International Journal of Advance Computational Engineering and Networking (IJACEN)
current issues
Volume-5,Issue-5  ( May, 2017 )
Past issues
  1. Volume-5, Issue-4  ( Apr, 2017 )
  2. Volume-5, Issue-3  ( Mar, 2017 )
  3. Volume-5, Issue-2  ( Feb, 2017 )
  4. Volume-5, Issue-1  ( Jan, 2017 )
  5. Volume-4, Issue-12  ( Dec, 2016 )
  6. Volume-4, Issue-11  ( Nov, 2016 )
  7. Volume-4, Issue-10  ( Oct, 2016 )
  8. Volume-4, Issue-9  ( Sep, 2016 )
  9. Volume-4, Issue-8  ( Aug, 2016 )
  10. Volume-4, Issue-7  ( Jul, 2016 )

Statistics report
Jul. 2017
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 52
Paper Published : 850
No. of Authors : 2134
    Volume-3, Issue-6  ( Jun, 2015 )
Total Viewed 1866
Download Citation    
Download Citation    

Part 1

1
Improving Safety And Effectiveness Information Sharing For Certified Deduplication
A. B. Manju, S. R. Rajkumar
 
Page 1-9

IRAJ DOI Number - IJACEN-IRAJ-DOI-2187
| Quick Abstract | PDF |
Viewed - 72
2
Protected Admission Control With Secret Verification For Active Groups In The Cloud
R. S. Geethanjali, J. Janet
 
Page 10-16

IRAJ DOI Number - IJACEN-IRAJ-DOI-2188
| Quick Abstract | PDF |
Viewed - 64
3
A Load Controlling Design Model With Heterogeneity For The Public Cloud
Keerthi Kommepalli, B.Ramaganesh
 
Page 17-22

IRAJ DOI Number - IJACEN-IRAJ-DOI-2189
| Quick Abstract | PDF |
Viewed - 77
4
A Multiple Reasoning Strategy For Increasing Conidential And Eficient Inquiry Perturbation
P.Kishore Kumar, B.Ramaganesh
 
Page 23-28

IRAJ DOI Number - IJACEN-IRAJ-DOI-2190
| Quick Abstract | PDF |
Viewed - 60
5
Attribute-Based Safety Reliable Source Allocation Platform For Collaborative Computing
V.Navya, B.Ramaganesh
 
Page 29-35

IRAJ DOI Number - IJACEN-IRAJ-DOI-2191
| Quick Abstract | PDF |
Viewed - 62
6
Kerberos Authentication With Cloud Computing Access Control
Santosh Khamitkar, Yaser Fuad Al-Dubai, Parag Bhalchandra, Pawan Wasnik
 
Page 36-41

IRAJ DOI Number - IJACEN-IRAJ-DOI-2353
| Quick Abstract | PDF |
Viewed - 58
7
Synthesis Of Selected Tree Searching Algorithms
Parag Bhalchandra, Santosh Khamitkar, Pawan Wasnik
 
Page 42-47

IRAJ DOI Number - IJACEN-IRAJ-DOI-2354
| Quick Abstract | PDF |
Viewed - 55
8
A Local Feature-Based Approach For Activity 3-D Skeleton Posture Retrieval
Md. Zia Uddin
 
Page 48-52

IRAJ DOI Number - IJACEN-IRAJ-DOI-2355
| Quick Abstract | PDF |
Viewed - 54
9
An Identification Method Of Normal And Edematous Humeral Head From Pd Weighted Mr Images Based On Glcm Texture Features
Aysun Sezer, Hasan Basri Sezer, Songul Albayrak
 
Page 53-56

IRAJ DOI Number - IJACEN-IRAJ-DOI-2356
| Quick Abstract | PDF |
Viewed - 58
10
Decision Support System For Choosing The Optimal Cad Configuration: Genetic Algorithm Approach
Motasem A. Abu-Dawas
 
Page 57-59

IRAJ DOI Number - IJACEN-IRAJ-DOI-2357
| Quick Abstract | PDF |
Viewed - 56
11
Word Sense Disambiguation Based Myanmar-To-English Machine Translation System
Aye Mya Nyein, May Zin Oo
 
Page 60-64

IRAJ DOI Number - IJACEN-IRAJ-DOI-2358
| Quick Abstract | PDF |
Viewed - 49
12
An Enhancement Of Fuzzy-Based Image Denoising For Gaussian Noise
Yin Mon Swe, Nang Aye Aye Htwe
 
Page 65-69

IRAJ DOI Number - IJACEN-IRAJ-DOI-2359
| Quick Abstract | PDF |
Viewed - 56
13
Image Compression Based On Modified Walsh-Hadamard Transform (MWHT)
Khin Thida Win, Nang Aye Aye Htwe
 
Page 70-74

IRAJ DOI Number - IJACEN-IRAJ-DOI-2360
| Quick Abstract | PDF |
Viewed - 54
14
Securing And Maintaining Privacy Information Brokering In Distributed Data Sharing
Sanket Divate, Pratap Ghayal, Saurabh Mamidwar, Mayur Narawade, Meghna Lokhande
 
Page 75-79

IRAJ DOI Number - IJACEN-IRAJ-DOI-2361
| Quick Abstract | PDF |
Viewed - 52
15
K-Zero Day Security: Network Security Metric For Risk Measurement Of Unknown Vulnerability
Mehul Das, Shubham Tripathi, Vikram Jaygude, Mr. Ramnath Banerjee
 
Page 80-83

IRAJ DOI Number - IJACEN-IRAJ-DOI-2362
| Quick Abstract | PDF |
Viewed - 56
16
Privacy-Preserving And Secured Multi-Keyword Ranked Search Over Encrypted Cloud Data Storage
Kamlesh Pawar, Kunal Ranawade, Vijay Berry
 
Page 84-86

IRAJ DOI Number - IJACEN-IRAJ-DOI-2363
| Quick Abstract | PDF |
Viewed - 50
17
Dynamic Secret Based Wireless Smart Grid Encryption And Authentication Technique
Shraddha Bagwe, J.W.Bakal
 
Page 87-90

IRAJ DOI Number - IJACEN-IRAJ-DOI-2364
| Quick Abstract | PDF |
Viewed - 54
18
Dual Mining Approach For Knowledge Discovery In Complex Data
Ashwini Borle, L.K.Vishwamitra
 
Page 91-102

IRAJ DOI Number - IJACEN-IRAJ-DOI-2365
| Quick Abstract | PDF |
Viewed - 55
19
An Additive Method For Medical Image Fusion Using Ripplet Transform
Rajeshwari S.Goswami, Seema R.Baji
 
Page 103-105

IRAJ DOI Number - IJACEN-IRAJ-DOI-2366
| Quick Abstract | PDF |
Viewed - 54
20
Cryptographic Techniques For Wireless Sensor Network Security - A Survey
Aiman Faquih, Priyanka Kadam
 
Page 106-110

IRAJ DOI Number - IJACEN-IRAJ-DOI-2367
| Quick Abstract | PDF |
Viewed - 56
21
A Novel Approach Based Hidden Biometrics: Medical Biometrics As An Aid To Security Biometrics
Apurva Khemani, Harish Chandra Maurya
 
Page 111-115

IRAJ DOI Number - IJACEN-IRAJ-DOI-2368
| Quick Abstract | PDF |
Viewed - 52
22
Standard Time Calculation (STC) For E-Learning
Manish Kumar Majumdar, Srinivas Choudhury, Roshan Kumar, Anjana Sen
 
Page 116-118

IRAJ DOI Number - IJACEN-IRAJ-DOI-2369
| Quick Abstract | PDF |
Viewed - 56
23
Forge Detection In Credit Application
P.Charanya, T.Dhivyabharathi, B.Kothai, J.Nivetha
 
Page 119-125

IRAJ DOI Number - IJACEN-IRAJ-DOI-2370
| Quick Abstract | PDF |
Viewed - 56
24
Speech Emotion Recognition Using Iterative Clustering Technique
R.anila, Dr. A. Revathy
 
Page 126-129

IRAJ DOI Number - IJACEN-IRAJ-DOI-2371
| Quick Abstract | PDF |
Viewed - 56
25
Context Based Document Retrieval Using Taxonomic Tree Structure
Veena Talikoti, M.Velammal
 
Page 130-132

IRAJ DOI Number - IJACEN-IRAJ-DOI-2372
| Quick Abstract | PDF |
Viewed - 59
26
Make Web Content Work In Responsive Design
Indu Joseph, V.S. Felix Enigo
 
Page 133-137

IRAJ DOI Number - IJACEN-IRAJ-DOI-2373
| Quick Abstract | PDF |
Viewed - 53
27
Requirement Analysis Using Requirement Analysis Engine
Ashvini p. Shende, Sarita Byagar, Manisha Patil, Shivaji Gawade
 
Page 138-140

IRAJ DOI Number - IJACEN-IRAJ-DOI-2374
| Quick Abstract | PDF |
Viewed - 51
28
Detection Of Dos Attacks Through Evidence Collection Using Dempster-Shafer Theory
Shradha S. Ippakayal, Geetanjali S. Dhaygude, Vinaya P. Kalyanshetty, M.N.Ingole
 
Page 141-143

IRAJ DOI Number - IJACEN-IRAJ-DOI-2375
| Quick Abstract | PDF |
Viewed - 56
29
Formation Of Information Security System Using Artificial Neural Networks And Genetic Algorithms Applying Elgamal Public Key Encryption Algorithm
Harshada Sawant, Revati Salvekar, Dipti Patil, Aishwarya Pandey
 
Page 144-147

IRAJ DOI Number - IJACEN-IRAJ-DOI-2376
| Quick Abstract | PDF |
Viewed - 54
30
Cloud Based Admission Process System
Mrinalkhadse, Ayushi Aggarwal
 
Page 148-152

IRAJ DOI Number - IJACEN-IRAJ-DOI-2377
| Quick Abstract | PDF |
Viewed - 57
31
Improving Performance Of System Using Genetic Algorithm With An Optimized Path
Shraddha S.Chaudhari, Pranay Saraf
 
Page 153-156

IRAJ DOI Number - IJACEN-IRAJ-DOI-2378
| Quick Abstract | PDF |
Viewed - 53
32
Survey On Content Based Retrieval
Milan R. Shetake, Sanjay. B. Waikar
 
Page 157-161

IRAJ DOI Number - IJACEN-IRAJ-DOI-2379
| Quick Abstract | PDF |
Viewed - 55
33
Design And Implementation Of Node To Node Message Authentication Scheme For Wireless Sensor Network
A. W. Motikar, S. R. Pawde
 
Page 162-168

IRAJ DOI Number - IJACEN-IRAJ-DOI-2445
| Quick Abstract | PDF |
Viewed - 56

   
   
IRAJ Other Journals
IJACEN updates
IJACEN Volume-5,Issue-4 (April, 2017 )
iraj eXPLORE

JOURNAL SUPPORTED BY