Vol 6, No 2 (2015)

Table of Contents

Articles

Journal Cover Page PDF
Journal Editor
Secure Transactions using Wireless Networks PDF
Rajeswari.P V.Sreenadha Sharma 1-5
Customizable Tele-Operated Unmanned Ground Vehicle PDF
Mayura Kinikar Akshay Pant, Anubhuti Poonia 6-8
E-Commerce and E-Governance: Technology for Tomorrow on India Reforms- 2020 PDF
S. Nibedita Arshad Usmani, Binod Kumar P.P. Satpathy, Jawed Kumar 9-12
An Approach for Solving Multiple Travelling Salesman Problem using Ant Colony Optimization PDF
Krishna H. Hingrajiya, Ravindra Kumar Gupta Gajendra Singh 13-17
Manchester Encoder and Decoder with Clock Recovery Unit and Invalid Detector PDF
Anjali.V P.Satishkumar 18-21
A Survey on Web Usage Mining, Applications and Tools PDF
ANITHA TALAKOKKULA 22-29
A Secure Key Management Scheme for Hierarchical WSN PDF
Tahira Laskar Debasish Jena 30-36
SQL Injection Attacks - Its Prevention using Flag Sequencing Approach PDF
Manveen Kaur 37-42
Optimizing Software Clustering using Hybrid Bee Colony Approach PDF
Kawal Jeet 43-49
Competence Based Management in Academics through Data Mining Approach PDF
Pooja Tripathi 50-57
A Note on “Solving Bimatrix Games with Fuzzy Payoffs by Introducing Nature as a Third Player” PDF
Tina Verma 58-61


Paper submission email: CEIS@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2863

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org