CFP last date
20 January 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 141
Number 6
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025
Submit your paper
Know more
The week's pick
Implementation of Feature Selection Using Correlation Matrix in Python
Ahmad Farhan AlShammari
Random Articles
Fogging: An Advanced Version of Cloud Storage
Mar
2020
A Case Study on Various Recommendation Systems
January
2016
A Survey of Static Scheduling Algorithm for Distributed Computing System
November
2015
Aesthetic Quality Assessment of Photographic Images: A Literature Survey
December
2015
Volume 141
Number 6
Statistical Analysis of DSS Query Optimizer for a Five Join DSS Query
Authors: Manik Sharma , Gurvinder Singh , Rajinder Singh , Sarbjit Singh
Investigations of Stack- driven Airflow through Rectangular Cross- Ventilated Building with Two Openings using Analytic Technique
Authors: A.L. Muhammad , A.B. Baffa , M.Z. Ringim
Digital Color Image Watermarking using DWT and SVD for Data Security
Authors: Ayushi Potfode , Deepak Kourav and
Smart Devices’ Contribution to the Development of Virtual Museology in Turkey
Authors: Burcu Kir Savaş , Oktay Duman , Suhap Şahin
A Survey on Data Placement Strategies for Cloud based Scientific Workflows
Authors: Lalitha Singh , Jyoti Malhotra
Convoy: An Android App for Visually Challenged People
Authors: Pallavi Patil , Revati Mulay , Vrunda Shah , Prasanna Shete
Privacy and Secure Data Retrival for Decentralized Military Network
Authors: Manmeet Kaur , Bhawna Mallick
Fuzzy based Low Contrast Image Enhancement Technique by using Pal and King Method
Authors: Ajay Kumar Gupta , Siddharth Singh Chouhan , Manish Shrivastava