CFP last date
22 July 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 70
Number 24
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 22 July 2024
Submit your paper
Know more
The week's pick
A semi-parallel data acquisition method in electrical impedance tomography using undersampling technique
Adriano Regis
Daniel J. Pagano
Francisco R.M. Mota
Marduck M. Henao
Random Articles
Forest Cover Type Prediction using Cartographic Variables
Dec
2018
A Study based on the Trust Management
February
2013
A SRAM Memory Cell Design in FPGA
June
2013
Techniques to Detect Spammers in Twitter- A Survey
January
2014
Volume 70
Number 24
JNT - Java Native Thread for Win32 Platform
Authors: Bala Dhandayuthapani Veerasamy , G.m. Nasira
Multilevel Security Model using Distributed Keys in MANET
Authors: Neha Agrawal , Sourabh Singh Verma
Hall Effects on Unsteady MHD Free Convective Flow Past an Accelerated Moving Vertical Plate with Viscous and Joule Dissipations
Authors: B. C. Sarkar , S. Das , R. N. Jana
HIPAA Compliance and Cloud Computing
Authors: Parshant Tyagi , Navdeep Aggarwal , Bhanu P. Dubey , Emmanuel S. Pilli
Cloud Computing: Data Storage Security Analysis and its Challenges
Authors: Navdeep Aggarwal , Parshant Tyagi , Bhanu P. Dubey , Emmanuel S. Pilli
Support Vector Machines based Part of Speech Tagging for Nepali Text
Authors: Tej Bahadur Shahi , Tank Nath Dhamala , Bikash Balami
Multimodal Biometrics for Person Authentication using Hand Image
Authors: S. Sumathi , R. Rani Hema Malini
Automated EJB2 to EJB3 Migration
Authors: Isha Mittal , J. S. Sodhi