CFP last date
20 May 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 1
Number 8
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2025
Submit your paper
Know more
The week's pick
Attack information gathering from network analysis data during scanning activity
Stephane J. Tamafo
Elie Fute Tagne
Jaime C. Acosta
Charles Kamhoua
Rawat Danda
Random Articles
Identifying Intrusion Patterns using a Decision Tree
May
2012
A Proposed New Framework for Securing Cloud Data on Multiple Infrastructures using Erasure Coding, Dispersal Technique and Encryption
Apr
2019
Artificial Intelligence-driven Decentralized Finance
Sep
2024
Noise Reduction of Speech Signal using Wavelet Transform with Modified Universal Threshold
April
2011
Volume 1
Number 8
Self Organizing Maps to Build Intrusion Detection System
Authors: Vivek A. Patole , V. K. Pachghare , Parag Kulkarni
Analysis of RTO Caused by Retransmission Loss to Combat Channel Noise
Authors: Bhavika Gambhava , N. J. Kothari , K. S. Dasgupta
A Futuristic Analysis on the Application Problems of Wireless Sensor Networks (WSN) with Effective Strategies and Optimal Solutions
Authors: R Jaichandran , A.Anthony Irudhayaraj
An Improvement of Liou et al.’s Authentication Scheme using Smart Cards
Authors: Sandeep K. Sood , Anil K. Sarje , Kuldip Singh
MOEA based Design of Decentralized Load-Frequency Controllers for Interconnected Power Systems with AC-DC Parallel Tie-lines and Considering Nonlinearities
Authors: S.Ganapathy , S.Velusami
MINIMUM SPANNING TREE ALGORITHM
Authors: Vikas.C.S
TCAS Functioning and Enhancements
Authors: Sathyan Murugan , Aniruth A.Oblah
Inter and Intra Cluster Scheduling for Performance Analysis of Coexistence Heterogeneous Networks
Authors: G.M.Tamilselvan , A.Shanmugam
An Open Source Multi Agent System for Data Preprocessing of Online Software Bug Repositories
Authors: Naresh Kumar Nagwani
Article:A Framework for Software Architecture Visualization and Evaluation
Authors: S. Margret Anouncia , Merin Cherian , Anubhuti Parija , Dulcy Sylvia.R , Jayaprasanna. D
Database Management Systems
Authors: Aparajitha.R.S.V , Kavitha M.K , Monisha T.R.P , Pavithra T.S.B , Vinoth Raja P
Robotics
Authors: Singh Abhimanyu U. , Ray Proneet P. , Chauhan Geetesh P.
Network protocols, Management and Security
Authors: Ray Proneet P. , Singh Abhimanyu U.and Chauhan Geetesh P.
BlueTooth Future Applications and Usage
Authors: N.Sai Jithendra , S.Ravi Teja
Bending of Skewed Cylindrical Shell Panels
Authors: Salil Haldar , Aditi Majumdar , Mihir Chandar Manna
Biogeography Based Groundwater Exploration
Authors: V.K.Panchal , Er. Harish Kundra , Gaganpreet Singh
Lexical Analyser for Automated Image Classification and Applying Classification on Google Earth
Authors: V.K.Panchal , Er. Harish Kundra , Gaganpreet Singh
Article:A New Genetic Based Multilayered Fuzzy Image Filter for Removing Additive Identical Independent Distribution Impulse Noise from Medical Images
Authors: A. Padma , R. Sukanesh , A. Santhana Vijayan
Focusing Informatics Methods in Clinical Medicine and Biomedical Challenges
Authors: Bhavana.K