Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Number 10 (ISBN: 973-93-80883-17-6)

# Article Title
1 Techniques of Binarization, Thinning and Feature Extraction Applied to a Fingerprint System
Authors : Romulo Ferrer L. Carneiro, Jessyca Almeida Bessa, Jermana Lopes De Moraes, Edson Cavalcanti Neto, Auzuir Ripardo De Alexandria
2 Message Privacy with Load Balancing using Attribute based Encryption
Authors : Jyoti Yogesh Deshmukh, Arati M. Dixit
3 Accident Analysis System by Integration of Spatial Data Mining with GIS Web Services
Authors : Dipali B. Gaikwad, Yogesh W. Wanjari, Karbhari. V. Kale
4 Situational Analysis of Distributed System and its Effectiveness in Area of Power System
Authors : G. Raghavendra, Manjunath Ramachandra
5 Presenting a Hiding Algorithm for Improving Privacy Preserving in Association Rule Mining
Authors : Somayeh Ghiasi, Mahdi Bateni
6 Capacity Management for Virtualized Data Centers using ECIES and Scheduling
Authors : Anil Kumar Raghuwanshi, Kavita Burse
7 Reviewing Contribution for Mitigating Routing Overhead and Adopting Signal Strength in MANET
Authors : Sachidananda S Joshi, Sangappa Ramachandra Biradar
8 Survey on Data Security for Mobile Devices
Authors : Nisha P Gholap, Mandar Mokashi, Soumitra S Das