Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Number 2 (ISBN: 973-93-80881-19-1)

# Article Title
1 Throughput and Delay Analysis of Access Point in IEEE 802. 11B Wireless LAN using Opnet Simulator
Authors : H. S. Mewara, Mukesh Kumar Saini, Rakesh Kumar
2 E-Shaped Multilayer Aperture Coupled Patch Antenna with Notching Characteristics for UWB Applications
Authors : Uma Shankar Modani, Gajanand Jagrawal, Anubhav Kanwaria
3 A Comparative Study Between Naive Bayes and Neural Network (MLP) Classifier for Spam Email Detection
Authors : Amit Kumar Sharma, Sudesh Kumar Prajapat, Mohammed Aslam
4 Notched Triangular Patch Antenna for Polarization Reconfigurability
Authors : Uma Shankar Modani, Anubhav Kanwaria, Gajanand Jagrawal
5 A Review on Handoff latency Reducing Techniques in IEEE 802. 11 WLAN
Authors : Madan Lal Tetarwal, Ashutosh Kuntal, Purnendu Karmakar
6 A Review of Location Detection Techniques in Wi-Fi
Authors : Ashutosh Kuntal, Madan Lal Tetarwal, Purnendu Karmakar
7 Identifying Collusion Attacks in P2P Trust and Reputation systems
Authors : Nitin Kumar Saini, Amit Chaturvedi, Ramesh Chand Yadav
8 Analysis of Sensitive Data Security on Trusted Third Party in Cloud Computing
Authors : Sophiya Sheikh, Amit Kumar Chaturvedi