Survey of text plagiarism detection AH Osman, N Salim, A Abuobieda Computer Engineering and Applications Journal 1 (1), 37-45, 2012 | 52 | 2012 |
Comparison jaccard similarity, cosine similarity and combined both of the data clustering with shared nearest neighbor method L Zahrotun Computer Engineering and Applications Journal 5 (1), 11-18, 2016 | 46 | 2016 |
Coronary heart disease interpretation based on deep neural network A Darmawahyuni, S Nurmaini, F Firdaus Computer Engineering and Applications Journal 8 (1), 1-12, 2019 | 34 | 2019 |
Predicting academic performance with applying data mining techniques (generalizing the results of two different case studies) RJ Oskouei, M Askari Computer Engineering and Applications Journal 3 (2), 79-88, 2014 | 33 | 2014 |
Indonesian culture learning application based on android A Setiawan, A Handojo International Journal of Electrical and Computer Engineering (IJECE) 7 (1 …, 2017 | 28 | 2017 |
Fuzzy-PID controller design of 4 DOF industrial arm robot manipulator Y Oktarina, F Septiarini, T Dewi, P Risma, M Nawawi Computer Engineering and Applications Journal 8 (2), 123-136, 2019 | 23 | 2019 |
Object following design for a mobile robot using neural network N Larasati, T Dewi, Y Oktarina Computer Engineering and Applications Journal 6 (1), 5-14, 2017 | 20 | 2017 |
Peak to Average Power Ratio Reduction in OFDM Using Pulse Shaping Technique D Das Computer Engineering and Applications Journal 5 (2), 57-64, 2016 | 18 | 2016 |
Review of optimization techniques for sizing renewable energy systems C Mekontso, A Abubakar, S Madugu, O Ibrahim, YA Adediran Computer Engineering and Applications Journal 8 (1), 13-30, 2019 | 17 | 2019 |
Optimization of copy-move forgery detection technique A Kaur, R Sharma Computer Engineering and Applications Journal 2 (2), 2013 | 17 | 2013 |
Blob analysis for fruit recognition and detection MD Yusuf, RD Kusumanto, Y Oktarina, T Dewi, P Risma Computer Engineering and Applications Journal 7 (1), 23-32, 2018 | 16 | 2018 |
NFC based inventory control system for secure and efficient communication R Iqbal, A Ahmad, A Gilani Computer Engineering and applications journal 3 (1), 23-33, 2014 | 16 | 2014 |
Clustering batik images using fuzzy C-means algorithm based on log-average luminance A Sanmorino Computer Engineering and Applications Journal 1 (1), 25-31, 2012 | 16 | 2012 |
Real Time Garbage Bin Capacity Monitoring NH Latifah, S Sitangsu, S Rasyad, AS Handayani Computer Engineering and Applications Journal 9 (2), 127-134, 2020 | 14 | 2020 |
An analysis of vulnerability web against attack unrestricted image file upload I Riadi, EI Aristianto Computer Engineering and Applications Journal 5 (1), 19-28, 2016 | 14 | 2016 |
Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android H Ubaya Computer Engineering and Applications Journal 1 (1), 1-12, 2012 | 14 | 2012 |
W_SR: A QoS based ranking approach for cloud computing service A Jahani, LM Khanli, SN Razavi Computer Engineering and Applications Journal 3 (2), 55-62, 2014 | 13 | 2014 |
Parking System Optimization Based on IoT using Face and Vehicle Plat Recognition via Amazon Web Service and ESP-32 CAM IF Ashari Computer Engineering and Applications Journal 11 (2), 137-153, 2022 | 11 | 2022 |
A computer security system for cloud computing based on encryption technique A Daniel, MO Momoh Computer Engineering and Applications Journal 10 (1), 41-54, 2021 | 11 | 2021 |
Assistive robotic technology: a review AS Prabuwono, KHS Allehaibi, K Kurnianingsih Computer Engineering and Applications Journal 6 (2), 71-78, 2017 | 11 | 2017 |