CFP last date
21 October 2024
International Journal of Computer Applications
A Publication of Foundation of Computer Science, Delaware
Scholarly peer reviewed publication
Home
Archives
About Us
The Model
Indexing, Abstracting, and Archiving
Editorial Board
Review Board
Associate Editorial Board
Policy on Publication Ethics
Vision & Mission
Publication Ethics and Malpractice Statement
For Authors
Call for Paper - Submission Open
Topics
Journal Prints
Article Correction Policy
Publishing practices
IJCA Frequently Asked Queries
Authors Self-Archiving Policy
Citation Improvement
Home
Proceedings
International Conference on Computer Communication and Networks CSI-COMNET-2011
Number 1
Call for Paper
November Edition
IJCA solicits high quality original research papers for the upcoming November edition of the journal. The last date of research paper submission is 21 October 2024
Submit your paper
Know more
The week's pick
Artificial Bee Colony (ABC) optimization Algorithm Based Automatic Segmentation and Detection of Suspicious Lesions in Lung CT Images
Divya A.
Janaki Sathya D.
Random Articles
Parts of Speech Tagging for Indian Languages: A Literature Survey
November
2011
Comparative Study of HSV Color Model and Ycbcr Color Model to Detect Nucleus of White Cells
Sep
2016
Performance Analysis of Filter Bank Multicarrier Cognitive Radio for Physical Layer under Binary Symmetric Radio Fading Channel
May
2014
Comparison of a Case Study of Uncertainty Propagation using Possibility-Probability Transformation
December
2011
International Conference on Computer Communication and Networks CSI-COMNET-2011
Number 1
A Comparative Study of Energy Efficient Air Indexing Techniques for Uniform Broadcasting
Authors: Vikas Goel, Anil Kumar Ahlawat, M.N. Gupta
Simulation of Measurement Based Admission Control using NS2
Authors: Heena Rathore, Manish Goyal, Dharm Singh
Virtualization Driven Mashup Container in Cloud Computing PaaS Model
Authors: Hitesh A Bheda, Chirag S Thaker
Evaluating the Performance of Wireless Ad-Hoc Networks with Low Forwarding Index
Authors: Surendra Singh Choudhary, Vijander Singh, Reena Dadhich
Comparative Analysis of PTS and Iterative Flipping Scheme for Reduction of PAPR in OFDMA Networks
Authors: Kamal Singh, Manoranjan Rai Bharti, Rohit Sharma
Multi-Objective Supply Chain Model through an Ant Colony Optimization Approach
Authors: Anamika K. Mittal, Chirag S. Thaker, Gaurav N. Sutaria
Sniffing: A Major Threat to Secure Socket layer and its Detection
Authors: Ajay Mathur, Sudhir Kr.Sharma, Amit Mishra
Survey of Power Line Communication
Authors: Nutan Sharma, Tanuja Pande, M. Shukla
Refining Human Reliability through Application of Strategic Management
Authors: Aman Dheer, Hitesh Kapoor
Vulnerabilities, Attacks and their Detection Techniques in Ad hoc Network
Authors: Rauki Yadav, Naveen Hemrajani
A Survey of Attacks Happened at Different Layers of Mobile Ad-Hoc Network & Some Available Detection Techniques
Authors: Mohammad Wazid, Rajesh Kumar Singh, R. H. Goudar
Comparative Analysis of Reactive Routing Protocols for MANET at Different Traffic Load
Authors: Ramprasad Kumawat, Vinay Somani
Comparative Analysis of DSDV and OLSR Routing Protocols in MANET at Different Traffic Load
Authors: Ramprasad Kumawat, Vinay Somani
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment using UBUNTU
Authors: Savita Shiwani, G.N. Purohit, Naveen Hemrajani
Least Squares Algorithms for Time of Arrival Based Mobile Source Localization and Time Synchronization in Wireless Sensor Networks
Authors: Anita Panwar, Anish Kumar, Sh. Ashok Kumar
Comparison of Parents Selection Methods of Genetic Algorithm for TSP
Authors: Chetan Chudasama, S. M. Shah, Mahesh Panchal
Indian Readiness Towards Migration from IPV4 to IPV6
Authors: Pawan Shanker Sharma, Shailendra Singh Tanwar, Neeta Sen
Evolution of Geographic Content Location Protocol (GCLP) for MANET
Authors: Ajay Singh, Abhay Chaturvedi, Utkarsh Aeron
SaaS Service Recommendation System based on SLA Ontology
Authors: B.Saravana Balaji, N.K.Karthikeyan, S.Mani, P.Bhuvaneswari
Comparative Study of Multipath- Based Routing Techniques for Wireless Sensor Network
Authors: Prashant Chaudhari, Haresh Rathod, B. V. Budhhadev
Mobility Simulation of Reactive Routing Protocols for Vehicular Ad-hoc Networks
Authors: Reena Dadhich, Ramesh C. Poonia
Zero-Day Attack Signatures Detection Using Honeypot
Authors: Reshma R. Patel, Chirag S. Thaker
Per-Sensor Energy-Saving MAC Protocol Design for Multi-hop Wireless Sensor Networks
Authors: Naveen Chauhan, Rakesh Bisht
Optimized Scheduling Algorithm
Authors: Lalit Kishor, Dinesh Goyal, Rajendra Singh, Praveen Sharma
A Hybrid Encryption Technique to Secure Bluetooth Communication
Authors: P S Patheja, Akhilesh A. Waoo, Sudhir Nagwanshi