CFP last date
22 April 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024
Submit your paper
Know more
The week's pick
Enhancing Privacy Preservation: Multi-Attribute Protection with P-Sensitive K-Anonymity
Twinkle Patel
Kiran Amin
Random Articles
A Review on Edge detection Technique “Canny Edge Detection”
May
2019
A Comprehensive Survey on the Role of the Medical AI for the Healthcare Support
Aug
2023
A Study of Application of Data Mining and Analytics in Education Domain
June
2015
A Framework for Reducing Impediments in Agile Projects
September
2014
Archives
Volume 186
Random article
Application of the SMART Method in the Smartphone Selection Decision Support System
Volume 185
Random article
A Review on Sentiment Analysis of Twitter Data
Volume 184
Random article
Design a Standalone Photovoltaic System with Integration of Asymmetric Double H Bridge Multilevel Inverter
Volume 183
Random article
Research on Anti-Duplication Technique of Security Printing for Office Documents
Volume 182
Random article
Effect of ACK on the Performance of Zigbee Topologies
Volume 181
Random article
Particle Swarm Optimization based Economic Dispatch of Kerala Power System
Volume 180
Random article
A Survey on Energy Efficient Clustering Protocols in Wireless Sensor Networks
Volume 179
Random article
Mobile Forensics: Android Platforms and WhatsApp Extraction Tools
Volume 178
Random article
Remote Home Security System using Open-Source Electronic Platform
Volume 177
Random article
Elliptic Curve Cryptography for Securing Encoded Media Storage on Cloud
Volume 176
Random article
Identifying and Studying the Interrelationships amongst Various Challenges in Successful Implementation of IoT to Military and Defence Systems in India
Volume 175
Random article
Performance Analysis of Molecular Complex Detection in Social Network Datasets
Volume 174
Random article
A Hybrid Digital Signature Technique using Cryptosystem
Volume 173
Random article
Iris Recognition System based on Multi-resolution Analysis and Support Vector Machine
Volume 172
Random article
Android Apllication Design for Smart Home Control
Volume 171
Random article
Sharing of a Digital Secret Image by Diverse Media for More Security
Volume 170
Random article
Adaptive Weiner Filter for Speech Enhancement under Various Noisy Conditions
Volume 169
Random article
Comparative Clustering Approach Intended for Evaluating SaaS
Volume 168
Random article
Genetic Programming Feature Extraction with Different Robust Classifiers for Network Intrusion Detection
Volume 167
Random article
Optimization and Energy Efficient Analysis of Shortest Path Algorithm in WSN for Node Failure
Volume 166
Random article
Implementation of Two Level Scheduler in Cloud Computing Environment
Volume 165
Random article
Load Balancing Improvement in Normal and Clustered User Distribution LTE Advanced HetNets through a Hybrid Channel-Gain Access-Aware Cell Selection Scheme
Volume 164
Random article
Management information systems and their impact on job performance among employees in the private sector: SAUDI Telecommunications companies
Volume 163
Random article
Investigation of One Day Ahead Load Forecasting for Iraqi Power System
Volume 162
Random article
Real Time Video Copy Detection using Hadoop
Volume 161
Random article
Improve Roll Dynamic Response of Road Vehicle to Step Steer Input using Semi-active PID Suspension Controller
Volume 160
Random article
Admission Control Algorithm for MPLS-TE Networks
Volume 159
Random article
DRR: Dynamic Resource Reservation in Grid Computing
Volume 158
Random article
Edge Domination Number of Corona Product Graph of a Cycle with a Complete Graph
Volume 157
Random article
Edge Domination Number of Corona Product Graph of a Cycle with a Star
Volume 156
Random article
Hardware Accelerator for Feature Extraction based on Circle Views Signature
Volume 155
Random article
Extension of Wiener’s Approach on Security on Aadhaar Card based ATM System
Volume 154
Random article
Detection and Prevention Mechanism of Black Hole and Sybil Attack in Mobile Ad Hoc Network: A Review
Volume 153
Random article
Energy Efficient Hierarchical Clustering Mechanism for Wireless Sensor Network Fields
Volume 152
Random article
Tsunami of Cyber Crime: Analysis of Cyber Crime New Trends, Causes and Remedies in Future Prospectus
Volume 151
Random article
Controlling SSSC by Full Order State Feedback Controller
Volume 150
Random article
OCR using the Artificial Neural Network with Character Localization using Combined PCA and MSER Features
Volume 149
Random article
Image Processing for Recognition of Skin Diseases
Volume 148
Random article
Planar Asymmetrical U-Slot Patch Antenna for C and X Band Applications
Volume 147
Random article
Comparative Performance Analysis of Secured LWT-SVD Based Color Image Watermarking Technique in YUV, YIQ and YCbCr Color Spaces
Volume 146
Random article
Securing Shared Data in Cloud Computing by using Cryptographic Schemes
Volume 145
Random article
Texture Analysis using Rough Texton
Volume 144
Random article
Rough set Approach to Find the Cause of Decline of E –Business
Volume 143
Random article
Group Coupon Recommendation System for Mobile Users
Volume 142
Random article
Comparative Analysis of ID3 and Naïve Bayes for Heart Disease Prediction
Volume 141
Random article
Access Control for Cloud Computing Through Secure OTP Logging as Services
Volume 140
Random article
A Study of Vehicular Information Network Architecture based Named Data Networking (NDN)
Volume 139
Random article
Comparison of NEAT and Backpropagation Neural Network on Breast Cancer Diagnosis
Volume 138
Random article
Data Mining: An experimental approach with WEKA on UCI Dataset
Volume 137
Random article
Organic Light Emitting Diodes: The Future Display
Volume 136
Random article
Parallel Approach for Optimized Travelling Salesman Problem using GPU
Volume 135
Random article
MAODV: A Defense against Sybil Attacks in Wireless Networks
Volume 134
Random article
Attack Resistant Digital Image Watermarking using Complex Wavelet Transform
Volume 133
Random article
A Modified Policy Iteration Algorithm for Discounted Reward Markov Decision Processes
Volume 132
Random article
Secret Handshakes based on Shortened Versions of DSS
Volume 131
Random article
Analysis and Effect of Feature Selection with Generic Classifier over Activity Recognition Dataset for Daily Life Activity Recognition
Volume 130
Random article
Local Outlier Factor based Data Mining Model for Three Phase Transmission Lines Faults Identification
Volume 129
Random article
Speech-to-Speech Translation: A Review
Volume 128
Random article
Techniques of Digital Image Watermarking: A Review
Volume 127
Random article
Radio Resource Management in Heterogeneous Networks, Functional Models and Implementation Requirements
Volume 126
Random article
Enhanced on Demand ECRSEP Protocol using Improved Cluster Head Selection
Volume 125
Random article
Systematic Review on Existing Load Balancing Techniques in Cloud Computing
Volume 124
Random article
A Cognitive Approach to solve Water Jugs Problem
Volume 123
Random article
Electronic Solution for Smart Electric Metering over Power Line
Volume 122
Random article
Implementing a Score-Time based Model for Handling Deadlocks in Football Group Matches
Volume 121
Random article
A Review on Various Enhancement Techniques for Mammograms
Volume 120
Random article
Effective Product Ranking Method based on Opinion Mining
Volume 119
Random article
Power and Area Efficient Design of 6T Multiplexer using Transmission Gate Logic
Volume 118
Random article
Information Retrieval Techniques based on Ontology for High Effectiveness
Volume 117
Random article
Enhanced Face Recognition based on PCA and SVM
Volume 116
Random article
Computing Pattern in Pervasive Healthcare
Volume 115
Random article
Investigation of Channel Coding Techniques for High Data Rate Mobile Wireless Systems
Volume 114
Random article
A Review of Routing Protocols for Practical Rural Wireless Mesh Networks (WMNs)
Volume 113
Random article
A Survey on Fraud Detection Techniques in Ecommerce
Volume 112
Random article
Efficient Wireless Channel Estimation using Alamouti STBC with MIMO and 16-PSK Modulation
Volume 111
Random article
Pipelined Implementation of Dynamic Rijndael S-Box
Volume 110
Random article
Comparative Study on Various Random Walk Techniques for Left Ventricle Cavity Segmentation
Volume 109
Random article
Overview of Relay Selection and dynamic resource Allocation for Cooperative Wireless Network
Volume 108
Random article
Microcontroller based Closed Loop Speed Control of DC Motor using PWM Technique
Volume 107
Random article
An Effective Approach of Negative Selection Algorithm with Canny Algorithm for Detection of Edges
Volume 106
Random article
MPCS: Myanmar Preposition Checking System
Volume 105
Random article
A review of Studies on Change Proneness Prediction in Object Oriented Software
Volume 104
Random article
Security and Authentication of Web Browsers using FCM
Volume 103
Random article
Hybrid Regression Analysis based Technique for Removal of Impulse Noise from Gray-Scale Images
Volume 102
Random article
Jordanian Cloud-Government between Implementation and Challenges
Volume 101
Random article
An Improved Leader Selection Approach for Improving Network QoS
Volume 100
Random article
Persian Named Entity Recognition based with Local Filters
Volume 99
Random article
An Efficient Clusterhead Election Algorithm for Mobile Ad-Hoc Network
Volume 98
Random article
The Optimization of Inter cell Handover Dynamics in a GSM Network
Volume 97
Random article
Cloud Scheduling - A Survey
Volume 96
Random article
Comparison of Nearest Neighbor (ibk), Regression by Discretization and Isotonic Regression Classification Algorithms for Precipitation Classes Prediction
Volume 95
Random article
A Survey on Nearest Neighbor Search Methods
Volume 94
Random article
Using Motor Speed Profile and Genetic Algorithm to Optimize the Fuzzy Logic Controller for Controlling DC Servomotor
Volume 93
Random article
Implementation of Five Key Process Areas to Improve the Requirement Engineering Process
Volume 92
Random article
Fabrication of Carbon Nanotubes and Investigating the Characteristics
Volume 91
Random article
Framework for Offloading Android Applications using Cloud
Volume 90
Random article
Wiener Index of Some Cycle Related Graphs using Matlab
Volume 89
Random article
A Fast and Efficient Hybrid Approach for Web Caching and Pre-Fetching to Enhance End User Experience over Web Environment
Volume 88
Random article
A Review on New Technique for Embedding Image into Audio as a Watermark using DCT
Volume 87
Random article
An Inherent Approach based on ACO and Tabu Search for Resource Allocation in Grid Environment
Previous
Next