International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
IRAJ Home
IJACEN Home
About IJACEN
Call For Paper
Guidelines
Author's Guidelines
Reviewer Guidelines
Special Issues
Special Issues
Special Issue-1 June 2015 ( Jun, 2015 )
Indexing
Editiorial Borad
Join Us
Join Editiorial Borad
Resources
Publisher
Review Process
Contact
current issues
Volume-12,Issue-6 ( Jun, 2024 )
View More
Past issues
Volume-12,Issue-5 ( May, 2024 )
Volume-12,Issue-4 ( Apr, 2024 )
Volume-12,Issue-3 ( Mar, 2024 )
Volume-12,Issue-2 ( Feb, 2024 )
Volume-12,Issue-1 ( Jan, 2024 )
Volume-11,Issue-12 ( Dec, 2023 )
Volume-11,Issue-11 ( Nov, 2023 )
Volume-11,Issue-10 ( Oct, 2023 )
Volume-11,Issue-9 ( Sep, 2023 )
Volume-11,Issue-8 ( Aug, 2023 )
Volume-11,Issue-7 ( Jul, 2023 )
Volume-11,Issue-6 ( Jun, 2023 )
Volume-11,Issue-5 ( May, 2023 )
Volume-11,Issue-4 ( Apr, 2023 )
Volume-11,Issue-3 ( Mar, 2023 )
Volume-11,Issue-2 ( Feb, 2023 )
Volume-11,Issue-1 ( Jan, 2023 )
Volume-10,Issue-12 ( Dec, 2022 )
Volume-10,Issue-11 ( Nov, 2022 )
Volume-10,Issue-10 ( Oct, 2022 )
Volume-10,Issue-9 ( Sep, 2022 )
Volume-10,Issue-8 ( Aug, 2022 )
Volume-10,Issue-7 ( Jul, 2022 )
Volume-10,Issue-6 ( Jun, 2022 )
Volume-10,Issue-5 ( May, 2022 )
Volume-10,Issue-4 ( Apr, 2022 )
Volume-10,Issue-3 ( Mar, 2022 )
Volume-10,Issue-2 ( Feb, 2022 )
Volume-10,Issue-1 ( Jan, 2022 )
Volume-9,Issue-12 ( Dec, 2021 )
Volume-9,Issue-11 ( Nov, 2021 )
Volume-9,Issue-10 ( Oct, 2021 )
Volume-9,Issue-9 ( Sep, 2021 )
Volume-9,Issue-8 ( Aug, 2021 )
Volume-9,Issue-7 ( Jul, 2021 )
Volume-9,Issue-6 ( Jun, 2021 )
Volume-9,Issue-5 ( May, 2021 )
Volume-9,Issue-4 ( Apr, 2021 )
Volume-9,Issue-3 ( Mar, 2021 )
Volume-9,Issue-2 ( Feb, 2021 )
Volume-9,Issue-1 ( Jan, 2021 )
Volume-8,Issue-12 ( Dec, 2020 )
Volume-8,Issue-11 ( Nov, 2020 )
Volume-8,Issue-10 ( Oct, 2020 )
Volume-8,Issue-9 ( Sep, 2020 )
Volume-8,Issue-8 ( Aug, 2020 )
Volume-8,Issue-7 ( Jul, 2020 )
Volume-8,Issue-6 ( Jun, 2020 )
Volume-8,Issue-5 ( May, 2020 )
Volume-8,Issue-4 ( Apr, 2020 )
Volume-8,Issue-3 ( Mar, 2020 )
Volume-8,Issue-2 ( Feb, 2020 )
Volume-8,Issue-1 ( Jan, 2020 )
Volume-7,Issue-12 ( Dec, 2019 )
Volume-7,Issue-11 ( Nov, 2019 )
Volume-7, Issue-10 ( Oct, 2019 )
Volume-7, Issue-9 ( Sep, 2019 )
Volume-7, Issue-8 ( Aug, 2019 )
Volume-7, Issue-7 ( Jul, 2019 )
Volume-7, Issue-6 ( Jun, 2019 )
Volume-7, Issue-5 ( May, 2019 )
Volume-7, Issue-4 ( Apr, 2019 )
Volume-7, Issue-3 ( Mar, 2019 )
Volume-7, Issue-2 ( Feb, 2019 )
Volume-7, Issue-1 ( Jan, 2019 )
Volume-6, Issue-12 ( Dec, 2018 )
Volume-6, Issue-11 ( Nov, 2018 )
Volume-6, Issue-10 ( Oct, 2018 )
Volume-6, Issue-9 ( Sep, 2018 )
Volume-6, Issue-8 ( Aug, 2018 )
Volume-6, Issue-7 ( Jul, 2018 )
Volume-6, Issue-6 ( Jun, 2018 )
Volume-6, Issue-5 ( May, 2018 )
Volume-6, Issue-4 ( Apr, 2018 )
Volume-6, Issue-3 ( Mar, 2018 )
Volume-6, Issue-2 ( Feb, 2018 )
Volume-6, Issue-1 ( Jan, 2018 )
Volume-5,Issue-12 ( Dec, 2017 )
Volume-5,Issue-11 ( Nov, 2017 )
Volume-5,Issue-10 ( Oct, 2017 )
Volume-5,Issue-9 ( Sep, 2017 )
Volume-5,Issue-8 ( Aug, 2017 )
Volume-5,Issue-7 ( Jul, 2017 )
Volume-5,Issue-6 ( Jun, 2017 )
Volume-5,Issue-5 ( May, 2017 )
Volume-5, Issue-4 ( Apr, 2017 )
Volume-5, Issue-3 ( Mar, 2017 )
Volume-5, Issue-2 ( Feb, 2017 )
Volume-5, Issue-1 ( Jan, 2017 )
Volume-4, Issue-12 ( Dec, 2016 )
Volume-4, Issue-11 ( Nov, 2016 )
Volume-4, Issue-10 ( Oct, 2016 )
Volume-4, Issue-9 ( Sep, 2016 )
Volume-4, Issue-8 ( Aug, 2016 )
Volume-4, Issue-7 ( Jul, 2016 )
Volume-4, Issue-6 ( Jun, 2016 )
Volume-4,Issue-5 ( May, 2016 )
Volume-4,Issue-4 ( Apr, 2016 )
Volume-4,Issue-3 ( Mar, 2016 )
Volume-4,Issue-2 ( Feb, 2016 )
Volume-4,Issue-1 ( Jan, 2016 )
Volume-3,Issue-12 ( Dec, 2015 )
Volume-3,Issue-11 ( Nov, 2015 )
Volume-3, Issue-10 ( Oct, 2015 )
Volume-3, Issue-9 ( Sep, 2015 )
Volume-3, Issue-8 ( Aug, 2015 )
Volume-3, Issue-7 ( Jul, 2015 )
Volume-3, Issue-6 ( Jun, 2015 )
Volume-3, Issue-5 ( May, 2015 )
Volume-3, Issue-4 ( Apr, 2015 )
Volume-3, Issue-3 ( Mar, 2015 )
Volume-3, Issue-2 ( Feb, 2015 )
Volume-3, Issue-1 ( Jan, 2015 )
Volume-2, Issue-12 ( Dec, 2014 )
Volume-2,Issue-11 ( Nov, 2014 )
Volume-2,Issue-10 ( Oct, 2014 )
Volume-2,Issue-9 ( Sep, 2014 )
Volume-2,Issue-8 ( Aug, 2014 )
Volume-2,Issue-7 ( Jul, 2014 )
Volume-2,Issue-6 ( Jun, 2014 )
Volume-2,Issue-5 ( May, 2014 )
Volume-5, Issue-5 ( May, 2014 )
Volume-2,Issue-4 ( Apr, 2014 )
Volume-2,Issue-3 ( Mar, 2014 )
Volume-2,Issue-2 ( Feb, 2014 )
Volume-2,Issue-1 ( Jan, 2014 )
Volume-1,Issue-10 ( Dec, 2013 )
Volume-1,Issue-9 ( Nov, 2013 )
Volume-1,Issue-8 ( Oct, 2013 )
Volume-1,Issue-7 ( Sep, 2013 )
Volume-1,Issue-6 ( Aug, 2013 )
Volume-1,Issue-5 ( Jul, 2013 )
Volume-1,Issue-4 ( Jun, 2013 )
Volume-1,Issue-3 ( May, 2013 )
Volume-1,Issue-2 ( Apr, 2013 )
Volume-1,Issue-1 ( Mar, 2013 )
View More
Statistics report
Oct. 2024
Submitted Papers
:
80
Accepted Papers
:
10
Rejected Papers
:
70
Acc. Perc
:
12%
Issue Published
:
138
Paper Published
:
1629
No. of Authors
:
4297
About DOIONLINE
Contact
Download Product Flyer
Copyright Form
Publication Charges
Download Sample Paper
Publication Ethics and Publication Malpractice Statement
Join Us
Join Editorial Board
Become a Reviewer
Recommend to Library
Volume-3, Issue-5 ( May, 2015 )
Total Viewed 1586
Download Citation
Download Citation
Part 1
1
Tumor Detection Using Fuzzy Logic And GMRF
Nithin Krishna. J, Mohammad Aslam. C, Satya Narayana. D, Padma Priya. K
Page 1-8
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2040
View Here
|
Quick Abstract
|
PDF
|
Viewed - 86
2
An Experimental Study On Obstacles And Management Issues In Software Cost Estimation
Vahid Khatibi Bardsiri, Amin Moradbeiky, Elham Khatibi
Page 9-15
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2041
View Here
|
Quick Abstract
|
PDF
|
Viewed - 79
3
Marathi Word Sense Disambiguation Using Genetic Algorithm – A Review
Kalyani Mamulkar, Lokesh Nandanwar
Page 16-18
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2042
View Here
|
Quick Abstract
|
PDF
|
Viewed - 107
4
The Most Common Vulnerabilities And Open Source Prevention Software
Mehmet Mehdi Karakoc, Mustafa Ulas, Asaf Varol
Page 19-26
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2043
View Here
|
Quick Abstract
|
PDF
|
Viewed - 96
5
A Novel One-Time Password Mutual Authentication Scheme Using Biometrics-Based Key And Visual Secret Sharing
Wei-Bin Lee, Yu-Ting Lin, Min-Hsuan Tsai, Hsing-Bai Chen
Page 27-32
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2044
View Here
|
Quick Abstract
|
PDF
|
Viewed - 75
6
An Expert System Model That Enables The Development Of Institutional Knowledge Using Text Mining Methods In Open Source Software
Aytug Boyaci, Mustafa Ulas
Page 33-36
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2045
View Here
|
Quick Abstract
|
PDF
|
Viewed - 81
7
Wireless Sensor Network For Lonely Elderly People Wellness
M.Anjali Manikannan, R.Jayarajan
Page 41-45
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2047
View Here
|
Quick Abstract
|
PDF
|
Viewed - 74
8
An Efficient Coded Based QOS Routing Mechanism In Wireless Sensor Networks
Shivangi M. Salunkhe, Shashi Prabha
Page 46-48
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2048
View Here
|
Quick Abstract
|
PDF
|
Viewed - 78
9
Exploring Causal Relations In Data Mining By Using Directed Acyclic Graphs (DAG)
Krishna Murthy Inumula
Page 49-55
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2049
View Here
|
Quick Abstract
|
PDF
|
Viewed - 78
10
Touchless Writer A Hand Gesture Recognizer For English Characters
Aditya G. Joshi, Darshana V. Kolte, Ashishv. Bandgar, Aakash S. Kadlak, N. S. Patil
Page 56-60
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2050
View Here
|
Quick Abstract
|
PDF
|
Viewed - 83
11
MIDS: A Decentralized, Multi-Intrusion Detection System
Suraj Krishnamoorthy, Swapnil Girme, Akshay Nair, Abhishek Gaikwad, S.S. Pawar
Page 61-63
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2051
View Here
|
Quick Abstract
|
PDF
|
Viewed - 75
12
Implementation Of Policy Enforcement Technique For Intrusion Detection System Using Manet's
Ankita Sharma, Darshanaa Birkad, Sabisha Shetty, Shehnaz Jabbar, Hema Kolla
Page 64-69
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2052
View Here
|
Quick Abstract
|
PDF
|
Viewed - 80
13
Privacy Preserved Social Network With Security
Aswathy Rajeev K, Sunder R
Page 70-74
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2053
View Here
|
Quick Abstract
|
PDF
|
Viewed - 79
14
Linear Cryptanalysis Of Advanced Encryption Standard Algorithm Based On Swarmintelligence: A Review
Dolly U. Jeswani, Swati G. Kale
Page 75-77
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2054
View Here
|
Quick Abstract
|
PDF
|
Viewed - 71
15
The Role Of Cognitive Style In The Comprehension Of Systems Analysis Tools
Narasimhaiah Gorla
Page 78-81
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2055
View Here
|
Quick Abstract
|
PDF
|
Viewed - 73
16
FCHE: Face Classification Using Histogram Equalization
Arunalatha J S, Suvarna C, Venugopal K R, L M Patnaik
Page 82-87
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2056
View Here
|
Quick Abstract
|
PDF
|
Viewed - 83
17
Direct To Home Electricity
Rachit Shah, Souradeep Paul
Page 88-93
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2057
View Here
|
Quick Abstract
|
PDF
|
Viewed - 75
18
Free Energy Formulations And Estimation Of Structural Parameters For A Model Binary Alloy System Using The Cluster Variation Method
P. Kezia, G. Srinivasa Gupta
Page 94-97
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2058
View Here
|
Quick Abstract
|
PDF
|
Viewed - 79
19
Feature Image Extraction For Real Time Content Based Image Retrieval And Video Indexing
Ghorpade Krishna Bhimraj, Swapnalini Pattanaik
Page 98-101
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2059
View Here
|
Quick Abstract
|
PDF
|
Viewed - 81
20
Evaluating The Performance Of Manet Protocols Considering Various Parameters
Veena Anand
Page 102-105
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2060
View Here
|
Quick Abstract
|
PDF
|
Viewed - 84
21
A Review On Security Issues In Social Networking Websites
Shishpal Jindal
Page 106-108
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-3431
View Here
|
Quick Abstract
|
PDF
|
Viewed - 51
IRAJ Other Journals
View More
View More
View More
View More
View More
View More
View More
View More
View More
View More
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World
IRAJ Upcoming Conference
This work is licensed under a
Creative Commons Attribution 4.0 International License.
JOURNAL
SUPPORTED BY