Vol 5, No 2 (2014)
Table of Contents
Articles
| A Survey of Provenance Leveraged Trust in Wireless Sensor Networks | |
| Gulustan Dogan, Ted Brown | 1-11 |
| Adaptive Backtracking Search Strategy to Find Optimal Path for Artificial Intelligence Purposes | |
| Isra’a Abdul-Ameer Abdul-Jabbar, Suhad M. Kadhum | 12-20 |
| Augmented Reality for Information Kiosk | |
| Waghmare Amit B., Sonawane Kunal S., Chavan Puja A., Kadu Nanasaheb B. | 21-26 |
| Face Recognition Using Fuzzy Moments Discriminant Analysis | |
| Hussein A. Lafta, Farah Mohammed AL-Shareefi | 27-37 |
| Image Content Analysis Using Neural Networks and Genetic Algorithms | |
| Reyadh S. Naoum, Mudhafar M. Al-Jarrah, Minan K. Mohammed, Marwan R. Shaker | 38-44 |
| Why Performance Testing | |
| Mansi Goel, Priyanka Jain | 45-49 |
| Security with Evidence Using Zigbee | |
| Mahesh Raj Urs, Badrinath K, Sharath P V | 50-52 |
| Digital Governance Implementation and Institutional Performance of State Universities and Colleges (SUCs) in the Philippines | |
| Christopher Chua | 53-61 |
| Development of Fingerprint Biometric Attendance System for Non-Academic Staff in a Tertiary Institution | |
| Adewole K. S., Abdulsalam S. O., Babatunde R. S., Shittu T. M., Oloyede M. O. | 62-70 |
Paper submission email: CEIS@iiste.org
Computer Engineering and Intelligent Systems http://goo.gl/JrlgT8
No comments:
Post a Comment