CFP last date
20 February 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 1
Number 6
Call for Paper
March Edition
IJCA solicits high quality original research papers for the upcoming March edition of the journal. The last date of research paper submission is 20 February 2025
Submit your paper
Know more
The week's pick
HYBRID ANN AND FIREWORKS ALGORITHM FOR REAL-TIME SOFTWARE RELIABILITY PREDICTION
Ivy Botchway
Felix Larbi Aryeh
Boniface Kayode Alese
Random Articles
BER Performance of OFDM with GI in SISO and MIMO System
October
2014
IFCCDC: A Fuzzy Control based Congestion Detection and Control in Wireless Sensor Networks
June
2012
A New Algorithm for Lossless Data Compression based of Time Clock Mechanism
Sep
2024
Study Habits of Higher Performing Engineering Students: A Survey
July
2014
Volume 1
Number 6
An Artificial Neural Network for Detection of Biological Early Brain Cancer
Authors: Manoj M , Elizabeth Jacob
Optimized Bandwidth Utilization for Real Time Applications in Wireless Sensor Networks
Authors: Neeraj Kumar , Manoj Kumar , R. B. Patel
Design issues, Topology issues, Quality of Service Support for Wireless Sensor Networks: Survey and Research Challenges
Authors: S.Muthukarpagam , V.Niveditta , S.Neduncheliyan
OPDSM: A Combinatorial Object-Based and Page-Based DSM Model
Authors: Milind R. Penurkar , Rekha S. Sugandhi
Analysis of Meta-Search engines using the Meta-Meta-Search tool SSIR
Authors: Manoj M , Elizabeth Jacob
Introduction of Aspect Oriented Techniques for refactoring legacy software
Authors: S.A.M.Rizvi , Zeba Khanam
Multi-agent Optimized Load Balancing Using Spanning Tree for Mobile Services
Authors: Pradeep Kumar Sinha , Sunil R Dhore
Article:Fuzzy Pi and Integrating Type Fuzzy PID Controllers of Linear, Nonlinear and Time -Delay Systems
Authors: K.A.Gopala Rao , B.Amarendra Reddy , P.Durga Bhavani
Investigating the effects of factors on software development
Authors: Seetharam.K Professor , Chandrakanth G Pujari
Measurement of Oxide Thickness for MOS Devices, Using Simulation of SUPREM Simulator
Authors: Viranjay M. Srivastava , G.Singh , K.S.Yadav
Pectoral Muscle removal and Detection of masses in Digital Mammogram using CCL
Authors: T.S.Subashini , V. Ramalingam , S. Palanivel
Performance Comparison of various levels of Fusion of Multi-focused Images using Wavelet Transform
Authors: K. Kannan , S. Arumuga Perumal , K. Arulmozhi
Applicability of Non-Rigid Medical Image Registration using Moving Least Squares
Authors: Hema P Menon , K.A.Narayanankutty
Purpose-based Access Control Exploits by HDB
Authors: Rajneeshkaur K. Bedi , Anita M. Thengade
Web Based Virtual Control System Laboratory and on-Line Temperature Control of Electrophoresis Equipment using LabVIEW
Authors: R.M.Sudha Sruthi , S.Ananya , B.Murugeshwari
Design of Linear Functional Observer for MIMO LTI systems
Authors: Prakash K. Nakade , Girish G. Galgate
Exploring the threats in Cell Phone as a Portable Storage Device
Authors: Vaishali Mishra , Ashutosh Mishra,
Improved personalized e-course composition approach using modified particle swarm optimization with inertia-coefficient
Authors: Dheeban S.G , Deepak V , Dhamodharan L , Susan Elias