CFP last date
22 April 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024
Submit your paper
Know more
The week's pick
Enhancing Privacy Preservation: Multi-Attribute Protection with P-Sensitive K-Anonymity
Twinkle Patel
Kiran Amin
Random Articles
An Enhanced Approach for Synchronization in WSN
May
2014
Enhanced Genetic Algorithm based Task Scheduling in Cloud Computing
September
2014
Influences of TwoRayGround and Nakagami Propagation model for the Performance of Adhoc Routing Protocol in VANET
May
2012
Improvised Version: Fully Homomorphic Encryption
May
2016
Archives
Volume 186
Random article
A Sustainable Approach to School Management: Introducing the Bold School Management System
Volume 185
Random article
IoT and the Autonomy of Communicating Objects Lead toward an Adapted Future
Volume 184
Random article
Face Mask Recognition based on Facial Feature and Skin Color Conversion
Volume 183
Random article
Mobile Forensic of Facebook Messenger on Cyber Fraud Case using National Institute of Standard Technology Method
Volume 182
Random article
Secured VANET Protocol with signature authentication (SVPSA)
Volume 181
Random article
Design of Smart House System based on Webserver Architecture Control
Volume 180
Random article
A Review on Big Data: Views, Categories and Aspects
Volume 179
Random article
Review of Tool Condition Monitoring Methods
Volume 178
Random article
IoT System with Access Control Integrating RFID and Non-invasive Air Conditioning
Volume 177
Random article
Evaluating the Impact of Full Virtualized High- Performance Computing Platform on Large Scale Scientific Data using Quantum Espresso
Volume 176
Random article
Re-engineering Real-time Intrusion and Burglary Detection using Fuzzy Technique
Volume 175
Random article
Performance Analysis of Various Machine Learning Approaches in Stroke Prediction
Volume 174
Random article
A Machine Learning Algorithm for Automatic Number Plate Recognition
Volume 173
Random article
Performance Analysis of OLSR Protocol using Pipelining and Multi-point Relay in WSN
Volume 172
Random article
Computational Musicology for Raga Analysis in Indian Classical Music: A Critical Review
Volume 171
Random article
Performance Analysis of Overcoming Far-end Congestion in Large-Scale Networks
Volume 170
Random article
Assessing Mobile Learning Readiness in Kampala University, Uganda
Volume 169
Random article
Early Prediction of Epilepsy Seizures System based on Artificial Immune BCI System
Volume 168
Random article
Cryptography using DNA Nucleotides
Volume 167
Random article
A Review of Data Fusion Techniques
Volume 166
Random article
Automatic Detection of Glaucoma in Retinal Fundus Images through Image Processing and Data Mining Techniques
Volume 165
Random article
M-Privacy for Collaborative Data Publishing
Volume 164
Random article
E-Banking Security using Cryptography, Steganography and Data Mining
Volume 163
Random article
Performance Improvement of Traffic Flow Prediction Model using Combination of Support Vector Machine and Rough Set
Volume 162
Random article
Copyright Assurance Scheme for computerized Color Images Utilizing Key based Visual Cryptography Watermarking
Volume 161
Random article
Diagnosing Alzheimer’s Disease
Volume 160
Random article
A Review of Comparative Analysis of TCP Variants for Congestion Control in Network
Volume 159
Random article
A Survey on Data Mining Approaches for Network Intrusion Detection System
Volume 158
Random article
Image Dehazing (Defogging) by using Depth Estimation and Fusion with Guided Filter
Volume 157
Random article
GALS Technology to Improve Throughput of FIFO
Volume 156
Random article
A Better Semantic based Friend Recommendation System for Modern Social Networks
Volume 155
Random article
Improved the Detection Ratio of Cyber Attack using Feature Reduction based on Support Vector Machine and Glowworm Optimization
Volume 154
Random article
High Speed Design of FPGA based Golay Encoder and Decoder
Volume 153
Random article
Comparative Analysis of Image Deblurring Techniques
Volume 152
Random article
Sliding Mode Active Vibration Control and Three Axis Attitude Control using Four Reaction Wheels
Volume 151
Random article
Classification of Skin Cancers using Radial basis Function Network
Volume 150
Random article
Network Intrusion Detection with Feature Selection Techniques using Machine-Learning Algorithms
Volume 149
Random article
Multimedia Data in Cloud Storage System using DE Duplication Verification
Volume 148
Random article
Securing Disseminated Data in Wireless Sensor Networks using Reliable Schemes
Volume 147
Random article
A Revised Unicode based Sorting Algorithm for Bengali Texts
Volume 146
Random article
Visual Tracking Enhancement of Object on Circular Path based on Tuned Kalman Filter by Particle Swarm Optimization
Volume 145
Random article
Case based Reasoning for Treatment and Management of Diabetes
Volume 144
Random article
Performance Enhancement of Cooperative Cognitive Relay Network using Multi Antennas Multi Hopping Techniques
Volume 143
Random article
Hand Vein Authentication System based on Information Sets
Volume 142
Random article
Low Power FPGA Implementation of a Transposed Form FIR Filter with Differential Input Technique
Volume 141
Random article
Issues and Limitations of HMM in Speech Processing: A Survey
Volume 140
Random article
Notification System to Students using an Android Application
Volume 139
Random article
Steganography with Projection aided Payload Dimension Reduction and Reconstruction for Military Covert Communication
Volume 138
Random article
A Case Study on the Different Algorithms used for Sentiment Analysis
Volume 137
Random article
SecAODV: Lightweight Authentication for AODV Protocol
Volume 136
Random article
A Compact Wide band Printed LPDA Antenna for WLAN Applications in 5 GHz Band
Volume 135
Random article
Logical Itemset Mining Implementation on Hadoop
Volume 134
Random article
A Comparison of Grammatical Bee Colony and Neural Networks in Medical Data Mining
Volume 133
Random article
Spark is superior to Map Reduce over Big Data
Volume 132
Random article
A Review and Basic Guidelines on Developing Android Applications
Volume 131
Random article
Generalized Directable Fuzzy Automata
Volume 130
Random article
Tree based Energy Balanced Routing Protocol by using Clustering and Compressive Sensing Technique
Volume 129
Random article
Autonomic Resource Management and Energy Consumption in Cloud Environment
Volume 128
Random article
Performance Analysis of Apriori Algorithm with Different Data Structures on Hadoop Cluster
Volume 127
Random article
Galois Field based Montgomery Multiplier for RSA Cryptosystem using Area Efficient Adder
Volume 126
Random article
Indian Face Age Database: A Database for Face Recognition with Age Variation
Volume 125
Random article
Accelerating CBIR System using Graphics Processing Unit in OPEN CV Environment
Volume 124
Random article
A Comparative Study of Methodologies to Optimize Post- layout Challenges
Volume 123
Random article
Effects of Variable Viscosity and Thermal Conductivity on MHD Flow Past a Vertically Moving Porous Plate with Viscous and Joule Dissipation
Volume 122
Random article
Data Hiding Techniques: A Review
Volume 121
Random article
A Study on Smartphone based Operating System
Volume 120
Random article
Security using 3D Password
Volume 119
Random article
Approaches for Software Performance Modelling, Cloud Computing and Openstack
Volume 118
Random article
Li-Fi: A New Communication Mechanism
Volume 117
Random article
Vertically Partitioning of Database for Secured Data Release
Volume 116
Random article
3-Dimensional Indoor Positioning System based on WI-FI Received Signal Strength using Greedy Algorithm and Parallel Resilient Propagation
Volume 115
Random article
Comparative Analysis of Clustering Protocols for Wireless Sensor Networks
Volume 114
Random article
A Review Paper on Different Approaches for Query Optimization using Schema Object base View
Volume 113
Random article
In-Silico Design of a Potent siRNA Molecule for Gene Silencing in Zaire Ebolavirus
Volume 112
Random article
The Role and Impact of Cultural Dimensions on Information Systems Security in Saudi Arabia National Health Service
Volume 111
Random article
Fraud Detection in Current Scenario, Sophistications and Directions: A Comprehensive Survey
Volume 110
Random article
On the Stability of Quadratic Functional Equation
Volume 109
Random article
Analyzing the Performance of MGNREGA Scheme using Data Mining Technique
Volume 108
Random article
Survey of Strong Authentication Approaches for Mobile Proximity and Remote Wallet Applications - Challenges and Evolution
Volume 107
Random article
A Framework for Enhancing Students' Participation in E-learning Environment using Motivational Factors
Volume 106
Random article
Survey on Comparative Analysis of Queries over Historical Time Series
Volume 105
Random article
Usability of Instructional Interface: Accessibility Strategies of Courseware Design for Distance Learning, Nigeria
Volume 104
Random article
A Review on RF Field Exposure from Cellular Base Stations
Volume 103
Random article
Cyber-Attack Classification using Improved Ensemble Technique based on Support Vector Machine and Neural Network
Volume 102
Random article
Optimal Software Release Time Policy using Goal Programming
Volume 101
Random article
Image Retrieval based on LBP Transitions
Volume 100
Random article
An Algorithm for Accurate Taillight Detection at Night
Volume 99
Random article
Performance Comparison of Various Filters for Denoising Foggy Images
Volume 98
Random article
State Estimation for Target Tracking Problems with Nonlinear Kalman Filter Algorithms
Volume 97
Random article
Comparative Study of Load Balancing Algorithms in Cloud Environment using Cloud Analyst
Volume 96
Random article
Security in Cloud Computing
Volume 95
Random article
Ontology based Semantic Search Engine for Cancer
Volume 94
Random article
Leukemia Image Segmentation using K-Means Clustering and HSI Color Image Segmentation
Volume 93
Random article
Comparison of Various Feature Extraction Techniques in CBIR using Statistical Parameters
Volume 92
Random article
Modified Phase Coding Audio Watermarking Resistant to Signal Attacks
Volume 91
Random article
Achieving Convergence through Deployment of IPTV in Cellular Network
Volume 90
Random article
Comparative Study of Various Sequential Pattern Mining Algorithms
Volume 89
Random article
Prevention of Malicious Attack on Smart Phones using Amendment Capture Service
Volume 88
Random article
An Enhanced Approach for Face Recognition of Newborns using HMM and SVD Coefficients
Volume 87
Random article
Multibiometric Personal Identification based on Hybrid Artificial Intelligence Technique using Serial Mode Architecture
Previous
Next