Saturday, 8 March 2014

Computer Engineering and Intelligent Systems

Vol 5, No 2 (2014)

Table of Contents


A Survey of Provenance Leveraged Trust in Wireless Sensor NetworksPDF
Gulustan Dogan, Ted Brown1-11

Adaptive Backtracking Search Strategy to Find Optimal Path for Artificial Intelligence PurposesPDF
Isra’a Abdul-Ameer Abdul-Jabbar, Suhad M. Kadhum12-20

Augmented Reality for Information KioskPDF
Waghmare Amit B., Sonawane Kunal S., Chavan Puja A., Kadu Nanasaheb B.21-26

Face Recognition Using Fuzzy Moments Discriminant AnalysisPDF
Hussein A. Lafta, Farah Mohammed AL-Shareefi27-37

Image Content Analysis Using Neural Networks and Genetic AlgorithmsPDF
Reyadh S. Naoum, Mudhafar M. Al-Jarrah, Minan K. Mohammed, Marwan R. Shaker38-44

Why Performance TestingPDF
Mansi Goel, Priyanka Jain45-49

Security with Evidence Using ZigbeePDF
Mahesh Raj Urs, Badrinath K, Sharath P V50-52

Digital Governance Implementation and Institutional Performance of State Universities and Colleges (SUCs) in the PhilippinesPDF
Christopher Chua53-61

Development of Fingerprint Biometric Attendance System for Non-Academic Staff in a Tertiary InstitutionPDF
Adewole K. S., Abdulsalam S. O., Babatunde R. S., Shittu T. M., Oloyede M. O.62-70

Paper submission email:

Computer Engineering and Intelligent Systems

No comments:

Post a Comment