International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
IRAJ Home
IJACEN Home
About IJACEN
Call For Paper
Guidelines
Author's Guidelines
Reviewer Guidelines
Special Issues
Special Issues
Special Issue-1 June 2015 ( Jun, 2015 )
Indexing
Editiorial Borad
Join Us
Join Editiorial Borad
Resources
Publisher
Review Process
Contact
current issues
Volume-12,Issue-6 ( Jun, 2024 )
View More
Past issues
Volume-12,Issue-5 ( May, 2024 )
Volume-12,Issue-4 ( Apr, 2024 )
Volume-12,Issue-3 ( Mar, 2024 )
Volume-12,Issue-2 ( Feb, 2024 )
Volume-12,Issue-1 ( Jan, 2024 )
Volume-11,Issue-12 ( Dec, 2023 )
Volume-11,Issue-11 ( Nov, 2023 )
Volume-11,Issue-10 ( Oct, 2023 )
Volume-11,Issue-9 ( Sep, 2023 )
Volume-11,Issue-8 ( Aug, 2023 )
Volume-11,Issue-7 ( Jul, 2023 )
Volume-11,Issue-6 ( Jun, 2023 )
Volume-11,Issue-5 ( May, 2023 )
Volume-11,Issue-4 ( Apr, 2023 )
Volume-11,Issue-3 ( Mar, 2023 )
Volume-11,Issue-2 ( Feb, 2023 )
Volume-11,Issue-1 ( Jan, 2023 )
Volume-10,Issue-12 ( Dec, 2022 )
Volume-10,Issue-11 ( Nov, 2022 )
Volume-10,Issue-10 ( Oct, 2022 )
Volume-10,Issue-9 ( Sep, 2022 )
Volume-10,Issue-8 ( Aug, 2022 )
Volume-10,Issue-7 ( Jul, 2022 )
Volume-10,Issue-6 ( Jun, 2022 )
Volume-10,Issue-5 ( May, 2022 )
Volume-10,Issue-4 ( Apr, 2022 )
Volume-10,Issue-3 ( Mar, 2022 )
Volume-10,Issue-2 ( Feb, 2022 )
Volume-10,Issue-1 ( Jan, 2022 )
Volume-9,Issue-12 ( Dec, 2021 )
Volume-9,Issue-11 ( Nov, 2021 )
Volume-9,Issue-10 ( Oct, 2021 )
Volume-9,Issue-9 ( Sep, 2021 )
Volume-9,Issue-8 ( Aug, 2021 )
Volume-9,Issue-7 ( Jul, 2021 )
Volume-9,Issue-6 ( Jun, 2021 )
Volume-9,Issue-5 ( May, 2021 )
Volume-9,Issue-4 ( Apr, 2021 )
Volume-9,Issue-3 ( Mar, 2021 )
Volume-9,Issue-2 ( Feb, 2021 )
Volume-9,Issue-1 ( Jan, 2021 )
Volume-8,Issue-12 ( Dec, 2020 )
Volume-8,Issue-11 ( Nov, 2020 )
Volume-8,Issue-10 ( Oct, 2020 )
Volume-8,Issue-9 ( Sep, 2020 )
Volume-8,Issue-8 ( Aug, 2020 )
Volume-8,Issue-7 ( Jul, 2020 )
Volume-8,Issue-6 ( Jun, 2020 )
Volume-8,Issue-5 ( May, 2020 )
Volume-8,Issue-4 ( Apr, 2020 )
Volume-8,Issue-3 ( Mar, 2020 )
Volume-8,Issue-2 ( Feb, 2020 )
Volume-8,Issue-1 ( Jan, 2020 )
Volume-7,Issue-12 ( Dec, 2019 )
Volume-7,Issue-11 ( Nov, 2019 )
Volume-7, Issue-10 ( Oct, 2019 )
Volume-7, Issue-9 ( Sep, 2019 )
Volume-7, Issue-8 ( Aug, 2019 )
Volume-7, Issue-7 ( Jul, 2019 )
Volume-7, Issue-6 ( Jun, 2019 )
Volume-7, Issue-5 ( May, 2019 )
Volume-7, Issue-4 ( Apr, 2019 )
Volume-7, Issue-3 ( Mar, 2019 )
Volume-7, Issue-2 ( Feb, 2019 )
Volume-7, Issue-1 ( Jan, 2019 )
Volume-6, Issue-12 ( Dec, 2018 )
Volume-6, Issue-11 ( Nov, 2018 )
Volume-6, Issue-10 ( Oct, 2018 )
Volume-6, Issue-9 ( Sep, 2018 )
Volume-6, Issue-8 ( Aug, 2018 )
Volume-6, Issue-7 ( Jul, 2018 )
Volume-6, Issue-6 ( Jun, 2018 )
Volume-6, Issue-5 ( May, 2018 )
Volume-6, Issue-4 ( Apr, 2018 )
Volume-6, Issue-3 ( Mar, 2018 )
Volume-6, Issue-2 ( Feb, 2018 )
Volume-6, Issue-1 ( Jan, 2018 )
Volume-5,Issue-12 ( Dec, 2017 )
Volume-5,Issue-11 ( Nov, 2017 )
Volume-5,Issue-10 ( Oct, 2017 )
Volume-5,Issue-9 ( Sep, 2017 )
Volume-5,Issue-8 ( Aug, 2017 )
Volume-5,Issue-7 ( Jul, 2017 )
Volume-5,Issue-6 ( Jun, 2017 )
Volume-5,Issue-5 ( May, 2017 )
Volume-5, Issue-4 ( Apr, 2017 )
Volume-5, Issue-3 ( Mar, 2017 )
Volume-5, Issue-2 ( Feb, 2017 )
Volume-5, Issue-1 ( Jan, 2017 )
Volume-4, Issue-12 ( Dec, 2016 )
Volume-4, Issue-11 ( Nov, 2016 )
Volume-4, Issue-10 ( Oct, 2016 )
Volume-4, Issue-9 ( Sep, 2016 )
Volume-4, Issue-8 ( Aug, 2016 )
Volume-4, Issue-7 ( Jul, 2016 )
Volume-4, Issue-6 ( Jun, 2016 )
Volume-4,Issue-5 ( May, 2016 )
Volume-4,Issue-4 ( Apr, 2016 )
Volume-4,Issue-3 ( Mar, 2016 )
Volume-4,Issue-2 ( Feb, 2016 )
Volume-4,Issue-1 ( Jan, 2016 )
Volume-3,Issue-12 ( Dec, 2015 )
Volume-3,Issue-11 ( Nov, 2015 )
Volume-3, Issue-10 ( Oct, 2015 )
Volume-3, Issue-9 ( Sep, 2015 )
Volume-3, Issue-8 ( Aug, 2015 )
Volume-3, Issue-7 ( Jul, 2015 )
Volume-3, Issue-6 ( Jun, 2015 )
Volume-3, Issue-5 ( May, 2015 )
Volume-3, Issue-4 ( Apr, 2015 )
Volume-3, Issue-3 ( Mar, 2015 )
Volume-3, Issue-2 ( Feb, 2015 )
Volume-3, Issue-1 ( Jan, 2015 )
Volume-2, Issue-12 ( Dec, 2014 )
Volume-2,Issue-11 ( Nov, 2014 )
Volume-2,Issue-10 ( Oct, 2014 )
Volume-2,Issue-9 ( Sep, 2014 )
Volume-2,Issue-8 ( Aug, 2014 )
Volume-2,Issue-7 ( Jul, 2014 )
Volume-2,Issue-6 ( Jun, 2014 )
Volume-2,Issue-5 ( May, 2014 )
Volume-5, Issue-5 ( May, 2014 )
Volume-2,Issue-4 ( Apr, 2014 )
Volume-2,Issue-3 ( Mar, 2014 )
Volume-2,Issue-2 ( Feb, 2014 )
Volume-2,Issue-1 ( Jan, 2014 )
Volume-1,Issue-10 ( Dec, 2013 )
Volume-1,Issue-9 ( Nov, 2013 )
Volume-1,Issue-8 ( Oct, 2013 )
Volume-1,Issue-7 ( Sep, 2013 )
Volume-1,Issue-6 ( Aug, 2013 )
Volume-1,Issue-5 ( Jul, 2013 )
Volume-1,Issue-4 ( Jun, 2013 )
Volume-1,Issue-3 ( May, 2013 )
Volume-1,Issue-2 ( Apr, 2013 )
Volume-1,Issue-1 ( Mar, 2013 )
View More
Statistics report
Oct. 2024
Submitted Papers
:
80
Accepted Papers
:
10
Rejected Papers
:
70
Acc. Perc
:
12%
Issue Published
:
138
Paper Published
:
1629
No. of Authors
:
4297
About DOIONLINE
Contact
Download Product Flyer
Copyright Form
Publication Charges
Download Sample Paper
Publication Ethics and Publication Malpractice Statement
Join Us
Join Editorial Board
Become a Reviewer
Recommend to Library
Volume-3, Issue-6 ( Jun, 2015 )
Total Viewed 2375
Download Citation
Download Citation
Part 1
1
Improving Safety And Effectiveness Information Sharing For Certified Deduplication
A. B. Manju, S. R. Rajkumar
Page 1-9
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2187
View Here
|
Quick Abstract
|
PDF
|
Viewed - 92
2
Protected Admission Control With Secret Verification For Active Groups In The Cloud
R. S. Geethanjali, J. Janet
Page 10-16
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2188
View Here
|
Quick Abstract
|
PDF
|
Viewed - 81
3
A Load Controlling Design Model With Heterogeneity For The Public Cloud
Keerthi Kommepalli, B.Ramaganesh
Page 17-22
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2189
View Here
|
Quick Abstract
|
PDF
|
Viewed - 95
4
A Multiple Reasoning Strategy For Increasing Conidential And Eficient Inquiry Perturbation
P.Kishore Kumar, B.Ramaganesh
Page 23-28
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2190
View Here
|
Quick Abstract
|
PDF
|
Viewed - 76
5
Attribute-Based Safety Reliable Source Allocation Platform For Collaborative Computing
V.Navya, B.Ramaganesh
Page 29-35
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2191
View Here
|
Quick Abstract
|
PDF
|
Viewed - 79
6
Kerberos Authentication With Cloud Computing Access Control
Santosh Khamitkar, Yaser Fuad Al-Dubai, Parag Bhalchandra, Pawan Wasnik
Page 36-41
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2353
View Here
|
Quick Abstract
|
PDF
|
Viewed - 77
7
Synthesis Of Selected Tree Searching Algorithms
Parag Bhalchandra, Santosh Khamitkar, Pawan Wasnik
Page 42-47
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2354
View Here
|
Quick Abstract
|
PDF
|
Viewed - 72
8
A Local Feature-Based Approach For Activity 3-D Skeleton Posture Retrieval
Md. Zia Uddin
Page 48-52
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2355
View Here
|
Quick Abstract
|
PDF
|
Viewed - 72
9
An Identification Method Of Normal And Edematous Humeral Head From Pd Weighted Mr Images Based On Glcm Texture Features
Aysun Sezer, Hasan Basri Sezer, Songul Albayrak
Page 53-56
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2356
View Here
|
Quick Abstract
|
PDF
|
Viewed - 77
10
Decision Support System For Choosing The Optimal Cad Configuration: Genetic Algorithm Approach
Motasem A. Abu-Dawas
Page 57-59
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2357
View Here
|
Quick Abstract
|
PDF
|
Viewed - 75
11
Word Sense Disambiguation Based Myanmar-To-English Machine Translation System
Aye Mya Nyein, May Zin Oo
Page 60-64
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2358
View Here
|
Quick Abstract
|
PDF
|
Viewed - 71
12
An Enhancement Of Fuzzy-Based Image Denoising For Gaussian Noise
Yin Mon Swe, Nang Aye Aye Htwe
Page 65-69
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2359
View Here
|
Quick Abstract
|
PDF
|
Viewed - 82
13
Image Compression Based On Modified Walsh-Hadamard Transform (MWHT)
Khin Thida Win, Nang Aye Aye Htwe
Page 70-74
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2360
View Here
|
Quick Abstract
|
PDF
|
Viewed - 86
14
Securing And Maintaining Privacy Information Brokering In Distributed Data Sharing
Sanket Divate, Pratap Ghayal, Saurabh Mamidwar, Mayur Narawade, Meghna Lokhande
Page 75-79
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2361
View Here
|
Quick Abstract
|
PDF
|
Viewed - 71
15
K-Zero Day Security: Network Security Metric For Risk Measurement Of Unknown Vulnerability
Mehul Das, Shubham Tripathi, Vikram Jaygude, Mr. Ramnath Banerjee
Page 80-83
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2362
View Here
|
Quick Abstract
|
PDF
|
Viewed - 76
16
Privacy-Preserving And Secured Multi-Keyword Ranked Search Over Encrypted Cloud Data Storage
Kamlesh Pawar, Kunal Ranawade, Vijay Berry
Page 84-86
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2363
View Here
|
Quick Abstract
|
PDF
|
Viewed - 66
17
Dynamic Secret Based Wireless Smart Grid Encryption And Authentication Technique
Shraddha Bagwe, J.W.Bakal
Page 87-90
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2364
View Here
|
Quick Abstract
|
PDF
|
Viewed - 72
18
Dual Mining Approach For Knowledge Discovery In Complex Data
Ashwini Borle, L.K.Vishwamitra
Page 91-102
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2365
View Here
|
Quick Abstract
|
PDF
|
Viewed - 76
19
An Additive Method For Medical Image Fusion Using Ripplet Transform
Rajeshwari S.Goswami, Seema R.Baji
Page 103-105
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2366
View Here
|
Quick Abstract
|
PDF
|
Viewed - 70
20
Cryptographic Techniques For Wireless Sensor Network Security - A Survey
Aiman Faquih, Priyanka Kadam
Page 106-110
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2367
View Here
|
Quick Abstract
|
PDF
|
Viewed - 72
21
A Novel Approach Based Hidden Biometrics: Medical Biometrics As An Aid To Security Biometrics
Apurva Khemani, Harish Chandra Maurya
Page 111-115
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2368
View Here
|
Quick Abstract
|
PDF
|
Viewed - 70
22
Standard Time Calculation (STC) For E-Learning
Manish Kumar Majumdar, Srinivas Choudhury, Roshan Kumar, Anjana Sen
Page 116-118
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2369
View Here
|
Quick Abstract
|
PDF
|
Viewed - 78
23
Forge Detection In Credit Application
P.Charanya, T.Dhivyabharathi, B.Kothai, J.Nivetha
Page 119-125
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2370
View Here
|
Quick Abstract
|
PDF
|
Viewed - 72
24
Speech Emotion Recognition Using Iterative Clustering Technique
R.anila, Dr. A. Revathy
Page 126-129
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2371
View Here
|
Quick Abstract
|
PDF
|
Viewed - 77
25
Context Based Document Retrieval Using Taxonomic Tree Structure
Veena Talikoti, M.Velammal
Page 130-132
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2372
View Here
|
Quick Abstract
|
PDF
|
Viewed - 77
26
Make Web Content Work In Responsive Design
Indu Joseph, V.S. Felix Enigo
Page 133-137
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2373
View Here
|
Quick Abstract
|
PDF
|
Viewed - 73
27
Requirement Analysis Using Requirement Analysis Engine
Ashvini p. Shende, Sarita Byagar, Manisha Patil, Shivaji Gawade
Page 138-140
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2374
View Here
|
Quick Abstract
|
PDF
|
Viewed - 70
28
Detection Of Dos Attacks Through Evidence Collection Using Dempster-Shafer Theory
Shradha S. Ippakayal, Geetanjali S. Dhaygude, Vinaya P. Kalyanshetty, M.N.Ingole
Page 141-143
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2375
View Here
|
Quick Abstract
|
PDF
|
Viewed - 76
29
Formation Of Information Security System Using Artificial Neural Networks And Genetic Algorithms Applying Elgamal Public Key Encryption Algorithm
Harshada Sawant, Revati Salvekar, Dipti Patil, Aishwarya Pandey
Page 144-147
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2376
View Here
|
Quick Abstract
|
PDF
|
Viewed - 76
30
Cloud Based Admission Process System
Mrinalkhadse, Ayushi Aggarwal
Page 148-152
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2377
View Here
|
Quick Abstract
|
PDF
|
Viewed - 74
31
Improving Performance Of System Using Genetic Algorithm With An Optimized Path
Shraddha S.Chaudhari, Pranay Saraf
Page 153-156
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2378
View Here
|
Quick Abstract
|
PDF
|
Viewed - 73
32
Survey On Content Based Retrieval
Milan R. Shetake, Sanjay. B. Waikar
Page 157-161
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2379
View Here
|
Quick Abstract
|
PDF
|
Viewed - 73
33
Design And Implementation Of Node To Node Message Authentication Scheme For Wireless Sensor Network
A. W. Motikar, S. R. Pawde
Page 162-168
DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2445
View Here
|
Quick Abstract
|
PDF
|
Viewed - 80
IRAJ Other Journals
View More
View More
View More
View More
View More
View More
View More
View More
View More
View More
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World
IRAJ Upcoming Conference
This work is licensed under a
Creative Commons Attribution 4.0 International License.
JOURNAL
SUPPORTED BY