Journal of Computer Science and Applications (JCSA)


Volume 7, Number 1, (2015)





An Outsourced image reconstruction in Cloud computing
pp. 1-9
G.S.Arun Kumar and S.Md.Ghouse 

Customization of U-Boot for TFTP and Flashloader
pp. 11-19
Siddharth Narayanan and Sameer Kadam

On Demand Security For Personal Health Record In Cloud Computing
pp. 21-28
V. Indhumathi and V. Prakasham

Replica Node Attack Detection Approaches in Static WSNs
pp. 29-38
Geetha C and Ramakrishnan M

A Novel Frame Work For Cloud Computing Security By Using Abe
pp. 39-44
P.Srinivas Kumar and S.Venkateswarlu


Breast Cancer Detection In Data Mining: A Review
pp. 45-48
S. Yuvarani and C. Jothi Venkateswaran

A Survey on Multimedia Analytics using Big Data Analytics
pp. 49-57
T.V.M. Sairam and B. Thirumala Rao

A Comparative Analysis Of Back Propagation And Random Forest Algorithm For Character Recognition From Handwritten Document
pp. 59-66
Amit Verma and Gagandeep kaur


Mining User Profile Exploitation Cluster From Computer Program Logs
pp. 67-73
R.Elankavi, R.Kalaiprasath and R.Udayakumar

Fault Management Strategies For Timely Detection Of Failures
pp. 75-81
R. Elankavi,  R. Kalaiprasath and R. Udayakumar

Dual Band, Dual Slant Polarized Microstrip Patch Array Antenna
pp. 83-89
R.Kalaiprasath, R.Elankavi and R.Udayakumar


Comparison Of SRLCS With Clustal-W For Characteristic Longest Common Subsequence In Biosequences
pp. 91-96
R. Kalaiprasath, R. Elankavi and R. Udayakumar







 All rights are reserved with Research India Publications                             Home  Journals  Contact