International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
IRAJ Home
IJACEN Home
About IJACEN
Call For Paper
Guidelines
Author's Guidelines
Reviewer Guidelines
Special Issues
Special Issues
Special Issue-1 June 2015 ( Jun, 2015 )
Indexing
Editiorial Borad
Join Us
Join Editiorial Borad
Resources
Publisher
Review Process
Contact
current issues
Volume-13,Issue-2 ( Feb, 2025 )
View More
Past issues
Volume-13,Issue-1 ( Jan, 2025 )
Volume-12,Issue-12 ( Dec, 2024 )
Volume-12,Issue-11 ( Nov, 2024 )
Volume-12,Issue-10 ( Oct, 2024 )
Volume-12,Issue-9 ( Sep, 2024 )
Volume-12,Issue-8 ( Aug, 2024 )
Volume-12,Issue-7 ( Jul, 2024 )
Volume-12,Issue-6 ( Jun, 2024 )
Volume-12,Issue-5 ( May, 2024 )
Volume-12,Issue-4 ( Apr, 2024 )
Volume-12,Issue-3 ( Mar, 2024 )
Volume-12,Issue-2 ( Feb, 2024 )
Volume-12,Issue-1 ( Jan, 2024 )
Volume-11,Issue-12 ( Dec, 2023 )
Volume-11,Issue-11 ( Nov, 2023 )
Volume-11,Issue-10 ( Oct, 2023 )
Volume-11,Issue-9 ( Sep, 2023 )
Volume-11,Issue-8 ( Aug, 2023 )
Volume-11,Issue-7 ( Jul, 2023 )
Volume-11,Issue-6 ( Jun, 2023 )
Volume-11,Issue-5 ( May, 2023 )
Volume-11,Issue-4 ( Apr, 2023 )
Volume-11,Issue-3 ( Mar, 2023 )
Volume-11,Issue-2 ( Feb, 2023 )
Volume-11,Issue-1 ( Jan, 2023 )
Volume-10,Issue-12 ( Dec, 2022 )
Volume-10,Issue-11 ( Nov, 2022 )
Volume-10,Issue-10 ( Oct, 2022 )
Volume-10,Issue-9 ( Sep, 2022 )
Volume-10,Issue-8 ( Aug, 2022 )
Volume-10,Issue-7 ( Jul, 2022 )
Volume-10,Issue-6 ( Jun, 2022 )
Volume-10,Issue-5 ( May, 2022 )
Volume-10,Issue-4 ( Apr, 2022 )
Volume-10,Issue-3 ( Mar, 2022 )
Volume-10,Issue-2 ( Feb, 2022 )
Volume-10,Issue-1 ( Jan, 2022 )
Volume-9,Issue-12 ( Dec, 2021 )
Volume-9,Issue-11 ( Nov, 2021 )
Volume-9,Issue-10 ( Oct, 2021 )
Volume-9,Issue-9 ( Sep, 2021 )
Volume-9,Issue-8 ( Aug, 2021 )
Volume-9,Issue-7 ( Jul, 2021 )
Volume-9,Issue-6 ( Jun, 2021 )
Volume-9,Issue-5 ( May, 2021 )
Volume-9,Issue-4 ( Apr, 2021 )
Volume-9,Issue-3 ( Mar, 2021 )
Volume-9,Issue-2 ( Feb, 2021 )
Volume-9,Issue-1 ( Jan, 2021 )
Volume-8,Issue-12 ( Dec, 2020 )
Volume-8,Issue-11 ( Nov, 2020 )
Volume-8,Issue-10 ( Oct, 2020 )
Volume-8,Issue-9 ( Sep, 2020 )
Volume-8,Issue-8 ( Aug, 2020 )
Volume-8,Issue-7 ( Jul, 2020 )
Volume-8,Issue-6 ( Jun, 2020 )
Volume-8,Issue-5 ( May, 2020 )
Volume-8,Issue-4 ( Apr, 2020 )
Volume-8,Issue-3 ( Mar, 2020 )
Volume-8,Issue-2 ( Feb, 2020 )
Volume-8,Issue-1 ( Jan, 2020 )
Volume-7,Issue-12 ( Dec, 2019 )
Volume-7,Issue-11 ( Nov, 2019 )
Volume-7, Issue-10 ( Oct, 2019 )
Volume-7, Issue-9 ( Sep, 2019 )
Volume-7, Issue-8 ( Aug, 2019 )
Volume-7, Issue-7 ( Jul, 2019 )
Volume-7, Issue-6 ( Jun, 2019 )
Volume-7, Issue-5 ( May, 2019 )
Volume-7, Issue-4 ( Apr, 2019 )
Volume-7, Issue-3 ( Mar, 2019 )
Volume-7, Issue-2 ( Feb, 2019 )
Volume-7, Issue-1 ( Jan, 2019 )
Volume-6, Issue-12 ( Dec, 2018 )
Volume-6, Issue-11 ( Nov, 2018 )
Volume-6, Issue-10 ( Oct, 2018 )
Volume-6, Issue-9 ( Sep, 2018 )
Volume-6, Issue-8 ( Aug, 2018 )
Volume-6, Issue-7 ( Jul, 2018 )
Volume-6, Issue-6 ( Jun, 2018 )
Volume-6, Issue-5 ( May, 2018 )
Volume-6, Issue-4 ( Apr, 2018 )
Volume-6, Issue-3 ( Mar, 2018 )
Volume-6, Issue-2 ( Feb, 2018 )
Volume-6, Issue-1 ( Jan, 2018 )
Volume-5,Issue-12 ( Dec, 2017 )
Volume-5,Issue-11 ( Nov, 2017 )
Volume-5,Issue-10 ( Oct, 2017 )
Volume-5,Issue-9 ( Sep, 2017 )
Volume-5,Issue-8 ( Aug, 2017 )
Volume-5,Issue-7 ( Jul, 2017 )
Volume-5,Issue-6 ( Jun, 2017 )
Volume-5,Issue-5 ( May, 2017 )
Volume-5, Issue-4 ( Apr, 2017 )
Volume-5, Issue-3 ( Mar, 2017 )
Volume-5, Issue-2 ( Feb, 2017 )
Volume-5, Issue-1 ( Jan, 2017 )
Volume-4, Issue-12 ( Dec, 2016 )
Volume-4, Issue-11 ( Nov, 2016 )
Volume-4, Issue-10 ( Oct, 2016 )
Volume-4, Issue-9 ( Sep, 2016 )
Volume-4, Issue-8 ( Aug, 2016 )
Volume-4, Issue-7 ( Jul, 2016 )
Volume-4, Issue-6 ( Jun, 2016 )
Volume-4,Issue-5 ( May, 2016 )
Volume-4,Issue-4 ( Apr, 2016 )
Volume-4,Issue-3 ( Mar, 2016 )
Volume-4,Issue-2 ( Feb, 2016 )
Volume-4,Issue-1 ( Jan, 2016 )
Volume-3,Issue-12 ( Dec, 2015 )
Volume-3,Issue-11 ( Nov, 2015 )
Volume-3, Issue-10 ( Oct, 2015 )
Volume-3, Issue-9 ( Sep, 2015 )
Volume-3, Issue-8 ( Aug, 2015 )
Volume-3, Issue-7 ( Jul, 2015 )
Volume-3, Issue-6 ( Jun, 2015 )
Volume-3, Issue-5 ( May, 2015 )
Volume-3, Issue-4 ( Apr, 2015 )
Volume-3, Issue-3 ( Mar, 2015 )
Volume-3, Issue-2 ( Feb, 2015 )
Volume-3, Issue-1 ( Jan, 2015 )
Volume-2, Issue-12 ( Dec, 2014 )
Volume-2,Issue-11 ( Nov, 2014 )
Volume-2,Issue-10 ( Oct, 2014 )
Volume-2,Issue-9 ( Sep, 2014 )
Volume-2,Issue-8 ( Aug, 2014 )
Volume-2,Issue-7 ( Jul, 2014 )
Volume-2,Issue-6 ( Jun, 2014 )
Volume-5, Issue-5 ( May, 2014 )
Volume-2,Issue-5 ( May, 2014 )
Volume-2,Issue-4 ( Apr, 2014 )
Volume-2,Issue-3 ( Mar, 2014 )
Volume-2,Issue-2 ( Feb, 2014 )
Volume-2,Issue-1 ( Jan, 2014 )
Volume-1,Issue-10 ( Dec, 2013 )
Volume-1,Issue-9 ( Nov, 2013 )
Volume-1,Issue-8 ( Oct, 2013 )
Volume-1,Issue-7 ( Sep, 2013 )
Volume-1,Issue-6 ( Aug, 2013 )
Volume-1,Issue-5 ( Jul, 2013 )
Volume-1,Issue-4 ( Jun, 2013 )
Volume-1,Issue-3 ( May, 2013 )
Volume-1,Issue-2 ( Apr, 2013 )
Volume-1,Issue-1 ( Mar, 2013 )
View More
Statistics report
Jun. 2025
Submitted Papers
:
80
Accepted Papers
:
10
Rejected Papers
:
70
Acc. Perc
:
12%
Issue Published
:
146
Paper Published
:
1720
No. of Authors
:
4595
About DOIONLINE
Contact
Download Product Flyer
Copyright Form
Publication Charges
Download Sample Paper
Publication Ethics and Publication Malpractice Statement
Join Us
Join Editorial Board
Become a Reviewer
Recommend to Library
Volume-13,Issue-1 ( Jan, 2025 )
Total Viewed 313
Download Citation
Download Citation
Part 1
1
Implementation of Lightweight Shufflenet Based CNN for Classification of Arrhythmia for Wearables
Puppalaveera Swamy, Leela Kumari.B, T.V. Ramani
Page 1-8
|
Quick Abstract
|
PDF
|
Viewed - 25
2
Applications of Artificial Intelligence in Predictive Healthcare System
A.Kalyanisugarwar, Santanu Sikdar
Page 9-14
|
Quick Abstract
|
PDF
|
Viewed - 15
3
Online Payment Fraud Detection
Akhil Kumar, Renu Yadav, Siddharth, Krishan Veer Singh
Page 15-20
|
Quick Abstract
|
PDF
|
Viewed - 19
4
Heart Stroke Prediction Using Neural Networks: A Comprehensive Approach
Berin Shalu S, Jayampu Akash Siva Teja, Mahadevuni Manith Rudhra, Sure Gowtham
Page 21-24
|
Quick Abstract
|
PDF
|
Viewed - 10
5
Harnessing Real-World Bug Hunting Techniques for Advanced Real-Time Threat Detection and Prevention
R. Umesh, Akchara Td, G.Naglakshmi
Page 25-31
|
Quick Abstract
|
PDF
|
Viewed - 11
6
Gesture Controlled Missile Launch Using Arduino and ZigBee
Udhyami M. B., Kiruthika K., Prutha G
Page 32-35
|
Quick Abstract
|
PDF
|
Viewed - 12
7
Optimized Graphene and Copper-Based THz Antennas for Explosive Detection Using Genetic Algorithms
Gurjeevan Singh, Karmjit Singh Sandha, Ankush Kansal
Page 36-41
|
Quick Abstract
|
PDF
|
Viewed - 10
8
Advancements in Deep Learning Architectures for Real-Time Big Data Processing and Analytics
Priyam Vaghasia, Dhruvitkumar Patel
Page 42-48
|
Quick Abstract
|
PDF
|
Viewed - 9
9
Scalable Algorithms for Machine Learning In Big Data Environments: Challenges and Innovations
Priyam Vaghasia, Dhruvitkumar Patel
Page 49-55
|
Quick Abstract
|
PDF
|
Viewed - 9
10
Adaptive AI Systems in Education: Real Time Personalised Learning Pathways for Skill Development
Akinyemi Sadeeq Akintola, Michael Akintayo, Temitope Kadri, Chukwuka Michael Oforgu, Mgbame Michael, Maxwell Nwanna
Page 56-62
|
Quick Abstract
|
PDF
|
Viewed - 9
11
Machine Learning in Cybersecurity: A Multi-Industry Case Study Analysis for Enhanced Threat Detection and Response
Victor Oriakhinosakhare, Bisola Kayode, Samuel Akerele, Ibrahim Yakub, Fatai Ayobami Popoola
Page 63-70
|
Quick Abstract
|
PDF
|
Viewed - 9
12
Fraud Detection in E-Commerce using Machine Learning
D.Mangaiyarkarasi, V.V.S.Lakshmi Mokshitha, M.Vijay Kumar, G.N.Sai Vardhan Reddy
Page 71-76
|
Quick Abstract
|
PDF
|
Viewed - 9
13
Federated Learning With Blockchain for Quantum Iot Devices: Privacy and Trust In Post – Quantum Networks
Sajina Sajeev Philomina
Page 77-80
|
Quick Abstract
|
PDF
|
Viewed - 9
14
GNU Radio and Software Defined Radio Enhances Self-Learning and Bridges The Gaps in Telemetry and Communication Course
Madhuri Gummineni, Papani Srinivas, Bhukya Vijay Kumar
Page 81-85
|
Quick Abstract
|
PDF
|
Viewed - 9
15
A Review of Phishing Website Detection Techniques
D.S.Adane, Aditya Deshmukh, Akash Yadav, Pratham Maske, Shreyash Kathane
Page 86-94
|
Quick Abstract
|
PDF
|
Viewed - 9
16
AI Voice Assistant for Carbon Emission
Srinivasan N, Mathavan S, Madesh A
Page 95-101
|
Quick Abstract
|
PDF
|
Viewed - 9
17
LoRaWAN based IoT Deployment for a Sustainable Urban Drainage System (SUDS)
Alberto Alvarellos, Juan Rabunal, Alejandro Pazos, Santiago Rodriguez-Yanez, Joaquin Suarez, Jeronimo Puertas, Jose Anta
Page 102-107
|
Quick Abstract
|
PDF
|
Viewed - 9
18
“Lung cancer Detection Using Deep Learning”
Jagruti Patel, Khooshi Thole, Saurabh Patra, Gunjan Agrawal
Page 108-113
|
Quick Abstract
|
PDF
|
Viewed - 10
19
Diagnosis and Treatment Suggestion for Parkinson Diseases Using ML Model
Ramya R, Yogesh S, Vithyashri V R, Sabari Ganesh E, Ajay Krishna R, B.Rajesh Kumar
Page 114-119
|
Quick Abstract
|
PDF
|
Viewed - 10
20
Research on Automatic Detection of Network Security Threats Using Deep Learning Technology
Tolegen Aidynov, Mamyr Altaibek, Dina Satybaldina, Gulsipat Abisheva, Aliyaissainova, Axaule Juasbayeva
Page 120-130
|
Quick Abstract
|
PDF
|
Viewed - 13
21
Exploring The Efficiency and Accuracy of Feature Extraction Techniques: A Comparative Study
Sanjivani B. Adsul, Ashish Fargade, Pradyun Gayakwad, Mayuresh Chavan, Chirag Deshpande, Prathmesh Haridas
Page 131-138
|
Quick Abstract
|
PDF
|
Viewed - 13
22
Disease Diagnosis by Pattern Matching with DNA Sequences Using Parallel Approach
Raju Bhukya
Page 139-145
|
Quick Abstract
|
PDF
|
Viewed - 11
23
Mutual Device Positioning System in the Industrial A IoT Platform
Anastasiia Radchenko, Ekaterina Moseiko
Page 146-154
|
Quick Abstract
|
PDF
|
Viewed - 9
24
Personalized Task Assignment in Multi-Agent Systems Based on a Deadline Model
Elizaveta Tarasova, Andrei Radchenko
Page 155-160
|
Quick Abstract
|
PDF
|
Viewed - 9
25
Cyber Security Threat Detection for Image Object Detection with Artificial Intelligence and Machine Learning Classification Process Using Cryptography Techniques
Mohammed Javed Hussain
Page 161-167
|
Quick Abstract
|
PDF
|
Viewed - 10
26
Transforming Queries: Developing a BERT-Based Language Model
Akash Sharma, Pintu Kumar Ram, Manish Kumar Ojha
Page 168-172
|
Quick Abstract
|
PDF
|
Viewed - 12
27
Cyber Security in Fintech: Navigating Challenges and Future Prospects
Shajiya Mohammed Abdul, Shiva Vamshi Krishna
Page 173-175
|
Quick Abstract
|
PDF
|
Viewed - 7
28
Unsupervised Machine Learning Insights Into Hereditary Disorders Through Genomic Profiling
Maryam Nageen, Syed Saqib Raza Rizvi, Muhammad Furqan
Page 176-183
|
Quick Abstract
|
PDF
|
Viewed - 7
IRAJ Other Journals
View More
View More
View More
View More
View More
View More
View More
View More
View More
View More
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World
IRAJ Upcoming Conference
This work is licensed under a
Creative Commons Attribution 4.0 International License.
JOURNAL
SUPPORTED BY