CFP last date
20 May 2025
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 44
Number 9
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2025
Submit your paper
Know more
The week's pick
Attack information gathering from network analysis data during scanning activity
Stephane J. Tamafo
Elie Fute Tagne
Jaime C. Acosta
Charles Kamhoua
Rawat Danda
Random Articles
Improved Multi-Agent Reinforcement Learning for Minimizing Traffic Waiting Time
November
2013
Zonal based Deterministic Energy Efficient Clustering Protocol for WSNs
January
2015
A Comparative Study of Graph Isomorphism Applications
Mar
2017
Performance Analysis of Ad-hoc Network Considering Energy and Packet Delivery Ratio with Speed - A Fuzzy Approach
May
2016
Volume 44
Number 9
Elliptic Curves, Palindrome Numbers and Secret keys
Authors: Karuna Kamath K , Shankar B.r
Computer Aided Molecular modeling approach of H & E (Haemotoxylin & Eosin) images of Colon Cancer
Authors: Venkata Subbaiah Kotakadi , Gaddam Susmila Aparna , D. V. R. Sai Gopal
Performance Comparison of AODV and DYMO MANET Protocols under Wormhole Attack Environment
Authors: Richa Agrawal , Rajeev Tripathi , Sudarshan Tiwari
A Comparative Study in Predicting Colon Rectum Cancer using Auto Regressive Integrated Moving Average (ARIMA) and Artificial Neural Network (ANN) Models
Authors: S. Shenbaga Ezhil , C. Vijayalakshmi
A Novel Approach for Finding Frequent Itemsets done by Comparison based Technique
Authors: Meghna Utmal , Shailendra Chourasia , Rashmi Vishwakarma
Studies on Research and Development in Web Mining
Authors: Pawan Singh , Amit Kumar , Prashast
A Study on Edge Marking Scheme of Various Standard Edge Detectors
Authors: Shaifali Pande , Vivek Singh Bhadouria , Dibyendu Ghoshal
On the Estimationof the Software Effort and Schedule using Constructive Cost Model – II and Functional Point Analysis
Authors: R. Chandrasekaran , R. Venkatesh Kumar