CFP last date
22 April 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Volume 95
Number 9
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024
Submit your paper
Know more
The week's pick
Enhancing Privacy Preservation: Multi-Attribute Protection with P-Sensitive K-Anonymity
Twinkle Patel
Kiran Amin
Random Articles
Analysis of Randomized Performance of Bias Parameters and Activation Function of Extreme Learning Machine
February
2016
Hardware Implementation of FFT using Vertically and Crosswise Algorithm
December
2011
Security and Privacy of Image by Encryption, Lossy Compression and Iterative Reconstruction
January
2013
Empirical Characterization of Propagation Path Loss and Performance Evaluation for Co-Site Urban Environment
May
2013
Volume 95
Number 9
Performance Analysis by Improving Bit Error Rate (BER) through various Diversity Techniques in Wireless Communication
Authors: Joydev Ghosh , Abhishek Dey , Subham Bachhar
A Brief survey of Data Mining Techniques Applied to Agricultural Data
Authors: Hetal Patel , Dharmendra Patel
Automatic Redeye Correction in Digital Photos
Authors: Navid Razmjooy , S. Shahram Naghibzadeh , B. Somayeh Mousavi
Optimal Scheduling of Flowshop Batch Process for Zero-Wait and No Intermediate Storage Transfer Policy
Authors: H. Abdel Samad , H. Moselhy , S. Aly , M. E. Awad
A Comparison of Joint ICA and Parallel ICA Multimodal Fusion Methods in Schizophrenia
Authors: Abdullah N. Mohammed , Taha E. Taha , Osama S. Faragallah
WebGuard: Enhancing Intrusion Detection in Multi-tier Web Applications
Authors: Asha U. Patil , Arati M. Dixit
Supporting Ranking Queries for Search-As-You-Type in Databases using WIP
Authors: Kaushik G. Vaghani , Pratik A. Patel
A Gravitational Black Hole Algorithm for Autonomous UCAV Mission Planning in 3D Realistic Environments
Authors: A. A. Heidari , R. A. Abbaspour