CFP last date
22 April 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024
Submit your paper
Know more
The week's pick
Enhancing Privacy Preservation: Multi-Attribute Protection with P-Sensitive K-Anonymity
Twinkle Patel
Kiran Amin
Random Articles
Irrigation Scheduling using WSN
February
2014
Study on Influence of Cognitive Load for Software Developer's Performance using NNBP Algorithm
September
2014
Provenance Linking using Bundles in OWL Ontology
Apr
2017
Article:Particle Swarm Optimization Algorithm for Voltage Stability Enhancement by Optimal Reactive Power Reserve Management with Multiple TCSCs
December
2010
Archives
Volume 186
Random article
Cyberbullying Detection on TikTok using Association of Chief Police Officers
Volume 185
Random article
Web Enabled IOT based Warehouse Management System for Agricultural Products
Volume 184
Random article
An Enhanced CICD Pipeline: A DevSecOps Approach
Volume 183
Random article
Performance Analysis of the Deep Learning Method for Medical Cases
Volume 182
Random article
Improved Weight based Web Page Ranking Algorithm
Volume 181
Random article
A Review on Automatic Speech Recognition System in Indian Regional Languages
Volume 180
Random article
Efficient Trusted Model in WSN for Privacy Preserving
Volume 179
Random article
Comparison among Five Bio-inspired Optimization Techniques for Designing Hybrid Optimization Algorithms
Volume 178
Random article
Firewall Rule Anomaly Detection and Resolution using Particle Swarm Optimization Algorithm
Volume 177
Random article
Design Health care system using Raspberry Pi and ESP32
Volume 176
Random article
A New Robust Pre-Processing Technology of Image Compression based on Wavelets Decomposition
Volume 175
Random article
Hypothesis-Testing Factors Affecting Students’ Academic Performance
Volume 174
Random article
A Hybrid Two-Phase Machine Learning Model for Early COVID-19 Diagnosis Prediction
Volume 173
Random article
Performance Analysis of WiMAX in Mobile Ad-hoc Networks
Volume 172
Random article
Automated Smart Irrigation System using Raspberry Pi
Volume 171
Random article
Improving Uptime of Femtocell Deployments in Rural and Remote Regions using Power Spreading
Volume 170
Random article
A COBIT5 Framework for IoT Risk Management
Volume 169
Random article
A Survey Paper on Image Classification and Methods of Image Mining
Volume 168
Random article
Designing of Multiplier with Improved AHL
Volume 167
Random article
A Survey on Various Approach used in Named Entity Recognition for Indian Languages
Volume 166
Random article
Smart Mirror: A Reflective Interface to Maximize Productivity
Volume 165
Random article
A New Visual Cryptography Approach using Mosaic and Spread Spectrum Watermarking
Volume 164
Random article
Enhancing Web Usability using User Behavior and Cognitive Study
Volume 163
Random article
Taxonomy and a Theoretical Model for Feedforward Neural Networks
Volume 162
Random article
Security Keys: Modern Security Feature of Web
Volume 161
Random article
Network Forensics Framework Development using Interactive Planning Approach
Volume 160
Random article
A New Approach to Enhance Internet Banking Security
Volume 159
Random article
A Secure Framework for Software Product Line Development
Volume 158
Random article
A Frame Work for Implementing Fractal Image Compression and Adaptive Byte Fractal Image Compression in Cloud Computing: A New Approach
Volume 157
Random article
GSM-GPS-RF based Alert Generating Device
Volume 156
Random article
Virtual Reality Content Creation using Unity 3D and Blender
Volume 155
Random article
Encryption Approaches for Secure Deduplication in Cloud Environment
Volume 154
Random article
Power System Dynamic State Estimation based on Kalman Filter
Volume 153
Random article
Analysis of MIMO-OFDM using different Modulation Techniques
Volume 152
Random article
Sliding Mode Active Vibration Control and Three Axis Attitude Control using Four Reaction Wheels
Volume 151
Random article
Classifying Bacterial Species using Computer Vision and Machine Learning
Volume 150
Random article
Survey Paper of Energy Efficient Data Aggregation Protocol in Wireless Sensor Network
Volume 149
Random article
Removal of Artifacts from ECG Signal using RLS based Adaptive Filter
Volume 148
Random article
Data Security Throws Image processing by Blowfish Algorithm, Genetic Algorithm and LSB
Volume 147
Random article
A Survey on Cloud Security and Various Attacks on Cloud
Volume 146
Random article
An Efficient Method of Web Page Noise Cleaning for Effective Web Mining
Volume 145
Random article
A New Approach for MR Brain Image Segmentation using Intuitionistic Fuzzy Complement
Volume 144
Random article
A Solution to CoCoS Problem in Recommender System based on SNA
Volume 143
Random article
A Framework for Model Driven Transformation Engineering towards Software Architecture and Performance
Volume 142
Random article
Comparative Evaluation of Supervised Learning Algorithms for Sentiment Analysis of Movie Reviews
Volume 141
Random article
A Comparative Study of Pattern Recognition Algorithms on Sales Data
Volume 140
Random article
Liver Cancer Identification using Adaptive Neuro-Fuzzy Inference System
Volume 139
Random article
PLC based Signaling of BRTs
Volume 138
Random article
Design and Analysis of Real-time Network Intrusion Detection and Prevention System using Open Source Tools
Volume 137
Random article
Privacy Preserving Data Mining: Techniques, Classification and Implications - A Survey
Volume 136
Random article
Memetic Algorithm for Dynamic Optimization Problems
Volume 135
Random article
Survey on Secure Data Retrieval Techniques for Military Networks
Volume 134
Random article
Review of Methods in TREC from 1992 to 2014
Volume 133
Random article
Topic Model for Person Identification using Gait Sequence Analysis
Volume 132
Random article
Public Road Transport Guiding System using Arduino Microcontroller
Volume 131
Random article
Automated Identification of Hard Exudates and Cotton Wool Spots using Biomedical image Processing
Volume 130
Random article
2-Step Logistic map Chaotic Cryptography using Dynamic Look-up Table
Volume 129
Random article
Survey on Various Applications of Hadoop in Bioinformatics
Volume 128
Random article
Efficient Algorithm for Extracting Complete Repeats from Biological Sequences
Volume 127
Random article
Software Reliability Estimation of Component based Software System using Fuzzy Logic
Volume 126
Random article
Age Invariant Face Recognition using K-PCA and K-NN on Indian Face Age Database (IFAD)
Volume 125
Random article
Heat Transfer in Enclosure of Composite Material with Fibers Arranged in Various Geometrical Arrays
Volume 124
Random article
Dynamic Analysis of Priority with Linear Decreasing Function of a Priority in the Service System with Four Types of Application
Volume 123
Random article
Phishing URL Detection: A Machine Learning and Web Mining-based Approach
Volume 122
Random article
Dance Gesture Recognition: A Survey
Volume 121
Random article
Grammatical Swarm based Segmentation Methodology for Lesion Segmentation in Brain MRI
Volume 120
Random article
A Reputation-based Incentive Framework for Mobile Ad Hoc Networks
Volume 119
Random article
Arrhythmia Detection Technique using basic ECG Parameters
Volume 118
Random article
Survey on Mobile Forensics
Volume 117
Random article
Maximizing Strategic Performance Results: Adopting Balanced Scorecards and BI Tools
Volume 116
Random article
A Comparative Study for Optimum Design of Grid Connected PV System based on Actual System Specifications
Volume 115
Random article
Socially-Aware Recommender Systems
Volume 114
Random article
Design and Implementation of dsPIC Fed Vienna Rectifier for Induction Heating Appliances
Volume 113
Random article
A Robust Method for Image Steganography based on Chaos Theory
Volume 112
Random article
Eyelids, Eyelashes Detection Algorithm and Hough Transform Method for Noise Removal in Iris Recognition
Volume 111
Random article
Web 3D Data Visualization of Spatio Temporal Data using Data Driven Document (D3js)
Volume 110
Random article
Survey on Image Watermarking Schemes using Adaptive Soft Computing Techniques
Volume 109
Random article
Conceptual Software Reliability Model using Neural Network
Volume 108
Random article
A Survey on Asynchronous MAC protocols in Wireless Sensor Networks
Volume 107
Random article
Design and Experimental Evaluation of PSO and PID Controller based Wireless Room Heating System
Volume 106
Random article
Future Navigation System for Blind/Illiterate/Old People
Volume 105
Random article
A Comparative Study of ANFIS Membership Function to Predict ERP User Satisfaction using ANN and MLRA
Volume 104
Random article
Image Encryption using Simplified Data Encryption Standard (S-DES)
Volume 103
Random article
Improved Leach using Highest Remaining Energy First based Cluster Head Selection
Volume 102
Random article
Private Cloud using OpenStack for Knowledge Sharing System
Volume 101
Random article
Distances, Hesitancy Degree and Flexible Querying via Neutrosophic Sets
Volume 100
Random article
Design of 0.13um CMOS Two Stage Low Noise Amplifier
Volume 99
Random article
Investigation of a Novel Technique for Decline Curve Analysis in Comparison with the Conventional Models
Volume 98
Random article
A Simulated Annealing approach for solving Minimum Manhattan Network Problem
Volume 97
Random article
Driver Fatigue Recognition using Skin Color Modeling
Volume 96
Random article
Comparison of Nearest Neighbor (ibk), Regression by Discretization and Isotonic Regression Classification Algorithms for Precipitation Classes Prediction
Volume 95
Random article
Analyzing the Comprehensibility of Aspect-Oriented Modelling and Design of Software System
Volume 94
Random article
Travelling Salesman Problem using Dynamic Approach
Volume 93
Random article
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirement) Metrics: Defensive Perspective
Volume 92
Random article
Wireless Sensor Networks in Agriculture Sector- Implementation and Security Measures
Volume 91
Random article
A Review on Mobility and Mobility Aware MAC Protocols in Wireless Sensor Network
Volume 90
Random article
Teaching Parallel Programming for Time-Efficient Computer Applications
Volume 89
Random article
Determination of Image Features for Content-based Image Retrieval using Interactive Genetic Algorithm
Volume 88
Random article
A New Technique for Relational Database Protection
Volume 87
Random article
Hardware for Calculation of SIN and COSINE Angle using CORDIC Algorithm
Previous
Next