Journal of Computer Science

Description

Journal of Computer Science is aimed to publish research articles on theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. JCS updated twelve times a year and is a peer reviewed journal covers the latest and most compelling research of the time.

Research Article

Multimodal Biometric-based Secured Authentication System using Steganography

Pages : 1012-1021

DOI : 10.3844/jcssp.2012.1012.1021

Published On : May 7, 2012

Analysis of Rule Generation Techniques using Computational Method

Pages : 1022-1028

DOI : 10.3844/jcssp.2012.1022.1028

Published On : May 9, 2012

A Novel Page Ranking Algorithm for a Personalized Web Search

Pages : 1029-1035

DOI : 10.3844/jcssp.2012.1029.1035

Published On : May 12, 2012

On the Relationship between Classes P and NP

Pages : 1036-1040

DOI : 10.3844/jcssp.2012.1036.1040

Published On : May 16, 2012

Improving the Attack Detection Rate in Network Intrusion Detection using Adaboost Algorithm

Pages : 1041-1048

DOI : 10.3844/jcssp.2012.1041.1048

Published On : May 16, 2012

Palmprint Recognition using Feature Level Fusion

Pages : 1049-1061

DOI : 10.3844/jcssp.2012.1049.1061

Published On : May 19, 2012

An Effective History-based Background Extraction System

Pages : 1062-1069

DOI : 10.3844/jcssp.2012.1062.1069

Published On : May 23, 2012

Using Multi-Scale Filtering to Initialize a Background Extraction Model

Pages : 1077-1084

DOI : 10.3844/jcssp.2012.1077.1084

Published On : May 24, 2012

Dynamic Distributed Intrusion Detection System Based on Mobile Agents with Fault Tolerance

Pages : 1092-1098

DOI : 10.3844/jcssp.2012.1092.1098

Published On : May 26, 2012

Evolving Fuzzy Neural Network for Phishing Emails Detection

Pages : 1099-1107

DOI : 10.3844/jcssp.2012.1099.1107

Published On : June 4, 2012

Explicit Allocation Strategy with Deadline and Budget Constraint Algorithm in Bag of Tasks Grid

Pages : 1108-1113

DOI : 10.3844/jcssp.2012.1108.1113

Published On : June 7, 2012

3D Mesh Streaming based on Predictive Modeling

Pages : 1123-1133

DOI : 10.3844/jcssp.2012.1123.1133

Published On : June 7, 2012

Peer-to-Peer Video Conferencing Using Hybrid Content Distribution Model

Pages : 1134-1142

DOI : 10.3844/jcssp.2012.1134.1142

Published On : June 8, 2012

Multipath Routing Protocol for Effective Local Route Recovery in Mobile Ad hoc Network

Pages : 1143-1149

DOI : 10.3844/jcssp.2012.1143.1149

Published On : June 8, 2012

Learning Software Component Model for Online Tutoring

Pages : 1150-1155

DOI : 10.3844/jcssp.2012.1150.1155

Published On : June 9, 2012

A Review of Security System for Smart Home Applications

Pages : 1165-1170

DOI : 10.3844/jcssp.2012.1165.1170

Published On : June 21, 2012

Multi-Threshold based Scheduling for Multi-User Multiple-Input Multiple-Output Systems

Pages : 1171-1176

DOI : 10.3844/jcssp.2012.1171.1176

Published On : June 21, 2012

An Optimized Ad Hoc on Demand Distance Vector Routing Protocol for Wireless Networks

Pages : 1177-1183

DOI : 10.3844/jcssp.2012.1177.1183

Published On : June 21, 2012

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine

Pages : 1184-1190

DOI : 10.3844/jcssp.2012.1184.1190

Published On : July 5, 2012

Comparative Study of Performance in Cryptography Algorithms (Blowfish and Skipjack)

Pages : 1191-1197

DOI : 10.3844/jcssp.2012.1191.1197

Published On : July 7, 2012

E2AODV Protocol for Load Balancing in Ad-Hoc Networks

Pages : 1198-1204

DOI : 10.3844/jcssp.2012.1198.1204

Published On : July 7, 2012