CFP last date
20 February 2026
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 187
Number 73
Call for Paper
March Edition
IJCA solicits high quality original research papers for the upcoming March edition of the journal. The last date of research paper submission is 20 February 2026
Submit your paper
Know more
The week's pick
A Knowledge-Graph–Driven Multimodal Large Model for Semantic Understanding and Controllable Generation of Intangible Cultural Heritage
Jundi Yang
Heng Yao
Random Articles
Volume 187
Number 73
Providing Information Support for Decision-making in Agricultural Production Through Implementation of Cross-platform Technologies
Authors: Irina Bolodurina , Rustam Rakhmatullin , Eugenij Speshilov , Petr Boldyrev
Self-Reflective Memory Consolidation in Agentic Architectures
Authors: Vijay Putta , Krishna Teja Areti , Ajay Guyyala , Prudhvi Ratna Badri Satya
Temporal Intent Reconstruction for Long-Horizon Agentic Predictive Control
Authors: Krishna Teja Areti , Vijay Putta , Prudhvi Ratna Badri Satya , Ajay Guyyala
Push Down Optimization for Distributed Multi Cloud Data Integration
Authors: Ravi Kiran Kodali , Vinoth Punniyamoorthy , Akash Kumar Agarwal , Bikesh Kumar , Balakrishna Pothineni , Aswathnarayan Muthukrishnan Kirubakaran , Sumit Saha , Nachiappan Chockalingam
The Rising Threat of Ransomware: Prevention and Response Strategies for Organizations
Authors: Jerome Ofori-Kyeremeh , Bright Osei Amankwatia , Leo Ofori-Kyeremeh , Francis Dartey , Ali Munhaimin , Victor Twene Dapaah
Cybersecurity in the Digital Age: Protecting Individuals and Organizations from Emerging Threats
Authors: Jerome Ofori-Kyeremeh , Kingsley Ofori , Isaac Okrah , Leo Ofori-Kyeremeh
Real-Time Human Action Recognition in Video Surveillance Using Machine Learning
Authors: Md.Musabbir Hossain , Md. Tachbir Dewan , Md. Sadikuzzaman , Abu Bakar M. Abdullah
Modeling Propagation of Financial Fraud A Case Study of Cryptocurrency Scam in Social Networks
Authors: Naglaa Mostafa , Hatem Abdelkader , Asmaa Ali