Journal of Computer Science

Description

Journal of Computer Science is aimed to publish research articles on theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. JCS updated twelve times a year and is a peer reviewed journal covers the latest and most compelling research of the time.

Research Article

Automatic Mouth Localization Using Edge Projection

Pages : 679-683

DOI : 10.3844/jcssp.2010.679.683

Published On : July 31, 2010

Quantum Cryptography with Several Cloning Attacks

Pages : 684-688

DOI : 10.3844/jcssp.2010.684.688

Published On : July 31, 2010

A System for E-Learning Processes Management

Pages : 689-692

DOI : 10.3844/jcssp.2010.689.692

Published On : July 31, 2010

Face Biometrics Based on Principal Component Analysis and Linear Discriminant Analysis

Pages : 693-699

DOI : 10.3844/jcssp.2010.693.699

Published On : July 31, 2010

Amelioration of Attack Classifications for Evaluating and Testing Intrusion Detection System

Pages : 716-722

DOI : 10.3844/jcssp.2010.716.722

Published On : July 31, 2010

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

Pages : 723-727

DOI : 10.3844/jcssp.2010.723.727

Published On : July 31, 2010

A Backward Recovery Mechanism in Preemptive Utility Accrual Real Time Scheduling Algorithm

Pages : 728-734

DOI : 10.3844/jcssp.2010.728.734

Published On : July 31, 2010

Constructing Fuzzy Time Series Model Based on Fuzzy Clustering for a Forecasting

Pages : 735-739

DOI : 10.3844/jcssp.2010.735.739

Published On : July 31, 2010

Indoor Navigation to Support the Blind Person Using True Pathway within the Map

Pages : 740-747

DOI : 10.3844/jcssp.2010.740.747

Published On : July 31, 2010

Feature Analysis of Recommender Techniques Employed in the Recommendation Engines

Pages : 748-755

DOI : 10.3844/jcssp.2010.748.755

Published On : July 31, 2010

An Efficient Causal Protocol with Forward Error Correction for Mobile Distributed Systems

Pages : 756-768

DOI : 10.3844/jcssp.2010.756.768

Published On : July 31, 2010

A New High Order Algorithm with Low Computational Complexity for Electric Field Simulation

Pages : 769-774

DOI : 10.3844/jcssp.2010.769.774

Published On : July 31, 2010

Summarizing Relational Data Using Semi-Supervised Genetic Algorithm-Based Clustering Techniques

Pages : 775-784

DOI : 10.3844/jcssp.2010.775.784

Published On : July 31, 2010

Towards An XML-Based Normalization for Healthcare Data Exchanges

Pages : 800-807

DOI : 10.3844/jcssp.2010.800.807

Published On : July 31, 2010

Dominant Factors in National Information Security Policies

Pages : 808-812

DOI : 10.3844/jcssp.2010.808.812

Published On : July 31, 2010

Approximation of Experimental Curve of Nonlinear Deformation of Duralumin

Pages : 813-816

DOI : 10.3844/jcssp.2010.813.816

Published On : July 31, 2010

The Design and Implementation of a Novel Skew Scenario Model in Mobile Ad Hoc Networks

Pages : 817-822

DOI : 10.3844/jcssp.2010.817.822

Published On : July 31, 2010

Modeling Projects in E-Learning Course: A Case of an Information Technology Project

Pages : 823-829

DOI : 10.3844/jcssp.2010.823.829

Published On : July 31, 2010

Evaluation of Ad Hoc on Demand Distance Vector Routing Protocol in HetMAN Architecture

Pages : 830-836

DOI : 10.3844/jcssp.2010.830.836

Published On : July 31, 2010