Journal of Computer Science

Research Article

Multimodal Biometric-based Secured Authentication System using Steganography

Pages : 1012-1021

DOI : 10.3844/jcssp.2012.1012.1021

Published On : May 7, 2012

Analysis of Rule Generation Techniques using Computational Method

Pages : 1022-1028

DOI : 10.3844/jcssp.2012.1022.1028

Published On : May 9, 2012

A Novel Page Ranking Algorithm for a Personalized Web Search

Pages : 1029-1035

DOI : 10.3844/jcssp.2012.1029.1035

Published On : May 12, 2012

On the Relationship between Classes P and NP

Pages : 1036-1040

DOI : 10.3844/jcssp.2012.1036.1040

Published On : May 16, 2012

Improving the Attack Detection Rate in Network Intrusion Detection using Adaboost Algorithm

Pages : 1041-1048

DOI : 10.3844/jcssp.2012.1041.1048

Published On : May 16, 2012

Palmprint Recognition using Feature Level Fusion

Pages : 1049-1061

DOI : 10.3844/jcssp.2012.1049.1061

Published On : May 19, 2012

An Effective History-based Background Extraction System

Pages : 1062-1069

DOI : 10.3844/jcssp.2012.1062.1069

Published On : May 23, 2012

Using Multi-Scale Filtering to Initialize a Background Extraction Model

Pages : 1077-1084

DOI : 10.3844/jcssp.2012.1077.1084

Published On : May 24, 2012

Dynamic Distributed Intrusion Detection System Based on Mobile Agents with Fault Tolerance

Pages : 1092-1098

DOI : 10.3844/jcssp.2012.1092.1098

Published On : May 26, 2012

Evolving Fuzzy Neural Network for Phishing Emails Detection

Pages : 1099-1107

DOI : 10.3844/jcssp.2012.1099.1107

Published On : June 4, 2012

Explicit Allocation Strategy with Deadline and Budget Constraint Algorithm in Bag of Tasks Grid

Pages : 1108-1113

DOI : 10.3844/jcssp.2012.1108.1113

Published On : June 7, 2012

3D Mesh Streaming based on Predictive Modeling

Pages : 1123-1133

DOI : 10.3844/jcssp.2012.1123.1133

Published On : June 7, 2012

Peer-to-Peer Video Conferencing Using Hybrid Content Distribution Model

Pages : 1134-1142

DOI : 10.3844/jcssp.2012.1134.1142

Published On : June 8, 2012

Multipath Routing Protocol for Effective Local Route Recovery in Mobile Ad hoc Network

Pages : 1143-1149

DOI : 10.3844/jcssp.2012.1143.1149

Published On : June 8, 2012

Learning Software Component Model for Online Tutoring

Pages : 1150-1155

DOI : 10.3844/jcssp.2012.1150.1155

Published On : June 9, 2012

A Review of Security System for Smart Home Applications

Pages : 1165-1170

DOI : 10.3844/jcssp.2012.1165.1170

Published On : June 21, 2012

Multi-Threshold based Scheduling for Multi-User Multiple-Input Multiple-Output Systems

Pages : 1171-1176

DOI : 10.3844/jcssp.2012.1171.1176

Published On : June 21, 2012

An Optimized Ad Hoc on Demand Distance Vector Routing Protocol for Wireless Networks

Pages : 1177-1183

DOI : 10.3844/jcssp.2012.1177.1183

Published On : June 21, 2012

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine

Pages : 1184-1190

DOI : 10.3844/jcssp.2012.1184.1190

Published On : July 5, 2012

Comparative Study of Performance in Cryptography Algorithms (Blowfish and Skipjack)

Pages : 1191-1197

DOI : 10.3844/jcssp.2012.1191.1197

Published On : July 7, 2012

E2AODV Protocol for Load Balancing in Ad-Hoc Networks

Pages : 1198-1204

DOI : 10.3844/jcssp.2012.1198.1204

Published On : July 7, 2012