Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android |
Application of Compound Bonding Based On Augmented Reality |
'A secure and optimized proximity mobile payment framework with formal verification' |
'Indonesian culture learning application based on android' |
'An extension for the mobile payment collaborative model proposed for developing countries—Egypt case study' |
'Astute license patrolling using near field communication technology' |
Analysis of Intercarrier Interference Cancellation Scheme in OFDM Systems |
'Comparison of OFDM system in terms of BER using different transform and channel coding' |
Clustering Batik Images using Fuzzy C-Means Algorithm Based on Log-Average Luminance |
'Inflation data clustering of some cities in Indonesia' |
Survey of Text Plagiarism Detection |
'Unmasking text plagiarism using syntactic-semantic based natural language processing techniques: Comparisons, analysis and challenges' |
'Role term-based semantic similarity technique for idea plagiarism detection' |
'Accurate detection of automatically spun content via stylometric analysis' |
'COUNTER: corpus of Urdu news text reuse' |
'Research on identification method of anonymous fake reviews in e-commerce' |
'Plagiarism detection in text documents using sentence bounded stop word n-grams' |
'UPPC - Urdu paraphrase plagiarism corpus' |
'Investigating the impact of combined similarity metrics and POS tagging in extrinsic text plagiarism detection system' |
'Plagiarism detection on electronic text based assignments using vector space model' |
'Using K-means cluster based techniques in external plagiarism detection' |
'Using Natural Language Processing techniques and fuzzy-semantic similarity for automatic external plagiarism detection' |
A Survey of Hand Gesture Dialogue Modeling For Map Navigation |
'A multimodal interaction for map navigation and evaluation study of its usability' |
Combined Classifier for Face Recognition using Legendre Moments |
'2D and 3D Image Analysis by Moments' |
'Hand shape recognition using Hu and legendre moments' |
Robotics Current Issues and Trends |
'Designing a low-cost web-controlled mobile robot for home monitoring' |
An Immune Based Patient Anomaly Detection using RFID Technology |
'Android malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization' |
Automatic Iranian Vehicle License Plate Recognition System Based on Support Vector Machine (SVM) Algorithms |
'Automatic character detection system for IC test handler based on active learning SVM' |
'Image super-resolution via sparse coding for Chinese license plate recognition' |
Optimization of Copy-Move Forgery Detection Technique |
'Copy-move and splicing image forgery detection and localization techniques: a review' |
'A survey on Image Forgery Detection techniques' |
A Hybrid Approach for Scheduling based on Multi-criteria Decision Method in Data Grid |
'An improved scheduling approach for efficient resource utilization and its application in bioinformatics grid' |
Classification of Smart Card Operating Systems |
'C2S, a new cryptographic command set for smart card operating system' |
NFC based inventory control system for secure and efficient communication |
'Internet of things in asset management: Insights from industrial professionals and academia' |
'An efficient technique to retrieve information from a damaged near-field communication tag' |
'NFC and Wi-Fi enabled smart clock for smart communication' |
'Wearable Near Field Communication ring antenna for mobile communication' |
'NFC tags-based notification system for medical appointments' |
W_SR: A QoS Based Ranking Approach for Cloud Computing Service |
'Computational MADM evaluation and ranking of cloud service providers using distance-based approach' |
'A cognitive approach for evaluating the usability of storage as a service in cloud computing environment' |
'A trust framework for ranking user as a cloud provider in peer-to-peer cloud system' |
'Fuzzy logic and AHP-based ranking of cloud service providers' |
'AHP-based ranking of cloud-service providers' |
Predicting Academic Performance with Applying Data Mining Techniques (Generalizing the results of two Different Case Studies) |
'A framework for smart academic guidance using educational data mining' |
'Performance analysis of students using machine learning &' |
'Early Warning System for Academic using Data Mining' |
'Running out of STEM: A comparative study across STEM majors of college students At-Risk of dropping out early' |
'Analyzing undergraduate students' performance using educational data mining' |
'A Review on Data Mining techniques and factors used in Educational Data Mining to predict student amelioration' |
Words Stemming Based on Structural and Semantic Similarity |
'A survey on Urdu and Urdu like language stemmers and stemming techniques' |
'Graph-based lemmatization of Turkish words by using morphological similarity' |
'Comparative study of various Persian stemmers in the field of information retrieval' |
Survey on Multi Agent Energy Efficient Clustering Algorithms in Wireless Sensor Networks |
'Distant biometry in cattle farm using wireless sensor networks' |
Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs |
'A survey on MANETs: Architecture, evolution, applications, security issues and solutions' |
Dynamic Location Modelling in 3D Beamforming for 5G Mobile Communications |
'Beam Division Multiple Access (BDMA) and modulation formats for 5G: Heir of OFDM?' |
Fingerprint Enhancement Algorithm Based-on Gradient Magnitude for the Estimation of Orientation Fields |
'Singular points detection in fingerprint images using the partitioning region of orientation fields' |
Energy efficient virtual machine placement algorithm with balanced resource utilization based on priority of resources |
'Priority-aware Virtual Machine selection algorithm in dynamic consolidation' |
'Construction and Resource Allocation of Cost-Efficient Clustered Virtual Network in Software Defined Networks' |
Parallel Continuous Double Auction for Service Allocation in Cloud Computing |
'A survey and future vision of double auctions-based autonomous cloud service negotiations' |
RFID-based Drug Management and Monitoring System, Case of Public Hospitals in Tanzania, A Review Paper |
'A survey on indigenous knowledge systems databases for African traditional medicines' |
C4.5 Versus Other Decision Trees: A Review |
'Optimized Classification Predictions with a New Index Combining Machine Learning Algorithms' |
Comparison Jaccard similarity, Cosine Similarity and Combined Both of the Data Clustering With Shared Nearest Neighbor Method |
'Identifying emerging research fields: a longitudinal latent semantic keyword analysis' |
Dual Band Fractal Antenna Design for Wireless Application |
'Bandwidth enhancement of circular ring fractal antenna for wireless applications' |
Object Reconstruction from 2D Drawing sketch to 3D Object |
'Developing tree height calculation by using aerial photographs for monitoring results of revegetation ex-mining land based on government regulation in Indonesia' |
Object Following Design for a Mobile Robot using Neural Network |
'Adaptive robust control strategy for rhombus-type lunar exploration wheeled mobile robot using wavelet transform and probabilistic neural network' |
'Neural network simulation for obstacle avoidance and wall follower robot as a helping tool for teaching-learning process in classroom' |
'Neural network controller design for a mobile robot navigation: A case study' |
Priority based computation: “An Initial study result of paradigm shift on real time computation” |
'Determination of fertilizer doses of plants utilizing the results of aerial photographs using fuzzy tsukamoto' |
'New model of vegetation monitoring using flying nir cameras with ndvi parameters and c-means' |
Python Source Code Plagiarism Attacks in Object-Oriented Environment |
'ES-Plag: Efficient and sensitive source code plagiarism detection tool for academic environment' |
Text Mining for Internship Titles Clustering Using Shared Nearest Neighbor |
'The implementation of k-means clustering method in classifying undergraduate thesis titles' |
Fuzzy Logic-Ant Colony Optimization for Explorer-Follower Robot with Global Optimal Path Planning |
'Enhancement of the Fuzzy Control Response with Particle Swarm Optimization in Mobile Robot System' |
Classification Method of Hand Gestures Based on Support Vector Machine |
'EMG finger movement classification based on ANFIS' |
'EMG based classification of hand gestures using PCA and ANFIS' |