CFP last date
20 May 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 16
Number 5
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024
Submit your paper
Know more
The week's pick
Enhancing Privacy Preservation: Multi-Attribute Protection with P-Sensitive K-Anonymity
Twinkle Patel
Kiran Amin
Random Articles
On Rayleigh-Ritz Method in Three-Parameter Eigenvalue Problems
January
2014
To Secure and Compress the Message on Local Area Network
May
2013
RIO: An AI based Virtual Assistant
May
2018
Improved the Prediction of Clinical Data Accuracy using RBF Neural Network Model
Mar
2017
Volume 16
Number 5
Novel Bound Setting Algorithm for Occluded Region Reconstruction for Reducing the Inpainting Complexity under Extreme Conditions
Authors: Bindu A , C N Ravi Kumar
Issues identified in the software process due to barriers found during eliciting requirements on agile software projects: Insights from India
Authors: N.Ganesh , S.Thangasamy
Enhanced Security for Information Flow in VANET using Signcryption and Trust level
Authors: Sumitkumar Singh , Vijayan R
A New GC Based HMM Algorithm for Disease Classification
Authors: Dr.V.Anuradha , S.K.M.Habeeb , A.Praveena , AmalaPriya
A Comprehensive Survey of Privacy Preserving Algorithm of Association Rule Mining in Centralized Database
Authors: Archana Tomar , Prof. Vineet Richhariya , Prof. R.K. pandey
Analysis of Circular Microstrip Patch Antenna Using Spherical Modal Expansion Technique
Authors: Rukmini T S , Shilpa J , Ravishankar S , K S Shushrutha , Commander S.K.Thakur
Below Elbow Upper Limb Prosthetic for Amputees and Paralyzed Patients
Authors: Debika Khanra , Dr. S. Sudesh
A Hybrid Cache Invalidation Technique for Data Consistency in MANET
Authors: N. Sabiyath Fatima , Dr. P. Sheik Abdul Khader
Classification of a Satellite Rural Image based on Fractal Dimension using Box Counting Method
Authors: DR.Ambika , AG Ananth