International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)
DOI: 10.5815/ijitcs

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 

 

Long Range Forecast on South West Monsoon Rainfall using Artificial Neural Networks based on Clustering Approach

Maya L. Pai, Kalavampara V. Pramod, Alungal N. Balchand

Abstract | References | Full Paper: PDF (Size:749KB), PP.1-8, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.01

 

 

PID Controller Parameters Tuning Based-on Satisfaction for Superheated Steam Temperature of Power Station Boiler

Benxian Xiao, Jun Xiao, Rongbao Chen, Yanhong Li

Abstract | References | Full Paper: PDF (Size:258KB), PP.9-14, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.02

 

 

Improved Apriori Algorithm for Mining Association Rules

Darshan M. Tank

Abstract | References | Full Paper: PDF (Size:1340KB), PP.15-23, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.03

 

 

Comprehensive Experimental Performance Analysis of DSR, AODV and DSDV Routing Protocol for Different Metrics Values with Predefined Constraints

Zafar Mehmood, Muddesar Iqbal, Xingheng Wang

Abstract | References | Full Paper: PDF (Size:482KB), PP.24-31, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.04

 

 

Improving the Performance of Semantic Web Services Discovery: Shortest Path based Approach

Maamar Khater, Mimoun Malki

Abstract | References | Full Paper: PDF (Size:1308KB), PP.32-39, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.05

 

 

Confidence Analysis of a Solo Sign-On Device for Distributed Computer Networks

Sumanth C M, Adithyan B

Abstract | References | Full Paper: PDF (Size:349KB), PP.40-46, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.06

 

 

High Performance Network Security Using NIDS Approach

Sutapa Sarkar, Brindha.M

Abstract | References | Full Paper: PDF (Size:336KB), PP.47-55, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.07

 

 

MADLVF: An Energy Efficient Resource Utilization Approach for Cloud Computing

J.K. Verma, C.P. Katti, P.C. Saxena

Abstract | References | Full Paper: PDF (Size:388KB), PP.56-64, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.08

 

 

VoIP Technology: Investigation of QoS and Security Issues

Amor Lazzez

Abstract | References | Full Paper: PDF (Size:366KB), PP.65-76, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.09

 

 

Design High Efficiency-Minimum Rule Base PID Like Fuzzy Computed Torque Controller

Alireza Khalilian, Ghasem Sahamijoo, Omid Avatefipour, Farzin Piltan, Mahmoud Reza Safaei Nasrabad

Abstract | References | Full Paper: PDF (Size:1329KB), PP.77-87, Pub. Date: 2014-6-8

DOI: 10.5815/ijitcs.2014.07.10