Browse Items (9465 total)

3297-Article Text-9907-1-10-20210825.pdf
The RSA algorithm is one of the cryptographic algorithms with an asymmetric model where the algorithm has two keys, namely
the public key and the private key. However, as time goes on, these algorithms are increasingly exposed to security holes…

An-Analysis-of-Individual-and-Social-Factors-Affectin_2019_Safety-and-Health.pdf
Background: Workforce health is one of the primary and most challenging issues, particularly in industrialized countries. This article aims at modeling the major factors affecting accidents in the workplace, including general health, workefamily…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

4441-Article Text-15592-1-10-20230202.pdf
One of the neural network algorithms that can be used in iris recognition is self-organizing map (SOM). This algorithm has a
weakness in determining the initial weight of the network, which is generally carried out randomly, which can result in a…

s12873-025-01227-7.pdf
Over the past few years, Iran has experienced several earthquakes. The literature has highlighted the significant role played by Iranian nurses in the Kermanshah earthquake. However, few studies have been conducted to investigate nurses’ responses to…

LAPORAN SKRIPSI_43E57006185014_AMIRULBAIHAQQI_compressed.pdf
Dalam pengelolaan sumber daya manusia merupakan upaya untuk pencapaiaan
tujuan perusahaan. Pimpinan perusahaan mengharapkan kinerja yang baik dari
masing-masing karyawan dalam mengerjakan pekerjaan yang sudah di tugaskan
oleh perusahaan.…

Challenges_in_abdominal_reexpl.PDF
Background: During the Syrian civil war, patients were initially treated on-site in Syria and later transferred to medical
centers in Israel. Relevant details concerning the exact nature of injury and medical/surgical care received in Syria
were…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

14279-46555-1-PB.pdf
Cryptography is one of the paramount and most vital data treatment processes, it allows us to be secure in our electronic transactions. The process of cryptography protects our valuable data such as private account numbers and transaction amounts,…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

13696-Article Text-50513-2-10-20210906.pdf
Abstract. Universal mobile networks require enhanced capability and appropriate quality of service (QoS) and experience (QoE). To achieve this, Long Term Evolution (LTE) system operators have intensively deployed femtocells (HeNBs) along with…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

21683-Article Text-83151-1-10-20240627.pdf
Melanoma, a highly malignant form of skin cancer, affects individuals of all genders and is associated with high mortality rates, especially in advanced stages. The use of tele-dermatology has emerged as a proficient diagnostic approach for…

document (7).pdf
A supply chain should be operated in the most efficient way in a highly competitive environment, with the goals of cost
minimization, shipment delays, inventories and expenditures, and distribution maximization, gain, return on investment,
level of…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2