CFP last date
20 October 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 187
Number 42
Call for Paper
November Edition
IJCA solicits high quality original research papers for the upcoming November edition of the journal. The last date of research paper submission is 20 October 2025
Submit your paper
Know more
The week's pick
Zero Trust Architecture Implementation in Enterprise Networks: Evaluating Effectiveness Against Cyber Threats
Stephen Kofi Dotse
Samuel Yao Sebuabe
Augustus Obeng
Silas Asani Abudu
Edna Awisie Pappoe
Random Articles
Volume 187
Number 42
Behavioral Determinants of Mobile Phone Payment System Adoption in Tanzania: An Extended Technology Acceptance Model Approach
Authors: Joseph Solomon Daudi
Survey of Presentation-Layer Architecture Patterns for Mobile Applications
Authors: Siarhei Krupenich
Machine Learning Frameworks for Effective Diagnosis of Parkinson’s Disease Using NB, GNN, and GBM Algorithms
Authors: Tarun S.J. , Gururaj S. Kori , Supreet Hiremath , Poornima M. Chanal
Enhancing Life Sciences Supply Chain Resilience through AI-Driven Master Data Governance
Authors: Chandra Babu Gundlapalli
Enhancing Life Sciences Master Data Governance with AI-Driven Data Protection and Masking
Authors: Vinod Thallapally
Rule-Based Offline Scam Detection with Multi-Dimensional Scoring and Algorithmic Implementation
Authors: Mohanish Rajaneni
A Dual-Stage Approach to Deepfake Video Detection Employing ResNet and LSTM Networks
Authors: Nithish Kumar S. , Akhila S.
An Integrated Computer Vision Pipeline for Face-Based Attendance: Detection, Recognition and Secure Logging
Authors: Shahid Hussain , Hashmat Ullah , Shah Zeb , Abbas Khan