by El Mahdi Barrah, Rachid Ahdid, Said Safi and Abdessamad Malaoui
Original Research
In this paper, we present an automatic recognition system of electronic components. The recognition system is based on digital image of Nyquist curves drawn by transfer functions of their equivalent impedances. In the first step, we construct a database of Nyquist diagram of 17 known circuits. In the second step, we apply shape analysis algorithms of curves such as: Fourier Descriptors (FD), Freeman Coding (FC) and Hu Moments (HM). In classification part, we use the Neural Networks (NN). The simulation results demonstrates that the proposed method give a good results.abortion in the first trimester
bigwindcn.com pregnancy termination options
albuterol (salbutamol) 4mg
read diprolene
prescription discount codes
link viagra free coupon
coupons for viagra
click drug discount coupons
viagra discounts coupons
allied.edu coupons for viagra
Journal of Computer Sciences and Applications. 2015, 3(4), 100-104. DOI: 10.12691/jcsa-3-4-3
Pub. Date: November 05, 2015
22679 Views6425 Downloads14 Likes2 Citations
by Duane Yoder, Raihan Uddin Ahmed, Munsi Barkatullah and A. S. M Mahmudul Hasan
Original Research
The traditional cascading menu, commonly used in most desktop applications to traverse hierarchical menu systems, can be a time consuming and difficult task. In particular, the wider the submenu the more difficult it becomes to navigate the constraints of a menu item to reach the submenu. As a consequence, the submenu may disappear requiring additional attempts to attain the submenu. When a target menu items resides several layers deep, the required navigation can produce inefficient time and distance management. In this paper, we present an innovative cascading menu called the zigzag menu to address these issues. In the zigzag menu, submenus appear in alternating directions reducing the navigational distance to reach a submenu. A user study confirmed that a zigzag cascading menu effectively reduces the total mouse traversal required and decreases navigational time as familiarity with the system increases.black women white men
maxcook.com married woman looking to cheat
forced sex with siblings stories
femchoice.org masterbation classes sex stories
coupon free
go discount prescription cards
discount prescription coupons
read discount prescription drug card
discount prescription drug cards
click cialis prescription coupon
Journal of Computer Sciences and Applications. 2015, 3(4), 94-99. DOI: 10.12691/jcsa-3-4-2
Pub. Date: September 04, 2015
17374 Views5070 Downloads3 Likes
by Samah Ahmed Senbel, Ahmed Ibrahim and Nagy E Zaki
Original Research
A Mobile Ad hoc Network is a collection of two or more devices connect with another nodes with flexibility and nodes can connect and leave the network easily. The unreliability of wireless networks lack on infrastructure and a lot of attacks can communicate with the wireless network. In the Black hole attack, the malicious node absorbs the data. MANET Disadvantages all packets and traffic in the network are dropped by Black hole node. Black hole node has the shortest path in the entire network by sending fake route reply. In this paper, propose the effect of the Black hole attack on the network performance using AODV protocol. The proposed process uses the AODV Encryption decryption to detect the Black hole attack. AODV Encryption decryption is modification of AODV protocol to reduce the effect of Black hole attack by adding Encrypt/Decrypt function in AODV protocol.catch a cheat
go how to catch a cheater
lesbian sex stories
site mom sex stories
walgreens photo print coupon
open coupon for medication
coupons for drugs
link cialis savings and coupons
bystolic discount coupon
bystolic coupon 2014
Journal of Computer Sciences and Applications. 2015, 3(4), 90-93. DOI: 10.12691/jcsa-3-4-1
Pub. Date: September 03, 2015
21823 Views6552 Downloads4 Likes