Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Journal of Computer Science"

ADD TO MY LIST
 
Using Virtual Security Lab in Teaching Cryptography

Author(s): Salma M. Gaffer | Daniyal M. Alghazzawi
Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques

Author(s): Sreenivasa Rao Basavala | Narendra Kumar | Alok Agarrwal
Performance Improvment of TCP in Ad hoc Network

Author(s): Mr. Mohit Singh Tomar
Design of Phrase-based Decoder for English-to-Sanskrit Translation

Author(s): Sandeep Rambhau Warhade | Prakash Devale
A NOVEL SCHEME FOR TEXT DATA ENCRYPTION

Author(s): Saptarshi Naskar
LINE SEGMENTATION USING CONTOUR TRACING

Author(s): Ashu Kumar | Simpel Rani Jindal | Galaxy Bansal
Cloud Computing: Windows Azure platform

Author(s): Ishpreet Singh Virk
Genetic Algorithm: A Versatile Optimization Tool

Author(s): Prof. Swati V. Chande | Dr. Madhavi Sinha
Parallel Implementation of Similarity Measures on GPU Architecture using CUDA

Author(s): Kuldeep Yadav | Ankush Mittal | M.A Ansari | Vennktesh Vishwarup
NETWORK NEUTRALITY SURVEY

Author(s): Anuj Pathania | Puneet Kalra
Color Image Enhancement Techniques: A Critical Review

Author(s): Anish Kumar Vishwakarma | Agya Mishra
AN ALGORITHM FOR DIGITAL WATERMARKING OF STILL IMAGES FOR COPYRIGHT PROTECTION

Author(s): Jahnvi Sen | A.M. Sen | K. Hemachandran
DIFFERENT SECURITY MECHANISMS FOR DIFFERENT TYPE OF SECURITY LAPSES IN WMN- A REVIEW

Author(s): Narender Singh | Kuldeep Vats | Jasvinder | Lovish Jaiswal
PETRI NETS GENERATING KOLAM PATTERNS

Author(s): D. Lalitha | K. Rangarajan
Two Methodes to Release a New Real-time Task

Author(s): Guangming Qian | Xianghua Chen | Gang Yao
IMPLEMENTATION OF KARATSUBA ALGORITHM USING POLYNOMIAL MULTIPLICATION

Author(s): SUDHANSHU MISHRA | MANORANJAN PRADHAN
A NOVEL METHOD FOR FINDING PRIVACY PRESERVING ASSOCIATION RULE MINING

Author(s): N V Muthu lakshmi | Dr. K Sandhya Rani
LOW POWER NOVEL HYBRID ADDERS FOR DATAPATH CIRCUITS IN DSP PROCESSOR

Author(s): B. Sathiyabama | Dr. S. Malarkkan
An Overview of MANET: History, Challenges and Applications

Author(s): Mohit Kumar | Rashmi Mishra
Link Reliability in WDM Optical Network

Author(s): Chinmayananda Panda | Dr. Surya Narayan Patro | Pradosh Kumar Gantayat
“Noise Detection and Noise Removal Techniques in Medical Images”

Author(s): Bhausaheb Shinde | Dnyandeo Mhaske | Machindra Patare | A.R. Dani
An Implementation of Integer Programming Techniques in Clustering Algorithm

Author(s): S. Shenbaga Ezhil | Dr. C. Vijayalakshmi
A Comparative Study of Software Requirements Tools For Secure Software Development

Author(s): Mohammad Ubaidullah Bokhari | Shams Tabrez Siddiqui
Different Views of Software Agent Paradigm

Author(s): Anand Kumar Pandey | Rashmi Pandey
SPATIAL FEATURE EXTRACTIONS USING SUPERVISED FUZZY CLASSIFICATION

Author(s): Md. Sarwar Kamal | Sonia Farhana Nimmy
Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages

Author(s): Mallikka Rajalingam | Saleh Ali Alomari | Putra Sumari
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System

Author(s): Razi Hosseinkhani | H. Haj Seyyed Javadi
Recourse Management Using a Fair Share Scheduler

Author(s): Suja Cherukullapurath Mana
Semantic Massage Addressing based on Social Cloud Actor's Interests

Author(s): Reem M. Bahgat | Akram I. Salah | Hamada I. Abdul Wakeil
A Micro-Mobility Management Scheme for Handover and Roaming

Author(s): Debabala Swain | Siba Prasada Panigrahi | Prasanta Kumar Patra
Audio Steganography Coding Using the Discrete Wavelet Transforms

Author(s): Siwar Rekik | Driss Guerchi | Habib Hamam | Sid-Ahmed Selouani
New Proposed Classic Cluster Layer Architecture for Mobile Adhoc Network (cclam)

Author(s): Kuldeep Sharma | Nikhil Khandelwal | Sanjeev Kumar Singh
Quality and Distortion Evaluation of Audio Signal by Spectrum

Author(s): Er. Niranjan Singh | Dr. Bhupendra Verma
A Framework for Cluster Ensemble Based on a Max Metric as Cluster Evaluator

Author(s): Hosein Alizadeh | Hamid Parvin | Sajad Parvin
A Precise Execution Semantics for BPMN

Author(s): Vitus S.W. Lam
Operator Fusion in a Data Parallel Library

Author(s): Bruce P. Lester
Low-Overhead and High-Performance Fault-Tolerant Architecture for Application-Specific Network-on-Chip

Author(s): Fathollah Karimi Koupaei | Ahmad Khademzadeh | Majid Janidarmian
Removing Preglottalization from Unit-Selection Synthesis: Towards the Linguistic Naturalness of Synthetic Czech Speech

Author(s): Jindrich Matousek | Radek Skarnitzl | Daniel Tihelka | Pavel Machac
Adopting E-Commerce To User's Needs

Author(s): Mohammad Alshehri | Hamza Aldabbas | James Sawle | Mai Abu Baqar
A comparative study analysis of materialized view for selection cost

Author(s): T.Nalini | A.Kumaravel | K.Rangarajan
Energy Saving in Wireless Sensor Networks

Author(s): Zahra Rezaei | Shima Mobininejad
Spatiotemporal Data Mining: Issues, Tasks And Applications

Author(s): K.Venkateswara Rao | A.Govardhan | K.V.Chalapati Rao
Secure And Reliable Routing In Mobile Adhoc Networks

Author(s): Rachid Haboub | Mohammed Ouzzif
Watermarking Schemes For Copy Protection : A Survey

Author(s): Dolley Shukla | Manisha Sharma
Fault Based Techniques For Testing Boolean Expressions: A Survey

Author(s): Usha Badhera | Purohit G.N | S.Taruna
Segment Based Visual Cryptography For Key Distribution

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
Development of a Mobile Based Device Remote Control with Voice Acknowledgment

Author(s): A. P. Bagade | S. L. Haridas | P. R. Indurkar
Effect of Working Fluid on Thermal Performance of Closed Loop Pulsating Heat Pipe: A Review

Author(s): Pramod R. Pachghare | Ashish M. Mahalle | Shekhar Khedkar
A Study of Digital Forensic: Process and Tools

Author(s): Sandhya Dahake | Shubhangi Daware
Trust Model for Reliable File Exchange In Cloud Computing

Author(s): Edna Dias Canedo | Rafael Timoteo de Sousa Junior | Robson de Oliveira Albuquerque
An Approach for Robots to Deal with Objects

Author(s): Sidiq S. Hidayat | Bong Keung Kim | Kohtaro Ohba
Reliability Analysis of Multi Path Multistage Interconnection Networks

Author(s): Sudarson Jena | G.Sri Sowmya | P.Radhika | P.Venkat Reddy
Achieving Consensus with Individual Centrality Approach

Author(s): Vitri Tundjungsari | Jazi Eko Istiyanto | Edi Winarko | Retantyo Wardoyo
Ranking Popular Items By Naive Bayes Algorithm

Author(s): Shiramshetty Gouthami | Golamari.Jose Mary | Pulluri Srinivas Rao
Quality of Service Using PSO Algorithm

Author(s): S.M. ELseuofi
Image Retrieval System Using Hybrid Feature Extraction Technique

Author(s): Vadhri Suryanarayana | M.V.L.N. Raja Rao | P. Bhaskara Reddy | G. Ravindra Babu
SignsWorld; Deeping into the Silence World and Hearing Its Signs (StAte oF the Art)

Author(s): A.M. Riad | Hamdy K.Elmonier | Samaa.M.Shohieb | A.S. Asem
Graph Based New Approach for Frequent Pattern Mining

Author(s): Anurag Choubey | Ravindra Patel | J.L. Rana
An Approach for Agile SOA Development using Agile Principals

Author(s): Majlesi Shahrbanoo | Mehrpour Ali | Mohsenzadeh Mehran
Visual Analysis of Cost Based Database Optimizers Using Picasso Tool

Author(s): Neeraj Sharma | Syed Imran Ali | Banshilal Patidar | Kavindra Raghuwanshi
Learning the Related Mathematics to Cryptography by Interactive Way

Author(s): Mohamed Salim Trigui | Daniyal M. Alghazzawi
Improve Teaching Method of Data Mining Course

Author(s): Sakha'a Al Manaseer | Areej Malibari
Robust Algorithm for Face Detection in Color Images

Author(s): Hlaing Htake Khaung Tin
Undergraduate Program in Network Engineering and Security – A Feasibility Study

Author(s): Fahed Awad | Omar Banimelhem | Eyad Taqieddin | Raed Bani-Hani
Survey of MAC Layer Protocols for vehicular Ad Hoc Network

Author(s): Vimal Bibhu | Dhirendra Kumar Singh
Speech Quality Assessment of VoIP: G.711 VS G.722 Based on Interview Tests with Thai Users

Author(s): Therdpong Daengsi | Chai Wutiwiwatchai | Apiruck Preechayasomboon | Saowanit Sukparungsee
A Hybrid Algorithm for Classification of Compressed ECG

Author(s): Shubhada S.Ardhapurkar | Ramandra R. Manthalkar | Suhas S.Gajre
Ear Biometrics in Human Identification System

Author(s): V.K. Narendira Kumar | B. Srinivasan
Using Fuzzy Logic to Evaluate Normalization Completeness for an Improved Database Design

Author(s): M. Rizwan Jameel Qureshi | Mahaboob Sharief Shaik | Nayyar Iqbal
Diversity Through N-Version Programming: Current State, Challenges and Recommendations

Author(s): Raphaël Khoury | Abdelwahab Hamou-Lhadj | Mario Couture | Robert Charpentier
A New Bit Wise Technique for 3-Partitioning Algorithm

Author(s): Rajkumar Jain | Narendra S. Chaudhari
Fuzzy C-Mean Clustering Algorithm Modification and Adaptation for Applications

Author(s): Bassam M. El-Zaghmouri | Marwan A. Abu-Zanona
Why do you need a reservation system?      Save time & money - Smart Internet Solutions