Journal of Computer Science

Research Article

Multimodal Biometric-based Secured Authentication System using Steganography

B. Shanthini and S. Swamynathan

Pages : 1012-1021

DOI : 10.3844/jcssp.2012.1012.1021

Published On : May 7, 2012

Analysis of Rule Generation Techniques using Computational Method

G. Maragatham and M. Lakshmi

Pages : 1022-1028

DOI : 10.3844/jcssp.2012.1022.1028

Published On : May 9, 2012

A Novel Page Ranking Algorithm for a Personalized Web Search

J. Jayanthi and K. S. Jayakumar

Pages : 1029-1035

DOI : 10.3844/jcssp.2012.1029.1035

Published On : May 12, 2012

On the Relationship between Classes P and NP

Anatoly D. Plotnikov

Pages : 1036-1040

DOI : 10.3844/jcssp.2012.1036.1040

Published On : May 16, 2012

Improving the Attack Detection Rate in Network Intrusion Detection using Adaboost Algorithm

P. Natesan, P. Balasubramanie and G. Gowrison

Pages : 1041-1048

DOI : 10.3844/jcssp.2012.1041.1048

Published On : May 16, 2012

Palmprint Recognition using Feature Level Fusion

R. Gayathri and P. Ramamoorthy

Pages : 1049-1061

DOI : 10.3844/jcssp.2012.1049.1061

Published On : May 19, 2012

An Effective History-based Background Extraction System

Seyed Hashem Davarpanah, Fatimah Khalid and Maryam Golchin

Pages : 1062-1069

DOI : 10.3844/jcssp.2012.1062.1069

Published On : May 23, 2012

Content Based Medical Image Retrieval with Texture Content Using Gray Level Co-occurrence Matrix and K-Means Clustering Algorithms

B. Ramamurthy and K. R. Chandran

Pages : 1070-1076

DOI : 10.3844/jcssp.2012.1070.1076

Published On : May 24, 2012

Using Multi-Scale Filtering to Initialize a Background Extraction Model

S. H. Davarpanah, Fatimah Khalid, N. A. Lili, S. S. Puteri and M. Golchin

Pages : 1077-1084

DOI : 10.3844/jcssp.2012.1077.1084

Published On : May 24, 2012

Artificial Neural Network Based Rotor Capacitive Reactance Control for Energy Efficient Wound Rotor Induction Motor

K. Ranjith Kumar, S. Palaniswami and K. Siva Kumar

Pages : 1085-1091

DOI : 10.3844/jcssp.2012.1085.1091

Published On : May 26, 2012

Dynamic Distributed Intrusion Detection System Based on Mobile Agents with Fault Tolerance

R. Sasikumar and D. Manjula

Pages : 1092-1098

DOI : 10.3844/jcssp.2012.1092.1098

Published On : May 26, 2012

Evolving Fuzzy Neural Network for Phishing Emails Detection

Ammar ALmomani, Tat-Chee Wan, Altyeb Altaher, Ahmad Manasrah, Eman ALmomani, Mohammed Anbar, Esraa ALomari and Sureswaran Ramadass

Pages : 1099-1107

DOI : 10.3844/jcssp.2012.1099.1107

Published On : June 4, 2012

Explicit Allocation Strategy with Deadline and Budget Constraint Algorithm in Bag of Tasks Grid

M. Suresh Kumar and T. Purusothaman

Pages : 1108-1113

DOI : 10.3844/jcssp.2012.1108.1113

Published On : June 7, 2012

A Quasi Delay Insensitive Reduced Stack Pre-Charged Half Buffer based High Speed Adder using pipeline templates for Asynchronous Circuits

D. Jayanthi and M. Rajaram

Pages : 1114-1122

DOI : 10.3844/jcssp.2012.1114.1122

Published On : June 7, 2012

3D Mesh Streaming based on Predictive Modeling

V. Vani, R. Pradeep Kumar and S. Mohan

Pages : 1123-1133

DOI : 10.3844/jcssp.2012.1123.1133

Published On : June 7, 2012

Peer-to-Peer Video Conferencing Using Hybrid Content Distribution Model

Alhamza Munther, Salah Noori, Azlan Osman, Ayad Hussain, Imad Jasim and Ali Shanoon

Pages : 1134-1142

DOI : 10.3844/jcssp.2012.1134.1142

Published On : June 8, 2012

Multipath Routing Protocol for Effective Local Route Recovery in Mobile Ad hoc Network

D. Jagadeesan and S. K. Srivatsa

Pages : 1143-1149

DOI : 10.3844/jcssp.2012.1143.1149

Published On : June 8, 2012

Learning Software Component Model for Online Tutoring

M. Balakrishnan and K. Duraiswamy

Pages : 1150-1155

DOI : 10.3844/jcssp.2012.1150.1155

Published On : June 9, 2012

An Optimal Rate Adjustment Algorithm for Medium Access Control Protocol in 802.11 Multi Hop Ad Hoc Networks

K. Saravanan and T. Ravichandran

Pages : 1156-1164

DOI : 10.3844/jcssp.2012.1156.1164

Published On : June 9, 2012

A Review of Security System for Smart Home Applications

Mohammad Syuhaimi Ab-Rahman and Mohd Ariff Razaly

Pages : 1165-1170

DOI : 10.3844/jcssp.2012.1165.1170

Published On : June 21, 2012

Multi-Threshold based Scheduling for Multi-User Multiple-Input Multiple-Output Systems

K. Chanthirasekaran and M. A. Bhagyaveni

Pages : 1171-1176

DOI : 10.3844/jcssp.2012.1171.1176

Published On : June 21, 2012

An Optimized Ad Hoc on Demand Distance Vector Routing Protocol for Wireless Networks

V. Ponniyin Selvan and S. Senthil Kumar

Pages : 1177-1183

DOI : 10.3844/jcssp.2012.1177.1183

Published On : June 21, 2012

Detection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine

G. Nirmala Priya and R. S.D. Wahida Banu

Pages : 1184-1190

DOI : 10.3844/jcssp.2012.1184.1190

Published On : July 5, 2012

Comparative Study of Performance in Cryptography Algorithms (Blowfish and Skipjack)

Ali Ahmad Milad, Hjh Zaiton Muda, Zul Azri Bin Muhamad Noh and Mustafa Almahdi Algaet

Pages : 1191-1197

DOI : 10.3844/jcssp.2012.1191.1197

Published On : July 7, 2012

E2AODV Protocol for Load Balancing in Ad-Hoc Networks

R. Vinod Kumar and R. S.D. Wahida Banu

Pages : 1198-1204

DOI : 10.3844/jcssp.2012.1198.1204

Published On : July 7, 2012