In this paper, a 180-nm CMOS ring oscillator design, made with halo-implanted transistors andoperating in the weak inversion region, is proposed, based on an undergraduate integrated circuit design course methodology for building…
Deep learning has proven to be a landmark computing approach to the computer vision domain. Hence, it has been widely applied to solve complex cognitive tasks like the detection of anomalies in surveillance videos. Anomaly detection in this case is…
The processing of natural languages is an area of computer science that has gained growing attention recently. NLP helps computers recognize, in other words, the ways in which people use their language. NLP research, however, has been performed…
Relationship marketing (RM) is an important issue in every business because it is
a key component of long-term business success. Small and Medium Enterprises
(SMEs) are an important business sector in economic growth. This study aims to
find out…
This study aims to systematically examine the Pay-What-You-Want (PWYW) pricing model, which has become increasingly popular among innovative strategies. The PWYW model offers an unconventional approach by giving consumers the power to determine the…
Tags:Pay-What-You-Want,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , PRISMA protocol,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , Systematic literature review
This paper introduces a unique method using supervised learning techniques in a hybrid crime detection model to identify phishing attempts on social media sites. Effective detection systems are desperately needed given the rise in criminality on…
Image enhancement as a problem-oriented process of optimizing visual appearances to provide easier-toprocess input to automated image processing techniques is an area that will consistently be a companion
to computer vision despite advances in…
Tags:Computer Vision,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , CV,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , image enhancement,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , machine learning,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , MI
Securing data is the main goal of any data security system (DSS). Valuable data must be protected all the time and stored in a very and highly
secure data storage device. This need has become more critical due to the continuous growth of data size.…