CFP last date
20 May 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 181
Number 49
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024
Submit your paper
Know more
The week's pick
Enhancing Privacy Preservation: Multi-Attribute Protection with P-Sensitive K-Anonymity
Twinkle Patel
Kiran Amin
Random Articles
Behavior Formula Extraction for Object Trajectory using Curve Fitting Method
October
2014
A Survey: Load Balancing for Distributed File System
February
2015
A Study on Ontology Application Scenarios in e-Learning Domain
Dec
2017
Brain Cancer Risk Prediction Tool using Data Mining
January
2013
Volume 181
Number 49
Medhelp: A Mobile Application to Connect Pilgrims with First-aiders during Al-hajj
Authors: Salma Elhag , Malak Alqarni , Juman Ahmad , Meznah Humidan Alsalhi
Studying the Interrelationship amongst various success factors for partnering in Construction Industry in Developing Countries
Authors: Remica Aggarwal , S. P. Singh , Veena Aggarwal
Machine Learning based Marks Prediction to Support Recommendation of Optimum Specialization and Study Track
Authors: Gibrael Abosamra , Ahmad Faloudah
Computational Framework for Heart Disease Prediction using Deep Belief Neural Network with Fuzzy Logic
Authors: S. Saranya , R. Manavalan
Congestion Free Routing in MANET based on Node Reliability Supported AODV
Authors: Bhawana Pillai , Rakesh Singhai
Design and Implementation of Linux based Workflow for Digital Forensics Investigation
Authors: Moses Ashawa , Morris Ntonja
Model of Evaluating the Effectiveness of the Information Technology for the Tasks of the Thermophysical Properties of Substances
Authors: Sura Khalil Ibrahim
A Proposed Application based on Mobile Learning Techniques to Manage Electronic Tests
Authors: Rasha Kandel M. Arafa , Elsaeed Elsaeed Mohamed Abd Elrazek , M. Z. Rashad
Clustering Algorithms for Huge Datasets: A Mathematical Approach
Authors: Shyam Mohan J. S. , Shanmugapriya P.
Comparative Analysis of Naïve Bayes and J48 Algorithms on Intrusion Detection System (IDS)
Authors: Priyanshi Kotlia , Janmejay Pant