Submit a Manuscript
Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Journal of Advanced Computer Science & Technology (JACST)
About
About the Journal
Author Guidelines
Editorial Team
Indexing and Abstracting
Publication Ethics
Article Processing Charges
Current Issue
Archives
Submit a Manuscript
Other Journals
Contact us
Search
Register
Login
Home
/
Archives
/
Vol. 4 No. 1 (2015)
Vol. 4 No. 1 (2015)
Published:
2014-12-25
Articles
A hybrid KNN-MLP algorithm to diagnose bipolar disorder
Mozhgan Mohammad Ghasemi, Mehdi Khalili
https://doi.org/10.14419/jacst.v4i1.3922
1-5
Coset decomposition method for storing and decoding fingerprint data
Mohamed Sayed
https://doi.org/10.14419/jacst.v4i1.3958
6-11
Using of SVM for diagnosis of major depressive disorder
Abdollah Ansari, Mehdi Khalili
https://doi.org/10.14419/jacst.v4i1.3994
12-14
Strategies and scenarios of CSRF attacks against the CAPTCHA forms
Hossein Moradi, Hossein Kardan Moghaddam
https://doi.org/10.14419/jacst.v4i1.3935
15-22
Presentation of an executable model for evaluation of software architecture using blackboard technique and formal models
Fatemeh Majidi, Ali Harounabadi
https://doi.org/10.14419/jacst.v4i1.3982
23-31
An optimized MLP model to diagnosis the bipolar disorder
Mozhgan Mohammad Ghasemi, Mehdi Khalili
https://doi.org/10.14419/jacst.v4i1.4038
32-36
An approach to implement interactive teaching in blended learning environments
Mohamed Sayed
https://doi.org/10.14419/jacst.v4i1.4129
37-42
A novel adaptive tolerance filter for random valued impulse noise suppression in digital grey and color images
Geeta Hanji, M. V. Latte
https://doi.org/10.14419/jacst.v4i1.3979
43-52
A new approach for finding semantic similar scientific articles
Masumeh Islami Nasab, Reza Javidan
https://doi.org/10.14419/jacst.v4i1.4012
53-59
Taxonomy of intelligence software reliability model
Saeed Ahmadluei
https://doi.org/10.14419/jacst.v4i1.4211
60-67
Solving optimization problems using black hole algorithm
Masoum Farahmandian, Abdolreza Hatamlou
https://doi.org/10.14419/jacst.v4i1.4094
68-74
The distributed parallel genetic algorithm on the ad hoc network
Nima Afifi, Hassan Tavakoli
https://doi.org/10.14419/jacst.v4i1.4162
75-83
Forecasting about EURJPY exchange rate using hidden Markova model and CART classification algorithm
Abdorrahman Haeri, Seyed Morteza Hatefi, Kamran Rezaie
https://doi.org/10.14419/jacst.v4i1.4194
84-89
New method for combining the channel coding with polar coding-based encryption
Mohammad Kenarkouhi, Hassan Tavakoli
https://doi.org/10.14419/jacst.v4i1.4163
90-94
A cluster based approach for wormhole attack detection in wireless sensor networks
Maliheh Shahryari, Hamid Reza Reza Naji
https://doi.org/10.14419/jacst.v4i1.4100
95-102
An evaluation of business models in e-mobile payment by using multiple criteria decision making
Abdolghader Pourali, Elham Hashempour
https://doi.org/10.14419/jacst.v4i1.4149
103-115
Strategies for enhancing the accuracy and security in ad hoc networks
Behnam Rahmani Delijani, Hassan Tavakoli
https://doi.org/10.14419/jacst.v4i1.4156
116-121
A novel authentication and access control framework in wireless sensor networks
Babak Nouri-Moghaddam, Hamid Reza Naji
https://doi.org/10.14419/jacst.v4i1.4307
122-135
Data integration of cost materials needs through a service oriented architecture (study case: pt x garment ungaran)
Erwien Christianto, Wiranto Utomo, Wiwin Sulistyo
https://doi.org/10.14419/jacst.v4i1.4309
136-147
New method for rapid diagnosis of Hepatitis disease based on reduction feature and machine learning
Nahid Khorashadizade, Hassan Rezaei
https://doi.org/10.14419/jacst.v4i1.4353
148-155
Using the interestingness measure lift to generate association rules
Nada Hussein, Abdallah Alashqur, Bilal Sowan
https://doi.org/10.14419/jacst.v4i1.4398
156-162
A four-phase data replication algorithm for data grid
Alireza Saleh, Reza Javidan, Mohammad Taghi FatehiKhajeh
https://doi.org/10.14419/jacst.v4i1.4009
163-174
Comparison criteria between matching algorithms texts application on (horspool's and brute force algorithms)
Amin Mubark Alamin Ibrahim, Mustafa Elgili Mustafa
https://doi.org/10.14419/jacst.v4i1.4283
175-179
ANN-based modeling of third order runge kutta method
M. Dehghanpour, A. Rahati, E. Dehghanian
https://doi.org/10.14419/jacst.v4i1.4365
180-189
Problem solving of container loading using genetic algorithm based on modified random keys
Mohammad Sadegh Arefi, Hassan Rezaei
https://doi.org/10.14419/jacst.v4i1.4348
190-197
Study of transient phenomena using NI-USB data acquisition systems in Matlab-Simulink medium on 64 bit operating systems
Niculescu Titu
https://doi.org/10.14419/jacst.v4i1.4518
198-203
A taxonomy of : The reviews on Cloud Computing Direction (CCD)
Alla Talal Yassin, Ban Kassim Alnidawy
https://doi.org/10.14419/jacst.v4i1.4564
204-211
Study of transitory phenomena at connecting the capacitive loads to an AC power source
Titu Niculescu, Marius Marcu, Florin Gabriel Popescu
https://doi.org/10.14419/jacst.v4i1.4656
212-219