- DokumentIJACSA_Volume 4 No 3hochgeladen vonEditor IJACSA
- DokumentPaper 42-Automatic Skin Cancer Images Classificationhochgeladen vonEditor IJACSA
- DokumentPaper 41-Analytical Solution of the Perturbed Oribt-Attitudehochgeladen vonEditor IJACSA
- DokumentPaper 40-K-Modulus Method for Image Transformationhochgeladen vonEditor IJACSA
- DokumentPaper 39-Extended Standard Hough Transform for Analyticalhochgeladen vonEditor IJACSA
- DokumentPaper 38-Hybrid Approach for Detection of Hard Exudateshochgeladen vonEditor IJACSA
- DokumentPaper 37-Toward Evolution Strategies Application in Automatic Polyphonic Music Transcription Using Electronic Synthesishochgeladen vonEditor IJACSA
- DokumentPaper 36-A Novel Optical Network on Chip Design for Future Generation of Multiprocessors System on Chiphochgeladen vonEditor IJACSA
- DokumentPaper 35-Energy-Aware Fragmented Memory Architecture With a Switching Power Supply for Sensor Nodeshochgeladen vonEditor IJACSA
- DokumentPaper 34-Algorithm to Match Ontologies on the Semantic Webhochgeladen vonEditor IJACSA
- DokumentPaper 33-Genetic Algorithms to Optimize Base Station Sitting in WCDMA Networkshochgeladen vonEditor IJACSA
- DokumentPaper 32-Draft Dynamic Student Learning in Designhochgeladen vonEditor IJACSA
- DokumentPaper 31-A Survey of Environment and Demands Along With a Marketing Communications Planhochgeladen vonEditor IJACSA
- DokumentPaper 30-Method for Psychological Status Estimation by Gaze Location Monitoring Using Eye Based Human Computer Interactionhochgeladen vonEditor IJACSA
- DokumentPaper 29-Multi Resolution Analysis of Multi Spectral Palmprints Using Hybrid Wavelets for Identificationhochgeladen vonEditor IJACSA
- DokumentPaper 28-Camera Mouse Including Ctrl-Alt-Del Key Operation Using Gaze Blink and Mouth Shapehochgeladen vonEditor IJACSA
- DokumentPaper 27-Pilot Study the Use of Electroencephalogram to Measure Attentiveness Towards Short Training Videoshochgeladen vonEditor IJACSA
- DokumentPaper 26-A New Viewpoint for Mining Frequent Patternshochgeladen vonEditor IJACSA
- DokumentPaper 25-Mitigating Cyber Identity Fraud Using Advanced Multi Anti-Phishing Techniquehochgeladen vonEditor IJACSA
- DokumentPaper 24-A Posteriori Error Estimator for Mixed Approximation of the Navier-Stokes Equations With the C a b c Boundary Conditionhochgeladen vonEditor IJACSA
- DokumentPaper 23-A New Type Method for the Structured Variational Inequalities Problemhochgeladen vonEditor IJACSA
- DokumentPaper 22-A Fresnelet-Based Encryption of Medical Images Using Arnold Transformhochgeladen vonEditor IJACSA
- DokumentPaper 21-Diagnosing Learning Disabilities in a Special Education by an Intelligent Agent Based Systemhochgeladen vonEditor IJACSA
- DokumentPaper 20-Joint Operation in Public Key Cryptographyhochgeladen vonEditor IJACSA
- DokumentPaper 19-Simulation of a WiMAX Network to Evaluate the Performance of MAC IEEE 802.16 During the IRhochgeladen vonEditor IJACSA
- DokumentPaper 18-Routing Discovery Algorithm Using Parallel Chase Packethochgeladen vonEditor IJACSA
- DokumentPaper 17-Sentiment Analyzer for Arabic Comments Systemhochgeladen vonEditor IJACSA
- DokumentPaper 16-Selection of Eigenvectors for Face Recognitionhochgeladen vonEditor IJACSA
- DokumentPaper 15-New Technique for Suppression Four-Wave Mixing Effects in SAC-OCDMA Networkshochgeladen vonEditor IJACSA
- DokumentPaper 14-Robust Facial Expression Recognition via Sparse Representation and Multiple Gabor Filtershochgeladen vonEditor IJACSA
- DokumentPaper 13-Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networkshochgeladen vonEditor IJACSA
- DokumentPaper 12-Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometershochgeladen vonEditor IJACSA
- DokumentPaper 11-Collaborative Learning Skills in Multi-Touch Tables for UML Software Designhochgeladen vonEditor IJACSA
- DokumentPaper 10-Design of Semi-Adaptive 190-200 KHz Digital Band Pass Filters for SAR Applicationshochgeladen vonEditor IJACSA
- DokumentPaper 9-An Overview of Recent Machine Learning Strategies in Data Mininghochgeladen vonEditor IJACSA
- DokumentPaper 8-Resolution of Unsteady Navier-Stokes Equations With the C a b Boundary Conditionhochgeladen vonEditor IJACSA
- DokumentPaper 7-Quadrant Based WSN Routing Technique by Shifting of Originhochgeladen vonEditor IJACSA
- DokumentPaper 6-A Project Based CSIS-1 Course With an Active Learning Environmenthochgeladen vonEditor IJACSA
- DokumentPaper 5-Transmission Control for Fast Recovery of Rateless Codeshochgeladen vonEditor IJACSA
- DokumentPaper 4-Spatial-Temporal Variations of Turbidity and Ocean Current Velocity of the Ariake Sea Areahochgeladen vonEditor IJACSA
- DokumentPaper 3-Interactive Application Development Policy Object 3D Virtual Tour Historyhochgeladen vonEditor IJACSA
- DokumentPaper 2-Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometers Onboard Remotehochgeladen vonEditor IJACSA
- DokumentPaper 1-Sensitivity Analysis and Validation of Refarctive Index Estimation Methodhochgeladen vonEditor IJACSA
- DokumentIJACSA_Volume 4 No 2hochgeladen vonEditor IJACSA
- DokumentPaper 41-Reliable Network Traffic Collection for Networkhochgeladen vonEditor IJACSA
- DokumentPaper 40-Algorithm Selection for Constraint Optimization Domainshochgeladen vonEditor IJACSA
- DokumentPaper 39-Reliable Global Navigation System Using Flowerhochgeladen vonEditor IJACSA
- DokumentPaper 38-An Efficient Algorithm for Resource Allocation in Parallel and Distributed Computing Systemshochgeladen vonEditor IJACSA
- DokumentPaper 37-A Gaps Approach to Access the Efficiency and Effectivenesshochgeladen vonEditor IJACSA