Journal of Computer Science

Research Article

Artificial Bee Colony Algorithm Integrated with Fuzzy C-mean Operator for Data Clustering

M. Krishnamoorthi and A. M. Natarajan

Pages : 404-412

DOI : 10.3844/jcssp.2013.404.412

Published On : May 6, 2013

Selection of Spectral Filters for Optical Demultiplexer-Same Filter Different Source

Mohammad Syuhaimi Ab-Rahman, Hadiguna and Latifah Sarah Supian

Pages : 413-420

DOI : 10.3844/jcssp.2013.413.420

Published On : May 6, 2013

Research Proposal: An Intrusion Detection System Alert Reduction and Assessment Framework Based on Data Mining

Karim Al-Saedi, Selvakumar Manickam, Sureswaran Ramadass, Wafaa Al-Salihy and Ammar ALmomani

Pages : 421-426

DOI : 10.3844/jcssp.2013.421.426

Published On : May 8, 2013

Temporal, Delegable and Cheap Update Access Control to Published XML Documents

Waleed Halboob, Ali Mamat, Ramlan Mahmod and Muhammad Khurram Khan

Pages : 427-432

DOI : 10.3844/jcssp.2013.427.432

Published On : May 8, 2013

Intelligent Apriori Algorithm for Complex Activity Mining in Supermarket Applications

V. Ganesh Kumar and K. Muneeswaran

Pages : 433-438

DOI : 10.3844/jcssp.2013.433.438

Published On : May 9, 2013

Secured Routing with Authentication in Mobile Ad Hoc Networks

T. Guru Baskar and D. Manimegalai

Pages : 439-448

DOI : 10.3844/jcssp.2013.439.448

Published On : May 9, 2013

Selection of Spectral Filters for Optical Demultiplexer Via Same Source Different Filters Testing Technique

Mohammad Syuhaimi Ab-Rahman, Hadiguna, Latifah Sarah Supian and Malik Sulaiman

Pages : 449-454

DOI : 10.3844/jcssp.2013.449.454

Published On : May 9, 2013

Performance Analysis of Message Passing Interface Collective Communication on Intel Xeon Quad-Core Gigabit Ethernet and Infiniband Clusters

Roswan Ismail, Nor Asilah Wati Abdul Hamid, Mohamed Othman and Rohaya Latip

Pages : 455-462

DOI : 10.3844/jcssp.2013.455.462

Published On : May 9, 2013

Nelder-Mead Method with Local Selection Using Neighborhood and Memory for Stochastic Optimization

Noocharin Tippayawannakorn and Juta Pichitlamken

Pages : 463-476

DOI : 10.3844/jcssp.2013.463.476

Published On : May 10, 2013

An Enhanced and Cost Effective Group Key Management Scheme for Multicast Network

Saravana Kumar Muthusamy, Purusothaman Thiyagarajan and Lavanya Selvaraj

Pages : 477-487

DOI : 10.3844/jcssp.2013.477.487

Published On : May 10, 2013

EVENT-DRIVEN BUSINESS INTELLIGENCE APPROACH FOR REAL-TIME INTEGRATION OF TECHNICAL AND FUNDAMENTAL ANALYSIS IN FOREX MARKET

Mohammed AbuHamad, Masnizah Mohd and Juhana Salim

Pages : 488-499

DOI : 10.3844/jcssp.2013.488.499

Published On : May 13, 2013

The Optimistic Adaptive Modulation Technique for Future Wireless Communication

Kugalur Muthusamy Palaniswamy, Veerappa Gounder Palanisamy and Kugalur Muthusamy Palaniswamy

Pages : 500-513

DOI : 10.3844/jcssp.2013.500.513

Published On : May 13, 2013

Low Power Analog Multiplier Using Mifgmos

K. Duraisamy and U. Ragavendran

Pages : 514-520

DOI : 10.3844/jcssp.2013.514.520

Published On : May 14, 2013

Effect of Clustering in Designing a Fuzzy Based Hybrid Intrusion Detection System for Mobile Ad Hoc Networks

D. Vydeki and R. S. Bhuvaneswaran

Pages : 521-525

DOI : 10.3844/jcssp.2013.521.525

Published On : May 14, 2013

Protecting the Online User’s Information Against Phishing Attacks Using Dynamic Encryption Techniques

C. Emilin Shyni and S. Swamynathan

Pages : 526-533

DOI : 10.3844/jcssp.2013.526.533

Published On : May 16, 2013