CFP last date
20 May 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 183
Number 7
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2025
Submit your paper
Know more
The week's pick
Attack information gathering from network analysis data during scanning activity
Stephane J. Tamafo
Elie Fute Tagne
Jaime C. Acosta
Charles Kamhoua
Rawat Danda
Random Articles
Article:Some Proposed Standard Models for Bangla Dictionary Entries of Bangla Morphemes for Universal Networking Language
December
2010
Two level Authentication and Packet Marking Mechanism for Defending against DoS and DDoS Attacks
February
2013
Fundamental Challenges in Identifying Tools for DevOps Pipeline
Apr
2020
Recent Trends and Challenges in Virtual Reality
May
2017
Volume 183
Number 7
Effectiveness of Artificial Intelligence in Stock Market Prediction based on Machine Learning
Authors: Sohrab Mokhtari , Kang K. Yen , Jin Liu
Predicting COVID-19 Pneumonia Severity based on Chest X-ray with Deep Learning
Authors: Swati Shekapure , Nikita Pagar , Bhagyashree Kulkarni , Dinesh Choudhary , Priti Parkhad
Bank Management System using Blockchain
Authors: Nalini Jagtap , Vivek Salunke , Sharvari Joshi , Rutiksha Bhosale , Afarin Manyar
Automated Essay Evaluation using Chart Parser
Authors: Sampada K.S. , Anusha S. , N. Vignesh Karthik
Improving the Performance in Sentiment Analysis
Authors: Sumanto Kar , J. Scriptu Rajan , Sebastian Dmello , Sapna Prabhu
Simple, Qualities, Efficient and Secure Method to Encrypt Voice Signal
Authors: Mohammad S. Khrisat , Hatim Ghazi Zaini , Ziad AlQadi
Efficient Multi-level Clustering for Very Large Wireless Sensor Networks with Gateways Support and Meta-heuristic Integration
Authors: Basilis Mamalis , Sotiris Mamalis , Marios Perlitis
Analysis and Prediction of Stock Market Mining using Machine Learning Clustering Technique
Authors: Zahraa Elsayed Mohamed , El-Amin Kamal El-Din El-Mesalamy