Journal of Computer Science

Research Article

A COMPARISION OF VARIOUS EDGE DETECTION TECHNIQUES IN MOTION PICTURE FOR IDENTIFYING A SHARK FISH

Shrivakshan Gopal Thiruvangadan and Chelliah Chandrasekar

Pages : 1427-1434

DOI : 10.3844/jcssp.2013.1427.1434

Published On : September 18, 2013

GENETIC ALGORITHM AND NEURAL NETWORK FOR OPTICAL CHARACTER RECOGNITION

Hendy Yeremia, Niko Adrianus Yuwono, Pius Raymond and Widodo Budiharto

Pages : 1435-1442

DOI : 10.3844/jcssp.2013.1435.1442

Published On : September 19, 2013

A REVIEW ON USER INTERFACE DESIGN PRINCIPLES TO INCREASE SOFTWARE USABILITY FOR USERS WITH LESS COMPUTER LITERACY

Ali Darejeh and Dalbir Singh

Pages : 1443-1450

DOI : 10.3844/jcssp.2013.1443.1450

Published On : September 20, 2013

ANALYSIS OF INTELLIGENT DATA MINING FOR INFORMATION EXTRACTION USING JAVA AGENT DEVELOPMENT ENVIRONMENT PLATFORM

M. Vinoth Kumar, G. Tholkappia Arasu and V. Palanisamy

Pages : 1451-1455

DOI : 10.3844/jcssp.2013.1451.1455

Published On : September 20, 2013

AUTOMATIC RETINAL VESSEL TORTUOSITY MEASUREMENT

Nidhal Khdhair El Abbadi and Enas Hamood Al Saadi

Pages : 1456-1460

DOI : 10.3844/jcssp.2013.1456.1460

Published On : September 21, 2013

EFFECTIVENESS OF SECOND BEST PARTICLE INFORMATION FOR PARTICLE SWARM OPTIMIZATION

Eisuke Kita and Young-Bin Shin

Pages : 1461-1471

DOI : 10.3844/jcssp.2013.1461.1471

Published On : September 23, 2013

FEATURE DIMENSION REDUCTION FOR EFFICIENT MEDICAL IMAGE RETRIEVAL SYSTEM USING UNIFIED FRAMEWORK

Yogapriya Jaganathan and Ila Vennila

Pages : 1472-1486

DOI : 10.3844/jcssp.2013.1472.1486

Published On : September 24, 2013

ANALYSIS OF BAYESIAN CLASSIFIER ACCURACY

Felipe Schneider Costa, Maria Marlene De Souza Pires and Silvia Modesto Nassar

Pages : 1487-1495

DOI : 10.3844/jcssp.2013.1487.1495

Published On : September 26, 2013

A REVIEW ON THE DEVELOPMENT OF INDONESIAN SIGN LANGUAGE RECOGNITION SYSTEM

Sutarman, Mazlina Abdul Majid and Jasni Mohamad Zain

Pages : 1496-1505

DOI : 10.3844/jcssp.2013.1496.1505

Published On : September 27, 2013

A HYBRID INTELLIGENT MODEL FOR SOFTWARE COST ESTIMATION

Wei Lin Du, Luiz Fernando Capretz, Ali Bou Nassif and Danny Ho

Pages : 1506-1513

DOI : 10.3844/jcssp.2013.1506.1513

Published On : September 28, 2013

CLUSTER BASED DUPLICATE DETECTION

A. Venkatesh Kumar and S. Vengataasalam

Pages : 1514-1518

DOI : 10.3844/jcssp.2013.1514.1518

Published On : September 28, 2013

STUDY AND ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD-HOC NETWORK

Uma Mani, Ramasamy Chandrasekaran and V. R. Sarma Dhulipala

Pages : 1519-1525

DOI : 10.3844/jcssp.2013.1519.1525

Published On : September 30, 2013

NEW BINARY PARTICLE SWARM OPTIMIZATION WITH IMMUNITY-CLONAL ALGORITHM

Dina EL-Gammal, Amr Badr and Mostafa Abd El Azeim

Pages : 1534-1542

DOI : 10.3844/jcssp.2013.1534.1542

Published On : September 30, 2013

PREDICTION OF GLIOMA USING GENETIC OPTIMIZED NEURAL NETWORK

S. Karpagam and S. Gowri

Pages : 1543-1555

DOI : 10.3844/jcssp.2013.1543.1555

Published On : October 1, 2013

A NOVEL APPROACH FOR INFORMATION SECURITY IN AD HOC NETWORKS THROUGH SECURE KEY MANAGEMENT

S. Suma Christal Mary, M. PallikondaRajasekaran and Y. ChrisbinJeeva

Pages : 1556-1565

DOI : 10.3844/jcssp.2013.1556.1565

Published On : October 2, 2013

DESIGN OF A DUAL KEYBOARD

V. Ragavi and G. Geetha

Pages : 1566-1574

DOI : 10.3844/jcssp.2013.1566.1574

Published On : October 2, 2013

SHADOW DETECTION USING COLOR AND EDGE INFORMATION

Maryam Golchin, Fatimah Khalid, Lili Nurliana Abdullah and Seyed Hashem Davarpanah

Pages : 1575-1588

DOI : 10.3844/jcssp.2013.1575.1588

Published On : October 5, 2013

CONSTRAINT INFORMATIVE RULES FOR GENETIC ALGORITHM-BASED WEB PAGE RECOMMENDATION SYSTEM

S. Prince Mary and E. Baburaj

Pages : 1589-1601

DOI : 10.3844/jcssp.2013.1589.1601

Published On : October 5, 2013

A CONTEXT-BASED TECHNIQUE USING TAG-TREE FOR AN EFFECTIVE RETRIEVAL FROM A DIGITAL LITERATURE COLLECTION

Muthuraman Thangaraj and Vengatasubramanian Gayathri

Pages : 1602-1617

DOI : 10.3844/jcssp.2013.1602.1617

Published On : October 5, 2013

DETERIORATING DISTRIBUTED DENIAL OF SERVICE ATTACK BY RECOVERING ZOMBIES USING PENALTY SCHEME

J. Udhayan and M. Rajesh Babu

Pages : 1618-1625

DOI : 10.3844/jcssp.2013.1618.1625

Published On : October 9, 2013