Monday, August 6, 2012

New published issue of Computer Engineering and Intelligent Systems


Vol 3, No 7 (2012)

Table of Contents

Articles

The Critical Need for Software Architecture Practices in Software Development ProcessPDF
Ishaya Gambo, Rhoda Ikono, Olaronke Iroju, Theressa Omodunbi1-7
A JADE Implemented Mobile Agent Based Host Platform SecurityPDF
Parul Ahuja, Vivek Sharma8-19
A Real-time Filtering Method of Positioning Data with Moving Window MechanismPDF
Ha YoonSong, Han-gyoo Kim20-31
An Efficient Distributed Group Key Management Using Hierarchical Approach with ECDH and Symmetric AlgorithmPDF
Uday Pratap Singh, Rajkumar Singh Rathore32-41
A Study of Image Fingerprinting by Using Visual CryptographyPDF
Santosh Choudhary, Shrikrishan Yadav, Neeta Sen, Gosiya Nasreen42-50
An Efficient Scheduling Policy for Load Balancing Model for Computational Grid SystemPDF
Mukul Pathak, Ajeet Kumar Bhartee, Vinay Tandon51-61
An Improvement to Trust Based Cross-Layer Security Protocol against Sybil Attacks (DAS)PDF
R. Naveen Kumar, V. Bapuji, Dr. A. Govardhan, Prof. S.S.V.N. Sarma62-70
Application of Computer Graphics Technique to Computer System AssemblingPDF
Falohun A. S, Omidiora E. O, Oke O. A, Ajala F. A, Ismaila W.O71-76
Implementation of a Modified Counterpropagation Neural Network Model in Online Handwritten Character Recognition SystemPDF
Fenwa O.D., Emuoyibofarhe J. O., Olabiyisi S.O., Ajala F. A., Falohun A. S.77-88
Mining Data Streams using Option TreesPDF
B. Reshma Yusuf, Dr. P. Chenna Reddy89-99
Distribution Systems EfficiencyPDF
Omar Al-Heyasat, Ashraf Abdel-Karim Abu-Ein, Hazem (Moh’d Said) Hatamleh, Ahmed A.M Sharadqeh, As'ad Mahmoud Alnaser100-104
Quality Assessment of Resultant Images after ProcessingPDF
Anitha S, Dr Nagabhushana B S105-112
Virtual Digital Retarders SystemPDF
GAHZI AL-MARAHLEH, SAYEL FAYYAD, SULEIMAN ABU-EIN, ASHRAF ABU-EIN113-125
An approach to Enhance the software and services of Health care centrePDF
SAURABH RAWAT, ANUSHREE SAH126-136
Speech Recognition Using Vector Quantization through Modified K-meansLBG AlgorithmPDF
Balwant A. Sonkamble, D. D. Doye137-144
Study of the Topology Mismatch Problem in Peer-to-Peer NetworksPDF
B Lalitha, Dr Ch D V Subba Rao145-154
Realization Of An 8-bit Pipelined Microprocessor in Verilog HDLPDF
Jayant Chowdhary, Vivek Garg, Tushar Negi, Shreya Jain155-161
Prediction of Stock Market Index Using Genetic AlgorithmPDF
R. Lakshman Naik, D. Ramesh, B. Manjula, Dr. A. Govardhan162-171

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.