Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More
Number 16 (ISBN: 973-93-80884-29-9)
# | Article Title |
---|---|
1 | Secure Profile Matching for Portable Public Networks Authors : M. Ramanjulu, M. Veeresh Babu |
2 | A Comparative Study of Call Admission Control in Mobile Multimedia Networks using Soft Computing Authors : Sanjeev Kumar, Krishan Kumar, Anand Kumar Pandey |
3 | Survey on Constrained based Data Stream Mining Authors : Lini Susan Kurien, Sreekumar K, Minu Kk |
4 | Strong (Weak) Domination Intuitionistic Fuzzy Graphs Authors : J. John Stephan, A. Muthaiyan, N. Vinoth Kumar |
5 | Functional Encryption for Secured Big Data Analytics Authors : Nilotpal Chakraborty, G K Patra |
6 | Performance Analysis of Floyd Warshall Algorithm vs Rectangular Algorithm Authors : Akanksha Singh, Pramod Kumar Mishra |
7 | An Efficient Algorithm for Mining Maximal Sparse Interval from Interval Dataset Authors : Naba Jyoti Sarmah, Anjana Kakoti Mahanta |
8 | A Review: Study of Test Case Generation Techniques Authors : Itti Hooda, Rajender Chhillar |