CFP last date
22 April 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 1
Number 6
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024
Submit your paper
Know more
The week's pick
Enhancing Privacy Preservation: Multi-Attribute Protection with P-Sensitive K-Anonymity
Twinkle Patel
Kiran Amin
Random Articles
Irrigation Scheduling using WSN
February
2014
Study on Influence of Cognitive Load for Software Developer's Performance using NNBP Algorithm
September
2014
Provenance Linking using Bundles in OWL Ontology
Apr
2017
Article:Particle Swarm Optimization Algorithm for Voltage Stability Enhancement by Optimal Reactive Power Reserve Management with Multiple TCSCs
December
2010
Volume 1
Number 6
An Artificial Neural Network for Detection of Biological Early Brain Cancer
Authors: Manoj M , Elizabeth Jacob
Optimized Bandwidth Utilization for Real Time Applications in Wireless Sensor Networks
Authors: Neeraj Kumar , Manoj Kumar , R. B. Patel
Design issues, Topology issues, Quality of Service Support for Wireless Sensor Networks: Survey and Research Challenges
Authors: S.Muthukarpagam , V.Niveditta , S.Neduncheliyan
OPDSM: A Combinatorial Object-Based and Page-Based DSM Model
Authors: Milind R. Penurkar , Rekha S. Sugandhi
Analysis of Meta-Search engines using the Meta-Meta-Search tool SSIR
Authors: Manoj M , Elizabeth Jacob
Introduction of Aspect Oriented Techniques for refactoring legacy software
Authors: S.A.M.Rizvi , Zeba Khanam
Multi-agent Optimized Load Balancing Using Spanning Tree for Mobile Services
Authors: Pradeep Kumar Sinha , Sunil R Dhore
Article:Fuzzy Pi and Integrating Type Fuzzy PID Controllers of Linear, Nonlinear and Time -Delay Systems
Authors: K.A.Gopala Rao , B.Amarendra Reddy , P.Durga Bhavani
Investigating the effects of factors on software development
Authors: Seetharam.K Professor , Chandrakanth G Pujari
Measurement of Oxide Thickness for MOS Devices, Using Simulation of SUPREM Simulator
Authors: Viranjay M. Srivastava , G.Singh , K.S.Yadav
Pectoral Muscle removal and Detection of masses in Digital Mammogram using CCL
Authors: T.S.Subashini , V. Ramalingam , S. Palanivel
Performance Comparison of various levels of Fusion of Multi-focused Images using Wavelet Transform
Authors: K. Kannan , S. Arumuga Perumal , K. Arulmozhi
Applicability of Non-Rigid Medical Image Registration using Moving Least Squares
Authors: Hema P Menon , K.A.Narayanankutty
Purpose-based Access Control Exploits by HDB
Authors: Rajneeshkaur K. Bedi , Anita M. Thengade
Web Based Virtual Control System Laboratory and on-Line Temperature Control of Electrophoresis Equipment using LabVIEW
Authors: R.M.Sudha Sruthi , S.Ananya , B.Murugeshwari
Design of Linear Functional Observer for MIMO LTI systems
Authors: Prakash K. Nakade , Girish G. Galgate
Exploring the threats in Cell Phone as a Portable Storage Device
Authors: Vaishali Mishra , Ashutosh Mishra,
Improved personalized e-course composition approach using modified particle swarm optimization with inertia-coefficient
Authors: Dheeban S.G , Deepak V , Dhamodharan L , Susan Elias