International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
IRAJ Home
IJACEN Home
About IJACEN
Call For Paper
Guidelines
Author's Guidelines
Reviewer Guidelines
Special Issues
Special Issues
Special Issue-1 June 2015 ( Jun, 2015 )
Indexing
Editiorial Borad
Join Us
Join Editiorial Borad
Resources
Publisher
Review Process
Contact
current issues
Volume-12,Issue-12 ( Dec, 2024 )
View More
Past issues
Volume-12,Issue-11 ( Nov, 2024 )
Volume-12,Issue-10 ( Oct, 2024 )
Volume-12,Issue-9 ( Sep, 2024 )
Volume-12,Issue-8 ( Aug, 2024 )
Volume-12,Issue-7 ( Jul, 2024 )
Volume-12,Issue-6 ( Jun, 2024 )
Volume-12,Issue-5 ( May, 2024 )
Volume-12,Issue-4 ( Apr, 2024 )
Volume-12,Issue-3 ( Mar, 2024 )
Volume-12,Issue-2 ( Feb, 2024 )
Volume-12,Issue-1 ( Jan, 2024 )
Volume-11,Issue-12 ( Dec, 2023 )
Volume-11,Issue-11 ( Nov, 2023 )
Volume-11,Issue-10 ( Oct, 2023 )
Volume-11,Issue-9 ( Sep, 2023 )
Volume-11,Issue-8 ( Aug, 2023 )
Volume-11,Issue-7 ( Jul, 2023 )
Volume-11,Issue-6 ( Jun, 2023 )
Volume-11,Issue-5 ( May, 2023 )
Volume-11,Issue-4 ( Apr, 2023 )
Volume-11,Issue-3 ( Mar, 2023 )
Volume-11,Issue-2 ( Feb, 2023 )
Volume-11,Issue-1 ( Jan, 2023 )
Volume-10,Issue-12 ( Dec, 2022 )
Volume-10,Issue-11 ( Nov, 2022 )
Volume-10,Issue-10 ( Oct, 2022 )
Volume-10,Issue-9 ( Sep, 2022 )
Volume-10,Issue-8 ( Aug, 2022 )
Volume-10,Issue-7 ( Jul, 2022 )
Volume-10,Issue-6 ( Jun, 2022 )
Volume-10,Issue-5 ( May, 2022 )
Volume-10,Issue-4 ( Apr, 2022 )
Volume-10,Issue-3 ( Mar, 2022 )
Volume-10,Issue-2 ( Feb, 2022 )
Volume-10,Issue-1 ( Jan, 2022 )
Volume-9,Issue-12 ( Dec, 2021 )
Volume-9,Issue-11 ( Nov, 2021 )
Volume-9,Issue-10 ( Oct, 2021 )
Volume-9,Issue-9 ( Sep, 2021 )
Volume-9,Issue-8 ( Aug, 2021 )
Volume-9,Issue-7 ( Jul, 2021 )
Volume-9,Issue-6 ( Jun, 2021 )
Volume-9,Issue-5 ( May, 2021 )
Volume-9,Issue-4 ( Apr, 2021 )
Volume-9,Issue-3 ( Mar, 2021 )
Volume-9,Issue-2 ( Feb, 2021 )
Volume-9,Issue-1 ( Jan, 2021 )
Volume-8,Issue-12 ( Dec, 2020 )
Volume-8,Issue-11 ( Nov, 2020 )
Volume-8,Issue-10 ( Oct, 2020 )
Volume-8,Issue-9 ( Sep, 2020 )
Volume-8,Issue-8 ( Aug, 2020 )
Volume-8,Issue-7 ( Jul, 2020 )
Volume-8,Issue-6 ( Jun, 2020 )
Volume-8,Issue-5 ( May, 2020 )
Volume-8,Issue-4 ( Apr, 2020 )
Volume-8,Issue-3 ( Mar, 2020 )
Volume-8,Issue-2 ( Feb, 2020 )
Volume-8,Issue-1 ( Jan, 2020 )
Volume-7,Issue-12 ( Dec, 2019 )
Volume-7,Issue-11 ( Nov, 2019 )
Volume-7, Issue-10 ( Oct, 2019 )
Volume-7, Issue-9 ( Sep, 2019 )
Volume-7, Issue-8 ( Aug, 2019 )
Volume-7, Issue-7 ( Jul, 2019 )
Volume-7, Issue-6 ( Jun, 2019 )
Volume-7, Issue-5 ( May, 2019 )
Volume-7, Issue-4 ( Apr, 2019 )
Volume-7, Issue-3 ( Mar, 2019 )
Volume-7, Issue-2 ( Feb, 2019 )
Volume-7, Issue-1 ( Jan, 2019 )
Volume-6, Issue-12 ( Dec, 2018 )
Volume-6, Issue-11 ( Nov, 2018 )
Volume-6, Issue-10 ( Oct, 2018 )
Volume-6, Issue-9 ( Sep, 2018 )
Volume-6, Issue-8 ( Aug, 2018 )
Volume-6, Issue-7 ( Jul, 2018 )
Volume-6, Issue-6 ( Jun, 2018 )
Volume-6, Issue-5 ( May, 2018 )
Volume-6, Issue-4 ( Apr, 2018 )
Volume-6, Issue-3 ( Mar, 2018 )
Volume-6, Issue-2 ( Feb, 2018 )
Volume-6, Issue-1 ( Jan, 2018 )
Volume-5,Issue-12 ( Dec, 2017 )
Volume-5,Issue-11 ( Nov, 2017 )
Volume-5,Issue-10 ( Oct, 2017 )
Volume-5,Issue-9 ( Sep, 2017 )
Volume-5,Issue-8 ( Aug, 2017 )
Volume-5,Issue-7 ( Jul, 2017 )
Volume-5,Issue-6 ( Jun, 2017 )
Volume-5,Issue-5 ( May, 2017 )
Volume-5, Issue-4 ( Apr, 2017 )
Volume-5, Issue-3 ( Mar, 2017 )
Volume-5, Issue-2 ( Feb, 2017 )
Volume-5, Issue-1 ( Jan, 2017 )
Volume-4, Issue-12 ( Dec, 2016 )
Volume-4, Issue-11 ( Nov, 2016 )
Volume-4, Issue-10 ( Oct, 2016 )
Volume-4, Issue-9 ( Sep, 2016 )
Volume-4, Issue-8 ( Aug, 2016 )
Volume-4, Issue-7 ( Jul, 2016 )
Volume-4, Issue-6 ( Jun, 2016 )
Volume-4,Issue-5 ( May, 2016 )
Volume-4,Issue-4 ( Apr, 2016 )
Volume-4,Issue-3 ( Mar, 2016 )
Volume-4,Issue-2 ( Feb, 2016 )
Volume-4,Issue-1 ( Jan, 2016 )
Volume-3,Issue-12 ( Dec, 2015 )
Volume-3,Issue-11 ( Nov, 2015 )
Volume-3, Issue-10 ( Oct, 2015 )
Volume-3, Issue-9 ( Sep, 2015 )
Volume-3, Issue-8 ( Aug, 2015 )
Volume-3, Issue-7 ( Jul, 2015 )
Volume-3, Issue-6 ( Jun, 2015 )
Volume-3, Issue-5 ( May, 2015 )
Volume-3, Issue-4 ( Apr, 2015 )
Volume-3, Issue-3 ( Mar, 2015 )
Volume-3, Issue-2 ( Feb, 2015 )
Volume-3, Issue-1 ( Jan, 2015 )
Volume-2, Issue-12 ( Dec, 2014 )
Volume-2,Issue-11 ( Nov, 2014 )
Volume-2,Issue-10 ( Oct, 2014 )
Volume-2,Issue-9 ( Sep, 2014 )
Volume-2,Issue-8 ( Aug, 2014 )
Volume-2,Issue-7 ( Jul, 2014 )
Volume-2,Issue-6 ( Jun, 2014 )
Volume-2,Issue-5 ( May, 2014 )
Volume-5, Issue-5 ( May, 2014 )
Volume-2,Issue-4 ( Apr, 2014 )
Volume-2,Issue-3 ( Mar, 2014 )
Volume-2,Issue-2 ( Feb, 2014 )
Volume-2,Issue-1 ( Jan, 2014 )
Volume-1,Issue-10 ( Dec, 2013 )
Volume-1,Issue-9 ( Nov, 2013 )
Volume-1,Issue-8 ( Oct, 2013 )
Volume-1,Issue-7 ( Sep, 2013 )
Volume-1,Issue-6 ( Aug, 2013 )
Volume-1,Issue-5 ( Jul, 2013 )
Volume-1,Issue-4 ( Jun, 2013 )
Volume-1,Issue-3 ( May, 2013 )
Volume-1,Issue-2 ( Apr, 2013 )
Volume-1,Issue-1 ( Mar, 2013 )
View More
Statistics report
May. 2025
Submitted Papers
:
80
Accepted Papers
:
10
Rejected Papers
:
70
Acc. Perc
:
12%
Issue Published
:
144
Paper Published
:
1690
No. of Authors
:
4493
About DOIONLINE
Contact
Download Product Flyer
Copyright Form
Publication Charges
Download Sample Paper
Publication Ethics and Publication Malpractice Statement
Join Us
Join Editorial Board
Become a Reviewer
Recommend to Library
Volume-3, Issue-5 ( May, 2015 )
Total Viewed 1588
Download Citation
Download Citation
Part 1
1
Tumor Detection Using Fuzzy Logic And GMRF
Nithin Krishna. J, Mohammad Aslam. C, Satya Narayana. D, Padma Priya. K
Page 1-8
|
Quick Abstract
|
PDF
|
Viewed - 86
2
An Experimental Study On Obstacles And Management Issues In Software Cost Estimation
Vahid Khatibi Bardsiri, Amin Moradbeiky, Elham Khatibi
Page 9-15
|
Quick Abstract
|
PDF
|
Viewed - 79
3
Marathi Word Sense Disambiguation Using Genetic Algorithm – A Review
Kalyani Mamulkar, Lokesh Nandanwar
Page 16-18
|
Quick Abstract
|
PDF
|
Viewed - 108
4
The Most Common Vulnerabilities And Open Source Prevention Software
Mehmet Mehdi Karakoc, Mustafa Ulas, Asaf Varol
Page 19-26
|
Quick Abstract
|
PDF
|
Viewed - 96
5
A Novel One-Time Password Mutual Authentication Scheme Using Biometrics-Based Key And Visual Secret Sharing
Wei-Bin Lee, Yu-Ting Lin, Min-Hsuan Tsai, Hsing-Bai Chen
Page 27-32
|
Quick Abstract
|
PDF
|
Viewed - 75
6
An Expert System Model That Enables The Development Of Institutional Knowledge Using Text Mining Methods In Open Source Software
Aytug Boyaci, Mustafa Ulas
Page 33-36
|
Quick Abstract
|
PDF
|
Viewed - 81
7
Wireless Sensor Network For Lonely Elderly People Wellness
M.Anjali Manikannan, R.Jayarajan
Page 41-45
|
Quick Abstract
|
PDF
|
Viewed - 74
8
An Efficient Coded Based QOS Routing Mechanism In Wireless Sensor Networks
Shivangi M. Salunkhe, Shashi Prabha
Page 46-48
|
Quick Abstract
|
PDF
|
Viewed - 78
9
Exploring Causal Relations In Data Mining By Using Directed Acyclic Graphs (DAG)
Krishna Murthy Inumula
Page 49-55
|
Quick Abstract
|
PDF
|
Viewed - 78
10
Touchless Writer A Hand Gesture Recognizer For English Characters
Aditya G. Joshi, Darshana V. Kolte, Ashishv. Bandgar, Aakash S. Kadlak, N. S. Patil
Page 56-60
|
Quick Abstract
|
PDF
|
Viewed - 83
11
MIDS: A Decentralized, Multi-Intrusion Detection System
Suraj Krishnamoorthy, Swapnil Girme, Akshay Nair, Abhishek Gaikwad, S.S. Pawar
Page 61-63
|
Quick Abstract
|
PDF
|
Viewed - 75
12
Implementation Of Policy Enforcement Technique For Intrusion Detection System Using Manet's
Ankita Sharma, Darshanaa Birkad, Sabisha Shetty, Shehnaz Jabbar, Hema Kolla
Page 64-69
|
Quick Abstract
|
PDF
|
Viewed - 80
13
Privacy Preserved Social Network With Security
Aswathy Rajeev K, Sunder R
Page 70-74
|
Quick Abstract
|
PDF
|
Viewed - 79
14
Linear Cryptanalysis Of Advanced Encryption Standard Algorithm Based On Swarmintelligence: A Review
Dolly U. Jeswani, Swati G. Kale
Page 75-77
|
Quick Abstract
|
PDF
|
Viewed - 71
15
The Role Of Cognitive Style In The Comprehension Of Systems Analysis Tools
Narasimhaiah Gorla
Page 78-81
|
Quick Abstract
|
PDF
|
Viewed - 73
16
FCHE: Face Classification Using Histogram Equalization
Arunalatha J S, Suvarna C, Venugopal K R, L M Patnaik
Page 82-87
|
Quick Abstract
|
PDF
|
Viewed - 84
17
Direct To Home Electricity
Rachit Shah, Souradeep Paul
Page 88-93
|
Quick Abstract
|
PDF
|
Viewed - 75
18
Free Energy Formulations And Estimation Of Structural Parameters For A Model Binary Alloy System Using The Cluster Variation Method
P. Kezia, G. Srinivasa Gupta
Page 94-97
|
Quick Abstract
|
PDF
|
Viewed - 79
19
Feature Image Extraction For Real Time Content Based Image Retrieval And Video Indexing
Ghorpade Krishna Bhimraj, Swapnalini Pattanaik
Page 98-101
|
Quick Abstract
|
PDF
|
Viewed - 81
20
Evaluating The Performance Of Manet Protocols Considering Various Parameters
Veena Anand
Page 102-105
|
Quick Abstract
|
PDF
|
Viewed - 84
21
A Review On Security Issues In Social Networking Websites
Shishpal Jindal
Page 106-108
|
Quick Abstract
|
PDF
|
Viewed - 51
IRAJ Other Journals
View More
View More
View More
View More
View More
View More
View More
View More
View More
View More
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World
IRAJ Upcoming Conference
This work is licensed under a
Creative Commons Attribution 4.0 International License.
JOURNAL
SUPPORTED BY