Journal: JCS

Volume 11, Issue 2

274 -- 282Alaa M. Elsayad, Mahmoud Fakhr. Diagnosis of Cardiovascular Diseases with Bayesian Classifiers
283 -- 290R. Velayutham, D. Manimegalai. CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA
291 -- 296M. RajaRam, J. Vijaya. A Defense Mechanism for Differential Power Analysis Attack in AES
297 -- 303L. G. Gagarina, D. N. Kavtaradze, A. A. Mordovin, E. M. Portnov, V. V. Slyusar, Kyaw Zaw Ye. Modeling of a Dynamic Interaction of Motor Transport and Natural Systems in Order to Minimize the Risks of Project and Management Decisions
304 -- 314K. S. Selvanayaki, R. M. Somasundaram. Hybrid Approach for Detection and Recognition of Vehicles
315 -- 324K. Thamizhchelvy, G. Geetha. An Efficient Image Generation Algorithm Using Fractals and Chaos Theory
325 -- 329Ahmad Alqurneh, Aida Mustapha. The Impact of Oath Writing Style on Stylometric Features and Machine Learning Classifiers
330 -- 336Nor Amalina Mohd Sabri, Abd. Samad Hasan Basari, Burairah Hussin, Khyrina Airin Fariza Abu Samah. The Utilisation of Dijkstra’s Algorithm to Assist Evacuation Route in Higher and Close Building
337 -- 343S. Sumalatha, G. Sreenivasulu, G. Uday Kiran Bhargava. Multicast Node Communication Using Virtual Queue with Process Scheduling
344 -- 350M. Sayee Kumar, T. Purusothaman. Hybrid Broadcast Group Management Protocol for Secure, Scalable and Efficient Group Communication
351 -- 360Nur Azman Abu, Ferda Ernawan, Fadzilah Salim. Smooth Formant Peak Via Discrete Tchebichef Transform
361 -- 371M. Uma Devi, G. Meera Gandhi. Wordnet and Ontology Based Query Expansion for Semantic Information Retrieval in Sports Domain
372 -- 382J. Vellingiri, S. Kaliraj, S. Satheeshkumar, T. Parthiban. A Novel Approach for User Navigation Pattern Discovery and Analysis for Web Usage Mining
383 -- 390Thabit Sultan Mohammed, Laith Al-Jobouri. t-Error Correction/All Unidirectional Error Detection Codes
391 -- 399S. Gopalakrishnan, P. Ganeshkumar. Secure and Efficient Transmission in Mobile Ad hoc Network to Identify the Fake ID’s Using Fake ID Detection Protocol
400 -- 405Joseph Gladwin Sekar, Salivahanan Sankarappan. Enhanced Channel Estimation and Performance Analysis Using H-Infinity Filter for MIMO-Orthogonal Frequency Division Multiplexing Systems
406 -- 415Mohd Fadzli Marhusin, Muhammad Firdaus Zul Kafli, Rossilawati Sulaiman, Shaharudin Ismail, Zul Hilmi Abdullah. A Framework for a Multi-Layered Security of an Automated Programming Code Assessment Tool
416 -- 425G. Nantha Kumar, A. Arokiasamy. An Efficient Combined Call Admission Control and Scheduling Algorithm to Improve Quality of Service for Multimedia Services Over Next Generation Wireless Networks
426 -- 437Vitor Chaves de Oliveira, Gunnar Bedicks Junior, Cristiano Akamine. Methodology to Asses Internet Protocol Connection Availability: A Prerequisite For Feasible Video Stream Through Content Delivery Networks
438 -- 442D. Ayyamuthukumar, S. Karthik. Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks
443 -- 452J. Jeyachidra, M. Punithavalli. A Novel Distinguishability Based Weighted Feature Selection Algorithms for Improved Classification of Gene Microarray Dataset