CFP last date
20 August 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Proceedings
Call for Paper
September Edition
IJCA solicits high quality original research papers for the upcoming September edition of the journal. The last date of research paper submission is 20 August 2024
Submit your paper
Know more
The week's pick
Implementation of Polynomial Regression using Least Squares and Gradient Descent in Python
Ahmad Farhan AlShammari
Random Articles
Impacts of Data Mining on Relational Database Management System Centric Business Environments
August
2013
Article:Simulation Study of Acoustic Wave Propagation in Ocean
December
2010
Delay Analysis of DSDV Protocol using NS 2.34
January
2016
Control of Non-Linear Inverted Pendulum using Fuzzy Logic Controller
May
2013
Proceedings
ACCA2015
Random article
Design of Visual Repository, Constraint and Process Modeling Tool based on Eclipse Plug-ins
ACCNET2016
Random article
Revocation based Access Control with Anonymous Authentication for Decentralized Cloud
ACEWRM2015
Random article
Audio based Secure Encryption and Decryption
AERA2015
Random article
Biomass Waste Potential Assesment in the Patiala District of Punjab
AICWIC
Random article
Survey on Multimodal Biometric using Palm print and Fingerprint
BITMED
Random article
E-Finance in the Mobile World
CCSN2013
Random article
Mitigation of Multiple Blackhole Attack in WMN
CCSN2014
Random article
Body Biasing Scheme to Control Leakage, Speed and Stability in SRAM Cell Design
CIQS
Random article
Linear Quadratic Gaussian Control for Two Interacting Conical Tank Process
COGNITION2015
Random article
Energy Aware Routing Protocol for Network Performance Optimization in MANET
COMNET
Random article
A Hybrid Encryption Technique to Secure Bluetooth Communication
CONFLUENCE2013
Random article
Strategies for Evaluating Risks to Project Schedule
CTNGC
Random article
Human Resource Management through AI Approach: An Experimental Study of an Expert System
DEDCE
Random article
A Hybrid Recommender Method for Learning Objects
DISP2015
Random article
Retinal Blood Vessels Extraction using Matched Filter on High Resolution Fundus Image Database
DRISTI
Random article
Security Issues in Mobile IPv6
EFITRA
Random article
Importance of Automation and It�s Application to Optimize Energy
EGOV
Random article
Cloud based Decision Support System for Diagnosis of Breast Cancer using Digital Mammograms
EPICTIS2014
Random article
Optimization Techniques for Energy Consumption in Sensor Networks � Survey
ETC2016
Random article
Sentiment Analysis of Customer Review Data using Big Data: A Survey
ETCC
Random article
Speed Control of Induction Motor using Scalar Control Technique
ETCC2015
Random article
Mathematical Modeling of Grid Connected Photovoltaic System using MATLAB/SIMULINK and Hardware Implementation
ETCSIT2011
Random article
Optimizing Code Reusability for Mobile Applications
ETCSIT
Random article
Hiding Sensitive Association Rules on Stars
ETEIAC
Random article
Design and Implementation of Fractional Order Controller for CSTR Process
FACET
Random article
Image Analysis - An Appropriate Tool for Examination of the Aging of Natural Fibers
GTETC
Random article
A Secure Scheme for Multiple Images Transmission and its VLSI Realization
IBC
Random article
The Effect of Socio-Technical Enablers on Knowledge Sharing in Institutions of Higher Learning: A Proposed Model
IC2IT
Random article
Bit Mask Search Algorithm for Trajectory Database Mining
IC3S
Random article
Performance Evaluation of Single Mode Fiber Optics for Long Distance Optical Communication
ICACA
Random article
Prospectus of Borrowing Software Testing Resources from the Cloud
ICACA2013
Random article
Study on the Effectiveness of Classical Fritz John Conditions
ICACACT
Random article
Dealer Agent based Cloud Ecommerce Framework
ICACCTHPA2014
Random article
AODV: Security Considerations
ICACEA
Random article
Case Study on Classification of Glass using Neural Network Tool in MATLAB
ICACT
Random article
A multivariate LMS with �Hybrid Recommender System using Association Rules for Peer Learners
ICACT2011
Random article
Mitigation of Distributed Denial of Service (DDoS) Threats
ICACTD
Random article
4A Frameworks for Prioritization Requirements
ICAET2015
Random article
Adaptive Modulation Based Link Adaptation for High Speed Wireless Data Networks using Fuzzy Expert System
ICAET2016
Random article
Design and Implementation of Mosfet Model Equations on MATLAB Simulink Library
ICAET2017
Random article
Compact Modeling of Tunnel Field Effect Transistor for Ultra-Low Power Design Applications
ICAIM2016
Random article
Study of Concerns Related to Implementation of M-Health in India:Understanding Urban Doctors Perspective
ICAIM2017
Random article
Network Security Analysis based on Authentication Techniques
ICAMT
Random article
Software Reliability Measurement and Improvement Policies
ICAST2014
Random article
AnDeWA: An Approach for Analyzing and Detecting Work Flow Deviation Attacks in Web Applications
ICAST2015
Random article
Design of Multilayer Micro Strip Antenna Array for Fixed WiMax Application
ICBEST
Random article
Advance Automobile Material for Light Weight Future - A Review
ICCC2016
Random article
Determining Urban Emotion using an Unsupervised Learning Approach: A Case Study around Majitar, East District, Sikkim
ICCCMIT2014
Random article
The Taxonomy of Factors influencing Effectiveness of Exploratory Testing
ICCCMIT2017
Random article
Predictive Analytics in Diabetes using oneR Classification Algorithm
ICCCV2016
Random article
Online Signature Verification in Banking Application: Biometrics SaaS Implementation
ICCIA
Random article
Improving the Performance of Dairy Plant Operations Using Loss Control Programme
ICCSMS2016
Random article
Security Flaws in Two Recently Proposed RFID Authentication Protocols
ICCT
Random article
Image based Authentication System
ICCT2015
Random article
Design of Truncated Corner Circularly Polarized Rectangular Microstrip Antenna
ICCTAC
Random article
Morphological Detection in Images
ICCTAC2014
Random article
Advanced Cryptographic Techniques for Secured Cloud Computing
ICCTAC2015
Random article
An Architectural Framework for Workload Demand Prediction in Scalable Federated Clouds
ICDCIT
Random article
e-Health Applications
ICDCIT2014
Random article
Securing Web Communication using Three Layer Image Shielding
ICDCIT2015
Random article
Image Steganography using Index based Chaotic Mapping
ICEMC2
Random article
Performance of K-Means Algorithm on 2D-DWT Compressed Image Data
ICETCC2017
Random article
User generated Recommendation System using Knowledge based System
ICETIC2016
Random article
A Simple Method for Study of Radial Variation of Pump and Signal Intensities in Mono-Mode Erbium-Doped Graded Index Fiber Amplifier in the Low V Region
ICETT
Random article
Classification of Microcalcification in Digital Mammogram using Stochastic Neighbor Embedding and KNN Classifier
ICETTAS2015
Random article
Channel Coding using Low Density Parity Check Codes in AWGN
ICFIDM2014
Random article
A Text to Image Story Teller Specially Challenged Children - Natural Language Processing Approach
ICGCT
Random article
Impact of Algorithms on Green Computing
ICICIC2013
Random article
Survey on Energy Efficient Resource Allocation Methods in Cloud Environment
ICICT
Random article
A Study on Hyperspectral Remote Sensing Classifications
ICICT2015
Random article
Improving QoS using Adaptive TXOP Allocation in IEEE 802.11e WLAN
ICIIECS
Random article
Filtering Noise from Electrocardiogram using FIR filter with CSD coefficients
ICIIIOES
Random article
A Review on Optimized Accelerometer Design for High Performance Application
ICINC2016
Random article
A Way Ahead Towards Efficient Big Data Analytics: Prime Utilization in Businesses Moving Towards Cloud
ICINC2017
Random article
Effective Co-extraction of Online Opinion Reviews and Product Aspect Ranking
ICISS
Random article
RSU Algorithm for Secured Communication
ICIST
Random article
A Pedagogically Significant Approach to Inputting Mathematical Expressions at Runtime in C
ICKCE
Random article
Human Expression Recognition using Facial Features
ICKE2016
Random article
Feature Tracking using Particle Filter in Rope Skipping for Gross Motor Skill Development
ICON3C
Random article
Improving Multimedia Transmission in 3G Wireless NetworksUsing Cooperative Diversity Technique
ICONECT
Random article
Comparative Study of Various Hybrid Network Design Techniques
ICQUEST
Random article
Access Density and Standard Deviation of Speed as Contributing Factors for Accident of High Speed Cars
ICQUEST2015
Random article
DCT SLM Scheme for Peak-to-Average Power Ratio Reduction in OFCDM System
ICQUEST2016
Random article
Path Selection Algorithms in Mobile Ad Hoc Networks
ICRDSTHM2017
Random article
Flow Imaging in a Vertical Gravity Flow Rig using Optical Tomography
ICRTAET2015
Random article
Performance Analysis of Long Reaches WDM Optical Access Network for Different Modulation Formats
ICRTCT
Random article
Sequential Pattern Mining � A Study
ICRTET
Random article
State of the Art Review of Network Traffic Classification based on Machine Learning Approach
ICRTITCS
Random article
Comparison of Signal Scrambling PAPR Reduction Techniques with Signal Distortion Techniques in OFDM Signal
ICRTITCS2012
Random article
Computational Modeling of Nanoscale Droplet Deposition Phenomena
ICRTSTMSD2018
Random article
Measurement of Circular Saw Blade Tooth Dimensions based on Machine Vision
ICSCN
Random article
Credit Card Fraud Detection using Time Series Analysis
ICSEM
Random article
Security for SOAP based Communication among Web Services
ICTHC2015
Random article
Enhancing Relevancy of Search Engine using Schema Matching Techniques
ICTSM
Random article
Multicore Transformation of Sequential Applications for achieving high Performance
ICVCI
Random article
Survey Analysis of Various Image Denoising Techniques � A Perspective View
ICWET
Random article
Performance Comparison of Image Classifier using Discrete Cosine Transform and Walsh Transform
ICWET2012
Random article
Binary Mixtures of PDLC Doped with Nanoparticles and MWCNT
ICWET2013
Random article
Vision based Analysis using Sixth Sense Technology
ICWET2014
Random article
A Compact Rupee Shaped Dual Band Antenna for WIMAX and WLAN Applications
ICWET2015
Random article
Encryption Protected Reversible Data Hiding for Secret Communication
ICWSC
Random article
An Efficient Hybrid Job Scheduling Algorithm for Computational Grids
IICE2016
Random article
TCAD Simulation of Tunnel Field Effect Transistor
IISC2017
Random article
Image De-blurring using Adaptive Non-linear Filter
IRAFIT
Random article
Performance Analysis of Wavelength Converter based on Cross-Gain Modulation for Varying SOA Active Length using ANFIS
ISCON
Random article
Creating Web Services from Legacy Code
ISCV
Random article
Cost Effective Group Key Agreement Protocol for Ad-Hoc Networks
ISDMISC
Random article
Simulation Study and Analysis of OFDM
ITCCE
Random article
User Action Interpretation for Online Content Optimization
IWAY
Random article
Implementation of a Wireless Communication Technologies based Home Security System
MECON
Random article
EXIT Chart Optimization for a Serial Concatenation of an SCCC and a Space-time Trellis Code
MEDHA
Random article
Special Approach for Recognition of Handwritten MODI Scripts Vowels
MEDHA2015
Random article
Additive Wavelet based Image Fusion using Improved Nonlinear IHS Transformation
MIC
Random article
Health InSys (Health Inspection System)
MICRO
Random article
A High Speed CMOS Current Comparator in 90 nm CMOS Process Technology
MICRO2015
Random article
A Parametric based Technique for Detection of Total and Multiform Symmetric Switching Functions in Logic Synthesis
MICRO2016
Random article
Analysis of Implementation Factors of 3D Printer: The Key Enabling Technology for making Prototypes of the Engineering Design and Manufacturing
MICRO2017
Random article
Effect of DNA-TiO2 Scaffold as Sensitize Absorber in Dye Sensitized Solar Cell
MICTDI2016
Random article
Impact of IFQ and EDCA on H.264/SVC over Mobile Ad Hoc Networks
MLCONF
Random article
Person Identification using Multiple Fingerprint Matching
NCAC2015
Random article
Preserving Privacy using Third Party Auditor in Cloud for Data Storage
NCACA2016
Random article
Reliable and Secure Data Availability in Distributed Cloud Data Storage using Optimal Exact � Regenerating Codes
NCACC2014
Random article
Effect of Moment Invariants on Signature Recognition Rate by using Fuzzy Min-Max Neural Networks
NCACC2015
Random article
Miniaturized Printed Filtering Antenna
NCACIT2016
Random article
The Onion Routing: Enhancement with Tunable Path Selection
NCACSA
Random article
Blacklist based Anonymus User Blocking in IP Networks
NCAETE
Random article
IRIS Pattern Recognition using Self-Organizing Neural Networks
NCATAS
Random article
Integration of Quality Function Deployment and Target Costing
NCATIT
Random article
iFeX - An Effective Search Tool for Content based Medical Image Retrieval
NCCC2016
Random article
Multi-Parameterized Optimized AODV Routing Protocol in MANET
NCCSIT2017
Random article
Tracking of Plant Water Stress Via an Automated Optical and IR Image Registration
NCDISP2016
Random article
Inner Iris Localization and Statistical Feature Extraction of CASIA and KVKR Databases
NCEC2015
Random article
Digital Library Creation using Standard Cells Implemented using GPDK 180 Nm Technology
NCECE2016
Random article
An Automated Change Process for Embedded Controller Software of a Full Authority Digital Engine Control System
NCESC2015
Random article
Scaling of Color Image using B-spline Curves
NCESC2017
Random article
VLSI Design, Implementation and Verification of Scalable FFT Processor
NCESCO2015
Random article
Feature Extraction for Human Detection using Hog and Cs-Lbp Methods
NCET
Random article
Reduction of Password Guessing Attacks using Click Point
NCETACT2015
Random article
Design of Adaptive Hold Logic (AHL) Circuit to Reduce Aging Effects
NCETCSIT
Random article
Performance of Naive Bayes Classifier Multinomial Model on Different Categories of Documents
NCETCT
Random article
Text Detection, Extraction and Removal: A Survey
NCETICT
Random article
Combined DCT CS Theory based Digital Watermarking Technique for Color Images
NCETIT
Random article
A Survey on Query Recommendation Techniques and Evaluation of Snippet based Query Recommendation
NCFAAIIA
Random article
A Bacterial Foraging Optimized Finite Difference Time Domain Method
NCFC
Random article
A Fuzzy Logic based Method for Efficient Retrieval of Vague and Uncertain Spatial Expressions in Text Exploiting the Granulation of the Spatial Event Queries
NCFC2014
Random article
Multiple Sensing Intrusion Detection System in Wireless Sensor Networks
NCICCT2016
Random article
Operation and Control of Off-Grid Hybrid Standalone System
NCICT
Random article
A Web based Temperature Monitoring System using Linux
NCICT2015
Random article
Design of Multiplier based Low Power PID Controllers
NCIFTOM2016
Random article
Evaluation of Corner Detection Algorithms for Human Emotion Modeling
NCIPET
Random article
An overview and Analysis of Low Power SRAM Design
NCIPET2013
Random article
Performance Analysis of CMOS OTA
NCIPRC2015
Random article
A Ripple Carry Adder based Low Power Architecture of LMS Adaptive Filter
NCIRET
Random article
Performance Measurement of Bandwidth Utilization for Video-on-Demand Streaming across Networks
NCIS2014
Random article
Power Flow Control using TCSC Facts Controller
NCIT2015
Random article
Speech based Gender Identification using Feed Forward Neural Networks
NCKITE2015
Random article
Fuzzy based Image Enhancement Method
NCNCCACT2017
Random article
A Novel Approach to RFID based Automated Parking Charges Collection System
NCPSIA2015
Random article
Design and Implementation of Low Power and Highly Scaled DCT Architecture with CORDIC Algorithm
NCRAIT
Random article
Palm Vein Image Elucidation using 2-D Wavelet Theory
NCRENB
Random article
A new approach to SMS Text Steganography using Emoticons
NCRENB2015
Random article
Cognitive Radio Network � A New Paradigm in Wireless Communication
NCRENB2016
Random article
Marketing Tactics Improvement by Looking out the Key Users from Facebook
NCRIIAMI2015
Random article
Algorithm for Microarray Cancer Data Analysis using Frequent Pattern Mining and Gene Intervals
NCRMC2015
Random article
Computing Efficient Rekeying for Multicast Key Distribution with Least Computation Complexity
NCRTC
Random article
Invoking Web Service using AJAX
NCRTCA
Random article
Detection of Brain Tumor using Modified K Means Algorithm and SVM
NCRTCSIT2016
Random article
Detection and Prevention of Energy Draining Attack with Reduced Overhead
NCRTEEE2017
Random article
Adaptive Noise Cancellation using Transform Domain Adaptive Algorithms
NCRTEM
Random article
Effect of Node Mobility and Traffic to Energy Behaviour of Adhoc Routing Protocols
NCRTIS2015
Random article
Design of Multinode Reconfigurable Network based Multiprocessor Systems on Chip
NCRTIT2016
Random article
Phase Noise Reduction Approach in PLL based Frequency Synthesizer for IEEE1394 PHY Applications
NCVES
Random article
4 Bit Reconfigurable ALU with Minimum Power and Delay
NCWBCB
Random article
Isolation of Staphylococcus Nepalensis for Degradation of Pyrene from Diesel Contaminated Site
NGCAST2016
Random article
A Study on EEG in Brain Computer Interface
NGCTA
Random article
Optimization approach for Convergence Aspect of Wireless Communication, Positioning Techniques and Spatial Databases in Facilitating Logistics Industry
NGTBES2016
Random article
Hierarchical based Routing Protocol in WSN
NSAAILS
Random article
Insilico Docking Analysis of Nitrogen Containing Bisphosphonate with Human Fernasyl Pyrophosphate Synthase
NSFTICE2015
Random article
Segmentation and Reassembly of Images using Biplane Slicing in Adaptive Lossless Dictionary based Compression
NSRCC
Random article
e-Insurance Trend with Benefit Illustration in a Cloud Computing Environment
NTSACT
Random article
The Server Reassignment Problem for Load Balancing in Structured Peer to Peer Systems
NWNC
Random article
Design of stair and slotted UWB antenna using stepped-feed with modified slotted ground plane
QSHINE
Random article
An Algorithm for Enumeration of Terminal and Multi Terminal Paths in a Reliability Graph of Communication Networks
RAWCAI
Random article
Cluster based Anycast Routing Protocol for Wireless Sensor Networks
RICSIT2016
Random article
Use of Genetic Algorithm and Fuzzy Logic in Optimizing Graph Coloring Problem
RTDM2016
Random article
Visual Healthcare Analytics using Adaptive Data Mining
RTEE2017
Random article
Decision Making in Distribution System using different MADM Methods
RTFEM2016
Random article
Gaze-based Authentication in Cloud Computing
RTMC
Random article
Inequalities for a Certain Class Of Analytic Functions
SITQ
Random article
Study of Various Partitioning Policies of Multiprocessor Systems
TACIT2016
Random article
Content Extraction from Ancient Document Image
TSETCS2016
Random article
A Study of Mobile Cloud Computing:Architecture, Applications, and Challenges
WINBIS
Random article
Tree of Wheels: A new Hierarichal and Scalabale Topology for Underwater Sensor Networks
WINBIS2012
Random article
Understanding Total System Assurance: the Case of Mobile Agent-based Wireless Sensor Network Systems
XPLORE
Random article
IT Job Portal in Android
XPLORE2014
Random article
Algorithm and Approaches to Handle Big Data
NCACC
Random article
Interpolated Finite Impulse Response (IFIR) Filter Approach: A Case Study
RTEC
Random article
PC Configurable P89V51RD2 based Digital Clock Displaying the Day, Date, Time, and Temperature on a 128x64 Graphical LCD Module
ICETT2011
Random article
Minimizing Electronic Waste using Infrastructure as a Service