CFP last date
20 January 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 176
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025
Submit your paper
Know more
The week's pick
SFLA-Based Line Balancing and Task Optimization in Master-Slave Controlled Hanger Transportation Systems for Garment Production
Duc Hoang Nguyen
Random Articles
Foreground Estimation in a Degraded Text document
April
2012
Color Image Quantization based on Bacteria Foraging Optimization
July
2011
Investigation of Probabilistic Graphical Model Algorithms for Palm print Verification
August
2011
Securing Videos using Selective Encryption and Watermarking using HAAR
Sep
2018
Volume 176
Number 1
Editor's choice::
Automatic Threshold Reset Scheme using a Double Fuzzy System for Improvement of Detection Rate in a Probabilistic Voting-based Filtering Scheme of WSNs
Authors: Sang-hyeok Lim , Tae-ho Cho
Number 2
Editor's choice::
High-Accuracy Serial Pattern Detection System with Optimized Annealing
Authors: Aykut Zongur
Number 3
Editor's choice::
New Insight into Customer Value Analysis using Data Mining Techniques
Authors: Nesma Taher , Shaimaa Salama , Doaa ElZanfaly
Number 4
Editor's choice::
Deep Arabic Font Family and Font Size Recognition
Authors: Ibrahim M. Amer , Salma Hamdy , Mostafa G. M. Mostafa
Number 5
Editor's choice::
Automatic Test Scenario Generation Technique for Medical Cyber Physical Systems
Authors: Afrina Khatun , Naushin Nower
Number 6
Editor's choice::
An Active Fault Tolerant Control Strategy based on Bond Graph Adaptive Observers
Authors: Hajer Najari , Rafika El Harabi , Mohamed Naceur Abdelkrim
Number 7
Editor's choice::
UML Diagrams and Source based Automatic Test Suite Regeneration for Improving State Model Coverage
Authors: Afrina Khatun , Naushin Nower , Kazi Sakib
Number 8
Editor's choice::
A Brief Guide for the Continuously Evolving μController Raspberry PI Mod.B
Authors: M. Papoutsidakis , A. Chatzopoulos , K. Kalovrektis , C. Drosos
Number 9
Editor's choice::
Role of Software Engineering in Visualizing Large Volume of Hyperspectral and Medical Data Sets
Authors: Basaeir Y. Ahmed , Safa A. Najim , Widad A. Mansour
Number 10
Editor's choice::
Elliptic Curve Diffie-Hellman (ECDH) Analogy for Secured Wireless Sensor Networks
Authors: Stephen Aikins-Bekoe , James Ben Hayfron-Acquah
Number 11
Editor's choice::
Efficient Steganography on Video File using Discrete Cosine Transform Method (DCTM)
Authors: Ononiwu R. N. , Okengwu U. A.
Number 12
Editor's choice::
Graph Isomorphism Algorithm using Pieces Patching Puzzle Technique (ppp - Technique)
Authors: Mohammad Alhashmi , Abdulaziz Alroomi
Number 13
Editor's choice::
Automated Discovery of Symbolic Approximation Formulae using Genetic Programming
Authors: Mohamed M. Khatib
Number 14
Editor's choice::
Data Mining for Rules Extraction to Virgin Olive Oil Optimization Process
Authors: A. Jiménez Márquez , G. Beltrán Maza
Number 15
Editor's choice::
End-to-End Lung Cancer Diagnosis on Computed Tomography Scans using 3D CNN and Explainable AI
Authors: Chaitanya Rahalkar , Anushka Virgaonkar , Dhaval Gujar , Sumedh Patkar
Number 16
Editor's choice::
Building Provably Secure Block Ciphers from Cryptographic Hash Functions
Authors: Charles F. De Barros
Number 17
Editor's choice::
Metaheuristics for Optimization Analysis on Urban Public Transport
Authors: Mariana Brito Batista , Warley Gramacho Da Silva
Number 18
Editor's choice::
Mind Overflow: A Process Proposal for Decomposing Monolithic Applications in Microservices
Authors: Tcharles Pereira Da Silva , Kleinner Farias
Number 19
Editor's choice::
Cooperative Target Observation Moving Over a Planar Graph using a Modified Hill Climbing Search
Authors: Levi P. Figueiredo , Jose E. B. Maia
Number 20
Editor's choice::
Optimal Classification of COVID-19: A Transfer Learning Approach
Authors: Aditya Kakde , Durgansh Sharma , Nitin Arora
Number 21
Editor's choice::
License Plate Recognition System based on Improved BP Neural Network
Authors: Tingyu Ma , Tao Wang , Jinchao Shi
Number 22
Editor's choice::
A Framework for Total Quality Management of Diesel Generator Fuel Consumption using Machine Learning and Internet of Things (IoT)
Authors: Ali A. Majeed Ali , Osama Abdulhak M. Nasher , Ahmed Sultan Al-Hegami
Number 23
Editor's choice::
Covid-19: A Tentative Estimation of Fatality Rates using Random Forest Algorithm
Authors: B.K.Praveen Kumar , Gundamaraju Nithya , K.Santhi Sree
Number 24
Editor's choice::
Eye Movements Biometrics: A Bibliometric Analysis from 2004 to 2019
Authors: Antonio Ricardo Alexandre Brasil , Jefferson Oliveira Andrade , Karin Satie Komati
Number 25
Editor's choice::
A Control Device to Monitor Domestic Violence using Speech Analysis
Authors: Tanmay Debnath
Number 26
Editor's choice::
Authors:
Number 27
Editor's choice::
GhanaToll: Barrier-Free RFID Toll Collection and Management System for Ghana
Authors: B. Kommey , C. Acquaye , T. A. Abeka
Number 28
Editor's choice::
Statistical Approach for Predicting the Most Accurate Classification Algorithm for a Data Set in Analysis
Authors: Shriniwas Nayak , Aditya Mahaddalkar
Number 29
Editor's choice::
Enhancing the NTRU Cryptosystem
Authors: Awnon Bhowmik , Unnikrishnan Menon
Number 30
Editor's choice::
Timeline Improvement of Hierarchical Clustering Algorithms for Wireless Sensor Networks
Authors: Nassirah Laloo , Mohammad Sameer Sunhaloo , Raja K. Subramanian
Number 31
Editor's choice::
Packet Crafting Tools for Cyber Crime Security Attacks
Authors: Prathyusha Kanakam , ASN Chakravarthy
Number 32
Editor's choice::
An Empirical Examination of the Relationship between Code Smells and Vulnerabilities
Authors: Aakanshi Gupta , Bharti Suri , Vijin Vincent
Number 33
Editor's choice::
A Survey on Cloud Computing: Structured Organization of Data Center
Authors: Md. Tareq Hasan , Md. Kawshik Ahmed , Amathul Hadi Shakara
Number 34
Editor's choice::
A Combined Model based on Clustering and Regression to Predicting School Dropout in Higher Education Institution
Authors: Marilia N. C. A. Lima , Wedson L. Soares , Iago R. R. Silva , Roberta A. De A. Fagundes
Number 35
Editor's choice::
Unsupervised Hybrid Algorithm to Detect Anomalies for Predicting Terrorists Attacks
Authors: Francesco Curia
Number 36
Editor's choice::
MES – Modern Encryption Standard
Authors: Awnon Bhowmik , Unnikrishnan Menon
Number 37
Editor's choice::
Machine Learning Application in Process on Extra Virgin Olive Oil Elaboration Disk Stack Vertical Centrifuge Modeling
Authors: A. Jiménez Márquez , G. Beltrán Maza
Number 38
Editor's choice::
COVID-CAM: A Method of Detection COVID using Active Map Classification, CNN and Deep Learning
Authors: Parth Sabhadiya , Vaikunth Desai , Nayankumar Sorathiya
Number 39
Editor's choice::
An Analysis of Data Security and Privacy in Cloud Computing
Authors: Akella Subhadra
Number 40
Editor's choice::
Time Series Forecasting: A Hybrid Neuro-Fuzzy-Particle Swarm Optimization Model
Authors: Muneer Abdullah Saeed Hazaa Al-Mekhlafy , Muneef Abdulkarim Farea Ahmed , Mohamed Ghaleb Yosuef
Number 41
Editor's choice::
Review on the Security Threats of Internet of Things
Authors: Prajoy Podder , M. Rubaiyat Hossain Mondal , Subrato Bharati , Pinto Kumar Paul
Number 42
Editor's choice::
Analysis of Biological Sequence Search Performance in NoSQL Database
Authors: Quezia N. Flach , Arthur F. Lorenzon , Marcelo C. Luizelli , Fabio D. Rossi