Journal of Computer Science

Research Article

PRESERVATION OF THE PRIVACY FOR MULTIPLE CUSTODIAN SYSTEMS WITH RULE SHARING

Pages : 1086-1091

DOI : 10.3844/jcssp.2013.1086.1091

Published On : August 6, 2013

INTELLISENSE CLUSTER MANAGEMENT AND ENERGY EFFICIENT ROUTING IN MOBILE AD HOC NETWORKS

Pages : 1092-1098

DOI : 10.3844/jcssp.2013.1092.1098

Published On : August 6, 2013

EXPERT-SYSTEM BASED MEDICAL STROKE PREVENTION

Pages : 1099-1105

DOI : 10.3844/jcssp.2013.1099.1105

Published On : August 6, 2013

A LEADER BASED MONITORING APPROACH FOR SINKHOLE ATTACK IN WIRELESS SENSOR NETWORK

Pages : 1106-1116

DOI : 10.3844/jcssp.2013.1106.1116

Published On : August 6, 2013

IMPROVING INDEPENDENT COMPONENT ANALYSIS USING SUPPORT VECTOR MACHINES FOR MULTIMODAL IMAGE FUSION

Pages : 1117-1132

DOI : 10.3844/jcssp.2013.1117.1132

Published On : August 6, 2013

MODELING AND SIMULATION OF FUZZY BASED AUTOMATIC INSULIN DELIVERY SYSTEM

Pages : 1133-1139

DOI : 10.3844/jcssp.2013.1133.1139

Published On : August 6, 2013

SCHOOL INFORMATION SYSTEMS DESIGN FOR MOBILE PHONES

Pages : 1140-1145

DOI : 10.3844/jcssp.2013.1140.1145

Published On : August 6, 2013

TECHNICAL ANALYSIS OF FUZZY METAGRAPH BASED DECISION SUPPORT SYSTEM FOR CAPITAL MARKET

Pages : 1146-1155

DOI : 10.3844/jcssp.2013.1146.1155

Published On : August 6, 2013

E-RESOURCES GEOGRAPHIC INFORMATION SYSTEM SYSTEM FOR MILITARY OPERATION

Pages : 1164-1173

DOI : 10.3844/jcssp.2013.1164.1173

Published On : August 6, 2013

SECRET HANDSHAKE ISSUE AND VALIDATE AUTHORITY BASED AUTHENTICATION SYSTEM FOR WIRELESS SENSOR NETWORK

Pages : 1174-1180

DOI : 10.3844/jcssp.2013.1174.1180

Published On : August 6, 2013

ENHANCED LOAD BALANCING STRATEGY IN HETEROGENEOUS PEER-TO-PEER NETWORKS

Pages : 1197-1204

DOI : 10.3844/jcssp.2013.1197.1204

Published On : August 6, 2013

IMPROVEMENT OF AUTOMATIC HEMORRHAGES DETECTION METHODS USING SHAPES RECOGNITION

Pages : 1205-1210

DOI : 10.3844/jcssp.2013.1205.1210

Published On : August 6, 2013

SECURING MOBILE ANT AGENT USING CHINESE REMAINDER THEOREM

Pages : 1211-1216

DOI : 10.3844/jcssp.2013.1211.1216

Published On : August 6, 2013

PROTOTYPE DESIGN SYSTEM FOR MOBILE WEB USING RADIO FREQUENCY IDENTIFICATION AT PARKING BUILDING

Pages : 1217-1223

DOI : 10.3844/jcssp.2013.1217.1223

Published On : August 6, 2013

REPLACEMENT MECHANISM OF CACHING TECHNIQUE FOR QUERY ROUTING IN PEER TO PEER NETWORKS

Pages : 1224-1231

DOI : 10.3844/jcssp.2013.1224.1231

Published On : August 6, 2013

ENHANCEMENT AND COMPARISON OF ANT COLONY OPTIMIZATION FOR SOFTWARE RELIABILITY MODELS

Pages : 1232-1240

DOI : 10.3844/jcssp.2013.1232.1240

Published On : August 6, 2013

NON-COOPERATIVE IRIS RECOGNITION: A NOVEL APPROACH FOR SEGMENTATION AND FAKE IDENTIFICATION

Pages : 1241-1251

DOI : 10.3844/jcssp.2013.1241.1251

Published On : August 6, 2013