CFP last date
21 July 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 1
Number 24
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 21 July 2025
Submit your paper
Know more
The week's pick
FORENSIC ANALYSIS FRAMEWORKS FOR ENCRYPTED CLOUD STORAGE INVESTIGATIONS
Joy Awoleye
Sarah Mavire
Allan Munyira
Kelvin Magora
Random Articles
Article:A Comparative study of Face Recognition with Principal Component Analysis and Cross-Correlation Technique
November
2010
Evaluating Embedded GPUs Performance via Computer Vision Applications
Jul
2020
Detection and Identification of Mass Structure in Digital Mammogram
September
2013
A Two Hop Power Adaptive MAC Protocol for Densely Populated Wireless Networks
March
2013
Volume 1
Number 24
Cells Contrive and Construction for Biological Activities Representation ñ An Image Based Approach
Authors: Jayanthi Manicassamy , P. Dhavachelvan
Web Technologies (WEB2.0)
Authors: Nimisha Goel , Seema Maitrey , Sunita Kanauziya
An Analysis of Mechanisms for Making IDS Fault Tolerant
Authors: Perminder Kaur , Dhavleesh Rattan , Amit Kumar Bhardwaj
Design of Real Time Multiprocessor System on Chip
Authors: V.V.Mane , U.L.Bombale
An Indirect Solution for Tampering EVM and Provision for Online Vote Casting and Authentication
Authors: B.Abhinandraj , N.Rajesh , M.Santhosh Kumar , Ravindra Babu Kallam
Personalization of Web Browsing for Novice Users
Authors: Samudra Banerjee , Arindam Chatterjee , Indrajit Mukherjee
Transmission Line Fault Detection and Location Using Wavelet Transform
Authors: M.Arun Bhaskar , T.Pritha , P.Suganya , Divya Prabha , Narmada Subramaniam
Application Specific Optimal Codec in Cognitive Environment
Authors: R. D. Raut , K.D. Kulat
A FUZZY based DSP Implementation for Power Quality Improvement of a three phase AC-AC Converter
Authors: N.Radhakrishnan , M.Ramaswamy
Protocol Modeling in Spiking Neural P systems and Petri nets
Authors: Venkata Padmavati Metta , Kamala Krithivasan , Deepak Garg
Face Description with Local Invariant Features: Application to Face Recognition
Authors: Sanjay A. Pardeshi , S.N. Talbar
Workstation as a Service (WaaS)
Authors: V Vireen , Sezhian Thiagarajan
Optimization of Simultaneous Multithreading Machines– Using Hybrid Genetic Algorithm
Authors: B.Arunbala
Energy Efficient MAC protocols for Mobile Sensor Networks
Authors: Isha Batra , Ritu Malik , Meenakshi Mittal
Flare: Architecture for rapid and easy development of Internet-based Applications
Authors: Shashank Shekhar , NVSN Kalyan Chakravarthy , Mohit Soni
High Performance of Sinusoidal Pulse Width Modulation Based Flying Capacitor Multilevel Inverter fed induction Motor Drive
Authors: K.Ramani , A.Krishnan
Isolated Handwritten Words Segmentation Techniques in Gurmukhi Script
Authors: Galaxy Bansal , Dharamveer Sharma
Identification of Metastatic Tumors by Using DNA Nanorobot: A Fuzzy Logic Approach
Authors: Sanchita Paul , Abhimanyu Kumar Singh
Using Kohonen’s Self-Organizing Map for Clustering in Sensor Networks
Authors: Chiranjib Patra
Finger Print Recognition using Discrete Wavelet Transform
Authors: K.Thaiyalnayaki , S. Syed Abdul Karim , P. Varsha Parmar