Journal of Computer Science

Research Article

TWO PHASE CLUSTERING METHOD FOR LEACH PROTOCOL FOR EFFECTIVE CLUSTER HEAD SELECTION

Pages : 366-375

DOI : 10.3844/jcssp.2014.366.375

Published On : November 21, 2013

A CONCEPTUAL FOUNDATION AND INTEGRATION DATABASE DESIGNING MODEL

Pages : 376-381

DOI : 10.3844/jcssp.2014.376.381

Published On : November 21, 2013

UBIQUITOUS PALM DISPLAY AND FINGERTIP TRACKER SYSTEM USING OPENCV

Pages : 382-392

DOI : 10.3844/jcssp.2014.382.392

Published On : November 22, 2013

DETECTING ABNORMAL BEHAVIOR IN SOCIAL NETWORK WEBSITES BY USING A PROCESS MINING TECHNIQUE

Pages : 393-402

DOI : 10.3844/jcssp.2014.393.402

Published On : November 22, 2013

ENHANCEMENT OF TOTAL TECHNICAL LIFE OF AERO PLANES

Pages : 403-410

DOI : 10.3844/jcssp.2014.403.410

Published On : November 22, 2013

EVALUATING THE PERFORMANCE OF THE LOCATION-AIDED ROUTING-1P ROUTE DISCOVERY ALGORITHM

Pages : 423-433

DOI : 10.3844/jcssp.2014.423.433

Published On : November 28, 2013

MIGITATION OF INTER CELL INTERFERENCE AND FADING IN LTE SYSTEMS

Pages : 434-442

DOI : 10.3844/jcssp.2014.434.442

Published On : November 28, 2013

THE ACCESS CONTROL SYSTEM BASED ON LINEAR DISCRIMINANT ANALYSIS

Pages : 453-457

DOI : 10.3844/jcssp.2014.453.457

Published On : November 29, 2013

IMPROVING THE PERFORMANCE AND REDUCING BIT ERROR RATE ON WIRELESS DEEP FADING ENVIRONMENT RECEIVERS

Pages : 458-468

DOI : 10.3844/jcssp.2014.458.468

Published On : November 29, 2013

A NOVEL ARCHITECTURAL FRAMEWORK FOR AGGREGATED SUBSCRIBER PROFILE

Pages : 469-476

DOI : 10.3844/jcssp.2014.469.476

Published On : November 29, 2013

3-DIMENSIONAL EAR RECOGNITION BASED ITERATIVE CLOSEST POINT WITH STOCHASTIC CLUSTERING MATCHING

Pages : 477-483

DOI : 10.3844/jcssp.2014.477.483

Published On : November 29, 2013

DISTRIBUTIVE POWER MIGRATION AND MANAGEMENT ALGORITHM FOR CLOUD ENVIRONMENT

Pages : 484-491

DOI : 10.3844/jcssp.2014.484.491

Published On : November 29, 2013

HIT RATE MAXIMIZATION BY LOGICAL CACHE PARTITIONING IN A MULTI-CORE ENVIRONMENT

Pages : 492-498

DOI : 10.3844/jcssp.2014.492.498

Published On : November 29, 2013

KNOWLEDGE MANAGEMENT AND ENTERPRISE RESOURCE PLANNING IMPLEMENTATION: A CONCEPTUAL MODEL

Pages : 499-507

DOI : 10.3844/jcssp.2014.499.507

Published On : November 30, 2013

PERMUTATION OF HTTPI AND HTTPS IN WEB SERVICES AGAINST ATTACKS FOR SECURITY ENHANCEMENT

Pages : 521-529

DOI : 10.3844/jcssp.2014.521.529

Published On : November 30, 2013

QUALITY BASED SPEAKER VERIFICATION SYSTEMS USING FUZZY INFERENCE FUSION SCHEME

Pages : 530-543

DOI : 10.3844/jcssp.2014.530.543

Published On : December 3, 2013

RECONFIGURING EVOLVED CIRCUITS USING CONTROLLER: A REAL TIME APPROACH

Pages : 544-551

DOI : 10.3844/jcssp.2014.544.551

Published On : December 2, 2013