Journal of Computer Science and Applications (JCSA)
Volume 3, Number 2, (2011)
CONTENTS
WISP: Computational Feasibility of UHF RFID Tags using RC5 Algorithm 85-89 Anusha Linda Kostka Data Security-Text based Digital Steganography 91-98 B. Vinod Fuzzy Knowledge Acquisition from Text Documents through Ontology-Guided Text Mining 99-106 Muhammad Abulaish Comprehensive Study on Image Transformation Basing on Mathematical Morphology 107-113 B.L.N. Phaneendra, D. Madhavi, Ch. Srividya and T.L. Surekha A Small Report on Network Security with Respective Firewall 115-122 V. Anantha Krishna and T. Aruldoss Albert Victoire A Survey on Distributed Page Ranking 123-130 Manju Patel and Shweta Modi
© All rights are reserved with Research India Publications Home Journals Contact