- DocumentIJACSA_Volume 4 No 3téléversé parEditor IJACSA
- DocumentPaper 42-Automatic Skin Cancer Images Classificationtéléversé parEditor IJACSA
- DocumentPaper 41-Analytical Solution of the Perturbed Oribt-Attitudetéléversé parEditor IJACSA
- DocumentPaper 40-K-Modulus Method for Image Transformationtéléversé parEditor IJACSA
- DocumentPaper 39-Extended Standard Hough Transform for Analyticaltéléversé parEditor IJACSA
- DocumentPaper 38-Hybrid Approach for Detection of Hard Exudatestéléversé parEditor IJACSA
- DocumentPaper 37-Toward Evolution Strategies Application in Automatic Polyphonic Music Transcription Using Electronic Synthesistéléversé parEditor IJACSA
- DocumentPaper 36-A Novel Optical Network on Chip Design for Future Generation of Multiprocessors System on Chiptéléversé parEditor IJACSA
- DocumentPaper 35-Energy-Aware Fragmented Memory Architecture With a Switching Power Supply for Sensor Nodestéléversé parEditor IJACSA
- DocumentPaper 34-Algorithm to Match Ontologies on the Semantic Webtéléversé parEditor IJACSA
- DocumentPaper 33-Genetic Algorithms to Optimize Base Station Sitting in WCDMA Networkstéléversé parEditor IJACSA
- DocumentPaper 32-Draft Dynamic Student Learning in Designtéléversé parEditor IJACSA
- DocumentPaper 31-A Survey of Environment and Demands Along With a Marketing Communications Plantéléversé parEditor IJACSA
- DocumentPaper 30-Method for Psychological Status Estimation by Gaze Location Monitoring Using Eye Based Human Computer Interactiontéléversé parEditor IJACSA
- DocumentPaper 29-Multi Resolution Analysis of Multi Spectral Palmprints Using Hybrid Wavelets for Identificationtéléversé parEditor IJACSA
- DocumentPaper 28-Camera Mouse Including Ctrl-Alt-Del Key Operation Using Gaze Blink and Mouth Shapetéléversé parEditor IJACSA
- DocumentPaper 27-Pilot Study the Use of Electroencephalogram to Measure Attentiveness Towards Short Training Videostéléversé parEditor IJACSA
- DocumentPaper 26-A New Viewpoint for Mining Frequent Patternstéléversé parEditor IJACSA
- DocumentPaper 25-Mitigating Cyber Identity Fraud Using Advanced Multi Anti-Phishing Techniquetéléversé parEditor IJACSA
- DocumentPaper 24-A Posteriori Error Estimator for Mixed Approximation of the Navier-Stokes Equations With the C a b c Boundary Conditiontéléversé parEditor IJACSA
- DocumentPaper 23-A New Type Method for the Structured Variational Inequalities Problemtéléversé parEditor IJACSA
- DocumentPaper 22-A Fresnelet-Based Encryption of Medical Images Using Arnold Transformtéléversé parEditor IJACSA
- DocumentPaper 21-Diagnosing Learning Disabilities in a Special Education by an Intelligent Agent Based Systemtéléversé parEditor IJACSA
- DocumentPaper 20-Joint Operation in Public Key Cryptographytéléversé parEditor IJACSA
- DocumentPaper 19-Simulation of a WiMAX Network to Evaluate the Performance of MAC IEEE 802.16 During the IRtéléversé parEditor IJACSA
- DocumentPaper 18-Routing Discovery Algorithm Using Parallel Chase Packettéléversé parEditor IJACSA
- DocumentPaper 17-Sentiment Analyzer for Arabic Comments Systemtéléversé parEditor IJACSA
- DocumentPaper 16-Selection of Eigenvectors for Face Recognitiontéléversé parEditor IJACSA
- DocumentPaper 15-New Technique for Suppression Four-Wave Mixing Effects in SAC-OCDMA Networkstéléversé parEditor IJACSA
- DocumentPaper 14-Robust Facial Expression Recognition via Sparse Representation and Multiple Gabor Filterstéléversé parEditor IJACSA
- DocumentPaper 13-Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networkstéléversé parEditor IJACSA
- DocumentPaper 12-Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometerstéléversé parEditor IJACSA
- DocumentPaper 11-Collaborative Learning Skills in Multi-Touch Tables for UML Software Designtéléversé parEditor IJACSA
- DocumentPaper 10-Design of Semi-Adaptive 190-200 KHz Digital Band Pass Filters for SAR Applicationstéléversé parEditor IJACSA
- DocumentPaper 9-An Overview of Recent Machine Learning Strategies in Data Miningtéléversé parEditor IJACSA
- DocumentPaper 8-Resolution of Unsteady Navier-Stokes Equations With the C a b Boundary Conditiontéléversé parEditor IJACSA
- DocumentPaper 7-Quadrant Based WSN Routing Technique by Shifting of Origintéléversé parEditor IJACSA
- DocumentPaper 6-A Project Based CSIS-1 Course With an Active Learning Environmenttéléversé parEditor IJACSA
- DocumentPaper 5-Transmission Control for Fast Recovery of Rateless Codestéléversé parEditor IJACSA
- DocumentPaper 4-Spatial-Temporal Variations of Turbidity and Ocean Current Velocity of the Ariake Sea Areatéléversé parEditor IJACSA
- DocumentPaper 3-Interactive Application Development Policy Object 3D Virtual Tour Historytéléversé parEditor IJACSA
- DocumentPaper 2-Vicarious Calibration Based Cross Calibration of Solar Reflective Channels of Radiometers Onboard Remotetéléversé parEditor IJACSA
- DocumentPaper 1-Sensitivity Analysis and Validation of Refarctive Index Estimation Methodtéléversé parEditor IJACSA
- DocumentIJACSA_Volume 4 No 2téléversé parEditor IJACSA
- DocumentPaper 41-Reliable Network Traffic Collection for Networktéléversé parEditor IJACSA
- DocumentPaper 40-Algorithm Selection for Constraint Optimization Domainstéléversé parEditor IJACSA
- DocumentPaper 39-Reliable Global Navigation System Using Flowertéléversé parEditor IJACSA
- DocumentPaper 38-An Efficient Algorithm for Resource Allocation in Parallel and Distributed Computing Systemstéléversé parEditor IJACSA
- DocumentPaper 37-A Gaps Approach to Access the Efficiency and Effectivenesstéléversé parEditor IJACSA