Journal of Computer Science

Description

Journal of Computer Science is aimed to publish research articles on theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. JCS updated twelve times a year and is a peer reviewed journal covers the latest and most compelling research of the time.

Research Article

A SECURE KEY MANAGEMENT TECHNIQUE FOR WIRELESS BODY AREA NETWORKS

Pages : 1780-1787

DOI : 10.3844/jcssp.2012.1780.1787

Published On : September 5, 2012

COMPARING THE IMPACT OF BLACK HOLE AND GRAY HOLE ATTACKS IN MOBILE ADHOC NETWORKS

Pages : 1788-1802

DOI : 10.3844/jcssp.2012.1788.1802

Published On : September 7, 2012

NON FUNCTIONAL REQUIREMENT TRACEABILITY AUTOMATION-AN MOBILE MULTIMEDIA APPROACH

Pages : 1803-1808

DOI : 10.3844/jcssp.2012.1803.1808

Published On : September 7, 2012

AN FUZZY NEURAL APPROACH FOR MEDICAL IMAGE RETRIEVAL

Pages : 1809-1813

DOI : 10.3844/jcssp.2012.1809.1813

Published On : September 8, 2012

A HYBRID MODEL FOR HUMAN RECOGNITION SYSTEM USING HAND DORSUM GEOMETRY AND FINGER-KNUCKLE-PRINT

Pages : 1814-1821

DOI : 10.3844/jcssp.2012.1814.1821

Published On : September 8, 2012

THE RATING OF OPERATING PERFORMANCE OF DOMESTIC AUTO INDUSTRY

Pages : 1822-1829

DOI : 10.3844/jcssp.2012.1822.1829

Published On : September 15, 2012

DESIGN OF HYBRID COUPLER CONNECTED SQUARE ARRAY PATCH ANTENNA FOR Wi-Fi APPLICATIONS

Pages : 1830-1833

DOI : 10.3844/jcssp.2012.1830.1833

Published On : September 19, 2012

CLASSIFICATION OF ATTACKS ON EMBEDDED SYSTEMS

Pages : 1834-1838

DOI : 10.3844/jcssp.2012.1834.1838

Published On : September 19, 2012

LOW COST TEST BENCH TO ASSESS ENERGY EFFICIENCY OF COMMUNICATIONS NETWORK EQUIPMENT

Pages : 1849-1853

DOI : 10.3844/jcssp.2012.1849.1853

Published On : September 20, 2012

QUALITY OF SERVICE AWARE REVERSE PATHAD-HOC ON-DEMAND DISTANCE VECTOR PROTOCOL

Pages : 1854-1858

DOI : 10.3844/jcssp.2012.1854.1858

Published On : September 20, 2012

ONLINE ARABIC HANDWRITTEN CHARACTER RECOGNITION BASED ON A RULE BASED APPROACH

Pages : 1859-1868

DOI : 10.3844/jcssp.2012.1859.1868

Published On : September 25, 2012

VOICE ACTIVATION VISUALIZATION FOR ECHOCARDIOGRAPH AND 3D ANGIOGRAPHIC IMAGES IN SURGERY

Pages : 1869-1873

DOI : 10.3844/jcssp.2012.1869.1873

Published On : October 9, 2012

HYBRID EXPONENTIAL PARTICLE SWARM OPTIMIZATION K-MEANS ALGORITHM FOR EFFICIENT IMAGE SEGMENTATION

Pages : 1874-1879

DOI : 10.3844/jcssp.2012.1874.1879

Published On : October 25, 2012

TRUST BASED NODE REPLICATION ATTACK DETECTION PROTOCOL FOR WIRELESS SENSOR NETWORKS

Pages : 1880-1888

DOI : 10.3844/jcssp.2012.1880.1888

Published On : November 5, 2012

QUERY TUNING IN ORACLE DATABASE

Pages : 1889-1896

DOI : 10.3844/jcssp.2012.1889.1896

Published On : November 5, 2012

WIRELESSHD VIDEO TRANSMISSION OVER MULTICARRIER ERROR-CORRECTION CHANNELS

Pages : 1897-1913

DOI : 10.3844/jcssp.2012.1897.1913

Published On : November 6, 2012

RANDOM DUMMY PACKET DISTRIBUTION APPROACH FOR DETECTION OF ROUTING MISBEHAVIOR IN MOBILE AD HOC NETWORK

Pages : 1914-1923

DOI : 10.3844/jcssp.2012.1914.1923

Published On : November 6, 2012

A DYNAMIC TEMPORAL NEURO FUZZY INFERENCE SYSTEM FOR MINING MEDICAL DATABASES

Pages : 1924-1931

DOI : 10.3844/jcssp.2012.1924.1931

Published On : November 7, 2012

A METHOD FOR THE DEVELOPMENT OF PLATFORM MODELS IN THE MODEL DRIVEN ARCHITECTURE CONTEXT

Pages : 1932-1939

DOI : 10.3844/jcssp.2012.1932.1939

Published On : November 7, 2012