CFP last date
21 April 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 83
Number 6
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 21 April 2025
Submit your paper
Know more
The week's pick
Design and Implementation of Wyltl: An Imperative, Embeddable and Portable Programming Language
Dineth Mallawarachchi
Yasas Jayaweera
Random Articles
A Survey on Performance Evaluation of Non-Realistic Mobility Models with Different Routing Protocols on MANET
October
2015
Generation of an Effective Training Feature Vector using VQ for Classification of Image Database
December
2014
Conceptual and Semantic Measures for Cohesion in Software Maintenance
June
2012
Article:A New TURBO LMS Beamforming for Mobile Communication
December
2010
Volume 83
Number 6
Is Power Law the Universal Law for Large Real Graph: Interneth
Authors: Pathik Sharma
Node Scheduling based on Grid Optimization for Enhancing Packet Delivery in WSN
Authors: Shivani Thakur
Bladder Cancer Diagnosis using Artificial Neural Network
Authors: Shaymaa M. Alkashef , Abdelhameed Ibrahim , Hesham Arafat , Tarek A. El-diasty
Thermal Analysis of Immersed Heat Source during Flow Reduction Transient
Authors: Akram W. Ahmed Ezzat , Salah I. Hasan
ICT in Local Self Governance: A Study of Rural India
Authors: Puneet Kumar , Dharminder Kumar , Narendra Kumar
Congestion Control in Distributed Networking System - A Review
Authors: K. Vinodha , R. Selvarani
A Compound Blind Digital Watermarking Technique for Image Authentication and Integrity using DCT and VC
Authors: Inder Pratap , Saroj Hiranwal , N. S. Yadav
Twitter News Credibility Meter
Authors: Zareen Sharf , Anwar Us Saeed