Vol 2, No 4 (2011)

Table of Contents


A Review on Enhanced GPSR protocol For Wireless Sensor Networks PDF
P. Pranitha, G. Swamy, Aakunuri Manjula 1-5
Malicious Node Detection in MANET PDF
Sima Sima, Ashwani Kush 6-13
Document Image Binarization Using Post Processing Method PDF
E. Balamurugan, K. Sangeetha, Dr. P. Sengottuvelan 14-17
The Impact of Climate Change in Nigeria. PDF
Yusuf Abdulhamid 18-25
Implementation of High Power Dc-Dc Converter and Speed Control of Dc Motor Using DSP PDF
P.M. Balasubramaniam, A.Sathish Kumar, V.Saravanakumar Kumar 26-33
An Empirical Model for Information Retrieval System Evaluation: The User's perspective PDF
Bernard Ijesunor AKHIGBE, Babajide Samuel AFOLABI, Emmanuel Rotimi ADAGUNODO 34-45
Throughput Enhancement in IEEE 802.16j Mobile Multi-hop Relay (MMR) Networks PDF
D.Satish Kumar, Dr.N. Nagarajan 46-54
Congestion Control for Wireless Ad-Hoc Networks PDF
Kartheek Kumar Reddy, Raaz Rajmohmmad 55-60
Simulation, Analysis and Performance Comparison among different Routing Protocols for Wireless Sensor Network PDF
Boshir Ahmed, Md. Khaled Ben Islam, Julia Rahman 61-71
Towards Remote Electronic Voting Systems PDF
Okediran Oladotun O, Omidiora Elijah O., Olabiyisi Stephen O., Ganiyu Rafiu A., Sijuade Adeyemi A. 72-81
Automatic Road Extractions from High Resolution Satellite Imagery Using Road Intersection Model in Urban Areas PDF
Boshir Ahmed, Md. Fayzur Rahman 82-93
A Review: Discover True Facts from Conflicting Information Providers on the Web using Truth Finder PDF
Sudhakar Katherapaka, P.Pradeep Kumar, Manjula Aakunuri 94-100
Lossy To Lossless Medical Image Coding Using Joint Bit Scanning Method PDF
Tirupathiraju kanumuri, M.L. Dewal, R.S. Anand 101-109
Three-Level Inverter Performance Using Adaptive Neuro-Fuzzy Based Space Vector Modulation PDF
G.. Durgasukumar, M.K. Pathak 110-123
Iris Recognition with Fake Identification PDF
Pradeep Kumar 124-135
An Analysis of Text-Based Authentication using Images in Banking System PDF
R. Sujatha, G. Arumugam 136-148
Automatic Clustering with Single Optimal Solution PDF
Karteeka Pavan K, Allam Appa Rao, A.V. Dattatreya Rao 149-161
Objects classification in still images using the region covariance descriptor PDF
T. Harini, P. Pradeep Kumar 162-170
Novel Image Segmentation through Agile Expanse Merging PDF
S. Kathiravan, A.K. Kamalraj 171-184
Design Approach to Implementation Of Arbitration Algorithm In Shared Bus Architectures (MPSoC) PDF
D. Shanthi, R. Amutha 185-196
Agent for Automating Educational Institutes as a Single Entity: Schools' Coordination System PDF
Sheikh Muhammad Saqib, Khalid Mehmood, Bashir Ahmad, Shakeel Ahmad, Muhammad Ahmad Jan, Muhammad Zubair Asghar 197-205
A review on Cloud Computing Architectures and Applications PDF
Waqas Haider, Abdul Wahab 206-210
Quality of Service aware Dynamic Source Routing Protocol in Ad hoc Networks: Proposal, Analysis and Comparison PDF
Singh Ajay Vikram, Alam M. Afshar, Singh Bani 211-221
A Study on Super-Resolution Image Reconstruction Techniques PDF
Kathiravan Srinivasan, J. Kanakaraj 222-227
Offering a Proper E-learning model for Islamic Azad University of Roudsar and Amlash (IAURA) PDF
Mehrbakhsh Nilashi, Othman Ibrahim, Norafida Ithnin, Nasim Janahmadi 228-236
Offering an Expert Electronic Roll Call and Teacher Assessment System Based on Mobile Phones for Higher Education PDF
Mehrbakhsh Nilashi, Othman Ibrahim, Norafida Ithnin, Nasim Janahmadi 237-245
A Decision Support System for Information Technology Policy Formulation PDF
Lukman A. Ogundele, Odetunji A. Odejobi, Lukman A. Akanbi, Emmanuel R. Adagunodo, M. O. Ilori 246-259
Intelligent Agent for detection of ATM Theft PDF
Muhammad Javed, Bashir Ahmad, Muhammad Ali Abid, Imran Ali Khan 260-264

Paper submission email: CEIS@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2863

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org