- DocumentoIJACSA_Volume 4 No 3caricato daEditor IJACSA
- DocumentoPaper 42-Automatic Skin Cancer Images Classificationcaricato daEditor IJACSA
- DocumentoPaper 41-Analytical Solution of the Perturbed Oribt-Attitudecaricato daEditor IJACSA
- DocumentoPaper 40-K-Modulus Method for Image Transformationcaricato daEditor IJACSA
- DocumentoPaper 39-Extended Standard Hough Transform for Analyticalcaricato daEditor IJACSA
- DocumentoPaper 38-Hybrid Approach for Detection of Hard Exudatescaricato daEditor IJACSA
- DocumentoPaper 37-Toward Evolution Strategies Application in Automatic Polyphonic Music Transcription Using Electronic Synthesiscaricato daEditor IJACSA
- DocumentoPaper 36-A Novel Optical Network on Chip Design for Future Generation of Multiprocessors System on Chipcaricato daEditor IJACSA
- DocumentoPaper 35-Energy-Aware Fragmented Memory Architecture With a Switching Power Supply for Sensor Nodescaricato daEditor IJACSA
- DocumentoPaper 34-Algorithm to Match Ontologies on the Semantic Webcaricato daEditor IJACSA
- DocumentoPaper 33-Genetic Algorithms to Optimize Base Station Sitting in WCDMA Networkscaricato daEditor IJACSA
- DocumentoPaper 32-Draft Dynamic Student Learning in Designcaricato daEditor IJACSA
- DocumentoPaper 31-A Survey of Environment and Demands Along With a Marketing Communications Plancaricato daEditor IJACSA
- DocumentoPaper 30-Method for Psychological Status Estimation by Gaze Location Monitoring Using Eye Based Human Computer Interactioncaricato daEditor IJACSA
- DocumentoPaper 29-Multi Resolution Analysis of Multi Spectral Palmprints Using Hybrid Wavelets for Identificationcaricato daEditor IJACSA
- DocumentoPaper 28-Camera Mouse Including Ctrl-Alt-Del Key Operation Using Gaze Blink and Mouth Shapecaricato daEditor IJACSA
- DocumentoPaper 27-Pilot Study the Use of Electroencephalogram to Measure Attentiveness Towards Short Training Videoscaricato daEditor IJACSA
- DocumentoPaper 26-A New Viewpoint for Mining Frequent Patternscaricato daEditor IJACSA
- DocumentoPaper 25-Mitigating Cyber Identity Fraud Using Advanced Multi Anti-Phishing Techniquecaricato daEditor IJACSA
- DocumentoPaper 24-A Posteriori Error Estimator for Mixed Approximation of the Navier-Stokes Equations With the C a b c Boundary Conditioncaricato daEditor IJACSA
- DocumentoPaper 23-A New Type Method for the Structured Variational Inequalities Problemcaricato daEditor IJACSA
- DocumentoPaper 22-A Fresnelet-Based Encryption of Medical Images Using Arnold Transformcaricato daEditor IJACSA
- DocumentoPaper 21-Diagnosing Learning Disabilities in a Special Education by an Intelligent Agent Based Systemcaricato daEditor IJACSA
- DocumentoPaper 20-Joint Operation in Public Key Cryptographycaricato daEditor IJACSA
- DocumentoPaper 19-Simulation of a WiMAX Network to Evaluate the Performance of MAC IEEE 802.16 During the IRcaricato daEditor IJACSA
- DocumentoPaper 18-Routing Discovery Algorithm Using Parallel Chase Packetcaricato daEditor IJACSA
- DocumentoPaper 17-Sentiment Analyzer for Arabic Comments Systemcaricato daEditor IJACSA
- DocumentoPaper 16-Selection of Eigenvectors for Face Recognitioncaricato daEditor IJACSA
- DocumentoPaper 15-New Technique for Suppression Four-Wave Mixing Effects in SAC-OCDMA Networkscaricato daEditor IJACSA
- DocumentoPaper 14-Robust Facial Expression Recognition via Sparse Representation and Multiple Gabor Filterscaricato daEditor IJACSA
- DocumentoPaper 13-Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networkscaricato daEditor IJACSA
- DocumentoPaper 12-Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometerscaricato daEditor IJACSA
- DocumentoPaper 11-Collaborative Learning Skills in Multi-Touch Tables for UML Software Designcaricato daEditor IJACSA
- DocumentoPaper 10-Design of Semi-Adaptive 190-200 KHz Digital Band Pass Filters for SAR Applicationscaricato daEditor IJACSA
- DocumentoPaper 9-An Overview of Recent Machine Learning Strategies in Data Miningcaricato daEditor IJACSA
- DocumentoPaper 8-Resolution of Unsteady Navier-Stokes Equations With the C a b Boundary Conditioncaricato daEditor IJACSA
- DocumentoPaper 7-Quadrant Based WSN Routing Technique by Shifting of Origincaricato daEditor IJACSA
- DocumentoPaper 6-A Project Based CSIS-1 Course With an Active Learning Environmentcaricato daEditor IJACSA
- DocumentoPaper 5-Transmission Control for Fast Recovery of Rateless Codescaricato daEditor IJACSA
- DocumentoPaper 4-Spatial-Temporal Variations of Turbidity and Ocean Current Velocity of the Ariake Sea Areacaricato daEditor IJACSA
- DocumentoPaper 3-Interactive Application Development Policy Object 3D Virtual Tour Historycaricato daEditor IJACSA
- DocumentoPaper 2-Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometers Onboard Remotecaricato daEditor IJACSA
- DocumentoPaper 1-Sensitivity Analysis and Validation of Refarctive Index Estimation Methodcaricato daEditor IJACSA
- DocumentoIJACSA_Volume 4 No 2caricato daEditor IJACSA
- DocumentoPaper 41-Reliable Network Traffic Collection for Networkcaricato daEditor IJACSA
- DocumentoPaper 40-Algorithm Selection for Constraint Optimization Domainscaricato daEditor IJACSA
- DocumentoPaper 39-Reliable Global Navigation System Using Flowercaricato daEditor IJACSA
- DocumentoPaper 38-An Efficient Algorithm for Resource Allocation in Parallel and Distributed Computing Systemscaricato daEditor IJACSA
- DocumentoPaper 37-A Gaps Approach to Access the Efficiency and Effectivenesscaricato daEditor IJACSA