Saturday 8 March 2014

Computer Engineering and Intelligent Systems

Vol 5, No 2 (2014)



Table of Contents


Articles






A Survey of Provenance Leveraged Trust in Wireless Sensor NetworksPDF
Gulustan Dogan, Ted Brown1-11




Adaptive Backtracking Search Strategy to Find Optimal Path for Artificial Intelligence PurposesPDF
Isra’a Abdul-Ameer Abdul-Jabbar, Suhad M. Kadhum12-20




Augmented Reality for Information KioskPDF
Waghmare Amit B., Sonawane Kunal S., Chavan Puja A., Kadu Nanasaheb B.21-26




Face Recognition Using Fuzzy Moments Discriminant AnalysisPDF
Hussein A. Lafta, Farah Mohammed AL-Shareefi27-37




Image Content Analysis Using Neural Networks and Genetic AlgorithmsPDF
Reyadh S. Naoum, Mudhafar M. Al-Jarrah, Minan K. Mohammed, Marwan R. Shaker38-44




Why Performance TestingPDF
Mansi Goel, Priyanka Jain45-49




Security with Evidence Using ZigbeePDF
Mahesh Raj Urs, Badrinath K, Sharath P V50-52




Digital Governance Implementation and Institutional Performance of State Universities and Colleges (SUCs) in the PhilippinesPDF
Christopher Chua53-61




Development of Fingerprint Biometric Attendance System for Non-Academic Staff in a Tertiary InstitutionPDF
Adewole K. S., Abdulsalam S. O., Babatunde R. S., Shittu T. M., Oloyede M. O.62-70

Paper submission email: CEIS@iiste.org



Computer Engineering and Intelligent Systems http://goo.gl/JrlgT8

No comments:

Post a Comment