Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Journal of Advanced Computer Science & Technology
About
About the Journal
Author Guidelines
Indexing and Abstracting
Publication Ethics
Join us
Conferences
Article Processing Charges
Current Issue
Archives
Submit a Manuscript
Other Journals
Contact us
Search
Register
Login
Home
/
Archives
/
Vol. 4 No. 1 (2015)
Vol. 4 No. 1 (2015)
DOI:
https://doi.org/10.14419/jacst.v4i1
Published:
2014-12-25
Articles
A hybrid KNN-MLP algorithm to diagnose bipolar disorder
Mozhgan Mohammad Ghasemi, Mehdi Khalili
Pages: 1-5
DOI:
https://doi.org/10.14419/jacst.v4i1.3922
Coset decomposition method for storing and decoding fingerprint data
Mohamed Sayed
Pages: 6-11
DOI:
https://doi.org/10.14419/jacst.v4i1.3958
Using of SVM for diagnosis of major depressive disorder
Abdollah Ansari, Mehdi Khalili
Pages: 12-14
DOI:
https://doi.org/10.14419/jacst.v4i1.3994
Strategies and scenarios of CSRF attacks against the CAPTCHA forms
Hossein Moradi, Hossein Kardan Moghaddam
Pages: 15-22
DOI:
https://doi.org/10.14419/jacst.v4i1.3935
Presentation of an executable model for evaluation of software architecture using blackboard technique and formal models
Fatemeh Majidi, Ali Harounabadi
Pages: 23-31
DOI:
https://doi.org/10.14419/jacst.v4i1.3982
An optimized MLP model to diagnosis the bipolar disorder
Mozhgan Mohammad Ghasemi, Mehdi Khalili
Pages: 32-36
DOI:
https://doi.org/10.14419/jacst.v4i1.4038
An approach to implement interactive teaching in blended learning environments
Mohamed Sayed
Pages: 37-42
DOI:
https://doi.org/10.14419/jacst.v4i1.4129
A novel adaptive tolerance filter for random valued impulse noise suppression in digital grey and color images
Geeta Hanji, M. V. Latte
Pages: 43-52
DOI:
https://doi.org/10.14419/jacst.v4i1.3979
A new approach for finding semantic similar scientific articles
Masumeh Islami Nasab, Reza Javidan
Pages: 53-59
DOI:
https://doi.org/10.14419/jacst.v4i1.4012
Taxonomy of intelligence software reliability model
Saeed Ahmadluei
Pages: 60-67
DOI:
https://doi.org/10.14419/jacst.v4i1.4211
Solving optimization problems using black hole algorithm
Masoum Farahmandian, Abdolreza Hatamlou
Pages: 68-74
DOI:
https://doi.org/10.14419/jacst.v4i1.4094
The distributed parallel genetic algorithm on the ad hoc network
Nima Afifi, Hassan Tavakoli
Pages: 75-83
DOI:
https://doi.org/10.14419/jacst.v4i1.4162
Forecasting about EURJPY exchange rate using hidden Markova model and CART classification algorithm
Abdorrahman Haeri, Seyed Morteza Hatefi, Kamran Rezaie
Pages: 84-89
DOI:
https://doi.org/10.14419/jacst.v4i1.4194
New method for combining the channel coding with polar coding-based encryption
Mohammad Kenarkouhi, Hassan Tavakoli
Pages: 90-94
DOI:
https://doi.org/10.14419/jacst.v4i1.4163
A cluster based approach for wormhole attack detection in wireless sensor networks
Maliheh Shahryari, Hamid Reza Reza Naji
Pages: 95-102
DOI:
https://doi.org/10.14419/jacst.v4i1.4100
An evaluation of business models in e-mobile payment by using multiple criteria decision making
Abdolghader Pourali, Elham Hashempour
Pages: 103-115
DOI:
https://doi.org/10.14419/jacst.v4i1.4149
Strategies for enhancing the accuracy and security in ad hoc networks
Behnam Rahmani Delijani, Hassan Tavakoli
Pages: 116-121
DOI:
https://doi.org/10.14419/jacst.v4i1.4156
A novel authentication and access control framework in wireless sensor networks
Babak Nouri-Moghaddam, Hamid Reza Naji
Pages: 122-135
DOI:
https://doi.org/10.14419/jacst.v4i1.4307
Data integration of cost materials needs through a service oriented architecture (study case: pt x garment ungaran)
Erwien Christianto, Wiranto Utomo, Wiwin Sulistyo
Pages: 136-147
DOI:
https://doi.org/10.14419/jacst.v4i1.4309
New method for rapid diagnosis of Hepatitis disease based on reduction feature and machine learning
Nahid Khorashadizade, Hassan Rezaei
Pages: 148-155
DOI:
https://doi.org/10.14419/jacst.v4i1.4353
Using the interestingness measure lift to generate association rules
Nada Hussein, Abdallah Alashqur, Bilal Sowan
Pages: 156-162
DOI:
https://doi.org/10.14419/jacst.v4i1.4398
A four-phase data replication algorithm for data grid
Alireza Saleh, Reza Javidan, Mohammad Taghi FatehiKhajeh
Pages: 163-174
DOI:
https://doi.org/10.14419/jacst.v4i1.4009
Comparison criteria between matching algorithms texts application on (horspool's and brute force algorithms)
Amin Mubark Alamin Ibrahim, Mustafa Elgili Mustafa
Pages: 175-179
DOI:
https://doi.org/10.14419/jacst.v4i1.4283
ANN-based modeling of third order runge kutta method
M. Dehghanpour, A. Rahati, E. Dehghanian
Pages: 180-189
DOI:
https://doi.org/10.14419/jacst.v4i1.4365
Problem solving of container loading using genetic algorithm based on modified random keys
Mohammad Sadegh Arefi, Hassan Rezaei
Pages: 190-197
DOI:
https://doi.org/10.14419/jacst.v4i1.4348
Study of transient phenomena using NI-USB data acquisition systems in Matlab-Simulink medium on 64 bit operating systems
Niculescu Titu
Pages: 198-203
DOI:
https://doi.org/10.14419/jacst.v4i1.4518
A taxonomy of : The reviews on Cloud Computing Direction (CCD)
Alla Talal Yassin, Ban Kassim Alnidawy
Pages: 204-211
DOI:
https://doi.org/10.14419/jacst.v4i1.4564
Study of transitory phenomena at connecting the capacitive loads to an AC power source
Titu Niculescu, Marius Marcu, Florin Gabriel Popescu
Pages: 212-219
DOI:
https://doi.org/10.14419/jacst.v4i1.4656