Table of Contents
Articles
| Requirements, Formal Verification and Model transformations of an Agent-based System: A CASE STUDY | |
| Nadeem Akhtar | 1-16 |
| Methodology for Evidence Reconstruction in Digital Image Forensics | |
| Kalpana Manudhane, M.M. Bartere | 17-27 |
| Comparative Analysis of Data Mining Tools and Classification Techniques using WEKA in Medical Bioinformatics | |
| Satish Kumar David, Amr T.M. Saeb, Khalid Al Rubeaan | 28-38 |
| Comparison of Machine Learning Classifiers for Recognition of Online and Offline Handwritten Digits* | |
| Elijah Olusayo Omidiora, Ibrahim Adepoju Adeyanju, Olusayo Deborah Fenwa | 39-47 |
| Development of an Enterprise Resource Planning System for Information Coordination in Higher Institutions | |
| Oyerinde I. M, Olabiyisi S. O | 48-54 |
| Parallel Query Processing on 2D Mesh and Linear Array Architectures | |
| Amal Elsayed Aboutabl | 55-64 |
| Pattern Recognition By a Scaled Corners Detection | |
| Dhyaa Shaheed Al-Azzwy | 65-71 |
| Text Mining Agent Using Hybrid Neural Networks | |
| Saja A. Muhammed, Laith R. Flaih | 72-83 |
| Artificial Immune System Approach for Multi Objective Optimization | |
| GARIMA SINGH, SUNITA BANSAL | 84-90 |
| Analysis and Implementation of Malicious Node in AODV Routing Protocol | |
| Bhupendra B Patel, Chirag S Thaker, Nidhi R Jani | 91-96 |
| Edge Detection of Noisy Medical Images Based Mixed Entropy | |
| A. E. A. Elaraby, El-Owny, Hassan Badry Mohamed A., M. Heshmat, M. Hassaballah, A. S. Abdel Rady | 97-106 |
| Data Hiding in Color Images: A High Capacity Data Hiding Technique for Covert Communication | |
| Shabir A. Parah, Javaid A. Sheikh, G. M. Bhat | 107-115 |
| Framework for Developing Web (Text-Based) Teleconferencing System. | |
| Ernest C. Ukwosah, Virginia E. Ejiofor | 116-120 |
| Managing Urban Crimes with Geoinformatics: A Case Study of Benin City, Nigeria | |
| Innocent E. Bello, Isi A. Ikhuoria, Ganiy, I. Agbaje, Steve. O. Ogedegbe | 121-134 |
| Multimedia Synchronization Protocol Dedicated for Virtual Classrooms over Narrowband networks | |
| Mahmud J.Abu Al-Shaeer, Enas Hadi Salih | 135-146 |
Paper submission email: CEIS@iiste.org
ISSN (Paper)2222-1727 ISSN (Online)2222-2863
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org
Computer Engineering and Intelligent Systems


