Comparison jaccard similarity, cosine similarity and combined both of the data clustering with shared nearest neighbor method L Zahrotun Computer Engineering and Applications Journal 5 (1), 11-18, 2016 | 88 | 2016 |
Survey of text plagiarism detection AH Osman, N Salim, A Abuobieda Computer Engineering and Applications Journal 1 (1), 37-45, 2012 | 58 | 2012 |
Fuzzy-PID controller design of 4 DOF industrial arm robot manipulator Y Oktarina, F Septiarini, T Dewi, P Risma, M Nawawi Computer Engineering and Applications Journal 8 (2), 123-136, 2019 | 39 | 2019 |
Coronary heart disease interpretation based on deep neural network A Darmawahyuni, S Nurmaini, F Firdaus Computer Engineering and Applications Journal 8 (1), 1-12, 2019 | 37 | 2019 |
Predicting academic performance with applying data mining techniques (generalizing the results of two different case studies) RJ Oskouei, M Askari Computer Engineering and Applications Journal 3 (2), 79-88, 2014 | 37 | 2014 |
Indonesian culture learning application based on android A Setiawan, A Handojo, R Hadi International Journal of Electrical and Computer Engineering 7 (1), 526, 2017 | 32 | 2017 |
Object following design for a mobile robot using neural network N Larasati, T Dewi, Y Oktarina Computer Engineering and Applications Journal 6 (1), 5-14, 2017 | 30 | 2017 |
Blob analysis for fruit recognition and detection MD Yusuf, RD Kusumanto, Y Oktarina, T Dewi, P Risma Computer Engineering and Applications Journal 7 (1), 23-32, 2018 | 27 | 2018 |
Peak to Average Power Ratio Reduction in OFDM Using Pulse Shaping Technique D Das Computer Engineering and Applications Journal 5 (2), 57-64, 2016 | 27 | 2016 |
Parking system optimization based on IoT using face and vehicle plat recognition via Amazon web service and ESP-32 CAM IF Ashari Computer Engineering and Applications Journal 11 (2), 137-153, 2022 | 26 | 2022 |
Review of optimization techniques for sizing renewable energy systems C Mekontso, A Abubakar, S Madugu, O Ibrahim, YA Adediran Computer Engineering and Applications Journal 8 (1), 13-30, 2019 | 24 | 2019 |
An analysis of vulnerability web against attack unrestricted image file upload I Riadi, EI Aristianto Computer Engineering and Applications Journal 5 (1), 19-28, 2016 | 22 | 2016 |
A computer security system for cloud computing based on encryption technique A Daniel, MO Momoh Computer Engineering and Applications Journal 10 (1), 41-54, 2021 | 21 | 2021 |
NFC based inventory control system for secure and efficient communication R Iqbal, A Ahmad, A Gilani Computer Engineering and applications journal 3 (1), 23-33, 2014 | 19 | 2014 |
Neural network controller application on a visual based object tracking and following robot P Risma, T Dewi, Y Oktarina, Y Wijanarko Computer Engineering and Applications Journal 8 (1), 31-40, 2019 | 18 | 2019 |
The effectiveness of image preprocessing on digital handwritten scripts recognition with the implementation of OCR Tesseract LR Mursari, A Wibowo Computer Engineering and Applications Journal 10 (3), 177-186, 2021 | 17 | 2021 |
Finger Cue for Mobile Robot Motion Control T Dewi, A Amperawan, P Risma, Y Oktarina, DA Yudha Computer Engineering and Applications Journal 9 (1), 39-48, 2020 | 17 | 2020 |
Clustering batik images using fuzzy C-means algorithm based on log-average luminance A Sanmorino Computer Engineering and Applications Journal 1 (1), 25-31, 2012 | 17 | 2012 |
Optimization of copy-move forgery detection technique A Kaur, R Sharma Computer Engineering and Applications Journal 2 (2), 2013 | 16 | 2013 |
Real Time Garbage Bin Capacity Monitoring NH Latifah, S Sitangsu, S Rasyad, AS Handayani Computer Engineering and Applications Journal 9 (2), 127-134, 2020 | 15 | 2020 |