Table of Contents
Articles
| A Review on Enhanced GPSR protocol For Wireless Sensor Networks | |
| P. Pranitha, G. Swamy, Aakunuri Manjula | 1-5 |
| Malicious Node Detection in MANET | |
| Sima Sima, Ashwani Kush | 6-13 |
| Document Image Binarization Using Post Processing Method | |
| E. Balamurugan, K. Sangeetha, Dr. P. Sengottuvelan | 14-17 |
| The Impact of Climate Change in Nigeria. | |
| Yusuf Abdulhamid | 18-25 |
| Implementation of High Power Dc-Dc Converter and Speed Control of Dc Motor Using DSP | |
| P.M. Balasubramaniam, A.Sathish Kumar, V.Saravanakumar Kumar | 26-33 |
| An Empirical Model for Information Retrieval System Evaluation: The User's perspective | |
| Bernard Ijesunor AKHIGBE, Babajide Samuel AFOLABI, Emmanuel Rotimi ADAGUNODO | 34-45 |
| Throughput Enhancement in IEEE 802.16j Mobile Multi-hop Relay (MMR) Networks | |
| D.Satish Kumar, Dr.N. Nagarajan | 46-54 |
| Congestion Control for Wireless Ad-Hoc Networks | |
| Kartheek Kumar Reddy, Raaz Rajmohmmad | 55-60 |
| Simulation, Analysis and Performance Comparison among different Routing Protocols for Wireless Sensor Network | |
| Boshir Ahmed, Md. Khaled Ben Islam, Julia Rahman | 61-71 |
| Towards Remote Electronic Voting Systems | |
| Okediran Oladotun O, Omidiora Elijah O., Olabiyisi Stephen O., Ganiyu Rafiu A., Sijuade Adeyemi A. | 72-81 |
| Automatic Road Extractions from High Resolution Satellite Imagery Using Road Intersection Model in Urban Areas | |
| Boshir Ahmed, Md. Fayzur Rahman | 82-93 |
| A Review: Discover True Facts from Conflicting Information Providers on the Web using Truth Finder | |
| Sudhakar Katherapaka, P.Pradeep Kumar, Manjula Aakunuri | 94-100 |
| Lossy To Lossless Medical Image Coding Using Joint Bit Scanning Method | |
| Tirupathiraju kanumuri, M.L. Dewal, R.S. Anand | 101-109 |
| Three-Level Inverter Performance Using Adaptive Neuro-Fuzzy Based Space Vector Modulation | |
| G.. Durgasukumar, M.K. Pathak | 110-123 |
| Iris Recognition with Fake Identification | |
| Pradeep Kumar | 124-135 |
| An Analysis of Text-Based Authentication using Images in Banking System | |
| R. Sujatha, G. Arumugam | 136-148 |
| Automatic Clustering with Single Optimal Solution | |
| Karteeka Pavan K, Allam Appa Rao, A.V. Dattatreya Rao | 149-161 |
| Objects classification in still images using the region covariance descriptor | |
| T. Harini, P. Pradeep Kumar | 162-170 |
| Novel Image Segmentation through Agile Expanse Merging | |
| S. Kathiravan, A.K. Kamalraj | 171-184 |
| Design Approach to Implementation Of Arbitration Algorithm In Shared Bus Architectures (MPSoC) | |
| D. Shanthi, R. Amutha | 185-196 |
| Agent for Automating Educational Institutes as a Single Entity: Schools' Coordination System | |
| Sheikh Muhammad Saqib, Khalid Mehmood, Bashir Ahmad, Shakeel Ahmad, Muhammad Ahmad Jan, Muhammad Zubair Asghar | 197-205 |
| A review on Cloud Computing Architectures and Applications | |
| Waqas Haider, Abdul Wahab | 206-210 |
| Quality of Service aware Dynamic Source Routing Protocol in Ad hoc Networks: Proposal, Analysis and Comparison | |
| Singh Ajay Vikram, Alam M. Afshar, Singh Bani | 211-221 |
| A Study on Super-Resolution Image Reconstruction Techniques | |
| Kathiravan Srinivasan, J. Kanakaraj | 222-227 |
| Offering a Proper E-learning model for Islamic Azad University of Roudsar and Amlash (IAURA) | |
| Mehrbakhsh Nilashi, Othman Ibrahim, Norafida Ithnin, Nasim Janahmadi | 228-236 |
| Offering an Expert Electronic Roll Call and Teacher Assessment System Based on Mobile Phones for Higher Education | |
| Mehrbakhsh Nilashi, Othman Ibrahim, Norafida Ithnin, Nasim Janahmadi | 237-245 |
| A Decision Support System for Information Technology Policy Formulation | |
| Lukman A. Ogundele, Odetunji A. Odejobi, Lukman A. Akanbi, Emmanuel R. Adagunodo, M. O. Ilori | 246-259 |
| Intelligent Agent for detection of ATM Theft | |
| Muhammad Javed, Bashir Ahmad, Muhammad Ali Abid, Imran Ali Khan | 260-264 |
Paper submission email: CEIS@iiste.org
ISSN (Paper)2222-1727 ISSN (Online)2222-2863
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org
Computer Engineering and Intelligent Systems


