CFP last date
20 March 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024
Submit your paper
Know more
The week's pick
Recurrent Neural Network for Stock Market Forecasting using Long Short-Term Memory and an Analysis of How Social Media Affects Share Prices
SR Samarasuriya
DVDS Abeysinghe
KGK Abeywardhane
Random Articles
Control Architecture Scalable Dedicated to Braille Panels for Displaying Information on Public Places
January
2015
Energizing Entrepreneurial Spirit Among Ghanaian Workforce
February
2016
Synthesis of a Linear Antenna Array for Maximum Side-lobe Level Reduction
January
2014
Multilevel Image based Data Security using Combined Approach of Lsb_Dct Watermarking
October
2013
Archives
Volume 186
Random article
Deep Learning Models of LSTM-Ann and Bilstm-ANN for Classification Accuracy
Volume 185
Random article
Writing Secure Code in the Digital Age: Preventing Common Vulnerabilities
Volume 184
Random article
Object Detection To Monitor COVID-19 Safety Measures
Volume 183
Random article
Building a New Tourism Sentiment Lexicon Containing Descriptive Words in Modern Standard and Colloquial Arabic
Volume 182
Random article
An Approach to Detect Brain Tumor
Volume 181
Random article
Donor 24*7 using GPS Tracking System
Volume 180
Random article
VLSI Implementation of Image Denoising Algorithm using Dual Tree Complex Wavelet Transform
Volume 179
Random article
Evolutionary Optimization Methods for Animal Leather Image Segmentation
Volume 178
Random article
Arrhythmia Detection from ECG based Heartbeat Classification using Deep Learning Networks
Volume 177
Random article
A Combined Preemptive SJF and Preemptive Priority Algorithm to Enhance CPU Utilization
Volume 176
Random article
Development of Multimedia Interactive Computer-based and Mobile-based Learning: Case Studies in the Learning of Logic
Volume 175
Random article
Style Transfer for Audio using Convolutional Neural Networks
Volume 174
Random article
Analyze Portrayal of Stable Election Protocol for Wireless Sensor Network using Matlab
Volume 173
Random article
Haar Wavelet Expansions of Signals and their Applications in Image Processing
Volume 172
Random article
Extraction of Face and Palmprint Features based on LBP, HOG and Zernike Moments
Volume 171
Random article
A Soft-Drink Experiment using Replicated Full Factorial (RFF) Design
Volume 170
Random article
An Effective Technique of Image Degradation using DWT based Padding Kernel Detection
Volume 169
Random article
Mutually Nearest Vertex Clusters for Solving TSP
Volume 168
Random article
Genetic Programming Feature Extraction with Different Robust Classifiers for Network Intrusion Detection
Volume 167
Random article
Scalable and Self-Adaptive Service Selection Method for the Internet of Things
Volume 166
Random article
Performance Analysis of Spectrum Sharing based on Bayesian Spectrum Sensing in Cognitive Radio Networks
Volume 165
Random article
Survey on Flooding Detection System using Internet of Things
Volume 164
Random article
Off-Grid and On-Grid Connected Power Generation: A Review
Volume 163
Random article
A Review on Image Encryption Technique and to Extract Feature from Image
Volume 162
Random article
Proposing DEM Model for Improving the Security of Data in Cloud Environment
Volume 161
Random article
Pathalogical Lab Image Retrieval as an Alternative Expert
Volume 160
Random article
Methods Usage Computer for Security and User Convenience
Volume 159
Random article
Secure and Practical Outsourcing of Linear Programming in Cloud Computing: A Survey
Volume 158
Random article
Automatic Recognition of Vegetable Crops Diseases based on Neural Network Classifier
Volume 157
Random article
Tuning of a PID Controller using Modified Dynamic Group based TLBO Algorithm
Volume 156
Random article
Analysis of Threats and Attacks on Privacy and Security of Cloud Computing
Volume 155
Random article
Survey on Wireless Sensor Network
Volume 154
Random article
WhatsApp Group Data Analysis with R
Volume 153
Random article
A Survey of Different Encoding Schemes for Improving the Efficiency of Text based Cryptosystem using ECC
Volume 152
Random article
Design and Implementation of Resampling Techniques for Face Recognition using Classical LDA Algorithm in MATLAB
Volume 151
Random article
A Review on Noise Reduction of Echo Cardiographic Images based on Temporal Information
Volume 150
Random article
MAYO Index for Deep Analytics of Price and Performance of IPL Players
Volume 149
Random article
Introduction to Optical Fiber Communication in Lightwave Systems
Volume 148
Random article
Intelligent Phishing Possibility Detector
Volume 147
Random article
FPGA Implementation of Ring and Star NoC Architectures
Volume 146
Random article
Speech Identification using GFCC, Additive White Gaussian Noise (AWGN) and Wavelet Filter
Volume 145
Random article
Level Shifting based Decision Trimmed Filter for Multiplicative Noises
Volume 144
Random article
Cross Layer based Optimal Path Selection Reactive Routing in MANETs
Volume 143
Random article
The Role of Virtualization Techniques to Overcome the Challenges in Cloud Computing
Volume 142
Random article
Secured File Sharing using Trust Mechanism in Wireless Sensor Network
Volume 141
Random article
Investigations of Stack- driven Airflow through Rectangular Cross- Ventilated Building with Two Openings using Analytic Technique
Volume 140
Random article
Free Terminal Time in Optimal Control approach of Chikungunya Model
Volume 139
Random article
Tourist Application for Selecting Packages: A Survey
Volume 138
Random article
A Survey of Cloud Computing Fault Tolerance: Techniques and Implementation
Volume 137
Random article
A Robust Chaotic Randomization for LSB Image Watermarking
Volume 136
Random article
Articulation Error Detection Techniques and Tools:
Volume 135
Random article
Performance Analysis of Microstrip Conformal Antenna Array and Effect of Mutual Coupling for Different Curvature
Volume 134
Random article
Feed Forward Neural Network Classification for INDIAN Krishna Kamod Rice
Volume 133
Random article
ROS-based Autonomous Navigation Wheelchair using Omnidirectional Sensor
Volume 132
Random article
Review for Event Delivering Techniques in Publish/Subscribe Scheme
Volume 131
Random article
AMI Information System of Ganesha University of Education with Decision Support System
Volume 130
Random article
Enterprise Cloud Storage and Computation Security
Volume 129
Random article
Performance Evaluation of Natural Language Text Watermarking using Encryption Techniques
Volume 128
Random article
Sparse Channel Estimation using Hybrid Approach for OFDM Transceiver
Volume 127
Random article
Review on Reverse Engineering of Legacy Code and Extraction of Class Diagrams
Volume 126
Random article
Improving Performance Parameters of Error Detection and Correction in HDLC Protocol by using Hamming Method
Volume 125
Random article
Watermarking Digital Artworks
Volume 124
Random article
RWD based IDS for MANET
Volume 123
Random article
Airflow Process Across Vertical Vents Induced by Stack- Driven Effect with an Opposing Flow in one of the Upper Openings
Volume 122
Random article
Complete Architecture of a Robust System of Face Recognition
Volume 121
Random article
Image fusion of PET and CT images based on Wavelet Transform
Volume 120
Random article
An AHP-based Model for Selecting Complementary Products
Volume 119
Random article
Robust Design of RF MEMS Switch Design with Reduced Buckeling Effect
Volume 118
Random article
Investigation and Optimization of Hello Message Interval for Scalable Ad-Hoc Network
Volume 117
Random article
An Intersection based Traffic Monitoring using VANET
Volume 116
Random article
Scaling the Effectiveness of Existing Techniques towards Enhancing Performance of UWB Antenna
Volume 115
Random article
Lung Nodule Detection and Analysis using VDE Chest Radiographs
Volume 114
Random article
Image Restoration by Developing an HDR Image for Minimizing the Blur in Image
Volume 113
Random article
Application of Fuzzy Expert Systems in Assessing Risk Management in the US Army
Volume 112
Random article
The Artificial Bee Colony Algorithm for Unsupervised Classification of Meteorological Satellite Images
Volume 111
Random article
Enhanced Intrusion Detection System for Mobile Adhoc Networks using Mobile Agents with no Manager
Volume 110
Random article
Authorship Attribution based on Data Compression for Telugu Text
Volume 109
Random article
A Survey on Intrusion Detection Systems for Cloud Computing Environment
Volume 108
Random article
Security Mechanisms at different Levels in Cloud Infrastructure
Volume 107
Random article
Multi-Objective Fuzzy Chance Constrained Fuzzy Goal Programming for Capacitated Transportation Problem
Volume 106
Random article
Optimization using Bio-inspired algorithm: Intelligent Waterdrop Algorithm
Volume 105
Random article
Quartic Spline Interpolation
Volume 104
Random article
Human Face Recognition
Volume 103
Random article
Securing the Wireless Sensor Network from Denial of Sleep attack by isolating the Nodes
Volume 102
Random article
PI-RTOS: Platform Independent RTOS
Volume 101
Random article
Enhanced Genetic Algorithm based Task Scheduling in Cloud Computing
Volume 100
Random article
Anomaly Extraction and Mitigation using Efficient-Web Miner Algorithm
Volume 99
Random article
Using a Quartic Spline Function for Certain Birkhoff Interpolation Problem
Volume 98
Random article
Allocation of Join and Semi Join Operations based on Dynamic Selectivity Factor in a Distributed Database Query
Volume 97
Random article
Analysis of Handwritten Hindi Character Recognition using Advanced Feature Extraction Technique and Back propagation Neural Network
Volume 96
Random article
An Efficient Method for Text Extraction from Colored Images
Volume 95
Random article
Ancient Indian Vedic Mathematics based 32-Bit Multiplier Design for High Speed and Low Power Processors
Volume 94
Random article
Reliability of Component based Software System using Soft Computing Techniques – A Review
Volume 93
Random article
EEKWSN – Energy Efficient Key Distribution in Wireless Sensor Network
Volume 92
Random article
Remote Monitoring and Control of Robotic Arm with Visual Feedback using Raspberry Pi
Volume 91
Random article
Atmospheric Radar Signal Processing using Complex Wavelet Transforms
Volume 90
Random article
Performance Comparison of Energy Efficient Protocols for Wireless Sensor Networks (WSN)
Volume 89
Random article
Hybrid Rough Sets and Particle Swarm Optimization Application in Data Mining
Volume 88
Random article
MCDM for Selecting the Best ICT Enabled Wireless Control for the Process Industry - A Case Study
Volume 87
Random article
Migration from Proprietary to Open Source Database for eHealth Domain
Previous
Next