International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-6  ( Jun, 2024 )
Past issues
  1. Volume-12,Issue-5  ( May, 2024 )
  2. Volume-12,Issue-4  ( Apr, 2024 )
  3. Volume-12,Issue-3  ( Mar, 2024 )
  4. Volume-12,Issue-2  ( Feb, 2024 )
  5. Volume-12,Issue-1  ( Jan, 2024 )
  6. Volume-11,Issue-12  ( Dec, 2023 )
  7. Volume-11,Issue-11  ( Nov, 2023 )
  8. Volume-11,Issue-10  ( Oct, 2023 )
  9. Volume-11,Issue-9  ( Sep, 2023 )
  10. Volume-11,Issue-8  ( Aug, 2023 )

Statistics report
Oct. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 138
Paper Published : 1629
No. of Authors : 4297
    Volume-2, Issue-12  ( Dec, 2014 )
Total Viewed 1471
Download Citation    
Download Citation    

Part 1

1
Secure Connectivity in Wireless Sensor Networks by Providing a New Scalable Key Management Scheme
C.THUMMALAPPA, A.K.PUNEETH KUMAR
 
Page 1-8

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1513   View Here
| Quick Abstract | PDF |
Viewed - 101
2
Network Intrusion Node Clone Detection In Virtual Network Systems
R.ASHOK, S.KOKILA, M.GIRI
 
Page 9-14

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1514   View Here
| Quick Abstract | PDF |
Viewed - 69
3
Fuzzy Logic Used for Network Service Maximization
R.NAGA POORNIMA, K.KOTESWAR RAO
 
Page 15-22

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1515   View Here
| Quick Abstract | PDF |
Viewed - 69
4
Disruption-Based Position Of Links Efficiency Maximization
M.Niranjan, K.Lakshmi Narayana, M.Giri
 
Page 23-27

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1517   View Here
| Quick Abstract | PDF |
Viewed - 71
5
Intact Analysis With Compiler And Security Editor
I.Harihara Prasad, K.Narayana, I.Kasthuri
 
Page 28-33

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1518   View Here
| Quick Abstract | PDF |
Viewed - 70
6
A Review On The Concept Of Knowledge And Knowledge Sharing
Sajjad Shalikar, Mohammad Mobin Rupani, Nooh Abu Bakar, Mohammad Amin Borjali
 
Page 34-37

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1532   View Here
| Quick Abstract | PDF |
Viewed - 72
7
UAMPP: Unauthorized Access Model For Peer–To–Peer System
Sai Divya Kalagatla, Ramana Reddy B., Mohana Roopa M.
 
Page 38-42

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1533   View Here
| Quick Abstract | PDF |
Viewed - 79
8
A Rough Set Based Feature Selection Approach For The Prediction Of Learning Disabilities
Sabu M.K
 
Page 43-48

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1534   View Here
| Quick Abstract | PDF |
Viewed - 80
9
Avionics Control Using 3D Gestures
Kumar Amit, Rachna Shivangi
 
Page 49-54

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1535   View Here
| Quick Abstract | PDF |
Viewed - 68
10
Authentication Model For Cloud Computing Using Single Sign-On
Aniesh Krishna K, Balagopalan A S
 
Page 55-60

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1536   View Here
| Quick Abstract | PDF |
Viewed - 75
11
Implementation of three block mat0063hing search algorithms in h. 264 on CUDA
Renuka Joshi, Jancy James, Sagar Karwande, Darshan Pawar
 
Page 61-65

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1537   View Here
| Quick Abstract | PDF |
Viewed - 84
12
Static Detection of Unsafe Component Loadings on Windows
Sneha D. Patel, Tareek M. Pattewar
 
Page 66-71

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1538   View Here
| Quick Abstract | PDF |
Viewed - 67
13
Enhancing Access Control And Efficiency In Attribute Based Data Sharing Using JMA
Nazneen Banu, K.Vinay Kumar
 
Page 72-77

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1539   View Here
| Quick Abstract | PDF |
Viewed - 67
14
SMAC: Revolutionary Technology & Security: Rip?
Moutan Sarkar, Arjun Chetry
 
Page 78-80

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1540   View Here
| Quick Abstract | PDF |
Viewed - 90
15
A Study On Electronic Medical Record System For Clinical Data Storage In The Selected Hospitals
Rajesh R Mane, R.V.Kulkarni
 
Page 81-84

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1541   View Here
| Quick Abstract | PDF |
Viewed - 74
16
LFSR Based Stream Cipher (Enhanced A5/1)
Amandeep Singh Bhal, Zhilmil Dhillon
 
Page 85-90

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1542   View Here
| Quick Abstract | PDF |
Viewed - 71
17
Uses The Bagging Algorithm of Classification Method With Weka Tool For Prediction Technique
Pooja Shrivastava, Manoj Shukla
 
Page 91-95

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1543   View Here
| Quick Abstract | PDF |
Viewed - 75
18
Implementation Of IHS Fusion Technique And Comparative Analysis With PCA Fusion Technique For Cotton Contaminants Detection
Vijendra Kumar, Maitreyee Dutta, Surender Singh Saini
 
Page 96-100

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1593   View Here
| Quick Abstract | PDF |
Viewed - 94
19
Adaptive Hierarchical Leader Follower with Evolutionary Computing Algorithm for Email Classification
U. Surya Kameswari, I. Ramesh Babu
 
Page 101-104

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1545   View Here
| Quick Abstract | PDF |
Viewed - 84
20
Cloud Computing And Virtual Resources That Maintain And Secure Educlouds
S.Ambareesh, Silambarasan.K
 
Page 105-108

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1590   View Here
| Quick Abstract | PDF |
Viewed - 83

   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY