Journal of Computer Science

Research Article

A Secure Key Management Technique for Wireless Body Area Networks

Pages : 1780-1787

DOI : 10.3844/jcssp.2012.1780.1787

Published On : September 5, 2012

Comparing the Impact of Black Hole and Gray Hole Attacks in Mobile Adhoc Networks

Pages : 1788-1802

DOI : 10.3844/jcssp.2012.1788.1802

Published On : September 7, 2012

Non Functional Requirement Traceability Automation-an Mobile Multimedia Approach

Pages : 1803-1808

DOI : 10.3844/jcssp.2012.1803.1808

Published On : September 7, 2012

An Fuzzy Neural Approach for Medical Image Retrieval

Pages : 1809-1813

DOI : 10.3844/jcssp.2012.1809.1813

Published On : September 8, 2012

A Hybrid Model for Human Recognition System Using Hand Dorsum Geometry and Finger-Knuckle-Print

Pages : 1814-1821

DOI : 10.3844/jcssp.2012.1814.1821

Published On : September 8, 2012

The Rating of Operating Performance of Domestic Auto Industry

Pages : 1822-1829

DOI : 10.3844/jcssp.2012.1822.1829

Published On : September 15, 2012

Design of Hybrid Coupler Connected Square Array Patch Antenna for Wi-Fi Applications

Pages : 1830-1833

DOI : 10.3844/jcssp.2012.1830.1833

Published On : September 19, 2012

Classification of Attacks on Embedded Systems

Pages : 1834-1838

DOI : 10.3844/jcssp.2012.1834.1838

Published On : September 19, 2012

Low Cost Test Bench to Assess Energy Efficiency of Communications Network Equipment

Pages : 1849-1853

DOI : 10.3844/jcssp.2012.1849.1853

Published On : September 20, 2012

Quality of Service Aware Reverse Pathad-Hoc On-Demand Distance Vector Protocol

Pages : 1854-1858

DOI : 10.3844/jcssp.2012.1854.1858

Published On : September 20, 2012

Online Arabic Handwritten Character Recognition Based on a Rule Based Approach

Pages : 1859-1868

DOI : 10.3844/jcssp.2012.1859.1868

Published On : September 25, 2012

Voice Activation Visualization for Echocardiograph and 3D Angiographic Images in Surgery

Pages : 1869-1873

DOI : 10.3844/jcssp.2012.1869.1873

Published On : October 9, 2012

Hybrid Exponential Particle Swarm Optimization K-Means Algorithm for Efficient Image Segmentation

Pages : 1874-1879

DOI : 10.3844/jcssp.2012.1874.1879

Published On : October 25, 2012

Trust Based Node Replication Attack Detection Protocol for Wireless Sensor Networks

Pages : 1880-1888

DOI : 10.3844/jcssp.2012.1880.1888

Published On : November 5, 2012

Query Tuning in Oracle Database

Pages : 1889-1896

DOI : 10.3844/jcssp.2012.1889.1896

Published On : November 5, 2012

Wirelesshd Video Transmission Over Multicarrier Error-Correctionchannels

Pages : 1897-1913

DOI : 10.3844/jcssp.2012.1897.1913

Published On : November 6, 2012

Random Dummy Packet Distribution Approach for Detection of Routing Misbehavior in Mobile Ad Hoc Network

Pages : 1914-1923

DOI : 10.3844/jcssp.2012.1914.1923

Published On : November 6, 2012

A Dynamic Temporal Neuro Fuzzy Inference System for Mining Medical Databases

Pages : 1924-1931

DOI : 10.3844/jcssp.2012.1924.1931

Published On : November 7, 2012

A Method for the Development of Platform Models in the Model Driven Architecture Context

Pages : 1932-1939

DOI : 10.3844/jcssp.2012.1932.1939

Published On : November 7, 2012