- DocumentoIJACSA_Volume 4 No 3enviado porEditor IJACSA
- DocumentoPaper 42-Automatic Skin Cancer Images Classificationenviado porEditor IJACSA
- DocumentoPaper 41-Analytical Solution of the Perturbed Oribt-Attitudeenviado porEditor IJACSA
- DocumentoPaper 40-K-Modulus Method for Image Transformationenviado porEditor IJACSA
- DocumentoPaper 39-Extended Standard Hough Transform for Analyticalenviado porEditor IJACSA
- DocumentoPaper 38-Hybrid Approach for Detection of Hard Exudatesenviado porEditor IJACSA
- DocumentoPaper 37-Toward Evolution Strategies Application in Automatic Polyphonic Music Transcription Using Electronic Synthesisenviado porEditor IJACSA
- DocumentoPaper 36-A Novel Optical Network on Chip Design for Future Generation of Multiprocessors System on Chipenviado porEditor IJACSA
- DocumentoPaper 35-Energy-Aware Fragmented Memory Architecture With a Switching Power Supply for Sensor Nodesenviado porEditor IJACSA
- DocumentoPaper 34-Algorithm to Match Ontologies on the Semantic Webenviado porEditor IJACSA
- DocumentoPaper 33-Genetic Algorithms to Optimize Base Station Sitting in WCDMA Networksenviado porEditor IJACSA
- DocumentoPaper 32-Draft Dynamic Student Learning in Designenviado porEditor IJACSA
- DocumentoPaper 31-A Survey of Environment and Demands Along With a Marketing Communications Planenviado porEditor IJACSA
- DocumentoPaper 30-Method for Psychological Status Estimation by Gaze Location Monitoring Using Eye Based Human Computer Interactionenviado porEditor IJACSA
- DocumentoPaper 29-Multi Resolution Analysis of Multi Spectral Palmprints Using Hybrid Wavelets for Identificationenviado porEditor IJACSA
- DocumentoPaper 28-Camera Mouse Including Ctrl-Alt-Del Key Operation Using Gaze Blink and Mouth Shapeenviado porEditor IJACSA
- DocumentoPaper 27-Pilot Study the Use of Electroencephalogram to Measure Attentiveness Towards Short Training Videosenviado porEditor IJACSA
- DocumentoPaper 26-A New Viewpoint for Mining Frequent Patternsenviado porEditor IJACSA
- DocumentoPaper 25-Mitigating Cyber Identity Fraud Using Advanced Multi Anti-Phishing Techniqueenviado porEditor IJACSA
- DocumentoPaper 24-A Posteriori Error Estimator for Mixed Approximation of the Navier-Stokes Equations With the C a b c Boundary Conditionenviado porEditor IJACSA
- DocumentoPaper 23-A New Type Method for the Structured Variational Inequalities Problemenviado porEditor IJACSA
- DocumentoPaper 22-A Fresnelet-Based Encryption of Medical Images Using Arnold Transformenviado porEditor IJACSA
- DocumentoPaper 21-Diagnosing Learning Disabilities in a Special Education by an Intelligent Agent Based Systemenviado porEditor IJACSA
- DocumentoPaper 20-Joint Operation in Public Key Cryptographyenviado porEditor IJACSA
- DocumentoPaper 19-Simulation of a WiMAX Network to Evaluate the Performance of MAC IEEE 802.16 During the IRenviado porEditor IJACSA
- DocumentoPaper 18-Routing Discovery Algorithm Using Parallel Chase Packetenviado porEditor IJACSA
- DocumentoPaper 17-Sentiment Analyzer for Arabic Comments Systemenviado porEditor IJACSA
- DocumentoPaper 16-Selection of Eigenvectors for Face Recognitionenviado porEditor IJACSA
- DocumentoPaper 15-New Technique for Suppression Four-Wave Mixing Effects in SAC-OCDMA Networksenviado porEditor IJACSA
- DocumentoPaper 14-Robust Facial Expression Recognition via Sparse Representation and Multiple Gabor Filtersenviado porEditor IJACSA
- DocumentoPaper 13-Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networksenviado porEditor IJACSA
- DocumentoPaper 12-Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometersenviado porEditor IJACSA
- DocumentoPaper 11-Collaborative Learning Skills in Multi-Touch Tables for UML Software Designenviado porEditor IJACSA
- DocumentoPaper 10-Design of Semi-Adaptive 190-200 KHz Digital Band Pass Filters for SAR Applicationsenviado porEditor IJACSA
- DocumentoPaper 9-An Overview of Recent Machine Learning Strategies in Data Miningenviado porEditor IJACSA
- DocumentoPaper 8-Resolution of Unsteady Navier-Stokes Equations With the C a b Boundary Conditionenviado porEditor IJACSA
- DocumentoPaper 7-Quadrant Based WSN Routing Technique by Shifting of Originenviado porEditor IJACSA
- DocumentoPaper 6-A Project Based CSIS-1 Course With an Active Learning Environmentenviado porEditor IJACSA
- DocumentoPaper 5-Transmission Control for Fast Recovery of Rateless Codesenviado porEditor IJACSA
- DocumentoPaper 4-Spatial-Temporal Variations of Turbidity and Ocean Current Velocity of the Ariake Sea Areaenviado porEditor IJACSA
- DocumentoPaper 3-Interactive Application Development Policy Object 3D Virtual Tour Historyenviado porEditor IJACSA
- DocumentoPaper 2-Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometers Onboard Remoteenviado porEditor IJACSA
- DocumentoPaper 1-Sensitivity Analysis and Validation of Refarctive Index Estimation Methodenviado porEditor IJACSA
- DocumentoIJACSA_Volume 4 No 2enviado porEditor IJACSA
- DocumentoPaper 41-Reliable Network Traffic Collection for Networkenviado porEditor IJACSA
- DocumentoPaper 40-Algorithm Selection for Constraint Optimization Domainsenviado porEditor IJACSA
- DocumentoPaper 39-Reliable Global Navigation System Using Flowerenviado porEditor IJACSA
- DocumentoPaper 38-An Efficient Algorithm for Resource Allocation in Parallel and Distributed Computing Systemsenviado porEditor IJACSA
- DocumentoPaper 37-A Gaps Approach to Access the Efficiency and Effectivenessenviado porEditor IJACSA