International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)
DOI: 10.5815/ijitcs


Published By: MECS Publisher







Real Time Efficient Scheduling Algorithm for Load Balancing in Fog Computing Environment

Manisha Verma, Neelam Bhardwaj, Arun Kumar Yadav

Abstract | References | Full Paper: PDF (Size:799KB), PP.1-10, Pub. Date: 2016-4-8

DOI: 10.5815/ijitcs.2016.04.01


Virtual Machine Monitor Indigenous Memory Reclamation Technique

Muhammad Shams Ul Haq, Lejian Liao, Ma Lerong

Abstract | References | Full Paper: PDF (Size:418KB), PP.11-18, Pub. Date: 2016-4-8

DOI: 10.5815/ijitcs.2016.04.02


A Framework to Stimulate Collaborative e-Learning through Collaborative Educational Games Modeled Using IMS-LD

Abderrahim El Mhouti, Azeddine Nasseh, Mohamed Erradi

Abstract | References | Full Paper: PDF (Size:730KB), PP.19-27, Pub. Date: 2016-4-8

DOI: 10.5815/ijitcs.2016.04.03


The Use of ANFIS and RBF to Model and Predict the Inhibitory Concentration Values Determined by MTT Assay on Cancer Cell Lines

A. Rezaei, L. Noori, M. Taghipour

Abstract | References | Full Paper: PDF (Size:543KB), PP.28-34, Pub. Date: 2016-4-8

DOI: 10.5815/ijitcs.2016.04.04


Various Approaches of Community Detection in Complex Networks: A Glance

Abhay Mahajan, Maninder Kaur

Abstract | References | Full Paper: PDF (Size:562KB), PP.35-41, Pub. Date: 2016-4-8

DOI: 10.5815/ijitcs.2016.04.05


Biometric Verification, Security Concerns and Related Issues - A Comprehensive Study

Sheela Shankar, V.R Udupi, Rahul Dasharath Gavas

Abstract | References | Full Paper: PDF (Size:616KB), PP.42-51, Pub. Date: 2016-4-8

DOI: 10.5815/ijitcs.2016.04.06


Covering Based Pessimistic Multigranular Rough Equalities and their Properties

B.K.Tripathy, S.C.Parida

Abstract | References | Full Paper: PDF (Size:496KB), PP.52-62, Pub. Date: 2016-4-8

DOI: 10.5815/ijitcs.2016.04.07


Hybrid Real-time Zero-day Malware Analysis and Reporting System

Ratinder Kaur, Maninder Singh

Abstract | References | Full Paper: PDF (Size:829KB), PP.63-73, Pub. Date: 2016-4-8

DOI: 10.5815/ijitcs.2016.04.08


Robust, Secure and High Capacity Watermarking Technique based on Image Partitioning-Merging Scheme

Baisa L. Gunjal

Abstract | References | Full Paper: PDF (Size:1054KB), PP.74-85, Pub. Date: 2016-4-8

DOI: 10.5815/ijitcs.2016.04.09


Automated Client-side Sanitizer for Code Injection Attacks

Dnyaneshwar K. Patil, Kailas R. Patil

Abstract | References | Full Paper: PDF (Size:683KB), PP.86-95, Pub. Date: 2016-4-8

DOI: 10.5815/ijitcs.2016.04.10