CFP last date
20 January 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Special Issues
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025
Submit your paper
Know more
The week's pick
Implementation of Feature Selection Using Correlation Matrix in Python
Ahmad Farhan AlShammari
Random Articles
A Fuzzy Rule Base System for the Diagnosis of Heart Disease
November
2012
Covert Image Transfer: A Secret Sharing Technique
October
2015
RONI Medical Image Watermarking using DWT and RSA
June
2014
A New Approach of Designing a Client/Server Model with Smart Screen
May
2014
Special Issues
RTIPPR
Random article
A Survey of Image Processing Techniques for Identification of Printing Technology in Document Forensic Perspective
CASCT
Random article
Noninvasive Technique for Acquiring and Analysis of Electrogastrogram
MANETS
Random article
Dynamic Intrusion Detection Method for Mobile Ad Hoc Network Using CPDOD Algorithm
ECOT
Random article
Cost Effective Approach on Feature Selection using Genetic Algorithms and LS-SVM Classifier
NCCSE
Random article
Fuzzy Adaptive PID for Flow Control System based on OPC
ICISD
Random article
Application of Digital Image Processing and Analysis in Healthcare Based on Medical Palmistry
AIT
Random article
A Modified Genetic Algorithm for Process Scheduling in Distributed System
ENCC
Random article
Optimization of Fitness Function through Evolutionary Game Learning
IPMC
Random article
Comparative Analysis of Network Forensic Systems
DIA
Random article
Acoustic Echo Cancellation for Noisy Signals
NSC
Random article
Fuzzy Logic Based Intrusion Detection System against Blackhole Attack on AODV in MANET
COMNETCN
Random article
Hardware Implementation of Mix Column Step in AES
WCMN
Random article
Performance Analysis of Various Modulation Techniques in Multipath Ad-Hoc Network using Tree Based Interleaver for Iterative IDMA Systems
OOC
Random article
Functional Buildup in Board Game Positional Composition through Evolutionary Genetic Mechanism
COMNETCS
Random article
Spatial and Frequency Domain for Grey level Digital Images
ACCTHPCA
Random article
Methods towards the Classification of Clustered Microcalcification
IPRC
Random article
Transmission Time based Detection of Wormhole Attack in Wireless Sensor Networks
CONFLUENCE
Random article
Modeling Data Warehouse using Quality Metrics:The Need of Software Process
CIIS
Random article
A Decision Support System for Performance Evaluation
ICEDSP
Random article
Support System for the Automated Detection of Hypertensive Retinopathy using Fundus Images
RETRET
Random article
Performance of Free-space Optical Communication with Feed Forward Compensation Model
RTPRIA
Random article
On Developing a Decision-Making Tool for General Applications to Computer Vision
RTINFOSEC
Random article
A Survey of Face Morphing Techniques
ICEICE
Random article
Review of the Challenges to Remove Jitter and Packet Loss during Continuous Playback of Streamed Video Data in Video On Demand (VOD) System Receivers
SEDEX
Random article
3D Face Recognition using Gaussian Hermite Moments
ICNICT
Random article
Study of Path Optimization in Packet Switching Network using Neural Network
ICECI
Random article
Image Retrieval and Image Categorization by Content based Information
ICCCMIT
Random article
Enhancing the Performance of Routing in Mobile Ad Hoc Networks using Connected Dominating Sets
CCSN2012
Random article
An Improved Approach of Cryptography using Triangulation and MSB Iteration Technique
ICRITO
Random article
Quantitative Project Assessment for Quality-Oriented Software Management
CCSN
Random article
PCA based Image Denoising using LPG