Computer Engineering and Applications (ComEngApp) Journal
Computer Engineering and Applications (ComEngApp) Journal
Verified email at unsri.ac.id - Homepage
TitleCited byYear
Survey of text plagiarism detection
AH Osman, N Salim, A Abuobieda
Computer Engineering and Applications Journal (ComEngApp) 1 (1), 37-45, 2012
342012
Predicting academic performance with applying data mining techniques (Generalizing the results of two different case studies)
RJ Oskouei, M Askari
Computer Engineering and Applications Journal 3 (2), 79-88, 2014
132014
Optimization of copy-move forgery detection technique
A Kaur, R Sharma
Computer Engineering and Applications Journal 2 (2), 2013
122013
Comparison Jaccard similarity, cosine similarity and combined both of the data clustering with shared nearest neighbor method
L Zahrotun
Computer Engineering and Applications Journal 5 (1), 11-18, 2016
112016
W_SR: A QoS based ranking approach for cloud computing service
A Jahani, LM Khanli, SN Razavi
Computer Engineering and Applications Journal 3 (2), 55-62, 2014
112014
Clustering Batik Images using Fuzzy C-Means Algorithm Based on Log-Average Luminance
A Sanmorino
Computer Engineering and Applications Journal (ComEngApp) 1 (1), 25-31, 2012
102012
NFC based inventory control system for secure and efficient communication
R Iqbal, A Ahmad, A Gilani
Computer Engineering and applications journal 3 (1), 23-33, 2014
92014
C4. 5 versus other decision trees: A review
Salih, G Gumus, S Khalilov
Computer Engineering and Applications Journal 4 (3), 173-182, 2015
72015
Object following design for a mobile robot using neural network
N Larasati, T Dewi, Y Oktarina
Computer Engineering and Applications Journal 6 (1), 5-14, 2017
62017
An analysis of vulnerability web against attack unrestricted image file upload
I Riadi, EI Aristianto
Computer Engineering and Applications Journal 5 (1), 19-28, 2016
62016
Data Mining Applications in Big Data
L Wang, G Wang
Computer Engineering and Applications Journal 4 (3), 143-152, 2015
62015
Words stemming based on structural and semantic similarity
MH Dianati, MH Sadreddini, AH Rasekh, SM Fakhrahmad, ...
Computer Engineering and Applications Journal 3 (2), 89-99, 2014
62014
Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem
EH El Kinani, F Amounas
Computer Engineering and Applications Journal 2 (1), 151-160, 2013
62013
Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android
H Ubaya
Computer Engineering and Applications Journal 1 (1), 1-12, 2012
62012
Network selection problems-QoE vs QoS who is the winner?
VM Mohanan, I Aldmour
Computer Engineering and Applications Journal 4 (1), 1-18, 2015
52015
Energy efficient virtual machine placement algorithm with balanced resource utilization based on priority of resources
A Rahimi, LM Khanli, S Pashazadeh
Computer Engineering and Applications Journal 4 (2), 107-118, 2015
42015
RFID-based Drug Management and Monitoring System, Case of Public Hospitals in Tanzania, A Review Paper
P Ishabakaki, S Kaijage
Computer Engineering and Applications Journal 4 (3), 165-172, 2015
32015
Parallel Continuous Double Auction for Service Allocation in Cloud Computing
N Farajian, H Ebrahim pour-komleh
Computer Engineering and Applications Journal 4 (2), 133-142, 2015
32015
Codes correcting and simultaneously detecting solid burst errors
PK Das
Computer Engineering and Applications Journal 2 (2), 2013
32013
A survey of hand gesture dialogue modeling for map navigation
YY Pang, NA Ismail
Computer Engineering and Applications Journal (ComEngApp) 1 (2), 57-62, 2012
32012
The system can't perform the operation now. Try again later.
Articles 1–20