International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)
DOI: 10.5815/ijitcs


Published By: MECS Publisher








Long Range Forecast on South West Monsoon Rainfall using Artificial Neural Networks based on Clustering Approach

Maya L. Pai, Kalavampara V. Pramod, Alungal N. Balchand

Abstract | References | Full Paper: PDF (Size:749KB), PP.1-8, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.01



PID Controller Parameters Tuning Based-on Satisfaction for Superheated Steam Temperature of Power Station Boiler

Benxian Xiao, Jun Xiao, Rongbao Chen, Yanhong Li

Abstract | References | Full Paper: PDF (Size:258KB), PP.9-14, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.02



Improved Apriori Algorithm for Mining Association Rules

Darshan M. Tank

Abstract | References | Full Paper: PDF (Size:1340KB), PP.15-23, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.03



Comprehensive Experimental Performance Analysis of DSR, AODV and DSDV Routing Protocol for Different Metrics Values with Predefined Constraints

Zafar Mehmood, Muddesar Iqbal, Xingheng Wang

Abstract | References | Full Paper: PDF (Size:482KB), PP.24-31, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.04



Improving the Performance of Semantic Web Services Discovery: Shortest Path based Approach

Maamar Khater, Mimoun Malki

Abstract | References | Full Paper: PDF (Size:1308KB), PP.32-39, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.05



Confidence Analysis of a Solo Sign-On Device for Distributed Computer Networks

Sumanth C M, Adithyan B

Abstract | References | Full Paper: PDF (Size:349KB), PP.40-46, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.06



High Performance Network Security Using NIDS Approach

Sutapa Sarkar, Brindha.M

Abstract | References | Full Paper: PDF (Size:336KB), PP.47-55, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.07



MADLVF: An Energy Efficient Resource Utilization Approach for Cloud Computing

J.K. Verma, C.P. Katti, P.C. Saxena

Abstract | References | Full Paper: PDF (Size:388KB), PP.56-64, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.08



VoIP Technology: Investigation of QoS and Security Issues

Amor Lazzez

Abstract | References | Full Paper: PDF (Size:366KB), PP.65-76, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.09



Design High Efficiency-Minimum Rule Base PID Like Fuzzy Computed Torque Controller

Alireza Khalilian, Ghasem Sahamijoo, Omid Avatefipour, Farzin Piltan, Mahmoud Reza Safaei Nasrabad

Abstract | References | Full Paper: PDF (Size:1329KB), PP.77-87, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.10