Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Number 8 (ISBN: 978-93-80865-79-7)

# Article Title
1 Software Architecture Evaluation using Multivariate Statistical Analysis
Authors : Dr. G. Zayaraz, J. Syed Ibrahim Shah, C. Dhaya, Dr. V. Vijayalakshmi
2 High Throughput Iterative VLSI Architecture for Cholesky Factorization Based Matrix Inversion
Authors : D. N. Sonawane, M. S. Sutaone
3 Simulation and Performance Analysis of SMF and MMF with Varying Lengths and Different Modulation Patterns using dispersion Compensation
Authors : Monica Bhutani
4 Precision in Rapid Application Development and Reusability of Software Components for Greater Performance using Ranking Mechanism
Authors : P.K. Suri, Sandeep Kumar, Gurdev Singh
5 Change Detection by Fusion/Contextual Classification based on a Hybrid DSmT Model and ICM with Constraints
Authors : Azeddine Elhassouny, Soufiane Idbraim, Aissam Bekkari, Driss Mammass, Danielle Ducrot
6 Perimeter Clustering Algorithm to Reduce the Number of Iterations
Authors : G. V. S. N. R. V. Prasad, Dr. Ch. Satyanarayana, Dr. V. Vijaya Kumar
7 Laser Triangulation for 3D Profiling of Target
Authors : Akash Malhotra, Kunal Gupta, Kamal Kant
8 A Comprehensive Analysis and study in Intrusion Detection System using Data Mining Techniques
Authors : G.V. Nadiammai, S. Krishnaveni, M. Hemalatha