Table of Contents
Articles
| Journal Cover Page | |
| Journal Editor |
| Secure Transactions using Wireless Networks | |
| Rajeswari.P V.Sreenadha Sharma | 1-5 |
| Customizable Tele-Operated Unmanned Ground Vehicle | |
| Mayura Kinikar Akshay Pant, Anubhuti Poonia | 6-8 |
| E-Commerce and E-Governance: Technology for Tomorrow on India Reforms- 2020 | |
| S. Nibedita Arshad Usmani, Binod Kumar P.P. Satpathy, Jawed Kumar | 9-12 |
| An Approach for Solving Multiple Travelling Salesman Problem using Ant Colony Optimization | |
| Krishna H. Hingrajiya, Ravindra Kumar Gupta Gajendra Singh | 13-17 |
| Manchester Encoder and Decoder with Clock Recovery Unit and Invalid Detector | |
| Anjali.V P.Satishkumar | 18-21 |
| A Survey on Web Usage Mining, Applications and Tools | |
| ANITHA TALAKOKKULA | 22-29 |
| A Secure Key Management Scheme for Hierarchical WSN | |
| Tahira Laskar Debasish Jena | 30-36 |
| SQL Injection Attacks - Its Prevention using Flag Sequencing Approach | |
| Manveen Kaur | 37-42 |
| Optimizing Software Clustering using Hybrid Bee Colony Approach | |
| Kawal Jeet | 43-49 |
| Competence Based Management in Academics through Data Mining Approach | |
| Pooja Tripathi | 50-57 |
| A Note on “Solving Bimatrix Games with Fuzzy Payoffs by Introducing Nature as a Third Player” | |
| Tina Verma | 58-61 |
Paper submission email: CEIS@iiste.org
ISSN (Paper)2222-1727 ISSN (Online)2222-2863
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org
Computer Engineering and Intelligent Systems


