Journal of Computer Science

Description

Journal of Computer Science is aimed to publish research articles on theoretical foundations of information and computation, and of practical techniques for their implementation and application in computer systems. JCS updated twelve times a year and is a peer reviewed journal covers the latest and most compelling research of the time.

Current Issue

HARDWARE REALIZATION OF HIGH SPEED ELLIPTIC CURVE POINT MULTIPLICATION USING PRECOMPUTATION OVER GF(P)

Pages : 1094-1106

DOI : 10.3844/jcssp.2014.1094.1106

Published On : February 4, 2014

SLOPE STABILITY ANALYSIS OF KALLAR-COONOOR HILL ROAD STRETCH OF THE NILGIRIS

Pages : 1107-1114

DOI : 10.3844/jcssp.2014.1107.1114

Published On : February 4, 2014

GRAPHSJ 3: A MODERN DIDACTIC APPLICATION FOR GRAPH ALGORITHMS

Pages : 1115-1119

DOI : 10.3844/jcssp.2014.1115.1119

Published On : February 10, 2014

TRUSTWORTHY ENABLED RELIABLE COMMUNICATION ARCHITECTURE IN MOBILE AD HOC NETWORK

Pages : 1120-1129

DOI : 10.3844/jcssp.2014.1120.1129

Published On : February 12, 2014

NOVEL REVERSIBLE VARIABLE PRECISION MULTIPLIER USING REVERSIBLE LOGIC GATES

Pages : 1135-1138

DOI : 10.3844/jcssp.2014.1135.1138

Published On : February 12, 2014

HYPERPARAMETER SELECTION IN KERNEL PRINCIPAL COMPONENT ANALYSIS

Pages : 1139-1150

DOI : 10.3844/jcssp.2014.1139.1150

Published On : February 15, 2014

ITERATIVE DICHOTOMISER-3 ALGORITHM IN DATA MINING APPLIED TO DIABETES DATABASE

Pages : 1151-1155

DOI : 10.3844/jcssp.2014.1151.1155

Published On : February 15, 2014

A LOAD BALANCING MODEL USING FIREFLY ALGORITHM IN CLOUD COMPUTING

Pages : 1156-1165

DOI : 10.3844/jcssp.2014.1156.1165

Published On : February 15, 2014

EXPLOITING SOCIAL TAGS TO OVERCOME COLD START RECOMMENDATION PROBLEM

Pages : 1166-1173

DOI : 10.3844/jcssp.2014.1166.1173

Published On : February 18, 2014

TRUST BASED AUTOMATIC QUERY FORMULATION SEARCH ON EXPERT AND KNOWLEDGE USERS SYSTEMS

Pages : 1174-1185

DOI : 10.3844/jcssp.2014.1174.1185

Published On : February 18, 2014

COMPARATIVE STUDY OF K-MEANS AND K-MEANS++ CLUSTERING ALGORITHMS ON CRIME DOMAIN

Pages : 1197-1206

DOI : 10.3844/jcssp.2014.1197.1206

Published On : February 19, 2014

SECURE COMMUNICATION PROTOCOL FOR PROTECTING COMPUTATION RESULT OF FREE ROAMING MOBILE AGENT

Pages : 1207-1215

DOI : 10.3844/jcssp.2014.1207.1215

Published On : February 19, 2014

DETECTION OF FLOOD ATTACKS IN DTN USING RATE LIMITER TECHNIQUE

Pages : 1216-1221

DOI : 10.3844/jcssp.2014.1216.1221

Published On : February 19, 2014

IMAGE ENCRYPTION BASED ON SINGULAR VALUE DECOMPOSITION

Pages : 1222-1230

DOI : 10.3844/jcssp.2014.1222.1230

Published On : February 19, 2014

AN INTELLIGENT RECOGNITION SYSTEM FOR IDENTIFICATION OF WOOD SPECIES

Pages : 1231-1237

DOI : 10.3844/jcssp.2014.1231.1237

Published On : February 19, 2014

ADAPTIVE I/O SWITCHING FOR SEAMLESS CONVERGENCE OF SMART PHONES AND EXTERNAL I/O DEVICES

Pages : 1238-1248

DOI : 10.3844/jcssp.2014.1238.1248

Published On : February 21, 2014

STEGANOGRAPHY APPLICATION PROGRAM USING THE ID3V2 IN THE MP3 AUDIO FILE ON MOBILE PHONE

Pages : 1249-1252

DOI : 10.3844/jcssp.2014.1249.1252

Published On : February 21, 2014

MEDICAL IMAGE SEGMENTATION FOR ANATOMICAL KNOWLEDGE EXTRACTION

Pages : 1253-1258

DOI : 10.3844/jcssp.2014.1253.1258

Published On : February 22, 2014

SUPER RESOLUTION FOR EGYPTSAT-1 IMAGES WITH ERRATIC SHIFT

Pages : 1324-1335

DOI : 10.3844/jcssp.2014.1324.1335

Published On : June 17, 2014



A DEFENSE MECHANISM FOR DPA ATTACK IN AES

M. Rajaram and J. Vijaya
Volume : 11, Issue : 2 Pages : 291-296
Published On : September 1, 2014


CCMP AES CIPHER FOR WLAN (IEEE 802.11I): A COMPARISON WITH DES AND RSA

R. Velayutham and D. Manimegalai
Volume : 11, Issue : 2 Pages : 283-290
Published On : August 26, 2014


A NEW COMPUTER SCIENCE STUDENT RECRUITMENT STRATEGY UNIVERSITY OF SHARJAH (UOS) CASE STUDY

Manar Abu Talib and Ashraf Elnagar
Volume : 11, Issue : 1 Pages : 145-152
Published On : August 25, 2014


AUTOMATIC DETECTION OF THE END-DIASTOLIC AND END-SYSTOLIC FROM 4D ECHOCARDIOGRAPHIC IMAGES

Anas A. Abboud, Rahmita Wirza Rahmat, Suhaini Bin Kadiman, Mohd Zamrin Bin Dimon, Lili Nurliyana, M. Iqbal Saripan and Hasan H. Khaleel
Volume : 11, Issue : 1 Pages : 230-240
Published On : August 25, 2014


A NOVEL APPROACH FOR DIAGNOSING DIABETIC RETINOPATHY IN FUNDUS IMAGES

E. Dhiravidachelvi and V. Rajamani
Volume : 11, Issue : 1 Pages : 262-268
Published On : August 21, 2014


A Mobile Robot Path Planning Using Genetic Algorithm in Static Environment

Ismail AL-Taharwa, Alaa Sheta and Mohammed Al-Weshah
Volume : 4, Issue : 4 Pages : 341-344
Cites : 55


A Survey of Content-Based Video Retrieval

P. Geetha and Vasumathi Narayanan
Volume : 4, Issue : 6 Pages : 474-486
Cites : 40


Computational Complexity between K-Means and K-Medoids Clustering Algorithms for Normal and Uniform Distributions of Data Points

T. Velmurugan and T. Santhanam
Volume : 6, Issue : 3 Pages : 363-368
Cites : 37


Design of Modified Adaptive Huffman Data Compression Algorithm for Wireless Sensor Network

C. Tharini and P. V. Ranjan
Volume : 5, Issue : 6 Pages : 466-470
Cites : 27


Design and Implementation of an Optimal Fuzzy Logic Controller Using Genetic Algorithm

S. Khan, S. F. Abdulazeez, L. W. Adetunji, A. H.M.Z. Alam and M. J.E. Salami
Volume : 4, Issue : 10 Pages : 799-806
Cites : 23


Accurate Wavelet Neural Network for Efficient Controlling of an Active Magnetic Bearing System

Youssef Harkouss, Souhad Mcheik and Roger Achkar
Volume : 6, Issue : 12 Pages : 1457-1464
Downloads : 28384


Position and Obstacle Avoidance Algorithm in Robot Soccer

Awang H. Pratomo, Anton S. Prabuwono, Mohd S. Zakaria, Khairuddin Omar, Md J. Nordin, Shahnorbanun Sahran, Siti N.H.S. Abdullah and Anton Heryanto
Volume : 6, Issue : 2 Pages : 173-179
Downloads : 16095


A System for Payroll Management

Pavitra R. Gautam, Sugadev Ragumani and Y. K. Sharma
Volume : 6, Issue : 12 Pages : 1531-1534
Downloads : 11458


Back Propagation Neural Network Arabic Characters Classification Module Utilizing Microsoft Word

A. A. Hamza
Volume : 4, Issue : 9 Pages : 744-751
Downloads : 11205


Computational Complexity between K-Means and K-Medoids Clustering Algorithms for Normal and Uniform Distributions of Data Points

T. Velmurugan and T. Santhanam
Volume : 6, Issue : 3 Pages : 363-368
Downloads : 8960


A New Approach for 3D Range Image Segmentation using Gradient Method

Dina A. Hafiz, Walaa M. Sheta, Sahar Bayoumi and Bayumy A.B. Youssef
Volume : 7, Issue : 4 Pages : 475-487
Views : 11411


Constructing Fuzzy Time Series Model Based on Fuzzy Clustering for a Forecasting

Ashraf K.A. Elaal, Hesham A. Hefny and Ashraf H.A. Elwahab
Volume : 6, Issue : 7 Pages : 735-739
Views : 2555


On the Relationship between Classes P and NP

Anatoly D. Plotnikov
Volume : 8, Issue : 7 Pages : 1036-1040
Views : 1884


A Survey of Content-Based Video Retrieval

P. Geetha and Vasumathi Narayanan
Volume : 4, Issue : 6 Pages : 474-486
Views : 1261


A Bit-Serial Multiplier Architecture for Finite Fields Over Galois Fields

Hero Modares, Yasser Salem, Rosli Salleh and Majid T. Shahgoli
Volume : 6, Issue : 11 Pages : 1237-1246
Views : 1238