CFP last date
21 April 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 100
Number 18
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 21 April 2025
Submit your paper
Know more
The week's pick
Design and Implementation of Wyltl: An Imperative, Embeddable and Portable Programming Language
Dineth Mallawarachchi
Yasas Jayaweera
Random Articles
A Critical Study and Comparative Analysis of Various Haze Removal Techniques
July
2015
A Review Study of Juang Approach with Overview of Improved Proposed Approach for Multisever Authentication and Key Agreement with User Protection
Sep
2016
Evaluation of Hybrid Encryption Technique to Secure Data during Transmission in Cloud Computing
May
2017
Software Reliability: An Order Statistics Approach using SPC
December
2011
Volume 100
Number 18
A Deviated Location and Updated Node Identity based Security Scheme for Preserving Source Node Location Privacy in Wireless Sensor Network
Authors: Neha Sahu , Sanjay Sharma
Sophisticated Charging System with Battery Specifications and Indications
Authors: Shravane Boggavarapu , Gedela Ramesh
Mechanical Part Surface Defect Detection using Crack Extraction Approach
Authors: Priyanka Khandelwal , Pankaj Kumar Gautam
Review of Different Local and Global Contrast Enhancement Techniques for a Digital Image
Authors: Shefali Gupta , Yadwinder Kaur
Automatic Declassification of Textual Documents by Generalizing Sensitive Terms
Authors: Veena Vasudevan , Ansamma John
Wireless Sensor Node for Gas Pipeline Leak Detection and Location
Authors: Lawrence Boaz , Shubi Kaijage , Ramadhani Sinde
SP-fold - Speculative Parallelization for Parallel Algorithm of RNA Secondary Structure Prediction on Multicore
Authors: Narendra Chaudhari , Anjali Mahajan
Improved Intrusion Detection Technique based on Feature Reduction and Classification using Support Vector Machine and Particle of Swarm Optimization
Authors: Sunita Patel , Jyoti Sondhi , Anand Motvani , Anurag Shrivastava