CFP last date
20 April 2026
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 187
Number 88
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 20 April 2026
Submit your paper
Know more
The week's pick
A Unified NIST SP 800-90B Validation Framework for CMOS True Random Number Generators and Quantum Random Number Generators
Che-Ping Lin
Random Articles
Volume 187
Number 88
The Authenticity Spectrum Framework: Classifying Deepfake and Generative AI Risks in Synthetic Media
Authors: Francis Martinson
An Integrated Interpretable Performance Prediction Model with Dynamically Optimized Attributes
Authors: Meenakshi Devi , Rakesh Kumar
A Rights-Centered Cyber Resilience Framework for Higher Education Institutions
Authors: Ali Munhaimin , Jerome Ofori-Kyeremeh , Leo Ofori-Kyeremeh , Richard Kyereh , Enock Gyabaa , Angela Nyame-Tabiri , Bright Osei Amankwatia , Victor Twene Dapaah , Francis Dartey
Optimizing Software Development Processes for Educational Technology Systems: A Data-Driven Approach.
Authors: Jerome Ofori-Kyeremeh , Richard Kyereh , Leo Ofori-Kyeremeh , Enock Gyabaa , Benjamin Oppong Kyeremeh , Angela Nyame-Tabiri , AlexanderQuaye Gyampoh , Victor Twene Dapaah , Francis Dartey , Kingsley Ofori , Kelvin Afriyie Kwarteng
AI-Driven Vendor-Managed Inventory (VMI) Systems: A Causal Inference Framework for Lowering Carrying Costs in Multi-Tier Supply Networks
Authors: Anil Mandloi , Prakhi Mandloi
Safe and Reliable Use of Generative AI in IT Operations: Guardrails and Validation Frameworks for Production Systems
Authors: Ruban Prabhu Selvaraj
AI POWERED POST DISASTER SURVEILLANCE DRONE SYSTEM
Authors: Madhav Manoj , Mitul K. , Nathaneal Vinod , Rachel P. Jose , Kurien Thampy
Evaluation of Generative AI-Enabled Cyber Attack Vectors
Authors: Shekar Munirathnam