CFP last date
20 March 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Archives
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024
Submit your paper
Know more
The week's pick
Optimizing Robot Path Planning in 2D Static Environments using GA, PSO and ACO Search Algorithms
Santosh Shrestha
Pranith Varma Appani
Praveen Reddy Kota
Alaa Sheta
Random Articles
Data Security Throws Image processing by Blowfish Algorithm, Genetic Algorithm and LSB
Aug
2016
Singularity Points Detection in Fingerprint Images
May
2012
Performance Analysis of TCP in Wireless Network
September
2013
Knowledge Acquisition under Imprecision through Neighborhood Approximation Operators
September
2011
Archives
Volume 86
Random article
Comparative Study of Neural Network Algorithms for Servo Control Applications
Volume 85
Random article
Content-based Routing For ebXML Messages in E-commerce
Volume 84
Random article
Removal of Noise in Medical Imaging Data using Modified Decision based Adaptive Weight Algorithm
Volume 83
Random article
Hall Effects on Unsteady Rotating MHD Flow Through Porous Channel with Variable Pressure Gradient
Volume 82
Random article
Surface EMG Signal Amplification and Filtering
Volume 81
Random article
Generic Algorithm Implementation of Approximation Algorithm using Simulated Annealing (SA)
Volume 80
Random article
Enhancing ATM Security using Fingerprint and GSM Technology
Volume 79
Random article
Improved RSA Encryption based Medical Image Compression using Fractional Fourier Transform and Modified SPIHT Encoding Scheme
Volume 78
Random article
Enhanced Framework for Building Successful Website for Informative Companies
Volume 77
Random article
Mathematical Modelling on Lamprey GnRH-III using Autoregressive Logistic Processes
Volume 76
Random article
Efficient Approach for Rapid Sample Protocol in Wireless Scenario
Volume 75
Random article
Applying a new Communication Technique among Agents in Hospital Management System
Volume 74
Random article
Chaotic Time Series Prediction for Rock-Paper-Scissors using Adaptive Social Behaviour Optimization (ASBO)
Volume 73
Random article
Improving Performance of Wireless Mesh Networks
Volume 72
Random article
Software Assessment Parameter Optimization using Genetic Algorithm
Volume 71
Random article
Eye Gaze Techniques for Human Computer Interaction: A Research Survey
Volume 70
Random article
Securing Cloud Data and Cheque Truncation System with Visual Cryptography
Volume 69
Random article
Comparative Study of Classification Techniques with Labeled Data in Wireless Sensor Network
Volume 68
Random article
Texture Feature Extraction of RGB, HSV, YIQ and Dithered Images using GLCM, Wavelet Decomposition Techniques
Volume 67
Random article
Rational Trigonometric Interpolation and Constrained Control of the Interpolant Curves
Volume 66
Random article
Image Segmentation using Isodata Clustering with Parameters Estimated by Evolutionary Approach: Application to Quality Control
Volume 65
Random article
Neural Network-based Video Quality via Adaptive FEC in Wireless Environment
Volume 64
Random article
Interference Cancellation using Logic OR Operation in MIMO Receiver
Volume 63
Random article
Analysis of Different Ranges for Wireless Sensor Node Localization using PSO and BBO and its variants
Volume 62
Random article
Data Structures in Robot Navigation Optimized by Adaptive Straightness
Volume 61
Random article
New Load Balanced Multi-Path Dynamic Source Routing Protocol for Mobile Ad-HOC Network
Volume 60
Random article
Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique
Volume 59
Random article
An Extendible Emulator for Investigating Configuration Algorithms in Mobile Ad-hoc Networks
Volume 58
Random article
An Statistical Technique to Mitigate Black Hole Attack in Wireless Network
Volume 57
Random article
An Implicit Rational Method for Solution of Second Order Initial Value Problems in Ordinary Differential Equations
Volume 56
Random article
Cascaded Nonlinear Adaptive Predictive Control based Adaptive Flux Observer of Induction Motor
Volume 55
Random article
Efficient Hardware Implementation of SHA-3 Candidate Grostl using FPGA
Volume 54
Random article
An Efficient Approach for Extraction of Actionable Association Rules
Volume 53
Random article
Towards Arabic Spell-Checker Based on N-Grams Scores
Volume 52
Random article
CIDT: Detection of Malicious Code Injection Attacks on Web Application
Volume 51
Random article
Automatic Arabic Text Clustering using K-means and K-mediods
Volume 50
Random article
Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG)
Volume 49
Random article
Diametral Reachable Index (DRI) of a Vertex
Volume 48
Random article
Galeorstack- A Novel Leakage Reduction Technique for Low Power VLSI Design
Volume 47
Random article
Implementation of Green House Automation using ARM7 Controller
Volume 46
Random article
ERP Projects: Key Success Factors and Risk of Failure A Proposed Model of Governance of Enterprise Resource Planning
Volume 45
Random article
A Comparative Study on Cognitive Radio Implementation Issues
Volume 44
Random article
Stability of Functional Equations in Multi-Banach Spaces via Fixed Point Approach
Volume 43
Random article
Error Minimization in Localization of Wireless Sensor Networks using Genetic Algorithm
Volume 42
Random article
Automatic Detection of Melanoma Skin Cancer using Texture Analysis
Volume 41
Random article
Embedded Home Automation for Visually Impaired
Volume 40
Random article
Optimized Asynchronous Circuit Design based on Evolutionary Algorithm
Volume 39
Random article
Polynomial based Design of CIC Compensation Filter used in Software Defined Radio for Multirate Signal Processing
Volume 38
Random article
Feature Selection for Finger Knuckle Print-based Multimodal Biometric System
Volume 37
Random article
Recent Developments in Text Clustering Techniques
Volume 36
Random article
A Survey on Problems in Distributed UDDI
Volume 35
Random article
Recent Trends in Text Classification Techniques
Volume 34
Random article
An Improved Algorithm of Fractal Image Compression
Volume 33
Random article
Evaluation of Some Physics and Atmospheric Models using Newly Developed Servers and Software Application
Volume 32
Random article
Analysis of Network Lifetime for Wireless Sensor Network
Volume 31
Random article
Genetic Algorithm based Parameter Identification of Three Phase Induction Motors
Volume 30
Random article
Text Reconstruction using Torn Document Mosaicing
Volume 29
Random article
Role of Segmentation in Medical Imaging: A Comparative Study
Volume 28
Random article
Dynamic Image Segmentation using Fuzzy C-Means based Genetic Algorithm
Volume 27
Random article
Analysis of Channel Coding in Fading Channels for MIMO Systems
Volume 26
Random article
Multi-Scale PLS Modeling for Industrial Process Monitoring
Volume 25
Random article
Service Oriented Architecture based SDI Model for Geographical Indication Web Services
Volume 24
Random article
SSB-7: A New Image Steganography System for Enhancement of Message Insertion Chance using 7th Bit of Pixel Value
Volume 23
Random article
Adaptive Image Decomposition by Improved Bilateral Filter
Volume 22
Random article
Performance Comparison of Devanagari Handwritten Numerals Recognition
Volume 21
Random article
A Multi-Commodity Grid Logistics Model for Data Transportation in Federated Datagrid
Volume 20
Random article
Environmental Economic Dispatch Optimization using a Modified Genetic Algorithm
Volume 19
Random article
Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique
Volume 18
Random article
An Efficient Hybrid Image Compression Scheme based on Correlation of Pixels for Storage and Transmission of Images
Volume 17
Random article
Article:Tunneling effects in DNA Bases Adenine and Guanine
Volume 16
Random article
Communication in Network using Wavelet Transform
Volume 15
Random article
Ishikawa Iterates for Logarithmic Function
Volume 14
Random article
Intelligent Building Management Systems by Using Hardware Multi Agents: Fuzzy Approach
Volume 13
Random article
GHHECR Protocol for Energy Conserving Routing in Sensor Networks
Volume 12
Random article
An Integrated Page Ranking Algorithm for Personalized Web Search
Volume 11
Random article
Article:Blind Adaptive Equalization of Complex Signals based on the Constant Modulus Algorithm
Volume 10
Random article
Article:Parallel Approach for Diagnosis of Breast Cancer using Neural Network Technique
Volume 9
Random article
Article:Green Cloud: An Algorithmic Approach
Volume 8
Random article
Article:Significance of Medium of Instruction and Personality in Designing Adaptive e-Learning Systems
Volume 7
Random article
Article:Improving Route Selection Mechanism using Trust Factor in AODV Routing Protocol for MaNeT
Volume 6
Random article
Article:A Performance Comparison With Modulation Schemes In WiMAX Physical Layer Security Aspect
Volume 5
Random article
An Approach to Optimize the Cost of Software Quality Assurance Analysis
Volume 4
Random article
A Neural Network based Method for Brain Abnormality Detection in MR Images Using Gabor Wavelets
Volume 3
Random article
Analysis of K-Connected MANETs for QoS Multicasting using EDMSTs based on Connectivity Index
Volume 2
Random article
Adaptive and Intelligent E-Portfolio Architecture for Learning
Volume 1
Random article
Development and Comparative Analysis of an Adaptive Fuzzy Logic LFC control model for Gain Scheduling using Fuzzy Logic and Adaptive Fuzzy Techniques
Previous
Next