Vol 3, No 7 (2012)

Table of Contents

Articles

The Critical Need for Software Architecture Practices in Software Development Process PDF
Ishaya Gambo, Rhoda Ikono, Olaronke Iroju, Theressa Omodunbi 1-7
A JADE Implemented Mobile Agent Based Host Platform Security PDF
Parul Ahuja, Vivek Sharma 8-19
A Real-time Filtering Method of Positioning Data with Moving Window Mechanism PDF
Ha YoonSong, Han-gyoo Kim 20-31
An Efficient Distributed Group Key Management Using Hierarchical Approach with ECDH and Symmetric Algorithm PDF
Uday Pratap Singh, Rajkumar Singh Rathore 32-41
A Study of Image Fingerprinting by Using Visual Cryptography PDF
Santosh Choudhary, Shrikrishan Yadav, Neeta Sen, Gosiya Nasreen 42-50
An Efficient Scheduling Policy for Load Balancing Model for Computational Grid System PDF
Mukul Pathak, Ajeet Kumar Bhartee, Vinay Tandon 51-61
An Improvement to Trust Based Cross-Layer Security Protocol against Sybil Attacks (DAS) PDF
R. Naveen Kumar, V. Bapuji, Dr. A. Govardhan, Prof. S.S.V.N. Sarma 62-70
Application of Computer Graphics Technique to Computer System Assembling PDF
Falohun A. S, Omidiora E. O, Oke O. A, Ajala F. A, Ismaila W.O 71-76
Implementation of a Modified Counterpropagation Neural Network Model in Online Handwritten Character Recognition System PDF
Fenwa O.D., Emuoyibofarhe J. O., Olabiyisi S.O., Ajala F. A., Falohun A. S. 77-88
Mining Data Streams using Option Trees PDF
B. Reshma Yusuf, Dr. P. Chenna Reddy 89-99
Distribution Systems Efficiency PDF
Omar Al-Heyasat, Ashraf Abdel-Karim Abu-Ein, Hazem (Moh’d Said) Hatamleh, Ahmed A.M Sharadqeh, As'ad Mahmoud Alnaser 100-104
Quality Assessment of Resultant Images after Processing PDF
Anitha S, Dr Nagabhushana B S 105-112
Virtual Digital Retarders System PDF
GAHZI AL-MARAHLEH, SAYEL FAYYAD, SULEIMAN ABU-EIN, ASHRAF ABU-EIN 113-125
An approach to Enhance the software and services of Health care centre PDF
SAURABH RAWAT, ANUSHREE SAH 126-136
Speech Recognition Using Vector Quantization through Modified K-meansLBG Algorithm PDF
Balwant A. Sonkamble, D. D. Doye 137-144
Study of the Topology Mismatch Problem in Peer-to-Peer Networks PDF
B Lalitha, Dr Ch D V Subba Rao 145-154
Realization Of An 8-bit Pipelined Microprocessor in Verilog HDL PDF
Jayant Chowdhary, Vivek Garg, Tushar Negi, Shreya Jain 155-161
Prediction of Stock Market Index Using Genetic Algorithm PDF
R. Lakshman Naik, D. Ramesh, B. Manjula, Dr. A. Govardhan 162-171


Paper submission email: CEIS@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2863

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org