Journal of Computer Science

Research Article

A COMPARATIVE STUDY FOR RHODOPSIN PROTEIN FOLDING PROBLEM

Pages : 1890-1899

DOI : 10.3844/jcssp.2014.1890.1899

Published On : May 6, 2014

BRAIN TUMOR CLASSIFICATION BASED ON CLUSTERED DISCRETE COSINE TRANSFORM IN COMPRESSED DOMAIN

Pages : 1908-1916

DOI : 10.3844/jcssp.2014.1908.1916

Published On : May 6, 2014

INFLUENCE OF EVOLUTIONARY COMPUTING ON NUTRITION RECOMMENDATION: A SURVEY

Pages : 1917-1923

DOI : 10.3844/jcssp.2014.1917.1923

Published On : May 8, 2014

SOPC BASED WIRELESS REMOTE PATIENT MONITORING USING ULTRA LIGHTWEIGHT CRYPTOGRAPHY

Pages : 1924-1928

DOI : 10.3844/jcssp.2014.1924.1928

Published On : May 8, 2014

METADATA DRIVEN EFFICIENT KEY GENERATION AND DISTRIBUTION IN CLOUD SECURITY

Pages : 1929-1938

DOI : 10.3844/jcssp.2014.1929.1938

Published On : May 12, 2014

AN EVENT DRIVEN SIMULATION FOR ADAPTIVE GENTLE RANDOM EARLY DETECTION (AGRED) ALGORITHM

Pages : 1939-1945

DOI : 10.3844/jcssp.2014.1939.1945

Published On : May 13, 2014

PROCESS MAPPING FOR SERVICE DELIVERY THROUGH NSDG IN PUBLIC TRANSPORTATION IN INDIA

Pages : 1955-1960

DOI : 10.3844/jcssp.2014.1955.1960

Published On : May 12, 2014

SUPERVISED TERM WEIGHTING METHODS FOR URL CLASSIFICATION

Pages : 1969-1976

DOI : 10.3844/jcssp.2014.1969.1976

Published On : June 23, 2014

CONSTRAINT SOVLING ENGINE BASED NURSE ROSTERING WITH INTELLIGENT BACKTRACKING

Pages : 1977-1984

DOI : 10.3844/jcssp.2014.1977.1984

Published On : May 22, 2014

A NEW METHOD FOR 3D SHAPE INDEXING AND RETRIEVAL IN LARGE DATABASE BY USING THE LEVEL CUT

Pages : 1985-1993

DOI : 10.3844/jcssp.2014.1985.1993

Published On : May 22, 2014

TRACKING THE POSITION OF MULTIPLE HUMAN GESTURES USING CONTOUR MAPPING ALGORITHM

Pages : 1994-2005

DOI : 10.3844/jcssp.2014.1994.2005

Published On : May 22, 2014

THE SECURITY SURVEY AND ANAYLSIS ON SUPERVISORY CONTROL AND DATA ACQUISITION COMMUNICATION

Pages : 2006-2019

DOI : 10.3844/jcssp.2014.2006.2019

Published On : June 23, 2014

INTRUSION DETECTION SYSTEM IN SECURE SHELL TRAFFIC IN CLOUD ENVIRONMENT

Pages : 2029-2036

DOI : 10.3844/jcssp.2014.2029.2036

Published On : June 26, 2014

REVIEW CLUSTERING MECHANISMS OF DISTRIBUTED DENIAL OF SERVICE ATTACKS

Pages : 2037-2046

DOI : 10.3844/jcssp.2014.2037.2046

Published On : June 26, 2014

SENSOR NETWORK PERIODICAL DATA ASSEMBLY USING IMBALANCED CLUSTERING ENERGY EFFICIENT MECHANISM

Pages : 2047-2054

DOI : 10.3844/jcssp.2014.2047.2054

Published On : June 28, 2014

A FAST AND ACCURATE METHOD FOR AUTOMATIC CORONARY ARTERIAL TREE EXTRACTION IN ANGIOGRAMS

Pages : 2060-2076

DOI : 10.3844/jcssp.2014.2060.2076

Published On : June 27, 2014

A LIGHT-WEIGHT CRYPTOGRAPHY ANALYSIS FOR WIRELESS BASED HEALTHCARE APPLICATIONS

Pages : 2088-2094

DOI : 10.3844/jcssp.2014.2088.2094

Published On : June 28, 2014

IMAGE COMPRESSION BASED ON SVD AND MPQ-BTC

Pages : 2095-2104

DOI : 10.3844/jcssp.2014.2095.2104

Published On : June 30, 2014

FREQUENT CORRELATED PERIODIC PATTERN MINING FOR LARGE VOLUME SET USING TIME SERIES DATA

Pages : 2105-2116

DOI : 10.3844/jcssp.2014.2105.2116

Published On : June 30, 2014

BEEBOARD: FROM WIIMOTE TO INTERACTIVE WHITEBOARD APPLICATION FOR CLASSROOM

Pages : 2117-2123

DOI : 10.3844/jcssp.2014.2117.2123

Published On : July 1, 2014

A STUDY OF SPAM DETECTION ALGORITHM ON SOCIAL MEDIA NETWORKS

Pages : 2135-2140

DOI : 10.3844/jcssp.2014.2135.2140

Published On : July 8, 2014

IMPROVED INTERACTIVE METHOD FOR RECO-VERING 2.5D MODELS FROM SINGLE IMAGES

Pages : 2141-2154

DOI : 10.3844/jcssp.2014.2141.2154

Published On : July 9, 2014

FUZZY SHRINK IMAGE DENOISING USING SMOOTHING SPLINE ESTIMATION

Pages : 2155-2163

DOI : 10.3844/jcssp.2014.2155.2163

Published On : July 9, 2014