Browse Items (9344 total)

16725-Article Text-73213-2-10-20231006.pdf
In this paper, a 180-nm CMOS ring oscillator design, made with halo-implanted transistors andoperating in the weak inversion region, is proposed, based on an undergraduate integrated circuit design course methodology for building…

2_A+Survey+of+Deep+Learning+Solutions+for+Anomaly.pdf
Deep learning has proven to be a landmark computing approach to the computer vision domain. Hence, it has been widely applied to solve complex cognitive tasks like the detection of anomalies in surveillance videos. Anomaly detection in this case is…

4_A+Systematic+Literature+Review+of+Hausa+Natural.pdf
The processing of natural languages is an area of computer science that has gained growing attention recently. NLP helps computers recognize, in other words, the ways in which people use their language. NLP research, however, has been performed…

7791-32184-1-PB.pdf
Relationship marketing (RM) is an important issue in every business because it is
a key component of long-term business success. Small and Medium Enterprises
(SMEs) are an important business sector in economic growth. This study aims to
find out…

1-s2.0-S2444883424000251-main.pdf
This study aims to systematically examine the Pay-What-You-Want (PWYW) pricing model, which has become increasingly popular among innovative strategies. The PWYW model offers an unconventional approach by giving consumers the power to determine the…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

5_A+Systematic+Literature+Review+on+Phishing+Detection+Model.pdf
This paper introduces a unique method using supervised learning techniques in a hybrid crime detection model to identify phishing attempts on social media sites. Effective detection systems are desperately needed given the rise in criminality on…

jiki,+Journal+manager,+1017.pdf
Image enhancement as a problem-oriented process of optimizing visual appearances to provide easier-toprocess input to automated image processing techniques is an area that will consistently be a companion
to computer vision despite advances in…

Tags: ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

document (12).pdf
Securing data is the main goal of any data security system (DSS). Valuable data must be protected all the time and stored in a very and highly
secure data storage device. This need has become more critical due to the continuous growth of data size.…

zmac040.pdf
Given how strongly social media is permeating young people’s everyday lives, many of them have formed strong habits that, under specific

circumstances, can spiral out of control and bring harmful experiences. Unlike in extant literature where…

zmac040 (1).pdf
Given how strongly social media is permeating young people’s everyday lives, many of them have formed strong habits that, under specific

circumstances, can spiral out of control and bring harmful experiences. Unlike in extant literature where…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2