CFP last date
21 April 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 131
Number 2
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 21 April 2025
Submit your paper
Know more
The week's pick
Design and Implementation of Wyltl: An Imperative, Embeddable and Portable Programming Language
Dineth Mallawarachchi
Yasas Jayaweera
Random Articles
A Critical Study and Comparative Analysis of Various Haze Removal Techniques
July
2015
A Review Study of Juang Approach with Overview of Improved Proposed Approach for Multisever Authentication and Key Agreement with User Protection
Sep
2016
Evaluation of Hybrid Encryption Technique to Secure Data during Transmission in Cloud Computing
May
2017
Software Reliability: An Order Statistics Approach using SPC
December
2011
Volume 131
Number 2
Minimization of E2E Delay in Wireless ADHOC Networks based on Residual Energy of Nodes
Authors: Prabu V. , Divya K. , Maheswsr R.
An Empirical Comparison by Data Mining Classification Techniques for Diabetes Data Set
Authors: Nilesh Jagdish Vispute , Dinesh Kumar Sahu , Anil Rajput
Reusability Types and Reuse Metrics: A Survey
Authors: Aditi Dubey , Harleen Kaur
UML based Approach for System Reliability Assessment
Authors: Bhagat Singh Rajput , Vaishali Chourey
Detection of Landing Areas for Unmanned Aerial Vehicles
Authors: Kausar Mukadam , Fuzail Misarwala , Aishwarya Sinh , Ruhina Karani
Energy Efficient Routing Protocols for Mobile Ad hoc Networks: A Review
Authors: M. Izharul Hasan Ansari , S.P. Singh , M N Doja
Using Data Mining Techniques for Children Brain Tumors Classification based on Magnetic Resonance Imaging
Authors: Eman M. Ali , Ahmed F. Seddik , Mohamed H. Haggag
Speed Limit Road Sign Detection and Recognition System
Authors: Fakhradeen Hamid Ali , Mohammad Haqqi Ismail