CFP last date
20 May 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 1
Number 21
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2025
Submit your paper
Know more
The week's pick
Disease Detection in Tea Leaves: A Hybrid Model Using YOLOv7 and DCNN
Md Zahidul Kabir
Md Sourav Hossen
Sumiya Kaisar Keya
Random Articles
Huffman Code Function and Mahalanobis Distance-base Face Recognition
Nov
2016
A Novel Architecture to Plan and Execute Industrial Visit for Educational Institutes
Feb
2019
FPGA Implementation of Hearing Aids using Stationary Wavelet-Packets for Denoising
May
2013
Error Correction at Malicious Nodes using Reed-Muller Codes
Oct
2016
Volume 1
Number 21
Algorithmic Trading (AT) - Framework for Futuristic Intelligent Human Interaction with Small Investors
Authors: Archit Bansal , Archit Bansal , Anshul Pachouri
Overview and Analysis of UWB signal for Low Power WPAN
Authors: Rajesh Thakare , Kishore Kulat , Santosh Chede
Business Logic Model for Web Service Source Control Management
Authors: Thirumaran. M , Dhavachelvan. P , Tushar Ranjan Sahoo , Maria Stephen. R
Secure BMP Image Steganography Using Dual Security Model (I.D.E.A, image intensity and Bit Randomization)and Max-Bit Algorithm.
Authors: Nabarun Bagchi
Design and implementation of an Asynchronous Controller for FPGA Based Asynchronous Systems
Authors: T.N.Prabakar , G. Lakshminarayanan , K.K.Anilkumar
Instant Theft Alert and Tracking System in Car
Authors: Kunjal P. Tanna , Preeti Kumar , Shubha Narayanan
Design of Controllers for Higher-Order-plus-Delay-Time Processes: A Practical Solution
Authors: Gajanan M. Malwatkar , Laxman M. Waghmare
Robust Fingerprint Matching
Authors: Ovais Ismail , Bhawani Singh Shekhwat
Speech Enhancement in Hearing Aids Using Conjugate Symmetry of DFT and SNR-Perception Models
Authors: S.D. Apte , Shridhar
Application of Distributive Co-operative Design Method in Smart Homes
Authors: V. Kavitha,
Analysis of Real-Time Multi version Concurrency Control Algorithms using Serialisability Graphs
Authors: K M Prakash Lingam
144-Bit Encryption/Decryption Technique
Authors: Puvvula Bhargava , Kuppam Hari Kishan
Article:Automatic Detection of Porosity and Slag Inclusion in Boilers Using Statistical Pattern Recognition Techniques
Authors: P.N.Jebarani Sargunar , R.Sukanesh
Green Operating System: Future Low Power Operating System
Authors: Anshul Pachouri , Mohit Sharma , Tribhuwan Tewari , Prashant Kaushik
Window Constrained Scheduling of Processes in Real Time CPU Using Multi Objective Genetic Algorithm
Authors: M.Karthiga , S.Ramya
A Generic Graph-Oriented Mapping Strategy for a Honeycomb Topology
Authors: Gaurav Kumar Singh , Mythri Alle , Keshavan Vardarajan , S K Nandy , Ranjani Narayan
Domain Specific Languages
Authors: Aruna Raja , Devika Lakshmanan
Optimizing Maintenance Activities Using HGA and Monte Carlo Simulation
Authors: Mahadevan ML , Paul Robert T , Vignesh kumar V , Sridhar S
Article:Automatic Detection of Weld Defects in Pressure Vessels Using Fuzzy Neural Network
Authors: P.N.Jebarani Sargunar , R.Sukanesh