CFP last date
20 February 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 1
Number 22
Call for Paper
March Edition
IJCA solicits high quality original research papers for the upcoming March edition of the journal. The last date of research paper submission is 20 February 2025
Submit your paper
Know more
The week's pick
HYBRID ANN AND FIREWORKS ALGORITHM FOR REAL-TIME SOFTWARE RELIABILITY PREDICTION
Ivy Botchway
Felix Larbi Aryeh
Boniface Kayode Alese
Random Articles
BER Performance of OFDM with GI in SISO and MIMO System
October
2014
IFCCDC: A Fuzzy Control based Congestion Detection and Control in Wireless Sensor Networks
June
2012
A New Algorithm for Lossless Data Compression based of Time Clock Mechanism
Sep
2024
Study Habits of Higher Performing Engineering Students: A Survey
July
2014
Volume 1
Number 22
Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks
Authors: Vishnu K , Amos J Paul
Network performance modeling and control through prediction feedback
Authors: Manjunath R , Shyam vasudev , Narendranath Udupa
Article:Unusual Pattern Detection in DNA Database Using KMP Algorithm
Authors: S.Rajesh , S.Prathima , L.S.S.Reddy
Prediction of Fault-Prone Software Modules using Statistical and Machine Learning Methods
Authors: Yogesh Singh , Arvinder Kaur , Ruchika Malhotra
An Efficient Algorithm for Constructing DNA Boolean Circuit
Authors: Michael Arock , R.Ponalagusamy , B.S.E.Zoraida
Result Analysis Using Classification Techniques
Authors: Varsha Namdeo , Anju Singh , Divakar Singh , R.C Jain
Rogue Access Point Detection in WLAN by Analyzing Network Traffic and Behavior
Authors: Shital V Jagtap , K N Honwadkar
Unified Virtual Storage: Virtualization of Distributed Storage in a Network
Authors: S.V.Patil , K.N.Honwadkar
A 100KHz ñ 20MHz source follower continuous time filter for SDR applications
Authors: S.Ramasamy , S.Kumaravel , B.Venkataramani
A Fast Modified Constructive Covering Algorithm for Multiclass Classification Problem in Data Mining
Authors: Vikas Shrivastava , Aruna Tiwari , Rajan Malhotra
Fuzzy Logic Based Image Edge Detection Algorithm in MATLAB
Authors: Kiranpreet Kaur , Vikram Mutenja , Inderjeet Singh Gill
DNA Algorithm Employing Temperature Gradient for Multiple Traveling Salesperson Problem
Authors: B.S.E.Zoraida , Michael Arock , R.Ponalagusamy
Improving Software Quality with Agile Testing
Authors: Shubhangi , Anand N. , Manisha V. , G. V. Garje
Sensorless Control of Switched Reluctance Motor Drive with Fuzzy Logic Based Rotor Position Estimation
Authors: R. A. Gupta , Rajesh Kumar , S.K.Bishnoi
Clustered Checkpointing and Partial Rollbacks for Reducing Conflict Costs in STMs
Authors: Monika Gupta , Rudrapatna K Shyamasundar , Shivali Agarwal
A Significance of VLSI Techniques for Low Power Real Time Systems
Authors: Santosh Chede , Kishore Kulat , Rajesh Thakare
Enhanced Hierarchical Clustering for Gene Expression data
Authors: Geetha.T , Michael Arock
Multifacility Location Problem using Scaled Conjugate Gradient Algorithm under Triangular Area Constraints
Authors: G.M. Nasira , T.S.S. Balaji
Real-Time Automization of Irrigation system for Social Modernization of Indian Agricultural System
Authors: Mahesh M. Galgalikar , Gayatri S Deshmukh
An Adaptive Quantum Evolutionary Algorithm for Engineering Optimization Problems
Authors: Ashish Mani , C. Patvardhan