CFP last date
20 February 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 1
Number 11
Call for Paper
March Edition
IJCA solicits high quality original research papers for the upcoming March edition of the journal. The last date of research paper submission is 20 February 2025
Submit your paper
Know more
The week's pick
HYBRID ANN AND FIREWORKS ALGORITHM FOR REAL-TIME SOFTWARE RELIABILITY PREDICTION
Ivy Botchway
Felix Larbi Aryeh
Boniface Kayode Alese
Random Articles
BER Performance of OFDM with GI in SISO and MIMO System
October
2014
IFCCDC: A Fuzzy Control based Congestion Detection and Control in Wireless Sensor Networks
June
2012
A New Algorithm for Lossless Data Compression based of Time Clock Mechanism
Sep
2024
Study Habits of Higher Performing Engineering Students: A Survey
July
2014
Volume 1
Number 11
Enhancing Feature Selection using Statistical Data with Unigrams and Bigrams
Authors: M.Janaki Meena , K.R.Chandran , J.Mary Brinda , P.R.Sindhu
A Generic Framework for Network Forensics
Authors: Emmanuel S. Pilli , R.C. Joshi , Rajdeep Niyogi
Graphical Driver Development Kit (GDDK) for Linux
Authors: Kumar Anik , Abhishek Sharma , Pavan Chakroborty
Integrating Swarm Intelligence and Statistical Data for Feature Selection in Text Categorization
Authors: M. Janaki Meena , K.R. Chandran , J. Mary Brinda
An Invisible Color Watermarking Framework for Uncompressed Video Authentication
Authors: Soumik Das , Pradosh Bandyopadhyay , Shauvik Paul , Atal Chaudhuri , Monalisa Banerjee
Study of BitTorrent based Video on Demand Systems
Authors: Rahul R. Pandey , KetanKumar Patil
Recuperating Website Link Structure Using Fuzzy Relations between the Content and Web Pages
Authors: Raj Gaurang Tiwari , Mohd. Husain , Sandeep Gupta , Arun Pratap Srivastava
Task Accomplishment to Verify True Intelligence in AI Agents
Authors: Madhura Dhande , Anuradha Jadhav , Shankar Gandhi , Nilesh Sonwane
ACCESSING REMOTE APPLICATION WITHOUT INSTALLATION AT HOST END THROUGH CLOUD COMPUTING
Authors: Shaily malik , Vineet Sinha
A Review of Routing Protocols in Wireless Mesh Networks (WMN)
Authors: V.Srikanth , A.Chenchu Jeevan , B.Avinash , T.Sai kiran , S.Suresh Babu
Side Band Power reduction in OFDM
Authors: S.P.Mohani , M.S. Sutaone , Meeta Bakuli
GA Based IFLC Design for an Industrial Process
Authors: P. Subbaraj , P.S. Godwin Anand
Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES)
Authors: V.S.Shankar Sriram , S.Dinesh , G.Sahoo
Design of an Automated Essay Grading (AEG) System in Indian Context
Authors: Siddhartha Ghosh , Sameen S Fatima
A Multiple Watermarking Technique for Images based on Visual Cryptography
Authors: B Surekha , GN Swamy , K Srinivasa Rao
A Cache Oblivious based GA Solution for Clustering Problem in IDS
Authors: Vignesh R , Ganesh B , Aarthi G , Iyswarya N
Microarray Image Denoising using Independent Component Analysis
Authors: Arunakumari Kakumani , Kaustubha A. Mendhurwar , Rajasekhar Kakumani
fuzzy Adaptive Controllers for Speed Control of PMSM Drive
Authors: N. J. Patil , R. H. Chile , L. M. Waghmare
Impact of Multihop Wireless Channel on TCP-AP with LRED
Authors: G. Sankara Malliga , Dharmishtan K Varughese