CFP last date
21 July 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 187
Number 17
Call for Paper
August Edition
IJCA solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 21 July 2025
Submit your paper
Know more
The week's pick
Navigating the Future of Cybersecurity: A Strategic Approach to Crypto Agility for Modern Enterprises
Aditya Gupta
Random Articles
Arabic Question Answering: A Study on Challenges, Systems, and Techniques
Mar
2019
A Trust Evaluation Model to Recommend a Service Provider to a Customer in Cloud Environment
July
2015
Modified RSA Digital Signature Scheme for Data Confidentiality
November
2014
Principal Component Analysis using Singular Value Decomposition for Image Compression
May
2014
Volume 187
Number 17
FORENSIC ANALYSIS FRAMEWORKS FOR ENCRYPTED CLOUD STORAGE INVESTIGATIONS
Authors: Joy Awoleye , Sarah Mavire , Allan Munyira , Kelvin Magora
PINAF: A Multi-Level Security Model for Mobile Payment Systems in Nigeria
Authors: Mobolaji F. Oladapo , Olutayo K. Boyinbode , Kolawole G. Akintola
EduBot: An AI-Integrated Chatbot for Educational Institution
Authors: Crenz Lhar R. Villasor , Lester Jay C. Rosquites , Nixon Flipper F. Poquiz , B-Jay R. Castro , Romulo Olalia, Jr , Maynard Gel F. Carse
Predicting Employee Attrition in an Organization Through Advanced Data Mining Technique
Authors: Yasmin P. Zacarias , Millbert S. Secretario , Dexter C. Macaraeg , Tracy Anne M. Agbuya , Jenniea A. Olalia , Maynard Gel F. Carse
Identifying Relevant and Non-Redundant Features in Highdimensional Data Using Automated Unsupervised Feature Selection Techniques
Authors: Suman Laha , Utpal Roy
Detection of Synthetic or Cloned Voices Using Deep Learning and Acoustic Feature Analysis
Authors: Kaushik Sinha , Debalina Sinha Jana
DOMAIN-SPECIFIC LEGAL JUDGMENT SUMMARIZER USING LATENT DIRICHLET ALLOCATION
Authors: Farhana Rizvi , Muhammad Daud Awan , Malik Sikandar Hayat Khiyal , Amber Sarwar Hashmi
Digital Forensic Analysis of Cyberbullying Cases on TikTok Application Service using National Institute of Justice Method
Authors: Florita Cinta Arum Kuncoro , Imam Riadi