-
Survey of text plagiarism detection
- AH Osman, N Salim, A Abuobieda
-
Computer Engineering and Applications Journal 1 (1), 37-45
|
43 |
-
Comparison jaccard similarity, cosine similarity and combined both of the data clustering with shared nearest neighbor method
- L Zahrotun
-
Computer Engineering and Applications Journal 5 (1), 11-18
|
23 |
-
Predicting academic performance with applying data mining techniques (generalizing the results of two different case studies)
- RJ Oskouei, M Askari
-
Computer Engineering and Applications Journal 3 (2), 79-88
|
19 |
-
Optimization of copy-move forgery detection technique
- A Kaur, R Sharma
-
Computer Engineering and Applications Journal 2 (2)
|
14 |
-
Clustering batik images using fuzzy c-means algorithm based on log-average luminance
- A Sanmorino
-
Computer Engineering and Applications Journal 1 (1), 25-31
|
14 |
-
Coronary heart disease interpretation based on deep neural network
- A Darmawahyuni, S Nurmaini, F Firdaus
-
Computer Engineering and Applications Journal 8 (1), 1-12
|
14 |
-
Object following design for a mobile robot using neural network
- N Larasati, T Dewi, Y Oktarina
-
Computer Engineering and Applications Journal 6 (1), 5-14
|
12 |
-
W_SR: A QoS based ranking approach for cloud computing service
- A Jahani, LM Khanli, SN Razavi
-
Computer Engineering and Applications Journal 3 (2), 55-62
|
11 |
-
Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android
- H Ubaya
-
Computer Engineering and Applications Journal 1 (1), 1-12
|
11 |
-
NFC based inventory control system for secure and efficient communication
- R Iqbal, A Ahmad, A Gilani
-
Computer Engineering and applications journal 3 (1), 23-33
|
11 |