Vol 6, No 2 (2015)
Table of Contents
Articles
Journal Cover Page | |
Journal Editor |
Secure Transactions using Wireless Networks | |
Rajeswari.P V.Sreenadha Sharma | 1-5 |
Customizable Tele-Operated Unmanned Ground Vehicle | |
Mayura Kinikar Akshay Pant, Anubhuti Poonia | 6-8 |
E-Commerce and E-Governance: Technology for Tomorrow on India Reforms- 2020 | |
S. Nibedita Arshad Usmani, Binod Kumar P.P. Satpathy, Jawed Kumar | 9-12 |
An Approach for Solving Multiple Travelling Salesman Problem using Ant Colony Optimization | |
Krishna H. Hingrajiya, Ravindra Kumar Gupta Gajendra Singh | 13-17 |
Manchester Encoder and Decoder with Clock Recovery Unit and Invalid Detector | |
Anjali.V P.Satishkumar | 18-21 |
A Survey on Web Usage Mining, Applications and Tools | |
ANITHA TALAKOKKULA | 22-29 |
A Secure Key Management Scheme for Hierarchical WSN | |
Tahira Laskar Debasish Jena | 30-36 |
SQL Injection Attacks – Its Prevention using Flag Sequencing Approach | |
Manveen Kaur | 37-42 |
Optimizing Software Clustering using Hybrid Bee Colony Approach | |
Kawal Jeet | 43-49 |
Competence Based Management in Academics through Data Mining Approach | |
Pooja Tripathi | 50-57 |
A Note on “Solving Bimatrix Games with Fuzzy Payoffs by Introducing Nature as a Third Player” | |
Tina Verma | 58-61 |
Paper submission email: CEIS@iiste.org
ISSN (Paper)2222-1727 ISSN (Online)2222-2863