Computer Engineering and Applications (ComEngApp) Journal
Computer Engineering and Applications (ComEngApp) Journal
Verified email at unsri.ac.id - Homepage
TitleCited byYear
Survey of text plagiarism detection
AH Osman, N Salim, A Abuobieda
Computer Engineering and Applications Journal (ComEngApp) 1 (1), 37-45, 2012
322012
W_SR: A QoS based ranking approach for cloud computing service
A Jahani, LM Khanli, SN Razavi
Computer Engineering and Applications Journal 3 (2), 55-62, 2014
112014
Clustering Batik Images using Fuzzy C-Means Algorithm Based on Log-Average Luminance
A Sanmorino
Computer Engineering and Applications Journal (ComEngApp) 1 (1), 25-31, 2012
102012
Predicting academic performance with applying data mining techniques (Generalizing the results of two different case studies)
RJ Oskouei, M Askari
Computer Engineering and Applications Journal 3 (2), 79-88, 2014
92014
NFC based inventory control system for secure and efficient communication
R Iqbal, A Ahmad, A Gilani
Computer Engineering and applications journal 3 (1), 23-33, 2014
92014
Comparison Jaccard similarity, cosine similarity and combined both of the data clustering with shared nearest neighbor method
L Zahrotun
Computer Engineering and Applications Journal 5 (1), 11-18, 2016
72016
C4. 5 versus other decision trees: A review
Salih, G Gumus, S Khalilov
Computer Engineering and Applications Journal 4 (3), 173-182, 2015
72015
Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem
EH El Kinani, F Amounas
Computer Engineering and Applications Journal 2 (1), 151-160, 2013
62013
Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android
H Ubaya
Computer Engineering and Applications Journal 1 (1), 1-12, 2012
62012
Object following design for a mobile robot using neural network
N Larasati, T Dewi, Y Oktarina
Computer Engineering and Applications Journal 6 (1), 5-14, 2017
52017
Data Mining Applications in Big Data
L Wang, G Wang
Computer Engineering and Applications Journal 4 (3), 143-152, 2015
52015
Words stemming based on structural and semantic similarity
MH Dianati, MH Sadreddini, AH Rasekh, SM Fakhrahmad, ...
Computer Engineering and Applications Journal 3 (2), 89-99, 2014
52014
An analysis of vulnerability web against attack unrestricted image file upload
I Riadi, EI Aristianto
Computer Engineering and Applications Journal 5 (1), 19-28, 2016
42016
Energy efficient virtual machine placement algorithm with balanced resource utilization based on priority of resources
A Rahimi, LM Khanli, S Pashazadeh
Computer Engineering and Applications Journal 4 (2), 107-118, 2015
42015
Network selection problems-QoE vs QoS who is the winner?
VM Mohanan, I Aldmour
Computer Engineering and Applications Journal 4 (1), 1-18, 2015
42015
RFID-based Drug Management and Monitoring System, Case of Public Hospitals in Tanzania, A Review Paper
P Ishabakaki, S Kaijage
Computer Engineering and Applications Journal 4 (3), 165-172, 2015
32015
Codes correcting and simultaneously detecting solid burst errors
PK Das
Computer Engineering and Applications Journal 2 (2), 2013
32013
A survey of hand gesture dialogue modeling for map navigation
YY Pang, NA Ismail
Computer Engineering and Applications Journal (ComEngApp) 1 (2), 57-62, 2012
32012
Coronary Heart Disease Interpretation Based on Deep Neural Network
A Darmawahyuni, S Nurmaini, F Firdaus
Computer Engineering and Applications Journal 8 (1), 1-12, 2019
22019
Classification Method of Hand Gestures Based on Support Vector Machine
W Caesarendra, M Irfan
Computer Engineering and Applications Journal 7 (3), 179-190, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20