CFP last date
20 January 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 12
Number 8
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025
Submit your paper
Know more
The week's pick
HYBRID ANN AND FIREWORKS ALGORITHM FOR REAL-TIME SOFTWARE RELIABILITY PREDICTION
Ivy Botchway
Felix Larbi Aryeh
Boniface Kayode Alese
Random Articles
Application of Wavelet De-noising Technique on a Congested Internet Protocol (IP) Network
August
2014
Docking Studies on Cyclooxygenases-2 Inhibitors based On Potential Ligand Binding Sites
February
2014
Implementation of Digital Image Morphological Algorithm on FPGA using Hardware Description Languages
November
2012
Predicting Interest in Working Abroad using Naïve Bayes and Decision Tree Algorithms
Nov
2023
Volume 12
Number 8
Article:Performance Enhancement of Identification System using Vein Biometric with Modified Run Length Encoding, Stegnography and Cryptography
Authors: Madhumita Kathuria
Article:The Development of Undistortion Digital Image Application using Backpropogation Neural Network Model
Authors: Sakonthawat Inban , Nopadol Uchaipichat , Nitikarn Nimsuk
Article:Sensor Fusion of Intelligent Sensors using Probability Density
Authors: Dr.L.Mary Immaculate Sheela
Article:Analysis of various service discovery protocols for infra-structureless networks
Authors: S. Thangam , Dr.E.Kirubhakaran
Article:A Comprehensive Approach to Ensure Secure Data Communication in Cloud Environment
Authors: M.Sudha , Dr.Bandaru Rama Krishna Rao , M.Monica
Article:Anti-Homomorphism in Fuzzy Sub Groups
Authors: A.Sheik Abdullah , K.Jeyaraman
Article:Optimization of MSA with Swift Particle Swarm Optimization
Authors: Amit Rathi , Poonam Rathi , Ritu Vijay
Article:Prevention of Wormhole and Rushing Attack on Location- based Geocasting and Forwarding Routing Protocol in Mobile Ad-hoc Network
Authors: D. Kothandaraman , A. Amuthan , Dr. C. Chellappan , Dr. N. Sreenath
Article:Simulation Study of Acoustic Wave Propagation in Ocean
Authors: T. B. Mohite-Patil , A.K.Saran , S. R. Sawant , R. H.Chile , T. T. Mohite-Patil