American Journal of Applied Sciences

Research Article

Analysis of Financial Markets Integration of Iran Within the Middle East and with the Rest of the World

Pages : 1492-1508

DOI : 10.3844/ajassp.2013.1492.1508

Published On : October 10, 2013

The Cost Advantage of Sicilian Wine Farms

Pages : 1529-1536

DOI : 10.3844/ajassp.2013.1529.1536

Published On : October 18, 2013

Delay and Power Reduction in New Routing Fabrics

Pages : 1537-1545

DOI : 10.3844/ajassp.2013.1537.1545

Published On : October 23, 2013

Antecedents of Employee Engagement in the Manufacturing Sector

Pages : 1546-1552

DOI : 10.3844/ajassp.2013.1546.1552

Published On : October 23, 2013

Balanced Score Card Approach for Better Shari’ah Corporate Governance

Pages : 1553-1557

DOI : 10.3844/ajassp.2013.1553.1557

Published On : October 23, 2013

Advanced Energy Efficient Passive Clustering Mobility in Wireless Sensor Networks

Pages : 1558-1569

DOI : 10.3844/ajassp.2013.1558.1569

Published On : October 24, 2013

Measuring Drivers’ Effect in a Cost Model by Means of Analysis of Variance

Pages : 1570-1574

DOI : 10.3844/ajassp.2013.1570.1574

Published On : October 24, 2013

Imaging Spectroscopy and Light Detection and Ranging Data Fusion for Urban Features Extraction

Pages : 1575-1585

DOI : 10.3844/ajassp.2013.1575.1585

Published On : October 28, 2013

Egronomic Fingerprint Scanner Design for People with Motor Neuron Diseases

Pages : 1598-1603

DOI : 10.3844/ajassp.2013.1598.1603

Published On : October 28, 2013

Optimization of Clock Tree Synthesis Under Stochastic Process Variation Modeling for Multi-FPGA Systems

Pages : 1604-1615

DOI : 10.3844/ajassp.2013.1604.1615

Published On : October 29, 2013

Combined Pattern Mining for D3M Using Fuzzy

Pages : 1629-1633

DOI : 10.3844/ajassp.2013.1629.1633

Published On : November 1, 2013

Hodsong: A Monastery Ritual for a Local Wisdom Ceremony for the Monk Ranking

Pages : 1634-1637

DOI : 10.3844/ajassp.2013.1634.1637

Published On : November 2, 2013

Research on Security Protocol for Collaborating Mobile Agents in Network Intrusion Detection Systems

Pages : 1638-1647

DOI : 10.3844/ajassp.2013.1638.1647

Published On : November 7, 2013

Combating Cyber Terrorism-Assessment of Log for Malicious Signatures

Pages : 1660-1666

DOI : 10.3844/ajassp.2013.1660.1666

Published On : November 7, 2013