Home > CSC-OpenAccess Library > Computer Science (General) > International Journal of Computer Science and Security (IJCSS)
International Journal of Computer Science and Security (IJCSS)
An International peer-review journal operated under CSC-OpenAccess Policy.
ISSN - 1985-1553
Published - Bi-Monthly | Established - 2007 | Year of Publication - 2024
|
|||||
HOME | About IJCSS | Editorial Board | Call For Papers/Editors | Submission Guidelines | Citation Report | Issues Archive | Subscribe IJCSS | |||||||||||||||
|
ISSUE MANUSCRIPTS
VOLUME - 1 ISSUE - 1 | ||||
Publication Date - June 2007 | Pages - 1 - 96 Download Complete Issue (1.56MB) |
||||
8 Records found in CSC-OpenAccess Library. | ||||
Analysis & Integrated Modeling of the Performance Evaluation Techniques for Evaluating Parallel Systems. | ||||
Amit Chhabra, Gurvinder Singh | ||||
Pages - 1 - 10 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available (109.78KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Novel Secure Key Agreement Protocol using Trusted Third Party. | ||||
Sairam Kulkarni, Debashih Jena, Sanjay Kumar Jena | ||||
Pages - 11 - 18 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available (102.34KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Active Contours Without Edges and Curvature Analysis for Endoscopic Image Classification. | ||||
B.V.Dhandra, Ravindra Hegadi | ||||
Pages - 19 - 32 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available (376.95KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Simple Encryption/Decryption Application. | ||||
Majdi Al-qdah, Lin Yi Hui | ||||
Pages - 33 - 40 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available (73.82KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Morphological Reconstruction for Word Level Script Identification. | ||||
B. V. Dhandra, Mallikarjun Hangarge | ||||
Pages - 41 - 51 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available (164.22KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Review Paper on Ad Hoc Network Security. | ||||
Karan Singh, Rama Shankar Yadav, Ranvijay | ||||
Pages - 52 - 69 | Revised - 15-06-2007 | Published - 30-05-2007 | ||||
Full Text Available (298.58KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
A Review of Studies On Machine Learning Techniques. | ||||
Yogesh Singh, Pradeep Kumar Bhatia, Omprakash Sangwan | ||||
Pages - 70 - 84 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available (156.31KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||
Texting Satisfaction: Does Age and Gender Make a Difference? | ||||
Vimala Balakrishnan, Paul H. P. Yeow | ||||
Pages - 85 - 96 | Revised - 15-06-2007 | Published - 30-06-2007 | ||||
Full Text Available (107.12KB) | ||||
MORE INFORMATION | ||||
Full Citation | Full Text PDF | Abstract | References | Related Articles | ||||