International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
IRAJ Home
IJACEN Home
About IJACEN
Call For Paper
Guidelines
Author's Guidelines
Reviewer Guidelines
Special Issues
Special Issues
Special Issue-1 June 2015 ( Jun, 2015 )
Indexing
Editiorial Borad
Join Us
Join Editiorial Borad
Resources
Publisher
Review Process
Contact
current issues
Volume-12,Issue-6 ( Jun, 2024 )
View More
Past issues
Volume-12,Issue-5 ( May, 2024 )
Volume-12,Issue-4 ( Apr, 2024 )
Volume-12,Issue-3 ( Mar, 2024 )
Volume-12,Issue-2 ( Feb, 2024 )
Volume-12,Issue-1 ( Jan, 2024 )
Volume-11,Issue-12 ( Dec, 2023 )
Volume-11,Issue-11 ( Nov, 2023 )
Volume-11,Issue-10 ( Oct, 2023 )
Volume-11,Issue-9 ( Sep, 2023 )
Volume-11,Issue-8 ( Aug, 2023 )
Volume-11,Issue-7 ( Jul, 2023 )
Volume-11,Issue-6 ( Jun, 2023 )
Volume-11,Issue-5 ( May, 2023 )
Volume-11,Issue-4 ( Apr, 2023 )
Volume-11,Issue-3 ( Mar, 2023 )
Volume-11,Issue-2 ( Feb, 2023 )
Volume-11,Issue-1 ( Jan, 2023 )
Volume-10,Issue-12 ( Dec, 2022 )
Volume-10,Issue-11 ( Nov, 2022 )
Volume-10,Issue-10 ( Oct, 2022 )
Volume-10,Issue-9 ( Sep, 2022 )
Volume-10,Issue-8 ( Aug, 2022 )
Volume-10,Issue-7 ( Jul, 2022 )
Volume-10,Issue-6 ( Jun, 2022 )
Volume-10,Issue-5 ( May, 2022 )
Volume-10,Issue-4 ( Apr, 2022 )
Volume-10,Issue-3 ( Mar, 2022 )
Volume-10,Issue-2 ( Feb, 2022 )
Volume-10,Issue-1 ( Jan, 2022 )
Volume-9,Issue-12 ( Dec, 2021 )
Volume-9,Issue-11 ( Nov, 2021 )
Volume-9,Issue-10 ( Oct, 2021 )
Volume-9,Issue-9 ( Sep, 2021 )
Volume-9,Issue-8 ( Aug, 2021 )
Volume-9,Issue-7 ( Jul, 2021 )
Volume-9,Issue-6 ( Jun, 2021 )
Volume-9,Issue-5 ( May, 2021 )
Volume-9,Issue-4 ( Apr, 2021 )
Volume-9,Issue-3 ( Mar, 2021 )
Volume-9,Issue-2 ( Feb, 2021 )
Volume-9,Issue-1 ( Jan, 2021 )
Volume-8,Issue-12 ( Dec, 2020 )
Volume-8,Issue-11 ( Nov, 2020 )
Volume-8,Issue-10 ( Oct, 2020 )
Volume-8,Issue-9 ( Sep, 2020 )
Volume-8,Issue-8 ( Aug, 2020 )
Volume-8,Issue-7 ( Jul, 2020 )
Volume-8,Issue-6 ( Jun, 2020 )
Volume-8,Issue-5 ( May, 2020 )
Volume-8,Issue-4 ( Apr, 2020 )
Volume-8,Issue-3 ( Mar, 2020 )
Volume-8,Issue-2 ( Feb, 2020 )
Volume-8,Issue-1 ( Jan, 2020 )
Volume-7,Issue-12 ( Dec, 2019 )
Volume-7,Issue-11 ( Nov, 2019 )
Volume-7, Issue-10 ( Oct, 2019 )
Volume-7, Issue-9 ( Sep, 2019 )
Volume-7, Issue-8 ( Aug, 2019 )
Volume-7, Issue-7 ( Jul, 2019 )
Volume-7, Issue-6 ( Jun, 2019 )
Volume-7, Issue-5 ( May, 2019 )
Volume-7, Issue-4 ( Apr, 2019 )
Volume-7, Issue-3 ( Mar, 2019 )
Volume-7, Issue-2 ( Feb, 2019 )
Volume-7, Issue-1 ( Jan, 2019 )
Volume-6, Issue-12 ( Dec, 2018 )
Volume-6, Issue-11 ( Nov, 2018 )
Volume-6, Issue-10 ( Oct, 2018 )
Volume-6, Issue-9 ( Sep, 2018 )
Volume-6, Issue-8 ( Aug, 2018 )
Volume-6, Issue-7 ( Jul, 2018 )
Volume-6, Issue-6 ( Jun, 2018 )
Volume-6, Issue-5 ( May, 2018 )
Volume-6, Issue-4 ( Apr, 2018 )
Volume-6, Issue-3 ( Mar, 2018 )
Volume-6, Issue-2 ( Feb, 2018 )
Volume-6, Issue-1 ( Jan, 2018 )
Volume-5,Issue-12 ( Dec, 2017 )
Volume-5,Issue-11 ( Nov, 2017 )
Volume-5,Issue-10 ( Oct, 2017 )
Volume-5,Issue-9 ( Sep, 2017 )
Volume-5,Issue-8 ( Aug, 2017 )
Volume-5,Issue-7 ( Jul, 2017 )
Volume-5,Issue-6 ( Jun, 2017 )
Volume-5,Issue-5 ( May, 2017 )
Volume-5, Issue-4 ( Apr, 2017 )
Volume-5, Issue-3 ( Mar, 2017 )
Volume-5, Issue-2 ( Feb, 2017 )
Volume-5, Issue-1 ( Jan, 2017 )
Volume-4, Issue-12 ( Dec, 2016 )
Volume-4, Issue-11 ( Nov, 2016 )
Volume-4, Issue-10 ( Oct, 2016 )
Volume-4, Issue-9 ( Sep, 2016 )
Volume-4, Issue-8 ( Aug, 2016 )
Volume-4, Issue-7 ( Jul, 2016 )
Volume-4, Issue-6 ( Jun, 2016 )
Volume-4,Issue-5 ( May, 2016 )
Volume-4,Issue-4 ( Apr, 2016 )
Volume-4,Issue-3 ( Mar, 2016 )
Volume-4,Issue-2 ( Feb, 2016 )
Volume-4,Issue-1 ( Jan, 2016 )
Volume-3,Issue-12 ( Dec, 2015 )
Volume-3,Issue-11 ( Nov, 2015 )
Volume-3, Issue-10 ( Oct, 2015 )
Volume-3, Issue-9 ( Sep, 2015 )
Volume-3, Issue-8 ( Aug, 2015 )
Volume-3, Issue-7 ( Jul, 2015 )
Volume-3, Issue-6 ( Jun, 2015 )
Volume-3, Issue-5 ( May, 2015 )
Volume-3, Issue-4 ( Apr, 2015 )
Volume-3, Issue-3 ( Mar, 2015 )
Volume-3, Issue-2 ( Feb, 2015 )
Volume-3, Issue-1 ( Jan, 2015 )
Volume-2, Issue-12 ( Dec, 2014 )
Volume-2,Issue-11 ( Nov, 2014 )
Volume-2,Issue-10 ( Oct, 2014 )
Volume-2,Issue-9 ( Sep, 2014 )
Volume-2,Issue-8 ( Aug, 2014 )
Volume-2,Issue-7 ( Jul, 2014 )
Volume-2,Issue-6 ( Jun, 2014 )
Volume-2,Issue-5 ( May, 2014 )
Volume-5, Issue-5 ( May, 2014 )
Volume-2,Issue-4 ( Apr, 2014 )
Volume-2,Issue-3 ( Mar, 2014 )
Volume-2,Issue-2 ( Feb, 2014 )
Volume-2,Issue-1 ( Jan, 2014 )
Volume-1,Issue-10 ( Dec, 2013 )
Volume-1,Issue-9 ( Nov, 2013 )
Volume-1,Issue-8 ( Oct, 2013 )
Volume-1,Issue-7 ( Sep, 2013 )
Volume-1,Issue-6 ( Aug, 2013 )
Volume-1,Issue-5 ( Jul, 2013 )
Volume-1,Issue-4 ( Jun, 2013 )
Volume-1,Issue-3 ( May, 2013 )
Volume-1,Issue-2 ( Apr, 2013 )
Volume-1,Issue-1 ( Mar, 2013 )
View More
Statistics report
Oct. 2024
Submitted Papers
:
80
Accepted Papers
:
10
Rejected Papers
:
70
Acc. Perc
:
12%
Issue Published
:
138
Paper Published
:
1629
No. of Authors
:
4297
About DOIONLINE
Contact
Download Product Flyer
Copyright Form
Publication Charges
Download Sample Paper
Publication Ethics and Publication Malpractice Statement
Join Us
Join Editorial Board
Become a Reviewer
Recommend to Library
Volume-2, Issue-12 ( Dec, 2014 )
Total Viewed 1471
Download Citation
Download Citation
Part 1
1
Secure Connectivity in Wireless Sensor Networks by Providing a New Scalable Key Management Scheme
C.THUMMALAPPA, A.K.PUNEETH KUMAR
Page 1-8
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1513
View Here
|
Quick Abstract
|
PDF
|
Viewed - 101
2
Network Intrusion Node Clone Detection In Virtual Network Systems
R.ASHOK, S.KOKILA, M.GIRI
Page 9-14
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1514
View Here
|
Quick Abstract
|
PDF
|
Viewed - 69
3
Fuzzy Logic Used for Network Service Maximization
R.NAGA POORNIMA, K.KOTESWAR RAO
Page 15-22
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1515
View Here
|
Quick Abstract
|
PDF
|
Viewed - 69
4
Disruption-Based Position Of Links Efficiency Maximization
M.Niranjan, K.Lakshmi Narayana, M.Giri
Page 23-27
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1517
View Here
|
Quick Abstract
|
PDF
|
Viewed - 71
5
Intact Analysis With Compiler And Security Editor
I.Harihara Prasad, K.Narayana, I.Kasthuri
Page 28-33
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1518
View Here
|
Quick Abstract
|
PDF
|
Viewed - 70
6
A Review On The Concept Of Knowledge And Knowledge Sharing
Sajjad Shalikar, Mohammad Mobin Rupani, Nooh Abu Bakar, Mohammad Amin Borjali
Page 34-37
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1532
View Here
|
Quick Abstract
|
PDF
|
Viewed - 72
7
UAMPP: Unauthorized Access Model For Peer–To–Peer System
Sai Divya Kalagatla, Ramana Reddy B., Mohana Roopa M.
Page 38-42
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1533
View Here
|
Quick Abstract
|
PDF
|
Viewed - 79
8
A Rough Set Based Feature Selection Approach For The Prediction Of Learning Disabilities
Sabu M.K
Page 43-48
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1534
View Here
|
Quick Abstract
|
PDF
|
Viewed - 80
9
Avionics Control Using 3D Gestures
Kumar Amit, Rachna Shivangi
Page 49-54
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1535
View Here
|
Quick Abstract
|
PDF
|
Viewed - 68
10
Authentication Model For Cloud Computing Using Single Sign-On
Aniesh Krishna K, Balagopalan A S
Page 55-60
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1536
View Here
|
Quick Abstract
|
PDF
|
Viewed - 75
11
Implementation of three block mat0063hing search algorithms in h. 264 on CUDA
Renuka Joshi, Jancy James, Sagar Karwande, Darshan Pawar
Page 61-65
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1537
View Here
|
Quick Abstract
|
PDF
|
Viewed - 84
12
Static Detection of Unsafe Component Loadings on Windows
Sneha D. Patel, Tareek M. Pattewar
Page 66-71
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1538
View Here
|
Quick Abstract
|
PDF
|
Viewed - 67
13
Enhancing Access Control And Efficiency In Attribute Based Data Sharing Using JMA
Nazneen Banu, K.Vinay Kumar
Page 72-77
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1539
View Here
|
Quick Abstract
|
PDF
|
Viewed - 67
14
SMAC: Revolutionary Technology & Security: Rip?
Moutan Sarkar, Arjun Chetry
Page 78-80
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1540
View Here
|
Quick Abstract
|
PDF
|
Viewed - 90
15
A Study On Electronic Medical Record System For Clinical Data Storage In The Selected Hospitals
Rajesh R Mane, R.V.Kulkarni
Page 81-84
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1541
View Here
|
Quick Abstract
|
PDF
|
Viewed - 74
16
LFSR Based Stream Cipher (Enhanced A5/1)
Amandeep Singh Bhal, Zhilmil Dhillon
Page 85-90
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1542
View Here
|
Quick Abstract
|
PDF
|
Viewed - 71
17
Uses The Bagging Algorithm of Classification Method With Weka Tool For Prediction Technique
Pooja Shrivastava, Manoj Shukla
Page 91-95
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1543
View Here
|
Quick Abstract
|
PDF
|
Viewed - 75
18
Implementation Of IHS Fusion Technique And Comparative Analysis With PCA Fusion Technique For Cotton Contaminants Detection
Vijendra Kumar, Maitreyee Dutta, Surender Singh Saini
Page 96-100
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1593
View Here
|
Quick Abstract
|
PDF
|
Viewed - 94
19
Adaptive Hierarchical Leader Follower with Evolutionary Computing Algorithm for Email Classification
U. Surya Kameswari, I. Ramesh Babu
Page 101-104
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1545
View Here
|
Quick Abstract
|
PDF
|
Viewed - 84
20
Cloud Computing And Virtual Resources That Maintain And Secure Educlouds
S.Ambareesh, Silambarasan.K
Page 105-108
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1590
View Here
|
Quick Abstract
|
PDF
|
Viewed - 83
IRAJ Other Journals
View More
View More
View More
View More
View More
View More
View More
View More
View More
View More
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World
IRAJ Upcoming Conference
This work is licensed under a
Creative Commons Attribution 4.0 International License.
JOURNAL
SUPPORTED BY