International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
IRAJ Home
IJACEN Home
About IJACEN
Call For Paper
Guidelines
Author's Guidelines
Reviewer Guidelines
Special Issues
Special Issues
Special Issue-1 June 2015 ( Jun, 2015 )
Indexing
Editiorial Borad
Join Us
Join Editiorial Borad
Resources
Publisher
Review Process
Contact
current issues
Volume-13,Issue-1 ( Jan, 2025 )
View More
Past issues
Volume-12,Issue-12 ( Dec, 2024 )
Volume-12,Issue-11 ( Nov, 2024 )
Volume-12,Issue-10 ( Oct, 2024 )
Volume-12,Issue-9 ( Sep, 2024 )
Volume-12,Issue-8 ( Aug, 2024 )
Volume-12,Issue-7 ( Jul, 2024 )
Volume-12,Issue-6 ( Jun, 2024 )
Volume-12,Issue-5 ( May, 2024 )
Volume-12,Issue-4 ( Apr, 2024 )
Volume-12,Issue-3 ( Mar, 2024 )
Volume-12,Issue-2 ( Feb, 2024 )
Volume-12,Issue-1 ( Jan, 2024 )
Volume-11,Issue-12 ( Dec, 2023 )
Volume-11,Issue-11 ( Nov, 2023 )
Volume-11,Issue-10 ( Oct, 2023 )
Volume-11,Issue-9 ( Sep, 2023 )
Volume-11,Issue-8 ( Aug, 2023 )
Volume-11,Issue-7 ( Jul, 2023 )
Volume-11,Issue-6 ( Jun, 2023 )
Volume-11,Issue-5 ( May, 2023 )
Volume-11,Issue-4 ( Apr, 2023 )
Volume-11,Issue-3 ( Mar, 2023 )
Volume-11,Issue-2 ( Feb, 2023 )
Volume-11,Issue-1 ( Jan, 2023 )
Volume-10,Issue-12 ( Dec, 2022 )
Volume-10,Issue-11 ( Nov, 2022 )
Volume-10,Issue-10 ( Oct, 2022 )
Volume-10,Issue-9 ( Sep, 2022 )
Volume-10,Issue-8 ( Aug, 2022 )
Volume-10,Issue-7 ( Jul, 2022 )
Volume-10,Issue-6 ( Jun, 2022 )
Volume-10,Issue-5 ( May, 2022 )
Volume-10,Issue-4 ( Apr, 2022 )
Volume-10,Issue-3 ( Mar, 2022 )
Volume-10,Issue-2 ( Feb, 2022 )
Volume-10,Issue-1 ( Jan, 2022 )
Volume-9,Issue-12 ( Dec, 2021 )
Volume-9,Issue-11 ( Nov, 2021 )
Volume-9,Issue-10 ( Oct, 2021 )
Volume-9,Issue-9 ( Sep, 2021 )
Volume-9,Issue-8 ( Aug, 2021 )
Volume-9,Issue-7 ( Jul, 2021 )
Volume-9,Issue-6 ( Jun, 2021 )
Volume-9,Issue-5 ( May, 2021 )
Volume-9,Issue-4 ( Apr, 2021 )
Volume-9,Issue-3 ( Mar, 2021 )
Volume-9,Issue-2 ( Feb, 2021 )
Volume-9,Issue-1 ( Jan, 2021 )
Volume-8,Issue-12 ( Dec, 2020 )
Volume-8,Issue-11 ( Nov, 2020 )
Volume-8,Issue-10 ( Oct, 2020 )
Volume-8,Issue-9 ( Sep, 2020 )
Volume-8,Issue-8 ( Aug, 2020 )
Volume-8,Issue-7 ( Jul, 2020 )
Volume-8,Issue-6 ( Jun, 2020 )
Volume-8,Issue-5 ( May, 2020 )
Volume-8,Issue-4 ( Apr, 2020 )
Volume-8,Issue-3 ( Mar, 2020 )
Volume-8,Issue-2 ( Feb, 2020 )
Volume-8,Issue-1 ( Jan, 2020 )
Volume-7,Issue-12 ( Dec, 2019 )
Volume-7,Issue-11 ( Nov, 2019 )
Volume-7, Issue-10 ( Oct, 2019 )
Volume-7, Issue-9 ( Sep, 2019 )
Volume-7, Issue-8 ( Aug, 2019 )
Volume-7, Issue-7 ( Jul, 2019 )
Volume-7, Issue-6 ( Jun, 2019 )
Volume-7, Issue-5 ( May, 2019 )
Volume-7, Issue-4 ( Apr, 2019 )
Volume-7, Issue-3 ( Mar, 2019 )
Volume-7, Issue-2 ( Feb, 2019 )
Volume-7, Issue-1 ( Jan, 2019 )
Volume-6, Issue-12 ( Dec, 2018 )
Volume-6, Issue-11 ( Nov, 2018 )
Volume-6, Issue-10 ( Oct, 2018 )
Volume-6, Issue-9 ( Sep, 2018 )
Volume-6, Issue-8 ( Aug, 2018 )
Volume-6, Issue-7 ( Jul, 2018 )
Volume-6, Issue-6 ( Jun, 2018 )
Volume-6, Issue-5 ( May, 2018 )
Volume-6, Issue-4 ( Apr, 2018 )
Volume-6, Issue-3 ( Mar, 2018 )
Volume-6, Issue-2 ( Feb, 2018 )
Volume-6, Issue-1 ( Jan, 2018 )
Volume-5,Issue-12 ( Dec, 2017 )
Volume-5,Issue-11 ( Nov, 2017 )
Volume-5,Issue-10 ( Oct, 2017 )
Volume-5,Issue-9 ( Sep, 2017 )
Volume-5,Issue-8 ( Aug, 2017 )
Volume-5,Issue-7 ( Jul, 2017 )
Volume-5,Issue-6 ( Jun, 2017 )
Volume-5,Issue-5 ( May, 2017 )
Volume-5, Issue-4 ( Apr, 2017 )
Volume-5, Issue-3 ( Mar, 2017 )
Volume-5, Issue-2 ( Feb, 2017 )
Volume-5, Issue-1 ( Jan, 2017 )
Volume-4, Issue-12 ( Dec, 2016 )
Volume-4, Issue-11 ( Nov, 2016 )
Volume-4, Issue-10 ( Oct, 2016 )
Volume-4, Issue-9 ( Sep, 2016 )
Volume-4, Issue-8 ( Aug, 2016 )
Volume-4, Issue-7 ( Jul, 2016 )
Volume-4, Issue-6 ( Jun, 2016 )
Volume-4,Issue-5 ( May, 2016 )
Volume-4,Issue-4 ( Apr, 2016 )
Volume-4,Issue-3 ( Mar, 2016 )
Volume-4,Issue-2 ( Feb, 2016 )
Volume-4,Issue-1 ( Jan, 2016 )
Volume-3,Issue-12 ( Dec, 2015 )
Volume-3,Issue-11 ( Nov, 2015 )
Volume-3, Issue-10 ( Oct, 2015 )
Volume-3, Issue-9 ( Sep, 2015 )
Volume-3, Issue-8 ( Aug, 2015 )
Volume-3, Issue-7 ( Jul, 2015 )
Volume-3, Issue-6 ( Jun, 2015 )
Volume-3, Issue-5 ( May, 2015 )
Volume-3, Issue-4 ( Apr, 2015 )
Volume-3, Issue-3 ( Mar, 2015 )
Volume-3, Issue-2 ( Feb, 2015 )
Volume-3, Issue-1 ( Jan, 2015 )
Volume-2, Issue-12 ( Dec, 2014 )
Volume-2,Issue-11 ( Nov, 2014 )
Volume-2,Issue-10 ( Oct, 2014 )
Volume-2,Issue-9 ( Sep, 2014 )
Volume-2,Issue-8 ( Aug, 2014 )
Volume-2,Issue-7 ( Jul, 2014 )
Volume-2,Issue-6 ( Jun, 2014 )
Volume-5, Issue-5 ( May, 2014 )
Volume-2,Issue-5 ( May, 2014 )
Volume-2,Issue-4 ( Apr, 2014 )
Volume-2,Issue-3 ( Mar, 2014 )
Volume-2,Issue-2 ( Feb, 2014 )
Volume-2,Issue-1 ( Jan, 2014 )
Volume-1,Issue-10 ( Dec, 2013 )
Volume-1,Issue-9 ( Nov, 2013 )
Volume-1,Issue-8 ( Oct, 2013 )
Volume-1,Issue-7 ( Sep, 2013 )
Volume-1,Issue-6 ( Aug, 2013 )
Volume-1,Issue-5 ( Jul, 2013 )
Volume-1,Issue-4 ( Jun, 2013 )
Volume-1,Issue-3 ( May, 2013 )
Volume-1,Issue-2 ( Apr, 2013 )
Volume-1,Issue-1 ( Mar, 2013 )
View More
Statistics report
May. 2025
Submitted Papers
:
80
Accepted Papers
:
10
Rejected Papers
:
70
Acc. Perc
:
12%
Issue Published
:
145
Paper Published
:
1692
No. of Authors
:
4498
About DOIONLINE
Contact
Download Product Flyer
Copyright Form
Publication Charges
Download Sample Paper
Publication Ethics and Publication Malpractice Statement
Join Us
Join Editorial Board
Become a Reviewer
Recommend to Library
Volume-3, Issue-6 ( Jun, 2015 )
Total Viewed 2375
Download Citation
Download Citation
Part 1
1
Improving Safety And Effectiveness Information Sharing For Certified Deduplication
A. B. Manju, S. R. Rajkumar
Page 1-9
|
Quick Abstract
|
PDF
|
Viewed - 92
2
Protected Admission Control With Secret Verification For Active Groups In The Cloud
R. S. Geethanjali, J. Janet
Page 10-16
|
Quick Abstract
|
PDF
|
Viewed - 81
3
A Load Controlling Design Model With Heterogeneity For The Public Cloud
Keerthi Kommepalli, B.Ramaganesh
Page 17-22
|
Quick Abstract
|
PDF
|
Viewed - 95
4
A Multiple Reasoning Strategy For Increasing Conidential And Eficient Inquiry Perturbation
P.Kishore Kumar, B.Ramaganesh
Page 23-28
|
Quick Abstract
|
PDF
|
Viewed - 76
5
Attribute-Based Safety Reliable Source Allocation Platform For Collaborative Computing
V.Navya, B.Ramaganesh
Page 29-35
|
Quick Abstract
|
PDF
|
Viewed - 79
6
Kerberos Authentication With Cloud Computing Access Control
Santosh Khamitkar, Yaser Fuad Al-Dubai, Parag Bhalchandra, Pawan Wasnik
Page 36-41
|
Quick Abstract
|
PDF
|
Viewed - 77
7
Synthesis Of Selected Tree Searching Algorithms
Parag Bhalchandra, Santosh Khamitkar, Pawan Wasnik
Page 42-47
|
Quick Abstract
|
PDF
|
Viewed - 72
8
A Local Feature-Based Approach For Activity 3-D Skeleton Posture Retrieval
Md. Zia Uddin
Page 48-52
|
Quick Abstract
|
PDF
|
Viewed - 72
9
An Identification Method Of Normal And Edematous Humeral Head From Pd Weighted Mr Images Based On Glcm Texture Features
Aysun Sezer, Hasan Basri Sezer, Songul Albayrak
Page 53-56
|
Quick Abstract
|
PDF
|
Viewed - 77
10
Decision Support System For Choosing The Optimal Cad Configuration: Genetic Algorithm Approach
Motasem A. Abu-Dawas
Page 57-59
|
Quick Abstract
|
PDF
|
Viewed - 75
11
Word Sense Disambiguation Based Myanmar-To-English Machine Translation System
Aye Mya Nyein, May Zin Oo
Page 60-64
|
Quick Abstract
|
PDF
|
Viewed - 71
12
An Enhancement Of Fuzzy-Based Image Denoising For Gaussian Noise
Yin Mon Swe, Nang Aye Aye Htwe
Page 65-69
|
Quick Abstract
|
PDF
|
Viewed - 82
13
Image Compression Based On Modified Walsh-Hadamard Transform (MWHT)
Khin Thida Win, Nang Aye Aye Htwe
Page 70-74
|
Quick Abstract
|
PDF
|
Viewed - 86
14
Securing And Maintaining Privacy Information Brokering In Distributed Data Sharing
Sanket Divate, Pratap Ghayal, Saurabh Mamidwar, Mayur Narawade, Meghna Lokhande
Page 75-79
|
Quick Abstract
|
PDF
|
Viewed - 71
15
K-Zero Day Security: Network Security Metric For Risk Measurement Of Unknown Vulnerability
Mehul Das, Shubham Tripathi, Vikram Jaygude, Mr. Ramnath Banerjee
Page 80-83
|
Quick Abstract
|
PDF
|
Viewed - 76
16
Privacy-Preserving And Secured Multi-Keyword Ranked Search Over Encrypted Cloud Data Storage
Kamlesh Pawar, Kunal Ranawade, Vijay Berry
Page 84-86
|
Quick Abstract
|
PDF
|
Viewed - 66
17
Dynamic Secret Based Wireless Smart Grid Encryption And Authentication Technique
Shraddha Bagwe, J.W.Bakal
Page 87-90
|
Quick Abstract
|
PDF
|
Viewed - 72
18
Dual Mining Approach For Knowledge Discovery In Complex Data
Ashwini Borle, L.K.Vishwamitra
Page 91-102
|
Quick Abstract
|
PDF
|
Viewed - 76
19
An Additive Method For Medical Image Fusion Using Ripplet Transform
Rajeshwari S.Goswami, Seema R.Baji
Page 103-105
|
Quick Abstract
|
PDF
|
Viewed - 70
20
Cryptographic Techniques For Wireless Sensor Network Security - A Survey
Aiman Faquih, Priyanka Kadam
Page 106-110
|
Quick Abstract
|
PDF
|
Viewed - 72
21
A Novel Approach Based Hidden Biometrics: Medical Biometrics As An Aid To Security Biometrics
Apurva Khemani, Harish Chandra Maurya
Page 111-115
|
Quick Abstract
|
PDF
|
Viewed - 70
22
Standard Time Calculation (STC) For E-Learning
Manish Kumar Majumdar, Srinivas Choudhury, Roshan Kumar, Anjana Sen
Page 116-118
|
Quick Abstract
|
PDF
|
Viewed - 78
23
Forge Detection In Credit Application
P.Charanya, T.Dhivyabharathi, B.Kothai, J.Nivetha
Page 119-125
|
Quick Abstract
|
PDF
|
Viewed - 72
24
Speech Emotion Recognition Using Iterative Clustering Technique
R.anila, Dr. A. Revathy
Page 126-129
|
Quick Abstract
|
PDF
|
Viewed - 77
25
Context Based Document Retrieval Using Taxonomic Tree Structure
Veena Talikoti, M.Velammal
Page 130-132
|
Quick Abstract
|
PDF
|
Viewed - 77
26
Make Web Content Work In Responsive Design
Indu Joseph, V.S. Felix Enigo
Page 133-137
|
Quick Abstract
|
PDF
|
Viewed - 73
27
Requirement Analysis Using Requirement Analysis Engine
Ashvini p. Shende, Sarita Byagar, Manisha Patil, Shivaji Gawade
Page 138-140
|
Quick Abstract
|
PDF
|
Viewed - 70
28
Detection Of Dos Attacks Through Evidence Collection Using Dempster-Shafer Theory
Shradha S. Ippakayal, Geetanjali S. Dhaygude, Vinaya P. Kalyanshetty, M.N.Ingole
Page 141-143
|
Quick Abstract
|
PDF
|
Viewed - 76
29
Formation Of Information Security System Using Artificial Neural Networks And Genetic Algorithms Applying Elgamal Public Key Encryption Algorithm
Harshada Sawant, Revati Salvekar, Dipti Patil, Aishwarya Pandey
Page 144-147
|
Quick Abstract
|
PDF
|
Viewed - 76
30
Cloud Based Admission Process System
Mrinalkhadse, Ayushi Aggarwal
Page 148-152
|
Quick Abstract
|
PDF
|
Viewed - 74
31
Improving Performance Of System Using Genetic Algorithm With An Optimized Path
Shraddha S.Chaudhari, Pranay Saraf
Page 153-156
|
Quick Abstract
|
PDF
|
Viewed - 73
32
Survey On Content Based Retrieval
Milan R. Shetake, Sanjay. B. Waikar
Page 157-161
|
Quick Abstract
|
PDF
|
Viewed - 73
33
Design And Implementation Of Node To Node Message Authentication Scheme For Wireless Sensor Network
A. W. Motikar, S. R. Pawde
Page 162-168
|
Quick Abstract
|
PDF
|
Viewed - 80
IRAJ Other Journals
View More
View More
View More
View More
View More
View More
View More
View More
View More
View More
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World
IRAJ Upcoming Conference
This work is licensed under a
Creative Commons Attribution 4.0 International License.
JOURNAL
SUPPORTED BY