Browse Items (9485 total)

4_A+Biometric+Authentication+Scheme+to+Enhance.pdf
Access control and security within higher education institutions are of paramount importance in safeguarding sensitive information and resources. Conventional authentication methods, such as passwords and identification cards, have proven susceptible…

jiki,+Journal+manager,+959.pdf
K-nearest neighbor (KNN) is an effective nonparametric classifier that determines the neighbors of a point based only on distance proximity. The classification performance of KNN is disadvantaged by the presence of outliers in small sample size…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

1-s2.0-S2444883421000085-main.pdf
The purpose of this paper is to improve understanding of Tourism Innovation by using a Uses and Gratification Theory model to investigate tourist intention to visit a city after reading other users' valuations of the destination on Mobile…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

5_A+Centrality+Maximization+Approach+for+Link.pdf
In social networks, the goal of link recommendation is to recommend links for nodes and add them to the network, thereby satisfying the potential link interests of the nodes. The centrality of nodes in social networks typically quantifies the…

3_A+Cloud-based+Framework+for+Quality+Assurance.pdf
The dynamic and multi-dimensional quality assurance process for Saudi higher education institutes under the National Commission for Academic Accreditation and Assessment (NCAAA) demands an integrated framework for management and support of internal…

4766-Article Text-15600-1-10-20230202.pdf
Multi-class classification has its challenge compared to binary classification. The challenges mainly caused by the interactions
between explanatory and responses variable are increasingly complex. Ensemble-based methods such as boosting and random…

61-Article Text-277-3-10-20250210 (1).pdf
AbstractThis study addresses the escalating challenge of Twitter spam detection by leveraging the power of Convolutional Neural Networks (CNNs). With the proliferation of spam content on social media platforms, traditional machine…

3_A+Comparative+Study+of+Gameplay+of+Different+Sets+of+Players+in+an+Engineering+Mapping+Game.pdf
Educators in the STEM (science, technology, engineering, and mathematics) field are constantly employing different tools to make the process of education streamlined and fun. The digital gaming platform also called e-gaming platform has evolved as…

editor,+3_A+Comparative+Study+on+South+African+Users’.pdf
Mobile technologies are increasingly making important contributions to the lives of many users. Various factors are said to influence the decision of users to remain connected and be in constant interaction with other users from the same or different…

jiki,+Journal+manager,+818.pdf
The existence of missing values will really inhibit process of clustering. To overcome it, some of scientists have found several solutions. Both of them are imputation and special clustering algorithms. This paper compared the results of clustering…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

Output Formats

atom, dcmes-xml, json, omeka-xml, rss2