Journal of Computer Science

Research Article

Automatic Mouth Localization Using Edge Projection

Pages : 679-683

DOI : 10.3844/jcssp.2010.679.683

Published On : July 31, 2010

Quantum Cryptography with Several Cloning Attacks

Pages : 684-688

DOI : 10.3844/jcssp.2010.684.688

Published On : July 31, 2010

A System for E-Learning Processes Management

Pages : 689-692

DOI : 10.3844/jcssp.2010.689.692

Published On : July 31, 2010

Face Biometrics Based on Principal Component Analysis and Linear Discriminant Analysis

Pages : 693-699

DOI : 10.3844/jcssp.2010.693.699

Published On : July 31, 2010

Amelioration of Attack Classifications for Evaluating and Testing Intrusion Detection System

Pages : 716-722

DOI : 10.3844/jcssp.2010.716.722

Published On : July 31, 2010

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

Pages : 723-727

DOI : 10.3844/jcssp.2010.723.727

Published On : July 31, 2010

A Backward Recovery Mechanism in Preemptive Utility Accrual Real Time Scheduling Algorithm

Pages : 728-734

DOI : 10.3844/jcssp.2010.728.734

Published On : July 31, 2010

Constructing Fuzzy Time Series Model Based on Fuzzy Clustering for a Forecasting

Pages : 735-739

DOI : 10.3844/jcssp.2010.735.739

Published On : July 31, 2010

Indoor Navigation to Support the Blind Person Using True Pathway within the Map

Pages : 740-747

DOI : 10.3844/jcssp.2010.740.747

Published On : July 31, 2010

Feature Analysis of Recommender Techniques Employed in the Recommendation Engines

Pages : 748-755

DOI : 10.3844/jcssp.2010.748.755

Published On : July 31, 2010

An Efficient Causal Protocol with Forward Error Correction for Mobile Distributed Systems

Pages : 756-768

DOI : 10.3844/jcssp.2010.756.768

Published On : July 31, 2010

A New High Order Algorithm with Low Computational Complexity for Electric Field Simulation

Pages : 769-774

DOI : 10.3844/jcssp.2010.769.774

Published On : July 31, 2010

Summarizing Relational Data Using Semi-Supervised Genetic Algorithm-Based Clustering Techniques

Pages : 775-784

DOI : 10.3844/jcssp.2010.775.784

Published On : July 31, 2010

Towards An XML-Based Normalization for Healthcare Data Exchanges

Pages : 800-807

DOI : 10.3844/jcssp.2010.800.807

Published On : July 31, 2010

Dominant Factors in National Information Security Policies

Pages : 808-812

DOI : 10.3844/jcssp.2010.808.812

Published On : July 31, 2010

Approximation of Experimental Curve of Nonlinear Deformation of Duralumin

Pages : 813-816

DOI : 10.3844/jcssp.2010.813.816

Published On : July 31, 2010

The Design and Implementation of a Novel Skew Scenario Model in Mobile Ad Hoc Networks

Pages : 817-822

DOI : 10.3844/jcssp.2010.817.822

Published On : July 31, 2010

Modeling Projects in E-Learning Course: A Case of an Information Technology Project

Pages : 823-829

DOI : 10.3844/jcssp.2010.823.829

Published On : July 31, 2010

Evaluation of Ad Hoc on Demand Distance Vector Routing Protocol in HetMAN Architecture

Pages : 830-836

DOI : 10.3844/jcssp.2010.830.836

Published On : July 31, 2010