International Journal of Information Technology and Computer Science(IJITCS)
ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)
DOI: 10.5815/ijitcs
Published By: MECS Press
IJITCS Vol. 6, No. 7, Jun. 2014
Cover page and Table of Contents: PDF (size: 196KB)
Contents
REGULAR PAPERS
-
Long Range Forecast on South West Monsoon Rainfall using Artificial Neural Networks based on Clustering Approach
Maya L. Pai, Kalavampara V. Pramod, Alungal N. Balchand
Abstract | References | Full Paper: PDF (Size:665KB), PP.1-8, Pub. Date: 2014-06-08
DOI: 10.5815/ijitcs.2014.07.01
-
PID Controller Parameters Tuning Based-on Satisfaction for Superheated Steam Temperature of Power Station Boiler
Benxian Xiao, Jun Xiao, Rongbao Chen, Yanhong Li
Abstract | References | Full Paper: PDF (Size:258KB), PP.9-14, Pub. Date: 2014-06-08
DOI: 10.5815/ijitcs.2014.07.02
-
Improved Apriori Algorithm for Mining Association Rules
Darshan M. Tank
Abstract | References | Full Paper: PDF (Size:558KB), PP.15-23, Pub. Date: 2014-06-08
DOI: 10.5815/ijitcs.2014.07.03
-
Comprehensive Experimental Performance Analysis of DSR, AODV and DSDV Routing Protocol for Different Metrics Values with Predefined Constraints
Zafar Mehmood, Muddesar Iqbal, Xingheng Wang
Abstract | References | Full Paper: PDF (Size:353KB), PP.24-31, Pub. Date: 2014-06-08
DOI: 10.5815/ijitcs.2014.07.04
-
Improving the Performance of Semantic Web Services Discovery: Shortest Path based Approach
Maamar Khater, Mimoun Malki
Abstract | References | Full Paper: PDF (Size:574KB), PP.32-39, Pub. Date: 2014-06-08
DOI: 10.5815/ijitcs.2014.07.05
-
Confidence Analysis of a Solo Sign-On Device for Distributed Computer Networks
Sumanth C M, Adithyan B
Abstract | References | Full Paper: PDF (Size:282KB), PP.40-46, Pub. Date: 2014-06-08
DOI: 10.5815/ijitcs.2014.07.06
-
High Performance Network Security Using NIDS Approach
Sutapa Sarkar, Brindha.M
Abstract | References | Full Paper: PDF (Size:303KB), PP.47-55, Pub. Date: 2014-06-08
DOI: 10.5815/ijitcs.2014.07.07
-
MADLVF: An Energy Efficient Resource Utilization Approach for Cloud Computing
J.K. Verma, C.P. Katti, P.C. Saxena
Abstract | References | Full Paper: PDF (Size:387KB), PP.56-64, Pub. Date: 2014-06-08
DOI: 10.5815/ijitcs.2014.07.08
-
VoIP Technology: Investigation of QoS and Security Issues
Amor Lazzez
Abstract | References | Full Paper: PDF (Size:339KB), PP.65-76, Pub. Date: 2014-06-08
DOI: 10.5815/ijitcs.2014.07.09
-
Design High Efficiency-Minimum Rule Base PID Like Fuzzy Computed Torque Controller
Alireza Khalilian, Ghasem Sahamijoo, Omid Avatefipour, Farzin Piltan, Mahmoud Reza Safaei Nasrabad
Abstract | References | Full Paper: PDF (Size:620KB), PP.77-87, Pub. Date: 2014-06-08
DOI: 10.5815/ijitcs.2014.07.10