Computer Engineering and Applications (ComEngApp) Journal
Computer Engineering and Applications (ComEngApp) Journal
Verified email at unsri.ac.id - Homepage
Title
Cited by
Cited by
Year
Survey of text plagiarism detection
AH Osman, N Salim, A Abuobieda
Computer Engineering and Applications Journal 1 (1), 37-45, 2012
432012
Comparison jaccard similarity, cosine similarity and combined both of the data clustering with shared nearest neighbor method
L Zahrotun
Computer Engineering and Applications Journal 5 (1), 11-18, 2016
202016
Predicting academic performance with applying data mining techniques (generalizing the results of two different case studies)
RJ Oskouei, M Askari
Computer Engineering and Applications Journal 3 (2), 79-88, 2014
192014
Clustering batik images using fuzzy c-means algorithm based on log-average luminance
A Sanmorino
Computer Engineering and Applications Journal 1 (1), 25-31, 2012
142012
Coronary heart disease interpretation based on deep neural network
A Darmawahyuni, S Nurmaini, F Firdaus
Computer Engineering and Applications Journal 8 (1), 1-12, 2019
132019
Optimization of copy-move forgery detection technique
A Kaur, R Sharma
Computer Engineering and Applications Journal 2 (2), 2013
132013
Object following design for a mobile robot using neural network
N Larasati, T Dewi, Y Oktarina
Computer Engineering and Applications Journal 6 (1), 5-14, 2017
122017
W_SR: A QoS based ranking approach for cloud computing service
A Jahani, LM Khanli, SN Razavi
Computer Engineering and Applications Journal 3 (2), 55-62, 2014
112014
NFC based inventory control system for secure and efficient communication
R Iqbal, A Ahmad, A Gilani
Computer Engineering and applications journal 3 (1), 23-33, 2014
112014
Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android
H Ubaya
Computer Engineering and Applications Journal 1 (1), 1-12, 2012
112012
C4. 5 versus other decision trees: A review
Salih, G Gumus, S Khalilov
Computer Engineering and Applications Journal 4 (3), 173-182, 2015
92015
Review of optimization techniques for sizing renewable energy systems
C Mekontso, A Abubakar, S Madugu, O Ibrahim, YA Adediran
Computer Engineering and Applications Journal 8 (1), 13-30, 2019
82019
An analysis of vulnerability web against attack unrestricted image file upload
I Riadi, EI Aristianto
Computer Engineering and Applications Journal 5 (1), 19-28, 2016
82016
Data mining applications in big data
L Wang, G Wang
Computer Engineering and Applications Journal 4 (3), 143-152, 2015
72015
Words stemming based on structural and semantic similarity
MH Dianati, MH Sadreddini, AH Rasekh, SM Fakhrahmad, ...
Computer Engineering and Applications Journal 3 (2), 89-99, 2014
72014
Energy efficient virtual machine placement algorithm with balanced resource utilization based on priority of resources
A Rahimi, LM Khanli, S Pashazadeh
Computer Engineering and Applications Journal 4 (2), 107-118, 2015
62015
Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem
EH El Kinani, F Amounas
Computer Engineering and Applications Journal 2 (1), 151-160, 2013
62013
Faces and eyes detection in digital images using cascade classifiers
AHA Mezher
Computer Engineering and Applications Journal 7 (1), 51-59, 2018
52018
Blob analysis for fruit recognition and detection
MD Yusuf, RD Kusumanto, Y Oktarina, T Dewi, P Risma
Computer Engineering and Applications Journal 7 (1), 23-32, 2018
52018
Faces and eyes detection in digital images using cascade classifiers
AHA Mezher
Computer Engineering and Applications Journal 7 (1), 51-59, 2018
52018
The system can't perform the operation now. Try again later.
Articles 1–20