Journal of Computer Science and Applications (JCSA)

 

Volume 3, Number 2, (2011)   

 

CONTENTS

 

WISP: Computational Feasibility of UHF RFID Tags using RC5 Algorithm
85-89
Anusha Linda Kostka

Data Security-Text based Digital Steganography
91-98
B. Vinod

Fuzzy Knowledge Acquisition from Text Documents through Ontology-Guided Text Mining
99-106
Muhammad Abulaish

Comprehensive Study on Image Transformation Basing on Mathematical Morphology
107-113
B.L.N. Phaneendra, D. Madhavi, Ch. Srividya and T.L. Surekha

A Small Report on Network Security with Respective Firewall
115-122
V. Anantha Krishna and T. Aruldoss Albert Victoire

A Survey on Distributed Page Ranking
123-130
Manju Patel and Shweta Modi

 

 

 [UP]  
 

 

 

© All rights are reserved with Research India Publications                             Home  Journals  Contact