Are you over 18 and want to see adult content?
More Annotations
A complete backup of edisonhotelnyc.com
Are you over 18 and want to see adult content?
A complete backup of findbestinsurquotes.com
Are you over 18 and want to see adult content?
A complete backup of vinci-airports.com
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of hairstyleforblackwomen.net
Are you over 18 and want to see adult content?
A complete backup of kalmarlansmuseum.se
Are you over 18 and want to see adult content?
A complete backup of radioparadise.com
Are you over 18 and want to see adult content?
A complete backup of campusgrotto.com
Are you over 18 and want to see adult content?
A complete backup of lawandfreedom.com
Are you over 18 and want to see adult content?
A complete backup of enterkeyoffice.com
Are you over 18 and want to see adult content?
Text
Sciences
A REVIEW OF ANOMALY BASED INTRUSIONDETECTION SYSTEMS International Journal of Computer Applications (0975 – 8887) Volume 28– No.7, September 2011 27 The important phase in defining the network behavior is the IDS engine capability to DESIGN AND IMPLEMENTATION OF LIBRARY MANAGEMENT SYSTEM International Journal of Computer Applications (0975 – 8887) Volume 182 – No. 13, September 2018 18 Design and Implementation of LibraryManagement System
A REVIEW ON FACE RECOGNITION ATTENDANCE SYSTEM International Journal of Computer Applications (0975 – 8887) Volume 143 – No.8, June 2016 19 A Review on Face Recognition Attendance System Shubhi Shriwastav M. Tech Scholar, AZ MODEL FOR SOFTWARE DEVELOPMENT International Journal of Computer Applications (0975 – 8887) Volume 151 – No.6, October 2016 33 AZ Model for Software Development Ahmed Mateen Department of Computer Science, DESIGN AND ANALYSIS OF CMOS THERMOMETER CURRENT STEERING International Journal of Computer Applications (0975 – 8887) Volume 118 – No.17, May 2015 33 Design and Analysis of CMOS Thermometer Current Steering DAC to Remove Non-Linearity ADOPTION OF MOBILE PAYMENTS IN KENYAN BUSINESSES: A CASE International Journal of Computer Applications (0975 – 8887) Volume 107 – No 7, December 2014 5 Adoption of Mobile Payments in KenyanBusinesses: A Case
A PROPOSED SOLUTION TO TRAVELLING SALESMAN PROBLEM USING International Journal of Computer Applications (0975 – 8887) Volume 65– No.5, March 2013 46 a) After reducing the row: b) After reducing column So the total expected cost at the root node is the sum of all reductions. Total expected cost of expanding root node L A BRIEF STUDY ON MEASURES TO IMPROVE CYBER NETWORK SECURITY International Journal of Computer Applications (0975 – 8887) Applications of Computers and Electronics for the Welfare of Rural Masses (ACEWRM) 2015 21 IJCA - INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS - IJCACALLSMIGRATION OF LEGACY INFORMATION SYSTEM BASED ON BUSINESS PROCESS THEORYCROSSREF IJCA is a computer science and electronics journal related with Theoretical Informatics, Quantum Computing, Software Testing, ComputerVision, Digital
A COMPARATIVE STUDY OF OPERATING SYSTEMS: CASE OF WINDOWS International Journal of Computer Applications (0975 – 8887) Volume 176 – No. 39, July 2020 17 A Comparative Study of Operating Systems: Case of Windows, UNIX, Linux, Mac, Android and iOS SOFTWARE TESTING GOALS, PRINCIPLES, AND LIMITATIONS International Journal of Computer Applications (0975 – 8887) Volume 6– No.9, September 2010 7 Software Testing – Goals, Principles, and Limitations S.M.K Quadri Head of Department Department of ComputerSciences
A REVIEW OF ANOMALY BASED INTRUSIONDETECTION SYSTEMS International Journal of Computer Applications (0975 – 8887) Volume 28– No.7, September 2011 27 The important phase in defining the network behavior is the IDS engine capability to SURVEY ON SECURE ONLINE VOTING SYSTEM International Journal of Computer Applications (0975 – 8887) Volume 134 – No.13, January 2016 19 Survey on Secure Online Voting System Smita Khairnar Department of Computer Engineering DESIGN AND ANALYSIS OF CMOS THERMOMETER CURRENT STEERING International Journal of Computer Applications (0975 – 8887) Volume 118 – No.17, May 2015 33 Design and Analysis of CMOS Thermometer Current Steering DAC to Remove Non-Linearity FAST AND ACCURATE METHOD FOR LEAF AREA MEASUREMENT International Journal of Computer Applications (0975 – 8887) Volume 49– No.9, July 2012 22 Fast and Accurate Method for Leaf Area Measurement Piyush Chaudhary#1, Sharda Godara*2, A. N. Cheeran#3, Anand K. Chaudhari#4 #Electrical Department, Veermata Jijabai Technological Institute, Mumbai, India *Accenture Services Pvt. Ltd., Pune, Maharastra, India COMPARISON OF VARIOUS ELECTION ALGORITHMS IN DISTRIBUTED International Journal of Computer Applications (0975 – 8887) Volume 53– No.12, September 2012 1 Comparison of Various Election Algorithms in Distributed System Priyanka Gupta ADOPTION OF MOBILE PAYMENTS IN KENYAN BUSINESSES: A CASE International Journal of Computer Applications (0975 – 8887) Volume 107 – No 7, December 2014 5 Adoption of Mobile Payments in KenyanBusinesses: A Case
A BRIEF STUDY ON MEASURES TO IMPROVE CYBER NETWORK SECURITY International Journal of Computer Applications (0975 – 8887) Applications of Computers and Electronics for the Welfare of Rural Masses (ACEWRM) 2015 21 IJCA - INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS - IJCA IJCA is a computer science and electronics journal related with Theoretical Informatics, Quantum Computing, Software Testing, ComputerVision, Digital
A REVIEW OF ANOMALY BASED INTRUSIONDETECTION SYSTEMS International Journal of Computer Applications (0975 – 8887) Volume 28– No.7, September 2011 27 The important phase in defining the network behavior is the IDS engine capability to IMPROVING SOFTWARE RELIABILITY USING SOFTWARE ENGINEERING International Journal of Computer Applications (0975 – 8887) Volume 10– No.5, November 2010 41 Improving Software Reliability using Software Engineering Approach- A Review K-MODES CLUSTERING ALGORITHM FOR CATEGORICAL DATA International Journal of Computer Applications (0975 – 8887) Volume 127 – No.17, October 2015 4 Table2: Lung Cancer TPR TNR FPR FNR Accuracy Precision Recall F-measure Vanilla 0.0185 0.012 0.9353 0.0159 0.0159 0.0283 0.0189 0.0227 LITERATURE SURVEY ON DOOR LOCK SECURITY SYSTEMS International Journal of Computer Applications (0975 – 8887) Volume 153 – No2, November 2016 13 Literature Survey on Door Lock Security Systems Pradnya R. Nehete Dept. of ETC, SURVEY ON SECURE ONLINE VOTING SYSTEM International Journal of Computer Applications (0975 – 8887) Volume 134 – No.13, January 2016 19 Survey on Secure Online Voting System Smita Khairnar Department of Computer Engineering COMPARISON OF EFFECTS OF CRYOGENIC TREATMENT ON DIFFERENT International Conference in Computational Intelligence (ICCIA) 2012 Proceedings published in International Journal of Computer Applications® (IJCA) A REVIEW OF REQUIREMENT ENGINEERING ISSUES AND CHALLENGES International Journal of Computer Applications (0975 – 8887) Volume 99 – No.15, August 2014 36 A Review of Requirement Engineering Issues and Challenges in Various Software Development Methods FAST AND ACCURATE METHOD FOR LEAF AREA MEASUREMENT International Journal of Computer Applications (0975 – 8887) Volume 49– No.9, July 2012 22 Fast and Accurate Method for Leaf Area Measurement Piyush Chaudhary#1, Sharda Godara*2, A. N. Cheeran#3, Anand K. Chaudhari#4 #Electrical Department, Veermata Jijabai Technological Institute, Mumbai, India *Accenture Services Pvt. Ltd., Pune, Maharastra, India DESIGN AND POWER ANALYSIS OF MEMORY SYSTEM USING International Journal of Computer Applications (0975 – 8887) National Conference on Power Systems & Industrial Automation (NCPSIA 2015) 10 Design and Power Analysis of Memory System usingEmail:
IJCA is now being indexed with EBSCO,
Google Scholar
,
Informatics, ProQuest CSA Technology Research Database, NASA ADS
, CiteSeer
,
UlrichWeb
,
ScientificCommons (Univ. of St Gallens), University of Karlsruhe,Germany
,
PennState University MOST READ RESEARCH ARTICLES * Novel Application of Multi-Layer Perceptrons (MLP) Neural Networks to Model HIV in South Africa using Seroprevalence Data from AntenatalClinics
* An Effective Evolutionary Clustering Algorithm: Hepatitis C CaseStudy
* Adaptivity and Adaptability of Learning Object’s Interface * Migration of Legacy Information System based on Business ProcessTheory
* Enhanced TCP Westwood Congestion Avoidance Mechanism (TCPWestwoodNew)
Call for Paper - July 2021 Edition IJCA solicits original research papers for the July 2021 Edition. Last date of manuscript submission is JUNE 22, 2021. Read More IJCA archives with University Affiliates IJCA regularly releases the article bibliographies to university library databases from 2010. A complete list of such affiliations is maintained. The PennState University Libraries comprise 36 libraries at 24 locations throughout the Commonwealth of Pennsylvania. IJCA releases the articles to PennState University via CSA enterprises. The University of Washington host the complete bibliography including the abstracts of the IJCA published articles via OAIster database. The hosting rights are also available with Worldcat.org via OAIster. The IJCA article abstracts are citable from the Library Catalog of Georgetown University. The university affiliates can subscribe directly from the library repository. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS - IJCA About IJCA & Disclaimer International Journal of Computer Applications (IJCA) is a peer reviewed journal published by Foundation of Computer Science (FCS). The journal publishes papers related with topics including but not limited to Information Systems, Distributed Systems, Graphics and Imaging, Bio-informatics, Natural Language Processing, Software Testing, Human-Computer Interaction, Embedded Systems, Pattern Recognition, Signal Processing Prospective authors should note that only original and previously unpublished manuscripts will be considered. Furthermore, simultaneous submissions (including Information systems journal and electronics journal ) are not acceptable. Authors are advised to read Publication Ethics and Malpractice Statement to learn about compliances. Information regarding paper submission to the computer journal can be found at call for papers page.* Home
* Archives
* Special Issues
* Proceedings
* The Model
* Topics
* Editorial Board
* Review Board
* Journal Hardcopy
* Peer Review
* What is peer-review?* Join as Reviewer
* Indexing
* CrossRef
* ISSN
* Calls
* Special Issue Proposals * Conference Proceedings* RDPD Program
* Register as Volunteer* Webmaster Central
* IJCA Statistical Data * Associate Editorial Board * Special Issue - nsc* FAQ
* Contact Us
Article Correction Policy Learn about the IJCA article correction policy and process Copyright Infringement Dealing with any form of infringement.Peer Review Quote
‘Peer Review – A Critical Inquiry’ by David Shatz Print/ hard copy request Directly place requests for print/ hard copies of IJCA via Google Docs IJCA is a member of the prestigious CrossRef. Each of the IJCA articles has its unique DOI reference. Learn more ISSN for IJCA Digital Library is 0975 - 8887. Learn more BE A RESEARCH VOLUNTEER IJCA is fuelled by a highly dispersed and geopraphically separated team of dynamic volunteers. IJCA calls volunteers interested to contribute towards the scientific development in the field of computerscience. More
POINT-OF-VIEW
Does US Copyright Act protects against plagiarism?Yes
No
Don't Know
Publication Ethics
Policy on Publication Ethics - Ensuring genuine authorship © 2009-2021 International Journal of Computer Applications FCS® (Foundation of Computer Science)Vision & Mission
| Privacy Policy |
Terms of Service
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0