Journal of Computer Science

Research Article

A COMPARISION OF VARIOUS EDGE DETECTION TECHNIQUES IN MOTION PICTURE FOR IDENTIFYING A SHARK FISH

Pages : 1427-1434

DOI : 10.3844/jcssp.2013.1427.1434

Published On : September 18, 2013

GENETIC ALGORITHM AND NEURAL NETWORK FOR OPTICAL CHARACTER RECOGNITION

Pages : 1435-1442

DOI : 10.3844/jcssp.2013.1435.1442

Published On : September 19, 2013

AUTOMATIC RETINAL VESSEL TORTUOSITY MEASUREMENT

Pages : 1456-1460

DOI : 10.3844/jcssp.2013.1456.1460

Published On : September 21, 2013

EFFECTIVENESS OF SECOND BEST PARTICLE INFORMATION FOR PARTICLE SWARM OPTIMIZATION

Pages : 1461-1471

DOI : 10.3844/jcssp.2013.1461.1471

Published On : September 23, 2013

FEATURE DIMENSION REDUCTION FOR EFFICIENT MEDICAL IMAGE RETRIEVAL SYSTEM USING UNIFIED FRAMEWORK

Pages : 1472-1486

DOI : 10.3844/jcssp.2013.1472.1486

Published On : September 24, 2013

ANALYSIS OF BAYESIAN CLASSIFIER ACCURACY

Pages : 1487-1495

DOI : 10.3844/jcssp.2013.1487.1495

Published On : September 26, 2013

A REVIEW ON THE DEVELOPMENT OF INDONESIAN SIGN LANGUAGE RECOGNITION SYSTEM

Pages : 1496-1505

DOI : 10.3844/jcssp.2013.1496.1505

Published On : September 27, 2013

A HYBRID INTELLIGENT MODEL FOR SOFTWARE COST ESTIMATION

Pages : 1506-1513

DOI : 10.3844/jcssp.2013.1506.1513

Published On : September 28, 2013

CLUSTER BASED DUPLICATE DETECTION

Pages : 1514-1518

DOI : 10.3844/jcssp.2013.1514.1518

Published On : September 28, 2013

STUDY AND ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORK

Pages : 1519-1525

DOI : 10.3844/jcssp.2013.1519.1525

Published On : September 30, 2013

NEW BINARY PARTICLE SWARM OPTIMIZATION WITH IMMUNITY-CLONAL ALGORITHM

Pages : 1534-1542

DOI : 10.3844/jcssp.2013.1534.1542

Published On : September 30, 2013

PREDICTION OF GLIOMA USING GENETIC OPTIMIZED NEURAL NETWORK

Pages : 1543-1555

DOI : 10.3844/jcssp.2013.1543.1555

Published On : October 1, 2013

A NOVEL APPROACH FOR INFORMATION SECURITY IN AD HOC NETWORKS THROUGH SECURE KEY MANAGEMENT

Pages : 1556-1565

DOI : 10.3844/jcssp.2013.1556.1565

Published On : October 2, 2013

DESIGN OF A DUAL KEYBOARD

Pages : 1566-1574

DOI : 10.3844/jcssp.2013.1566.1574

Published On : October 2, 2013

SHADOW DETECTION USING COLOR AND EDGE INFORMATION

Pages : 1575-1588

DOI : 10.3844/jcssp.2013.1575.1588

Published On : October 5, 2013

CONSTRAINT INFORMATIVE RULES FOR GENETIC ALGORITHM-BASED WEB PAGE RECOMMENDATION SYSTEM

Pages : 1589-1601

DOI : 10.3844/jcssp.2013.1589.1601

Published On : October 5, 2013

A CONTEXT-BASED TECHNIQUE USING TAG-TREE FOR AN EFFECTIVE RETRIEVAL FROM A DIGITAL LITERATURE COLLECTION

Pages : 1602-1617

DOI : 10.3844/jcssp.2013.1602.1617

Published On : October 5, 2013

DETERIORATING DISTRIBUTED DENIAL OF SERVICE ATTACK BY RECOVERING ZOMBIES USING PENALTY SCHEME

Pages : 1618-1625

DOI : 10.3844/jcssp.2013.1618.1625

Published On : October 9, 2013