Journal of Computer Science

Description

Journal of Computer Science is aimed to publish research articles on theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. JCS updated twelve times a year and is a peer reviewed journal covers the latest and most compelling research of the time.

Research Article

HARDWARE REALIZATION OF HIGH SPEED ELLIPTIC CURVE POINT MULTIPLICATION USING PRECOMPUTATION OVER GF(P)

Pages : 1094-1106

DOI : 10.3844/jcssp.2014.1094.1106

Published On : February 4, 2014

SLOPE STABILITY ANALYSIS OF KALLAR-COONOOR HILL ROAD STRETCH OF THE NILGIRIS

Pages : 1107-1114

DOI : 10.3844/jcssp.2014.1107.1114

Published On : February 4, 2014

GRAPHSJ 3: A MODERN DIDACTIC APPLICATION FOR GRAPH ALGORITHMS

Pages : 1115-1119

DOI : 10.3844/jcssp.2014.1115.1119

Published On : February 10, 2014

TRUSTWORTHY ENABLED RELIABLE COMMUNICATION ARCHITECTURE IN MOBILE AD HOC NETWORK

Pages : 1120-1129

DOI : 10.3844/jcssp.2014.1120.1129

Published On : February 12, 2014

NOVEL REVERSIBLE VARIABLE PRECISION MULTIPLIER USING REVERSIBLE LOGIC GATES

Pages : 1135-1138

DOI : 10.3844/jcssp.2014.1135.1138

Published On : February 12, 2014

HYPERPARAMETER SELECTION IN KERNEL PRINCIPAL COMPONENT ANALYSIS

Pages : 1139-1150

DOI : 10.3844/jcssp.2014.1139.1150

Published On : February 15, 2014

ITERATIVE DICHOTOMISER-3 ALGORITHM IN DATA MINING APPLIED TO DIABETES DATABASE

Pages : 1151-1155

DOI : 10.3844/jcssp.2014.1151.1155

Published On : February 15, 2014

A LOAD BALANCING MODEL USING FIREFLY ALGORITHM IN CLOUD COMPUTING

Pages : 1156-1165

DOI : 10.3844/jcssp.2014.1156.1165

Published On : February 15, 2014

EXPLOITING SOCIAL TAGS TO OVERCOME COLD START RECOMMENDATION PROBLEM

Pages : 1166-1173

DOI : 10.3844/jcssp.2014.1166.1173

Published On : February 18, 2014

TRUST BASED AUTOMATIC QUERY FORMULATION SEARCH ON EXPERT AND KNOWLEDGE USERS SYSTEMS

Pages : 1174-1185

DOI : 10.3844/jcssp.2014.1174.1185

Published On : February 18, 2014

AN EFFICIENT HYBRID ALGORITHM TO REDUCE LATENCY IN AD-HOC AGGREGATION

Pages : 1186-1196

DOI : 10.3844/jcssp.2014.1186.1196

Published On : February 18, 2014

COMPARATIVE STUDY OF K-MEANS AND K-MEANS++ CLUSTERING ALGORITHMS ON CRIME DOMAIN

Pages : 1197-1206

DOI : 10.3844/jcssp.2014.1197.1206

Published On : February 19, 2014

SECURE COMMUNICATION PROTOCOL FOR PROTECTING COMPUTATION RESULT OF FREE ROAMING MOBILE AGENT

Pages : 1207-1215

DOI : 10.3844/jcssp.2014.1207.1215

Published On : February 19, 2014

DETECTION OF FLOOD ATTACKS IN DTN USING RATE LIMITER TECHNIQUE

Pages : 1216-1221

DOI : 10.3844/jcssp.2014.1216.1221

Published On : February 19, 2014

IMAGE ENCRYPTION BASED ON SINGULAR VALUE DECOMPOSITION

Pages : 1222-1230

DOI : 10.3844/jcssp.2014.1222.1230

Published On : February 19, 2014

AN INTELLIGENT RECOGNITION SYSTEM FOR IDENTIFICATION OF WOOD SPECIES

Pages : 1231-1237

DOI : 10.3844/jcssp.2014.1231.1237

Published On : February 19, 2014

ADAPTIVE I/O SWITCHING FOR SEAMLESS CONVERGENCE OF SMART PHONES AND EXTERNAL I/O DEVICES

Pages : 1238-1248

DOI : 10.3844/jcssp.2014.1238.1248

Published On : February 21, 2014

STEGANOGRAPHY APPLICATION PROGRAM USING THE ID3V2 IN THE MP3 AUDIO FILE ON MOBILE PHONE

Pages : 1249-1252

DOI : 10.3844/jcssp.2014.1249.1252

Published On : February 21, 2014

MEDICAL IMAGE SEGMENTATION FOR ANATOMICAL KNOWLEDGE EXTRACTION

Pages : 1253-1258

DOI : 10.3844/jcssp.2014.1253.1258

Published On : February 22, 2014

CLUSTERING TWEETS USING CELLULAR GENETIC ALGORITHM

Pages : 1269-1280

DOI : 10.3844/jcssp.2014.1269.1280

Published On : June 16, 2014

AN EFFICIENT AND VARIABLE INTERVAL REKEYING FOR DYNAMIC AD HOC MULTICAST GROUP USING KEY PATH REDUCTION

Pages : 1281-1290

DOI : 10.3844/jcssp.2014.1281.1290

Published On : June 16, 2014

A BIO-SURVEILLANCE SYSTEM USING EFFICIENT ALGORITHM FOR INFORMATION SHARING APPLICATIONS

Pages : 1291-1297

DOI : 10.3844/jcssp.2014.1291.1297

Published On : June 17, 2014

DEPENDABILITY ATTRIBUTES FOR INCREASED SECURITY IN COMPONENT-BASED SOFTWARE DEVELOPMENT

Pages : 1298-1306

DOI : 10.3844/jcssp.2014.1298.1306

Published On : June 17, 2014

SUPER RESOLUTION FOR EGYPTSAT-1 IMAGES WITH ERRATIC SHIFT

Pages : 1324-1335

DOI : 10.3844/jcssp.2014.1324.1335

Published On : June 17, 2014

IMPROVING QUALITY OF SERVICE IN IP NETWORKS FOR MULTIMEDIA APPLICATIONS WITH OPTIMAL FRAGMENTATION

Pages : 1336-1343

DOI : 10.3844/jcssp.2014.1336.1343

Published On : June 17, 2014