CFP last date
20 May 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 16
Number 5
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2025
Submit your paper
Know more
The week's pick
Attack information gathering from network analysis data during scanning activity
Stephane J. Tamafo
Elie Fute Tagne
Jaime C. Acosta
Charles Kamhoua
Rawat Danda
Random Articles
Article:Some Proposed Standard Models for Bangla Dictionary Entries of Bangla Morphemes for Universal Networking Language
December
2010
Two level Authentication and Packet Marking Mechanism for Defending against DoS and DDoS Attacks
February
2013
Fundamental Challenges in Identifying Tools for DevOps Pipeline
Apr
2020
Recent Trends and Challenges in Virtual Reality
May
2017
Volume 16
Number 5
Novel Bound Setting Algorithm for Occluded Region Reconstruction for Reducing the Inpainting Complexity under Extreme Conditions
Authors: Bindu A , C N Ravi Kumar
Issues identified in the software process due to barriers found during eliciting requirements on agile software projects: Insights from India
Authors: N.Ganesh , S.Thangasamy
Enhanced Security for Information Flow in VANET using Signcryption and Trust level
Authors: Sumitkumar Singh , Vijayan R
A New GC Based HMM Algorithm for Disease Classification
Authors: Dr.V.Anuradha , S.K.M.Habeeb , A.Praveena , AmalaPriya
A Comprehensive Survey of Privacy Preserving Algorithm of Association Rule Mining in Centralized Database
Authors: Archana Tomar , Prof. Vineet Richhariya , Prof. R.K. pandey
Analysis of Circular Microstrip Patch Antenna Using Spherical Modal Expansion Technique
Authors: Rukmini T S , Shilpa J , Ravishankar S , K S Shushrutha , Commander S.K.Thakur
Below Elbow Upper Limb Prosthetic for Amputees and Paralyzed Patients
Authors: Debika Khanra , Dr. S. Sudesh
A Hybrid Cache Invalidation Technique for Data Consistency in MANET
Authors: N. Sabiyath Fatima , Dr. P. Sheik Abdul Khader
Classification of a Satellite Rural Image based on Fractal Dimension using Box Counting Method
Authors: DR.Ambika , AG Ananth