Vol 5, No 2 (2014)
Table of Contents
Articles
A Survey of Provenance Leveraged Trust in Wireless Sensor Networks | |
Gulustan Dogan, Ted Brown | 1-11 |
Adaptive Backtracking Search Strategy to Find Optimal Path for Artificial Intelligence Purposes | |
Isra’a Abdul-Ameer Abdul-Jabbar, Suhad M. Kadhum | 12-20 |
Augmented Reality for Information Kiosk | |
Waghmare Amit B., Sonawane Kunal S., Chavan Puja A., Kadu Nanasaheb B. | 21-26 |
Face Recognition Using Fuzzy Moments Discriminant Analysis | |
Hussein A. Lafta, Farah Mohammed AL-Shareefi | 27-37 |
Image Content Analysis Using Neural Networks and Genetic Algorithms | |
Reyadh S. Naoum, Mudhafar M. Al-Jarrah, Minan K. Mohammed, Marwan R. Shaker | 38-44 |
Why Performance Testing | |
Mansi Goel, Priyanka Jain | 45-49 |
Security with Evidence Using Zigbee | |
Mahesh Raj Urs, Badrinath K, Sharath P V | 50-52 |
Digital Governance Implementation and Institutional Performance of State Universities and Colleges (SUCs) in the Philippines | |
Christopher Chua | 53-61 |
Development of Fingerprint Biometric Attendance System for Non-Academic Staff in a Tertiary Institution | |
Adewole K. S., Abdulsalam S. O., Babatunde R. S., Shittu T. M., Oloyede M. O. | 62-70 |
Paper submission email: CEIS@iiste.org