CFP last date
20 December 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 1
Number 21
Call for Paper
January Edition
IJCA solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 20 December 2024
Submit your paper
Know more
The week's pick
SFLA-Based Line Balancing and Task Optimization in Master-Slave Controlled Hanger Transportation Systems for Garment Production
Duc Hoang Nguyen
Random Articles
Mining Multiple Text Sequence with Key Management
March
2014
Ensemble Learning Techniques for Appendicitis Prediction
Apr
2017
Opinion Mining Techniques on Social Media Data
May
2015
An Encoding Scheme to Support Efficient Searching and Linguistic Sorting for Bengali Texts
May
2012
Volume 1
Number 21
Algorithmic Trading (AT) - Framework for Futuristic Intelligent Human Interaction with Small Investors
Authors: Archit Bansal , Archit Bansal , Anshul Pachouri
Overview and Analysis of UWB signal for Low Power WPAN
Authors: Rajesh Thakare , Kishore Kulat , Santosh Chede
Business Logic Model for Web Service Source Control Management
Authors: Thirumaran. M , Dhavachelvan. P , Tushar Ranjan Sahoo , Maria Stephen. R
Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization)and Max-Bit Algorithm.
Authors: Nabarun Bagchi
Design and implementation of an Asynchronous Controller for FPGA Based Asynchronous Systems
Authors: T.N.Prabakar , G. Lakshminarayanan , K.K.Anilkumar
Instant Theft Alert and Tracking System in Car
Authors: Kunjal P. Tanna , Preeti Kumar , Shubha Narayanan
Design of Controllers for Higher-Order-plus-Delay-Time Processes: A Practical Solution
Authors: Gajanan M. Malwatkar , Laxman M. Waghmare
Robust Fingerprint Matching
Authors: Ovais Ismail , Bhawani Singh Shekhwat
Speech Enhancement in Hearing Aids Using Conjugate Symmetry of DFT and SNR-Perception Models
Authors: S.D. Apte , Shridhar
Application of Distributive Co-operative Design Method in Smart Homes
Authors: V. Kavitha,
Analysis of Real-Time Multi version Concurrency Control Algorithms using Serialisability Graphs
Authors: K M Prakash Lingam
144-Bit Encryption/Decryption Technique
Authors: Puvvula Bhargava , Kuppam Hari Kishan
Article:Automatic Detection of Porosity and Slag Inclusion in Boilers Using Statistical Pattern Recognition Techniques
Authors: P.N.Jebarani Sargunar , R.Sukanesh
Green Operating System: Future Low Power Operating System
Authors: Anshul Pachouri , Mohit Sharma , Tribhuwan Tewari , Prashant Kaushik
Window Constrained Scheduling of Processes in Real Time CPU Using Multi Objective Genetic Algorithm
Authors: M.Karthiga , S.Ramya
A Generic Graph-Oriented Mapping Strategy for a Honeycomb Topology
Authors: Gaurav Kumar Singh , Mythri Alle , Keshavan Vardarajan , S K Nandy , Ranjani Narayan
Domain Specific Languages
Authors: Aruna Raja , Devika Lakshmanan
Optimizing Maintenance Activities Using HGA and Monte Carlo Simulation
Authors: Mahadevan ML , Paul Robert T , Vignesh kumar V , Sridhar S
Article:Automatic Detection of Weld Defects in Pressure Vessels Using Fuzzy Neural Network
Authors: P.N.Jebarani Sargunar , R.Sukanesh