Table of Contents
Articles
The Critical Need for Software Architecture Practices in Software Development Process | |
Ishaya Gambo, Rhoda Ikono, Olaronke Iroju, Theressa Omodunbi | 1-7 |
A JADE Implemented Mobile Agent Based Host Platform Security | |
Parul Ahuja, Vivek Sharma | 8-19 |
A Real-time Filtering Method of Positioning Data with Moving Window Mechanism | |
Ha YoonSong, Han-gyoo Kim | 20-31 |
An Efficient Distributed Group Key Management Using Hierarchical Approach with ECDH and Symmetric Algorithm | |
Uday Pratap Singh, Rajkumar Singh Rathore | 32-41 |
A Study of Image Fingerprinting by Using Visual Cryptography | |
Santosh Choudhary, Shrikrishan Yadav, Neeta Sen, Gosiya Nasreen | 42-50 |
An Efficient Scheduling Policy for Load Balancing Model for Computational Grid System | |
Mukul Pathak, Ajeet Kumar Bhartee, Vinay Tandon | 51-61 |
An Improvement to Trust Based Cross-Layer Security Protocol against Sybil Attacks (DAS) | |
R. Naveen Kumar, V. Bapuji, Dr. A. Govardhan, Prof. S.S.V.N. Sarma | 62-70 |
Application of Computer Graphics Technique to Computer System Assembling | |
Falohun A. S, Omidiora E. O, Oke O. A, Ajala F. A, Ismaila W.O | 71-76 |
Implementation of a Modified Counterpropagation Neural Network Model in Online Handwritten Character Recognition System | |
Fenwa O.D., Emuoyibofarhe J. O., Olabiyisi S.O., Ajala F. A., Falohun A. S. | 77-88 |
Mining Data Streams using Option Trees | |
B. Reshma Yusuf, Dr. P. Chenna Reddy | 89-99 |
Distribution Systems Efficiency | |
Omar Al-Heyasat, Ashraf Abdel-Karim Abu-Ein, Hazem (Moh’d Said) Hatamleh, Ahmed A.M Sharadqeh, As'ad Mahmoud Alnaser | 100-104 |
Quality Assessment of Resultant Images after Processing | |
Anitha S, Dr Nagabhushana B S | 105-112 |
Virtual Digital Retarders System | |
GAHZI AL-MARAHLEH, SAYEL FAYYAD, SULEIMAN ABU-EIN, ASHRAF ABU-EIN | 113-125 |
An approach to Enhance the software and services of Health care centre | |
SAURABH RAWAT, ANUSHREE SAH | 126-136 |
Speech Recognition Using Vector Quantization through Modified K-meansLBG Algorithm | |
Balwant A. Sonkamble, D. D. Doye | 137-144 |
Study of the Topology Mismatch Problem in Peer-to-Peer Networks | |
B Lalitha, Dr Ch D V Subba Rao | 145-154 |
Realization Of An 8-bit Pipelined Microprocessor in Verilog HDL | |
Jayant Chowdhary, Vivek Garg, Tushar Negi, Shreya Jain | 155-161 |
Prediction of Stock Market Index Using Genetic Algorithm | |
R. Lakshman Naik, D. Ramesh, B. Manjula, Dr. A. Govardhan | 162-171 |
Paper submission email: CEIS@iiste.org
ISSN (Paper)2222-1727 ISSN (Online)2222-2863
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org