Computer Engineering and Intelligent Systems

Vol 5, No 2 (2014)

Table of Contents

Articles

A Survey of Provenance Leveraged Trust in Wireless Sensor Networks PDF
Gulustan Dogan, Ted Brown 1-11
Adaptive Backtracking Search Strategy to Find Optimal Path for Artificial Intelligence Purposes PDF
Isra’a Abdul-Ameer Abdul-Jabbar, Suhad M. Kadhum 12-20
Augmented Reality for Information Kiosk PDF
Waghmare Amit B., Sonawane Kunal S., Chavan Puja A., Kadu Nanasaheb B. 21-26
Face Recognition Using Fuzzy Moments Discriminant Analysis PDF
Hussein A. Lafta, Farah Mohammed AL-Shareefi 27-37
Image Content Analysis Using Neural Networks and Genetic Algorithms PDF
Reyadh S. Naoum, Mudhafar M. Al-Jarrah, Minan K. Mohammed, Marwan R. Shaker 38-44
Why Performance Testing PDF
Mansi Goel, Priyanka Jain 45-49
Security with Evidence Using Zigbee PDF
Mahesh Raj Urs, Badrinath K, Sharath P V 50-52
Digital Governance Implementation and Institutional Performance of State Universities and Colleges (SUCs) in the Philippines PDF
Christopher Chua 53-61
Development of Fingerprint Biometric Attendance System for Non-Academic Staff in a Tertiary Institution PDF
Adewole K. S., Abdulsalam S. O., Babatunde R. S., Shittu T. M., Oloyede M. O. 62-70

Paper submission email: CEIS@iiste.org