International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-9,Issue-1  ( Jan, 2021 )
Past issues
  1. Volume-8,Issue-12  ( Dec, 2020 )
  2. Volume-8,Issue-11  ( Nov, 2020 )
  3. Volume-8,Issue-10  ( Oct, 2020 )
  4. Volume-8,Issue-9  ( Sep, 2020 )
  5. Volume-8,Issue-8  ( Aug, 2020 )
  6. Volume-8,Issue-7  ( Jul, 2020 )
  7. Volume-8,Issue-6  ( Jun, 2020 )
  8. Volume-8,Issue-5  ( May, 2020 )
  9. Volume-8,Issue-4  ( Apr, 2020 )
  10. Volume-8,Issue-3  ( Mar, 2020 )

Statistics report
Apr. 2021
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 96
Paper Published : 1284
No. of Authors : 3226
    Volume-3, Issue-8  ( Aug, 2015 )
Total Viewed 2083
Download Citation    
Download Citation    

Part 1

1
A Slicing-Based Effort Estimation Approach For Open-Source Software Projects
Hakam W. Alomari
 
Page 1-7

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2678   View Here
| Quick Abstract | PDF |
Viewed - 110
2
Measuring The Delone And Mclean Model Of Information Systems Success Applied To Banking Sector Of Turkey
Busra Kutlu, Asil Alkaya
 
Page 8-13

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2679   View Here
| Quick Abstract | PDF |
Viewed - 110
3
Time Based Discovering Of Web User Patterns To Optimize Web Sites And Hyperlinks
Emrah Donmez, Alper Ozcan
 
Page 14-20

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2680   View Here
| Quick Abstract | PDF |
Viewed - 87
4
Software Maintenance Process Model After Delivery With Qualified Output
Saleem Al-Zoubi
 
Page 21-25

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2681   View Here
| Quick Abstract | PDF |
Viewed - 87
5
Forecasting Of Literacy Rate Using Statistical And Data Mining Methods
Swati Jain, Nitin Mishra
 
Page 26-31

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2682   View Here
| Quick Abstract | PDF |
Viewed - 90
6
A Discussion About Honeypots And Different Models Based On Honeypots
Snehil Vidwarshi, Atul Tyagi, Rishi Kumar
 
Page 32-40

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2683   View Here
| Quick Abstract | PDF |
Viewed - 88
7
Symmetric Key Cryptographic Technique Using Digital Logic Concept
Joyita Goswami (Ghosh), Manas Paul
 
Page 41-45

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2684   View Here
| Quick Abstract | PDF |
Viewed - 81
8
An Automatic Text Summarization For Malayalam Using Sentence Extraction
Renjith S R, Sony P
 
Page 46-50

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2685   View Here
| Quick Abstract | PDF |
Viewed - 117
9
Compound Approach For Digital Image Of Sobel, Canny And Log Edge Detection Techniques
Harpreet Singh, Mandeep Kaur
 
Page 51-54

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2686   View Here
| Quick Abstract | PDF |
Viewed - 282
10
Instant Fuzzy Based Efficient Search Engine Using Proximity Ranking
Ratnesh Kumar Choudhary, Anil Warbhe, Shyam Prakash Dubey
 
Page 59-65

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2688   View Here
| Quick Abstract | PDF |
Viewed - 77
11
A Future Of Internet- Internet Of Things Its Security And Privacy Issues
Devendra S Kushwaha, Vikash K Singh, Manish Taram, Shaibya Singh
 
Page 66-71

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2689   View Here
| Quick Abstract | PDF |
Viewed - 85
12
Software Development, Testing And Utility Theory In Insurance
Dinesh Kumar Saini, Nebras Altar
 
Page 72-75

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2690   View Here
| Quick Abstract | PDF |
Viewed - 82
13
Study On Energy Consumption And Carbon Footprint On Application Of Cloud Computing Case Study: Segi University
Khaled Obaideen, Putri Nadzrul Faizura
 
Page 76-80

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2691   View Here
| Quick Abstract | PDF |
Viewed - 87
14
Generalized Regression Neural Networks For Reservoir Level Modeling
Fatih Unes, Mustafa Demirci
 
Page 81-84

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2692   View Here
| Quick Abstract | PDF |
Viewed - 85
15
Knn Based Twitter Newscaster
Prasad j. Koyande, kavita P. Shirsat
 
Page 85-88

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2693   View Here
| Quick Abstract | PDF |
Viewed - 85
16
Analysis Of Development Phases In Digital Forensics Model
Snehil Vidwarshi, Nidhi Chandra
 
Page 89-95

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2694   View Here
| Quick Abstract | PDF |
Viewed - 75
17
Location Recognition Using Prioritized Matching Algorithm
Lakshmidevi.G, Girish.H
 
Page 96-100

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2695   View Here
| Quick Abstract | PDF |
Viewed - 75
18
Game Theory And Business Intelligence In Strategic Business Decisions- A Review
Violet Asikomurwa, Manar Mohaisen
 
Page 101-105

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2696   View Here
| Quick Abstract | PDF |
Viewed - 84
19
Framing Honest Participants In A Fault Tolerant Group Key Agreement Protocol
Ziba Eslami, Saeideh Kabiri-Rad
 
Page 106-108

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2697   View Here
| Quick Abstract | PDF |
Viewed - 78
20
Administration Module Of Web Servers In Hmast
Amaury Viera, Jenrry Cordero
 
Page 109-115

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2698   View Here
| Quick Abstract | PDF |
Viewed - 72
21
Enhanced Network Storage And Processing In A Cloud Environment
Srinath S, Arun Kumar C, Siddarth Madan K
 
Page 116-120

DOIONLINE NO - IJACEN-IRAJ-DOIONLNE-2699   View Here
| Quick Abstract | PDF |
Viewed - 78

   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY