Journal of Computer Science

Description

Journal of Computer Science is aimed to publish research articles on theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. JCS updated twelve times a year and is a peer reviewed journal covers the latest and most compelling research of the time.

Research Article

PRESERVATION OF THE PRIVACY FOR MULTIPLE CUSTODIAN SYSTEMS WITH RULE SHARING

Pages : 1086-1091

DOI : 10.3844/jcssp.2013.1086.1091

Published On : August 6, 2013

INTELLISENSE CLUSTER MANAGEMENT AND ENERGY EFFICIENT ROUTING IN MOBILE AD HOC NETWORKS

Pages : 1092-1098

DOI : 10.3844/jcssp.2013.1092.1098

Published On : August 6, 2013

EXPERT-SYSTEM BASED MEDICAL STROKE PREVENTION

Pages : 1099-1105

DOI : 10.3844/jcssp.2013.1099.1105

Published On : August 6, 2013

A LEADER BASED MONITORING APPROACH FOR SINKHOLE ATTACK IN WIRELESS SENSOR NETWORK

Pages : 1106-1116

DOI : 10.3844/jcssp.2013.1106.1116

Published On : August 6, 2013

IMPROVING INDEPENDENT COMPONENT ANALYSIS USING SUPPORT VECTOR MACHINES FOR MULTIMODAL IMAGE FUSION

Pages : 1117-1132

DOI : 10.3844/jcssp.2013.1117.1132

Published On : August 6, 2013

MODELING AND SIMULATION OF FUZZY BASED AUTOMATIC INSULIN DELIVERY SYSTEM

Pages : 1133-1139

DOI : 10.3844/jcssp.2013.1133.1139

Published On : August 6, 2013

SCHOOL INFORMATION SYSTEMS DESIGN FOR MOBILE PHONES

Pages : 1140-1145

DOI : 10.3844/jcssp.2013.1140.1145

Published On : August 6, 2013

TECHNICAL ANALYSIS OF FUZZY METAGRAPH BASED DECISION SUPPORT SYSTEM FOR CAPITAL MARKET

Pages : 1146-1155

DOI : 10.3844/jcssp.2013.1146.1155

Published On : August 6, 2013

E-RESOURCES GEOGRAPHIC INFORMATION SYSTEM SYSTEM FOR MILITARY OPERATION

Pages : 1164-1173

DOI : 10.3844/jcssp.2013.1164.1173

Published On : August 6, 2013

SECRET HANDSHAKE ISSUE AND VALIDATE AUTHORITY BASED AUTHENTICATION SYSTEM FOR WIRELESS SENSOR NETWORK

Pages : 1174-1180

DOI : 10.3844/jcssp.2013.1174.1180

Published On : August 6, 2013

ENHANCED LOAD BALANCING STRATEGY IN HETEROGENEOUS PEER-TO-PEER NETWORKS

Pages : 1197-1204

DOI : 10.3844/jcssp.2013.1197.1204

Published On : August 6, 2013

IMPROVEMENT OF AUTOMATIC HEMORRHAGES DETECTION METHODS USING SHAPES RECOGNITION

Pages : 1205-1210

DOI : 10.3844/jcssp.2013.1205.1210

Published On : August 6, 2013

SECURING MOBILE ANT AGENT USING CHINESE REMAINDER THEOREM

Pages : 1211-1216

DOI : 10.3844/jcssp.2013.1211.1216

Published On : August 6, 2013

PROTOTYPE DESIGN SYSTEM FOR MOBILE WEB USING RADIO FREQUENCY IDENTIFICATION AT PARKING BUILDING

Pages : 1217-1223

DOI : 10.3844/jcssp.2013.1217.1223

Published On : August 6, 2013

REPLACEMENT MECHANISM OF CACHING TECHNIQUE FOR QUERY ROUTING IN PEER TO PEER NETWORKS

Pages : 1224-1231

DOI : 10.3844/jcssp.2013.1224.1231

Published On : August 6, 2013

ENHANCEMENT AND COMPARISON OF ANT COLONY OPTIMIZATION FOR SOFTWARE RELIABILITY MODELS

Pages : 1232-1240

DOI : 10.3844/jcssp.2013.1232.1240

Published On : August 6, 2013

NON-COOPERATIVE IRIS RECOGNITION: A NOVEL APPROACH FOR SEGMENTATION AND FAKE IDENTIFICATION

Pages : 1241-1251

DOI : 10.3844/jcssp.2013.1241.1251

Published On : August 6, 2013