International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-8  ( Aug, 2024 )
Past issues
  1. Volume-12,Issue-7  ( Jul, 2024 )
  2. Volume-12,Issue-6  ( Jun, 2024 )
  3. Volume-12,Issue-5  ( May, 2024 )
  4. Volume-12,Issue-4  ( Apr, 2024 )
  5. Volume-12,Issue-3  ( Mar, 2024 )
  6. Volume-12,Issue-2  ( Feb, 2024 )
  7. Volume-12,Issue-1  ( Jan, 2024 )
  8. Volume-11,Issue-12  ( Dec, 2023 )
  9. Volume-11,Issue-11  ( Nov, 2023 )
  10. Volume-11,Issue-10  ( Oct, 2023 )

Statistics report
Dec. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 140
Paper Published : 1656
No. of Authors : 4371
    Volume-3, Issue-5  ( May, 2015 )
Total Viewed 1586
Download Citation    
Download Citation    

Part 1

1
Tumor Detection Using Fuzzy Logic And GMRF
Nithin Krishna. J, Mohammad Aslam. C, Satya Narayana. D, Padma Priya. K
 
Page 1-8

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2040   View Here
| Quick Abstract | PDF |
Viewed - 86
2
An Experimental Study On Obstacles And Management Issues In Software Cost Estimation
Vahid Khatibi Bardsiri, Amin Moradbeiky, Elham Khatibi
 
Page 9-15

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2041   View Here
| Quick Abstract | PDF |
Viewed - 79
3
Marathi Word Sense Disambiguation Using Genetic Algorithm – A Review
Kalyani Mamulkar, Lokesh Nandanwar
 
Page 16-18

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2042   View Here
| Quick Abstract | PDF |
Viewed - 107
4
The Most Common Vulnerabilities And Open Source Prevention Software
Mehmet Mehdi Karakoc, Mustafa Ulas, Asaf Varol
 
Page 19-26

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2043   View Here
| Quick Abstract | PDF |
Viewed - 96
5
A Novel One-Time Password Mutual Authentication Scheme Using Biometrics-Based Key And Visual Secret Sharing
Wei-Bin Lee, Yu-Ting Lin, Min-Hsuan Tsai, Hsing-Bai Chen
 
Page 27-32

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2044   View Here
| Quick Abstract | PDF |
Viewed - 75
6
An Expert System Model That Enables The Development Of Institutional Knowledge Using Text Mining Methods In Open Source Software
Aytug Boyaci, Mustafa Ulas
 
Page 33-36

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2045   View Here
| Quick Abstract | PDF |
Viewed - 81
7
Wireless Sensor Network For Lonely Elderly People Wellness
M.Anjali Manikannan, R.Jayarajan
 
Page 41-45

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2047   View Here
| Quick Abstract | PDF |
Viewed - 74
8
An Efficient Coded Based QOS Routing Mechanism In Wireless Sensor Networks
Shivangi M. Salunkhe, Shashi Prabha
 
Page 46-48

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2048   View Here
| Quick Abstract | PDF |
Viewed - 78
9
Exploring Causal Relations In Data Mining By Using Directed Acyclic Graphs (DAG)
Krishna Murthy Inumula
 
Page 49-55

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2049   View Here
| Quick Abstract | PDF |
Viewed - 78
10
Touchless Writer A Hand Gesture Recognizer For English Characters
Aditya G. Joshi, Darshana V. Kolte, Ashishv. Bandgar, Aakash S. Kadlak, N. S. Patil
 
Page 56-60

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2050   View Here
| Quick Abstract | PDF |
Viewed - 83
11
MIDS: A Decentralized, Multi-Intrusion Detection System
Suraj Krishnamoorthy, Swapnil Girme, Akshay Nair, Abhishek Gaikwad, S.S. Pawar
 
Page 61-63

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2051   View Here
| Quick Abstract | PDF |
Viewed - 75
12
Implementation Of Policy Enforcement Technique For Intrusion Detection System Using Manet's
Ankita Sharma, Darshanaa Birkad, Sabisha Shetty, Shehnaz Jabbar, Hema Kolla
 
Page 64-69

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2052   View Here
| Quick Abstract | PDF |
Viewed - 80
13
Privacy Preserved Social Network With Security
Aswathy Rajeev K, Sunder R
 
Page 70-74

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2053   View Here
| Quick Abstract | PDF |
Viewed - 79
14
Linear Cryptanalysis Of Advanced Encryption Standard Algorithm Based On Swarmintelligence: A Review
Dolly U. Jeswani, Swati G. Kale
 
Page 75-77

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2054   View Here
| Quick Abstract | PDF |
Viewed - 71
15
The Role Of Cognitive Style In The Comprehension Of Systems Analysis Tools
Narasimhaiah Gorla
 
Page 78-81

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2055   View Here
| Quick Abstract | PDF |
Viewed - 73
16
FCHE: Face Classification Using Histogram Equalization
 Arunalatha J S, Suvarna C, Venugopal K R, L M Patnaik
 
Page 82-87

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2056   View Here
| Quick Abstract | PDF |
Viewed - 83
17
Direct To Home Electricity
Rachit Shah, Souradeep Paul
 
Page 88-93

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2057   View Here
| Quick Abstract | PDF |
Viewed - 75
18
Free Energy Formulations And Estimation Of Structural Parameters For A Model Binary Alloy System Using The Cluster Variation Method
P. Kezia, G. Srinivasa Gupta
 
Page 94-97

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2058   View Here
| Quick Abstract | PDF |
Viewed - 79
19
Feature Image Extraction For Real Time Content Based Image Retrieval And Video Indexing
Ghorpade Krishna Bhimraj, Swapnalini Pattanaik
 
Page 98-101

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2059   View Here
| Quick Abstract | PDF |
Viewed - 81
20
Evaluating The Performance Of Manet Protocols Considering Various Parameters
Veena Anand
 
Page 102-105

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-2060   View Here
| Quick Abstract | PDF |
Viewed - 84
21
A Review On Security Issues In Social Networking Websites
Shishpal Jindal
 
Page 106-108

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-3431   View Here
| Quick Abstract | PDF |
Viewed - 51

   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY