International Journal of Information Technology and Computer Science(IJITCS)
ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)
DOI: 10.5815/ijitcs
Published By: MECS Press
IJITCS Vol. 6, No. 1, Dec. 2013
Cover page and Table of Contents: PDF (size: 225KB)
Contents
REGULAR PAPERS
-
Computer Simulation of Theoretical Model of Electromagnetic Transient Processes in Power Transformers
Slobodan Bjelić, Zorica Bogićević
Abstract | References | Full Paper: PDF (Size:572KB), PP.1-12, Pub. Date: 2013-12-01
DOI: 10.5815/ijitcs.2014.01.01
-
New RLS Wiener Smoother for Colored Observation Noise in Linear Discrete-time Stochastic Systems
Seiichi Nakamori
Abstract | References | Full Paper: PDF (Size:467KB), PP.13-24, Pub. Date: 2013-12-01
DOI: 10.5815/ijitcs.2014.01.02
-
Improved Decomposition for a System of Completely Specified Boolean Functions
Saeid Taghavi Afshord, Yuri Pottosin
Abstract | References | Full Paper: PDF (Size:320KB), PP.25-32, Pub. Date: 2013-12-01
DOI: 10.5815/ijitcs.2014.01.03
-
Parallel Implementation of Color Based Image Retrieval Using CUDA on the GPU
Hadis Heidari, Abdolah Chalechale, Alireza Ahmadi Mohammadabadi
Abstract | References | Full Paper: PDF (Size:343KB), PP.33-40, Pub. Date: 2013-12-01
DOI: 10.5815/ijitcs.2014.01.04
-
Method for Object Motion Characteristic Estimation Based on Wavelet Multi-Resolution Analysis: MRA
Kohei Arai
Abstract | References | Full Paper: PDF (Size:538KB), PP.41-49, Pub. Date: 2013-12-01
DOI: 10.5815/ijitcs.2014.01.05
-
Energy-efficient Secure Directed Diffusion Protocol for Wireless Sensor Networks
Malika BELKADI, Rachida AOUDJIT, Mehammed DAOUI, Mustapha LALAM
Abstract | References | Full Paper: PDF (Size:271KB), PP.50-56, Pub. Date: 2013-12-01
DOI: 10.5815/ijitcs.2014.01.06
-
A Survey of Unipath Routing Protocols for Mobile Ad Hoc Networks
M.Barveen Banu, P.Periyasamy
Abstract | References | Full Paper: PDF (Size:309KB), PP.57-67, Pub. Date: 2013-12-01
DOI: 10.5815/ijitcs.2014.01.07
-
FSM Circuits Design for Approximate String Matching in Hardware Based Network Intrusion Detection Systems
Dejan Georgiev, Aristotel Tentov
Abstract | References | Full Paper: PDF (Size:477KB), PP.68-75, Pub. Date: 2013-12-01
DOI: 10.5815/ijitcs.2014.01.08
-
Social Network Clustering
Narges Azizifard
Abstract | References | Full Paper: PDF (Size:415KB), PP.76-81, Pub. Date: 2013-12-01
DOI: 10.5815/ijitcs.2014.01.09
-
An Image Encryption Scheme Based on Bit Circular Shift and Bi-directional Diffusion
Ruisong Ye, Shaojun Zeng, Peiqian Lun, Junming Ma, Chuting Lai
Abstract | References | Full Paper: PDF (Size:872KB), PP.82-92, Pub. Date: 2013-12-01
DOI: 10.5815/ijitcs.2014.01.10
-
A New Fault Detection Method Using End-to-End Data and Sequential Testing for Computer Networks
Mohammad Sadeq Garshasbi, Shahram Jamali
Abstract | References | Full Paper: PDF (Size:344KB), PP.93-100, Pub. Date: 2013-12-01
DOI: 10.5815/ijitcs.2014.01.11
-
Management of Automotive Engine Based on Stable Fuzzy Technique with Parallel Sliding Mode Optimization
Mansour Bazregar, Farzin Piltan, Mehdi Akbari, Mojdeh Piran
Abstract | References | Full Paper: PDF (Size:597KB), PP.101-107, Pub. Date: 2013-12-01
DOI: 10.5815/ijitcs.2014.01.12