Vol 6, No 10 (2015) Computer Engineering and Intelligent Systems

Vol 6, No 10 (2015)

Table of Contents

Articles

An Appraisal of Cyber Laws with Reference to E-Banking in Pakistan PDF
Rameez Anjum Fozia Naseem 1-5
Fraud Detection in Telecommunications Industry: Bridging the Gap with Random Rough Subspace Based Neural Network Ensemble Method PDF
Iyabo Awoyelu, Adenike Adebomi, Adekemi Amoo, Rachael Adebisi, Charles Mabude 6-15
Factors Affecting Acceptance, Adoption and Use of Online SNS by Seniors PDF
Lindah Sawe, Stephen Kimani, Michael Kimwele 16-21
Development G-Index and H-Index : Dgh-Index PDF
Ahmed Abdul Hassan AL-Fatlawi 22-35
Identification of Canola Seeds using Nearest Neighbor and K-Nearest Neighbor Algorithms PDF
Altaf Saeed 36-42
On A Single Display Multi-View Video Over Internet Protocol (SDMV-VOIP) Streamer PDF
S. Eyakedung, F. U. Ogban 43-47

 

Paper submission email: CEIS@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2863

Vol 5, No 12 (2014) Computer Engineering and Intelligent Systems

Vol 5, No 12 (2014)

Table of Contents

Articles

Automatic Diagnosis of Distortion Type of Arabic /r/ Phoneme Using Feed Forward Neural Network PDF
Ayad T. Imam, Jehad A. Alaraifi, Ibtisam Hussien J 1-8
Development of an Online Bus Ticket Reservation System for a Transportation Service in Nigeria PDF
Oloyede, M.O., Alaya S.M., Adewole, K.S 9-17
Algorithmic Framework for Frequent Pattern Mining with FP-Tree PDF
Georgina N. Obunadike, Audu Isah, Arthur Umeh, H. C. Inyiamah 18-25
Microcontroller Based Green House Control Device PDF
Alausa Dele W.S, Keshinro Kazeem Kolawole 26-32
Object-Oriented Modeling of DIPRM System for E-Commerce Transaction PDF
Sanjay Banerjee, Sunil Karforma 33-48
The GSM Approach in Home Security PDF
Alausa Dele W.S, Keshinro Kazeem Kolawole 49-54
Static Analysis Based Behavioral API for Malware Detection using Markov Chain PDF
Abbas M. Al-Bakri, Hussein L. Hussein 55-63
The Relation between Cultural Learning Framework and Blackboard System Acceptance: Case Study Blended Learning University-United Arab Emirate PDF
Sundus A. Hamoodi 64-70
Understanding the State of Financial Inclusion in Namibia PDF
Albert Mutonga Matongela 71-75
Video Calling Over Wi-Fi Network using Android Phones PDF
Shrideep N. Ghag, Kamlesh D. Kakade, Ritesh N. Goyal, Amit A. Kamthane 76-80
Detection of Link Failures and Autonomous Reconfiguration in WMNs PDF
Sumathi P, Srinivasulu M 81-85
Solving The Problem of Adaptive E-Learning By Using Social Networks PDF
Mohammed Yaqub, A. M. Raid, H. M. El-Bakry 86-93
A User Behavior Based Study on Search Engine Ranking PDF
Yu Huang, Mu Zhang, Xuekui Ge 94-104

Paper submission email: CEIS@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2863

Vol 5, No 8 (2014) Computer Engineering and Intelligent Systems

Vol 5, No 8 (2014)

Table of Contents

Articles

Decision Making Intelligent Agent on SOX Compliance over the Imports Process PDF
Jesus Angel Fernandez Canelas, Quintin Martin Martin, Juan Manuel Corchado Rodriguez 1-17
Tchebichef Moment Based Hilbert Scan for Image Compression PDF
Farah M.H. AL-Shareefi 18-25
Impact of ICT on Tax Administration in Nigeria PDF
AYODEJI OYEYINKA EFUNBOADE 26-29
Complete Security Package for USB Thumb Drive PDF
Sinan Adnan Diwan, Sundresan Perumal, Ammar J. Fatah 30-37
An Brief Introduction to Android Operating System PDF
Kasamsetty Kedarnath 38-43
A Simulated Annealing Algorithm for Solving the School Bus Routing Problem: A Case Study of Dar es Salaam PDF
Denis M. Manumbu, E. Mujuni, Dmitry Kuznetsov 44-58
A Step on Developing Network Monitoring Tools PDF
Ahmed Kijazi, Kisangiri Michael 59-65
Automatic Multiple Choice Question Generation System for Semantic Attributes Using String Similarity Measures PDF
Ibrahim Eldesoky Fattoh 66-73
Semantic Based Automatic Question Generation using Artificial Immune System PDF
Ibrahim Eldesoky Fattoh 74-82

Paper submission email: CEIS@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2863

Vol.5 No.5, Vol.5 No.6 and Vol 5, No 7 (2014) Computer Engineering and Intelligent Systems

Vol 5, No 7 (2014)

Table of Contents

Articles

Open Social Learning Network PDF
Mohammed Yaqub, A. M. Raid, Haitham A. EL-Ghareeb 1-14
Common Fixed Point Theorems Using Faintly Compatible Mappings In Fuzzy Metric Spaces PDF
Kamal Wadhwa, Ved Prakash Bhardwaj 15-22
Investigational Analysis of Security Measures Effectiveness in Cloud Computing: A Study PDF
Vijay. G.R, A.Rama Mohan Reddy 23-30
Eigenface Based Recognition of Emotion Variant Faces PDF
Thuseethan, S., Kuhanesan, S. 31-37
Video-based Smoke Detection Algorithms: A Chronological Survey PDF
John Adedapo Ojo, Jamiu Alabi Oladosu 38-50
Secure Data Transmission Using DNA ENCRYPTION PDF
ANUPRIYA AGGARWAL, PRAVEEN KANTH 51-59
PERFORMANCE EVALUATION OF DVB-T2 BROADCASTING NETWORK: A CASE STUDY OF DAR ES SALAAM, TANZANIA PDF
Lusekelo Kibona, Anael Sam

Vol 5, No 6 (2014)

Vol 5, No 5 (2014)

Table of Contents

Articles

Biometrics: Effectiveness and Applications within the Blended Learning Environment PDF
Mohamed Sayed, Farid Jradi 1-8
A Survey on Challenges to the Media Cloud PDF
Lajja Vyas, Shruti Raval, Richa Sinha 9-12
Comparative Analysis of Handoff Queuing Scheme for Minimizing Call Drop Due to Handoff Failure in GSM Systems. PDF
Aniebiet Kingsley Inyang, Uduak Idio Akpan, Constance Kalu 13-20
A Failure Rate Model for Reliability Assessment of Ibadan Distribution Systems PDF
Ganiyu Adedayo Ajenikoko, Anthony A Olaomi, David Olugbenga Aborisade 21-33
Developing a Modified Hybrid Caesar Cipher and Vigenere Cipher for Secure Data Communication PDF
O.E. Omolara, A.I. Oludare, S.E. Abdulahi 34-46

Paper submission email: CEIS@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2863

Vol 5, No 3 (2014) Journal of Computer Engineering and Intelligent Systems

Vol 5, No 3 (2014)

Table of Contents

Articles

Requirements, Formal Verification and Model transformations of an Agent-based System: A CASE STUDY PDF
Nadeem Akhtar 1-16
Computer Govern Maintenance System for a Process Industry PDF
Rajiv Suman, Sushil Kumar Choudhary, Pooja Preet 17-24
A New Method of Gridding for Spot Detection in Microarray Images PDF
J. Harikiran, D. RamaKrishna, B. Avinash, P.V. Lakshmi, R. KiranKumar 25-33
KitRobot: A multi-platform graphical programming IDE to program mini-robotic agents PDF
Nadeem Akhtar, Anique Akhtar 34-42
Adaptive Mean Value Function Based Quality Assessment of Software Reliable Growth Models PDF
Chandra Mouli Venkata Srinivas Akana,, C. Divakar, Ch. Satyanarayana 43-49
A Computer Programme to Determine the Bending and Pitting Stresses of Gears and the Effect of Varying the AGMA Stress Equation Parameters on the Stress Values PDF
Stephen Kwasi Adzimah, Issifu Ibrahim 50-65
A Usability Evaluation Framework for B2C E-Commerce Websites PDF
Sandeep Kumar Panda 66-85
An Evaluation of Web Based Expert System as a Catalyst for Maize Production in Kenya PDF
Andrew Kipkebut 86-97
Managing of Urban Water Network using GIS Concept PDF
Samir Mahmud Adam Abdalla, Magdy Shayboub Ali Mahmoud 98-109
A Survey on Live Virtual Machine Migrations and its Techniques PDF
Swapnil M. Parikh 110-113
Virtual Explorer: a Path Prediction Algorithm for Intelligent Transport Systems PDF
Arwa Zabian, Ahmad Ibrahim, Sami Qawasmeh 114-122

Paper submission email: CEIS@iiste.org