Mafteiu-Scai, Improved the convergence of iterative methods for solving systems of equations by memetics techniques, IJCA
(0975 - 8887), 64/17, ISBN: 973-93-80873-17-5 FCS New-York, February 2013  L.O.
Salama, Mohamed Abdelfattah, Mohamed Eisa, Distances, Hesitancy Degree and Flexible Querying via Neutrosophic Sets, International Journal of Computer Application (IJCA
) , Issue4, Vol.(3): May 2014.
A decision support system for performance evaluation, IJCA
Special Issue on Computational Intelligence & Information Security CIIS 2012: 1-8.
Sarma Dhulipala, "Energy-efficient target tracking algorithms in wireless sensor networks: an overview," in Proceedings of the IJCA
on National Conference on Advances in Computer Science and Applications (NCACSA '12), vol.
Kaushal, "Deadline and budget distribution based cost-time optimization workflow scheduling algorithm for cloud," in Proceedings of the IJCA
on International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT '12), pp.
[7.] Besavaraju, M., Prabhakar, R., "A Novel Method of Spam Mail Detection Using Text Based Clustering Approach", Published in International Journal of Computer Applications (IJCA
), 2010; 5: 15-25.
and Parashuram Bannigidad (2010) Automatic Identification and Classification of Bacilli Bacterial Cell Growth Phases, IJCA
Special Issue on Recent Trends in Image Processing and Pattern Recognition (RTIPPR-2010), Vol.1 (2), pp.48-52.
The session is part of a three-cornered co-operation programme between Tunisia, represented by the PIT and Tunisian Technical Co-operation Agency of (TTCA), Japan, represented by the International Japanese Co-operation Agency (IJCA
) and several African countries.
Shanthi Bala, "A Cluster-based Routing Algorithm for WSN based on Residual Energy of the Nodes," IJCA
'Ultra Low Power 1-Bit Full Adder', International Symposium on Devices MEMS, Intelligent Systems & Communication (ISDMISC), Proceedings published by International Journal of Computer Applications (IJCA
"Multipath based Energy Efficient (MEE) Routing Protocol for WMSNs", IJCA
Proceedings on International Conference on Communication Technology, pp.
El-rabaie and E M Nigm "Security Analysis of Reverse Encryption Algorithm for Databases", IJCA
Journal, 66(14):19-27, March 2013.