IJCA Vol. 11, No. 6
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 2005-4297

Vol.1, No.1, 2008
Vol.2, No.1, 2009
Vol.2, No.2, 2009
Vol.2, No.3, 2009
Vol.2, No.4, 2009
Vol.3, No.1, 2010
Vol.3, No.2, 2010
Vol.3, No.3, 2010
Vol.3, No.4, 2010
Vol.4, No.1, 2011
Vol.4, No.2, 2011
Vol.4, No.3, 2011
Vol.4, No.4, 2011
Vol.5, No.1, 2012
Vol.5, No.2, 2012
Vol.5, No.3, 2012
Vol.5, No.4, 2012
Vol.6, No.1, 2013
Vol.6, No.2, 2013
Vol.6, No.3, 2013
Vol.6, No.4, 2013
Vol.6, No.5, 2013
Vol.6, No.6, 2013
Vol.7, No.1, 2014
Vol.7, No.2, 2014
Vol.7, No.3, 2014
Vol.7, No.4, 2014
Vol.7, No.5, 2014
Vol.7, No.6, 2014
Vol.7, No.7, 2014
Vol.7, No.8, 2014
Vol.7, No.9, 2014
Vol.7, No.10, 2014
Vol.7, No.11, 2014
Vol.7, No.12, 2014
Vol.8, No.1, 2015
Vol.8, No.2, 2015
Vol.8, No.3, 2015
Vol.8, No.4, 2015
Vol.8, No.5, 2015
Vol.8, No.6, 2015
Vol.8, No.7, 2015
Vol.8, No.8, 2015
Vol.8, No.9, 2015
Vol.8, No.10, 2015
Vol.8, No.11, 2015
Vol.8, No.12, 2015
Vol.9, No.1, 2016
Vol.9, No.2, 2016
Vol.9, No.3, 2016
Vol.9, No.4, 2016
Vol.9, No.5, 2016
Vol.9, No.6, 2016
Vol.9, No.7, 2016
Vol.9, No.8, 2016
Vol.9, No.9, 2016
Vol.9, No.10, 2016
Vol.9, No.11, 2016
Vol.9, No.12, 2016
Vol.10, No.1, 2017
Vol.10, No.2, 2017
Vol.10, No.3, 2017
Vol.10, No.4, 2017
Vol.10, No.5, 2017
Vol.10, No.6, 2017
Vol.10, No.7, 2017
Vol.10, No.8, 2017
Vol.10, No.9, 2017
Vol.10, No.10, 2017
Vol.10, No.11, 2017
Vol.10, No.12, 2017
Vol.11, No.1, 2018
Vol.11, No.2, 2018
Vol.11, No.3, 2018
Vol.11, No.4, 2018
Vol.11, No.5, 2018
Vol.11, No.6, 2018

 


Contents

  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • Scenario-based Log Dataset for Combating the Insider Threat, Seungwoo Kim, Jangju Kim, Dongwook Ha and Yeonseung Ryu (pp. 1-12).
  • Detection of Nitro-aromatic Explosives with Parametric Regression Modeling Approach, Dipali Ramdasi and Rohini Mudhalwadkar (pp. 13-24).
  • Study on the Influence of V2V Communication Noise on AEB System, Jungeun Lee and Byeongwoo Kim (pp. 25-34).
  • An Efficient Actuator Control Mechanism using Fuzzy Logic on Embedded System, Muhammad Fayaz and Do-Hyeun Kim (pp. 35-44).
  • Enhancement of Power Quality with Robust Series Active Filter under Harmonic Polluted Loading Conditions in Distribution Networks, Kumar Reddy Cheepati, Sardar Ali and Suraya Kalavathi.M (pp. 45-56).
  • Development of Monitoring and Classification Systems for Wave Energy, Henock M. Deberneh and Intaek Kim (pp. 57-66).
  • Performance Analysis of OFDM System Augmented with Hybrid Combination of Selective Mapping and Diverse Transforms, Shiwani Sandal and Lavish Kansal (pp. 67-76).
  • A Numerical Analysis of 1D Angular Interferometry Based on Random Array, Youssef Khmou, Said Safi and Miloud Frikel (pp. 77 -86).
  • Machine Vision-based Indoor Fire Detection Using Static and Dynamic Features, Rubayat Ahmed Khan, Jia Uddin, Sonia Corraya, Jong-Myon Kim (pp. 87-98).
  • Enhancing the Quality of Software Project Bug Repositories by Early Prediction of Average and Instantaneous Bug Closing Rates, Ekbal Rashid and Mohan Prakash (pp. 99-108).
  • Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph, Andysah Putera Utama Siahaan, Rusiadi, Phak Len Eh Kan, Ku Nurul Fazira Ku Azir and Amiza Amir (pp. 109-122).
  • SDN MPTCP Sub-Flows Routing Security Against MiTM Attacks, Mouhcine Chliah, Ghizlane Orhanou and Said El Hajji (pp. 123-136).
  • Copyright





 
____________________________________________