International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)
DOI: 10.5815/ijitcs


Published By: MECS Publisher








Computer Simulation of Theoretical Model of Electromagnetic Transient Processes in Power Transformers

Slobodan Bjelić, Zorica Bogićević

Abstract | References | Full Paper: PDF (Size:552KB), PP.1-12, Pub. Date: 2013-12-1

DOI: 10.5815/ijitcs.2014.01.01



New RLS Wiener Smoother for Colored Observation Noise in Linear Discrete-time Stochastic Systems

Seiichi Nakamori

Abstract | References | Full Paper: PDF (Size:469KB), PP.13-24, Pub. Date: 2013-12-1

DOI: 10.5815/ijitcs.2014.01.02



Improved Decomposition for a System of Completely Specified Boolean Functions

Saeid Taghavi Afshord, Yuri Pottosin

Abstract | References | Full Paper: PDF (Size:292KB), PP.25-32, Pub. Date: 2013-12-1

DOI: 10.5815/ijitcs.2014.01.03



Parallel Implementation of Color Based Image Retrieval Using CUDA on the GPU

Hadis Heidari, Abdolah Chalechale, Alireza Ahmadi Mohammadabadi

Abstract | References | Full Paper: PDF (Size:457KB), PP.33-40, Pub. Date: 2013-12-1

DOI: 10.5815/ijitcs.2014.01.04



Method for Object Motion Characteristic Estimation Based on Wavelet Multi-Resolution Analysis: MRA

Kohei Arai

Abstract | References | Full Paper: PDF (Size:2032KB), PP.41-49, Pub. Date: 2013-12-1

DOI: 10.5815/ijitcs.2014.01.05



Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks

Malika BELKADI, Rachida AOUDJIT, Mehammed DAOUI, Mustapha LALAM

Abstract | References | Full Paper: PDF (Size:241KB), PP.50-56, Pub. Date: 2013-12-1

DOI: 10.5815/ijitcs.2014.01.06



A Survey of Unipath Routing Protocols for Mobile Ad Hoc Networks

M.Barveen Banu, P.Periyasamy

Abstract | References | Full Paper: PDF (Size:408KB), PP.57-67, Pub. Date: 2013-12-1

DOI: 10.5815/ijitcs.2014.01.07



FSM Circuits Design for Approximate String Matching in Hardware Based Network Intrusion Detection Systems

Dejan Georgiev, Aristotel Tentov

Abstract | References | Full Paper: PDF (Size:1165KB), PP.68-75, Pub. Date: 2013-12-1

DOI: 10.5815/ijitcs.2014.01.08



Social Network Clustering

Narges Azizifard

Abstract | References | Full Paper: PDF (Size:1069KB), PP.76-81, Pub. Date: 2013-12-1

DOI: 10.5815/ijitcs.2014.01.09



An Image Encryption Scheme Based on Bit Circular Shift and Bi-directional Diffusion

Ruisong Ye, Shaojun Zeng, Peiqian Lun, Junming Ma, Chuting Lai

Abstract | References | Full Paper: PDF (Size:1350KB), PP.82-92, Pub. Date: 2013-12-1

DOI: 10.5815/ijitcs.2014.01.10



A New Fault Detection Method Using End-to-End Data and Sequential Testing for Computer Networks

Mohammad Sadeq Garshasbi, Shahram Jamali

Abstract | References | Full Paper: PDF (Size:301KB), PP.93-100, Pub. Date: 2013-12-1

DOI: 10.5815/ijitcs.2014.01.11



Management of Automotive Engine Based on Stable Fuzzy Technique with Parallel Sliding Mode Optimization

Mansour Bazregar, Farzin Piltan, Mehdi Akbari, Mojdeh Piran

Abstract | References | Full Paper: PDF (Size:1215KB), PP.101-107, Pub. Date: 2013-12-1

DOI: 10.5815/ijitcs.2014.01.12