- DocumentoIJACSA_Volume 4 No 3caricato da
Editor IJACSA
- DocumentoPaper 42-Automatic Skin Cancer Images Classificationcaricato da
Editor IJACSA
- DocumentoPaper 41-Analytical Solution of the Perturbed Oribt-Attitudecaricato da
Editor IJACSA
- DocumentoPaper 40-K-Modulus Method for Image Transformationcaricato da
Editor IJACSA
- DocumentoPaper 39-Extended Standard Hough Transform for Analyticalcaricato da
Editor IJACSA
- DocumentoPaper 38-Hybrid Approach for Detection of Hard Exudatescaricato da
Editor IJACSA
- DocumentoPaper 37-Toward Evolution Strategies Application in Automatic Polyphonic Music Transcription Using Electronic Synthesiscaricato da
Editor IJACSA
- DocumentoPaper 36-A Novel Optical Network on Chip Design for Future Generation of Multiprocessors System on Chipcaricato da
Editor IJACSA
- DocumentoPaper 35-Energy-Aware Fragmented Memory Architecture With a Switching Power Supply for Sensor Nodescaricato da
Editor IJACSA
- DocumentoPaper 34-Algorithm to Match Ontologies on the Semantic Webcaricato da
Editor IJACSA
- DocumentoPaper 33-Genetic Algorithms to Optimize Base Station Sitting in WCDMA Networkscaricato da
Editor IJACSA
- DocumentoPaper 32-Draft Dynamic Student Learning in Designcaricato da
Editor IJACSA
- DocumentoPaper 31-A Survey of Environment and Demands Along With a Marketing Communications Plancaricato da
Editor IJACSA
- DocumentoPaper 30-Method for Psychological Status Estimation by Gaze Location Monitoring Using Eye Based Human Computer Interactioncaricato da
Editor IJACSA
- DocumentoPaper 29-Multi Resolution Analysis of Multi Spectral Palmprints Using Hybrid Wavelets for Identificationcaricato da
Editor IJACSA
- DocumentoPaper 28-Camera Mouse Including Ctrl-Alt-Del Key Operation Using Gaze Blink and Mouth Shapecaricato da
Editor IJACSA
- DocumentoPaper 27-Pilot Study the Use of Electroencephalogram to Measure Attentiveness Towards Short Training Videoscaricato da
Editor IJACSA
- DocumentoPaper 26-A New Viewpoint for Mining Frequent Patternscaricato da
Editor IJACSA
- DocumentoPaper 25-Mitigating Cyber Identity Fraud Using Advanced Multi Anti-Phishing Techniquecaricato da
Editor IJACSA
- DocumentoPaper 24-A Posteriori Error Estimator for Mixed Approximation of the Navier-Stokes Equations With the C a b c Boundary Conditioncaricato da
Editor IJACSA
- DocumentoPaper 23-A New Type Method for the Structured Variational Inequalities Problemcaricato da
Editor IJACSA
- DocumentoPaper 22-A Fresnelet-Based Encryption of Medical Images Using Arnold Transformcaricato da
Editor IJACSA
- DocumentoPaper 21-Diagnosing Learning Disabilities in a Special Education by an Intelligent Agent Based Systemcaricato da
Editor IJACSA
- DocumentoPaper 20-Joint Operation in Public Key Cryptographycaricato da
Editor IJACSA
- DocumentoPaper 19-Simulation of a WiMAX Network to Evaluate the Performance of MAC IEEE 802.16 During the IRcaricato da
Editor IJACSA
- DocumentoPaper 18-Routing Discovery Algorithm Using Parallel Chase Packetcaricato da
Editor IJACSA
- DocumentoPaper 17-Sentiment Analyzer for Arabic Comments Systemcaricato da
Editor IJACSA
- DocumentoPaper 16-Selection of Eigenvectors for Face Recognitioncaricato da
Editor IJACSA
- DocumentoPaper 15-New Technique for Suppression Four-Wave Mixing Effects in SAC-OCDMA Networkscaricato da
Editor IJACSA
- DocumentoPaper 14-Robust Facial Expression Recognition via Sparse Representation and Multiple Gabor Filterscaricato da
Editor IJACSA
- DocumentoPaper 13-Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networkscaricato da
Editor IJACSA
- DocumentoPaper 12-Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometerscaricato da
Editor IJACSA
- DocumentoPaper 11-Collaborative Learning Skills in Multi-Touch Tables for UML Software Designcaricato da
Editor IJACSA
- DocumentoPaper 10-Design of Semi-Adaptive 190-200 KHz Digital Band Pass Filters for SAR Applicationscaricato da
Editor IJACSA
- DocumentoPaper 9-An Overview of Recent Machine Learning Strategies in Data Miningcaricato da
Editor IJACSA
- DocumentoPaper 8-Resolution of Unsteady Navier-Stokes Equations With the C a b Boundary Conditioncaricato da
Editor IJACSA
- DocumentoPaper 7-Quadrant Based WSN Routing Technique by Shifting of Origincaricato da
Editor IJACSA
- DocumentoPaper 6-A Project Based CSIS-1 Course With an Active Learning Environmentcaricato da
Editor IJACSA
- DocumentoPaper 5-Transmission Control for Fast Recovery of Rateless Codescaricato da
Editor IJACSA
- DocumentoPaper 4-Spatial-Temporal Variations of Turbidity and Ocean Current Velocity of the Ariake Sea Areacaricato da
Editor IJACSA
- DocumentoPaper 3-Interactive Application Development Policy Object 3D Virtual Tour Historycaricato da
Editor IJACSA
- DocumentoPaper 2-Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometers Onboard Remotecaricato da
Editor IJACSA
- DocumentoPaper 1-Sensitivity Analysis and Validation of Refarctive Index Estimation Methodcaricato da
Editor IJACSA
- DocumentoIJACSA_Volume 4 No 2caricato da
Editor IJACSA
- DocumentoPaper 41-Reliable Network Traffic Collection for Networkcaricato da
Editor IJACSA
- DocumentoPaper 40-Algorithm Selection for Constraint Optimization Domainscaricato da
Editor IJACSA
- DocumentoPaper 39-Reliable Global Navigation System Using Flowercaricato da
Editor IJACSA
- DocumentoPaper 38-An Efficient Algorithm for Resource Allocation in Parallel and Distributed Computing Systemscaricato da
Editor IJACSA
- DocumentoPaper 37-A Gaps Approach to Access the Efficiency and Effectivenesscaricato da
Editor IJACSA