ComEngApp Document Citedness in Scopus

The Computer Engineering and Application Journal (ComEngApp-Journal) is an open access journal that provides online publication of articles in all areas of the subject in computer engineering and application. Since 2012, ComEngApp-Jornal has a great contribution in the world of research which can be seen by its number of citation. By 2019, ComEngApp-Journal has been cited by 59 times in 27 SCOPUS indexed documents. The following table shows ComEngApp articles and the title of SCOPUS indexed documents in which the articles are cited.  

ComEngApp Document Cited By (Scopus Documents)
Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android Application of Compound Bonding Based On Augmented Reality
'A secure and optimized proximity mobile payment framework with formal verification'
'Indonesian culture learning application based on android'
'An extension for the mobile payment collaborative model proposed for developing countries—Egypt case study'
'Astute license patrolling using near field communication technology'
Analysis of Intercarrier Interference Cancellation Scheme in OFDM Systems 'Comparison of OFDM system in terms of BER using different transform and channel coding'
Clustering Batik Images using Fuzzy C-Means Algorithm Based on Log-Average Luminance 'Inflation data clustering of some cities in Indonesia'
Survey of Text Plagiarism Detection 'Unmasking text plagiarism using syntactic-semantic based natural language processing techniques: Comparisons, analysis and challenges'
'Accurate detection of automatically spun content via stylometric analysis'
'COUNTER: corpus of Urdu news text reuse'
'Research on identification method of anonymous fake reviews in e-commerce'
'Plagiarism detection in text documents using sentence bounded stop word n-grams'
'UPPC - Urdu paraphrase plagiarism corpus'
'Investigating the impact of combined similarity metrics and POS tagging in extrinsic text plagiarism detection system'
'Plagiarism detection on electronic text based assignments using vector space model'
'Using K-means cluster based techniques in external plagiarism detection'
'Using Natural Language Processing techniques and fuzzy-semantic similarity for automatic external plagiarism detection'
A Survey of Hand Gesture Dialogue Modeling For Map Navigation 'A multimodal interaction for map navigation and evaluation study of its usability'
Combined Classifier for Face Recognition using Legendre Moments '2D and 3D Image Analysis by Moments'
'Hand shape recognition using Hu and legendre moments'
Robotics Current Issues and Trends 'Designing a low-cost web-controlled mobile robot for home monitoring'
'Formation control of leader-follower robot using interval type-2 fuzzy logic controller'
An Immune Based Patient Anomaly Detection using RFID Technology 'Android malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization'
Automatic Iranian Vehicle License Plate Recognition System Based on Support Vector Machine (SVM) Algorithms 'Automatic character detection system for IC test handler based on active learning SVM'
'Image super-resolution via sparse coding for Chinese license plate recognition'
Optimization of Copy-Move Forgery Detection Technique 'Copy-move and splicing image forgery detection and localization techniques: a review'
'A survey on Image Forgery Detection techniques'
A Hybrid Approach for Scheduling based on Multi-criteria Decision Method in Data Grid 'An improved scheduling approach for efficient resource utilization and its application in bioinformatics grid'
NFC based inventory control system for secure and efficient communication 'An efficient technique to retrieve information from a damaged near-field communication tag'
'NFC and Wi-Fi enabled smart clock for smart communication'
'Wearable Near Field Communication ring antenna for mobile communication'
'NFC tags-based notification system for medical appointments'
W_SR: A QoS Based Ranking Approach for Cloud Computing Service 'Fuzzy logic and AHP-based ranking of cloud service providers'
'AHP-based ranking of cloud-service providers'
'Computational MADM evaluation and ranking of cloud service providers using distance-based approach'
'Prioritization tool of Cloud Computing service provider based on user requirement'
'Cloud service ranking as a multi objective optimization problem'
'A cognitive approach for evaluating the usability of storage as a service in cloud computing environment'
'A trust framework for ranking user as a cloud provider in peer-to-peer cloud system'
Predicting Academic Performance with Applying Data Mining Techniques (Generalizing the results of two Different Case Studies) 'Running out of STEM: A comparative study across STEM majors of college students At-Risk of dropping out early'
'A framework for smart academic guidance using educational data mining'
'Analyzing undergraduate students' performance using educational data mining'
'A Review on Data Mining techniques and factors used in Educational Data Mining to predict student amelioration'
Words Stemming Based on Structural and Semantic Similarity 'A survey on Urdu and Urdu like language stemmers and stemming techniques'
'Graph-based lemmatization of Turkish words by using morphological similarity'
'Comparative study of various Persian stemmers in the field of information retrieval'
Survey on Multi Agent Energy Efficient Clustering Algorithms in Wireless Sensor Networks 'Distant biometry in cattle farm using wireless sensor networks'
Dynamic Location Modelling in 3D Beamforming for 5G Mobile Communications 'Beam Division Multiple Access (BDMA) and modulation formats for 5G: Heir of OFDM?'
Energy efficient virtual machine placement algorithm with balanced resource utilization based on priority of resources  'Priority-aware Virtual Machine selection algorithm in dynamic consolidation'
'Construction and Resource Allocation of Cost-Efficient Clustered Virtual Network in Software Defined Networks'
Data Mining Applications in Big Data 'Spatiooral analysis of South Sumatera hotspot distribution'
Comparison Jaccard similarity, Cosine Similarity and Combined Both of the Data Clustering With Shared Nearest Neighbor Method 'Identifying emerging research fields: a longitudinal latent semantic keyword analysis'
Fingerprint Enhancement Algorithm Based-on Gradient Magnitude for the Estimation of Orientation Fields 'Singular points detection in fingerprint images using the partitioning region of orientation fields'
Parallel Continuous Double Auction for Service Allocation in Cloud Computing 'A survey and future vision of double auctions-based autonomous cloud service negotiations'
C4.5 Versus Other Decision Trees: A Review 'Optimized Classification Predictions with a New Index Combining Machine Learning Algorithms'
Object Following Design for a Mobile Robot using Neural Network 'Neural network simulation for obstacle avoidance and wall follower robot as a helping tool for teaching-learning process in classroom'
'Neural network controller design for a mobile robot navigation: A case study'
Python Source Code Plagiarism Attacks in Object-Oriented Environment 'ES-Plag: Efficient and sensitive source code plagiarism detection tool for academic environment'