- DocumentoIJACSA_Volume 4 No 3enviado por
Editor IJACSA
- DocumentoPaper 42-Automatic Skin Cancer Images Classificationenviado por
Editor IJACSA
- DocumentoPaper 41-Analytical Solution of the Perturbed Oribt-Attitudeenviado por
Editor IJACSA
- DocumentoPaper 40-K-Modulus Method for Image Transformationenviado por
Editor IJACSA
- DocumentoPaper 39-Extended Standard Hough Transform for Analyticalenviado por
Editor IJACSA
- DocumentoPaper 38-Hybrid Approach for Detection of Hard Exudatesenviado por
Editor IJACSA
- DocumentoPaper 37-Toward Evolution Strategies Application in Automatic Polyphonic Music Transcription Using Electronic Synthesisenviado por
Editor IJACSA
- DocumentoPaper 36-A Novel Optical Network on Chip Design for Future Generation of Multiprocessors System on Chipenviado por
Editor IJACSA
- DocumentoPaper 35-Energy-Aware Fragmented Memory Architecture With a Switching Power Supply for Sensor Nodesenviado por
Editor IJACSA
- DocumentoPaper 34-Algorithm to Match Ontologies on the Semantic Webenviado por
Editor IJACSA
- DocumentoPaper 33-Genetic Algorithms to Optimize Base Station Sitting in WCDMA Networksenviado por
Editor IJACSA
- DocumentoPaper 32-Draft Dynamic Student Learning in Designenviado por
Editor IJACSA
- DocumentoPaper 31-A Survey of Environment and Demands Along With a Marketing Communications Planenviado por
Editor IJACSA
- DocumentoPaper 30-Method for Psychological Status Estimation by Gaze Location Monitoring Using Eye Based Human Computer Interactionenviado por
Editor IJACSA
- DocumentoPaper 29-Multi Resolution Analysis of Multi Spectral Palmprints Using Hybrid Wavelets for Identificationenviado por
Editor IJACSA
- DocumentoPaper 28-Camera Mouse Including Ctrl-Alt-Del Key Operation Using Gaze Blink and Mouth Shapeenviado por
Editor IJACSA
- DocumentoPaper 27-Pilot Study the Use of Electroencephalogram to Measure Attentiveness Towards Short Training Videosenviado por
Editor IJACSA
- DocumentoPaper 26-A New Viewpoint for Mining Frequent Patternsenviado por
Editor IJACSA
- DocumentoPaper 25-Mitigating Cyber Identity Fraud Using Advanced Multi Anti-Phishing Techniqueenviado por
Editor IJACSA
- DocumentoPaper 24-A Posteriori Error Estimator for Mixed Approximation of the Navier-Stokes Equations With the C a b c Boundary Conditionenviado por
Editor IJACSA
- DocumentoPaper 23-A New Type Method for the Structured Variational Inequalities Problemenviado por
Editor IJACSA
- DocumentoPaper 22-A Fresnelet-Based Encryption of Medical Images Using Arnold Transformenviado por
Editor IJACSA
- DocumentoPaper 21-Diagnosing Learning Disabilities in a Special Education by an Intelligent Agent Based Systemenviado por
Editor IJACSA
- DocumentoPaper 20-Joint Operation in Public Key Cryptographyenviado por
Editor IJACSA
- DocumentoPaper 19-Simulation of a WiMAX Network to Evaluate the Performance of MAC IEEE 802.16 During the IRenviado por
Editor IJACSA
- DocumentoPaper 18-Routing Discovery Algorithm Using Parallel Chase Packetenviado por
Editor IJACSA
- DocumentoPaper 17-Sentiment Analyzer for Arabic Comments Systemenviado por
Editor IJACSA
- DocumentoPaper 16-Selection of Eigenvectors for Face Recognitionenviado por
Editor IJACSA
- DocumentoPaper 15-New Technique for Suppression Four-Wave Mixing Effects in SAC-OCDMA Networksenviado por
Editor IJACSA
- DocumentoPaper 14-Robust Facial Expression Recognition via Sparse Representation and Multiple Gabor Filtersenviado por
Editor IJACSA
- DocumentoPaper 13-Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networksenviado por
Editor IJACSA
- DocumentoPaper 12-Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometersenviado por
Editor IJACSA
- DocumentoPaper 11-Collaborative Learning Skills in Multi-Touch Tables for UML Software Designenviado por
Editor IJACSA
- DocumentoPaper 10-Design of Semi-Adaptive 190-200 KHz Digital Band Pass Filters for SAR Applicationsenviado por
Editor IJACSA
- DocumentoPaper 9-An Overview of Recent Machine Learning Strategies in Data Miningenviado por
Editor IJACSA
- DocumentoPaper 8-Resolution of Unsteady Navier-Stokes Equations With the C a b Boundary Conditionenviado por
Editor IJACSA
- DocumentoPaper 7-Quadrant Based WSN Routing Technique by Shifting of Originenviado por
Editor IJACSA
- DocumentoPaper 6-A Project Based CSIS-1 Course With an Active Learning Environmentenviado por
Editor IJACSA
- DocumentoPaper 5-Transmission Control for Fast Recovery of Rateless Codesenviado por
Editor IJACSA
- DocumentoPaper 4-Spatial-Temporal Variations of Turbidity and Ocean Current Velocity of the Ariake Sea Areaenviado por
Editor IJACSA
- DocumentoPaper 3-Interactive Application Development Policy Object 3D Virtual Tour Historyenviado por
Editor IJACSA
- DocumentoPaper 2-Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometers Onboard Remoteenviado por
Editor IJACSA
- DocumentoPaper 1-Sensitivity Analysis and Validation of Refarctive Index Estimation Methodenviado por
Editor IJACSA
- DocumentoIJACSA_Volume 4 No 2enviado por
Editor IJACSA
- DocumentoPaper 41-Reliable Network Traffic Collection for Networkenviado por
Editor IJACSA
- DocumentoPaper 40-Algorithm Selection for Constraint Optimization Domainsenviado por
Editor IJACSA
- DocumentoPaper 39-Reliable Global Navigation System Using Flowerenviado por
Editor IJACSA
- DocumentoPaper 38-An Efficient Algorithm for Resource Allocation in Parallel and Distributed Computing Systemsenviado por
Editor IJACSA
- DocumentoPaper 37-A Gaps Approach to Access the Efficiency and Effectivenessenviado por
Editor IJACSA