Browse Items (9485 total)

v103i10.pdf
This paper introduces the R package exuber for testing and date-stamping periods of
mildly explosive dynamics (exuberance) in time series. The package computes test statistics for the supremum augmented Dickey-Fuller test (SADF) of Phillips, Wu, and…

4437-Article Text-15598-1-10-20230202.pdf
Facial recognition is a part of Computer Vision that is used to get facial coordinates from an image. Many algorithms have
been developed to support Facial Detection such as Cascade Face Detection using Haar-Like features and AdaBoost to classify…

aakreditasi2017,+1511-3674-2-CE+55-63.pdf
Perkembangan teknologi berkembang dengan sangat cepat, sehingga memberikan banyak manfaat khususnya dalam bidang Teknologi Informasi. Permintaan layanan dengan penggunaan teknologi semakin banyak dibutuhkan oleh perusahaan. Salah satu…

editor_jiki,+1100.pdf
Face spoofing can provide inaccurate face verification results in the face recognition
system. Deep learning has been widely used to solve face spoofing problems. In face
spoofing detection, it is unnecessary to use the entire network layer to…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

57-Article Text-250-3-10-20250210.pdf
Generative Adversarial Networks (GANs)are a type of neural network that can generate synthetic images that are often indistinguishable from real ones. The article explores GAN to augment existing datasets or generate new onesfor training…

jiki,+Journal+manager,+Ready_Paper_968.pdf
During the COVID-19 pandemic, many offline activities are turned into online activities via video meetings to prevent the spread of the COVID-19 virus. In the online video meeting, some micro-interactions are missing when compared to direct social…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

10454-33043-1-PB.pdf
Transactions that indicate tunneling can impact business performance. Therefore, the tunneling that occurs in the use of assets must be properly controlled. Therefore, this research focuses on knowing the factors that influence the use of assets. The…

6205-19413-1-PB.pdf
The COVID-19 spread to all countries including Indonesia requires the government to refocus the budget and reallocate activities to accelerate the handling of this outbreak.There are still many local governments in South Sumatra that have not…

document (14).pdf
The current study investigated the effects of management commitment, energy awareness, energy knowledge, energy
audit towards energy efficiency which was further examined towards CO2 reduction in manufacturing firms of Thailand.
The sample of this…

document (9).pdf
Information systems are very important to support various organizational and individual activities. Therefore, information system security is an important issue in today's digital era, where it is very important to pay attention to the protection of…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2