International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-9,Issue-6  ( Jun, 2021 )
Past issues
  1. Volume-9,Issue-5  ( May, 2021 )
  2. Volume-9,Issue-4  ( Apr, 2021 )
  3. Volume-9,Issue-3  ( Mar, 2021 )
  4. Volume-9,Issue-2  ( Feb, 2021 )
  5. Volume-9,Issue-1  ( Jan, 2021 )
  6. Volume-8,Issue-12  ( Dec, 2020 )
  7. Volume-8,Issue-11  ( Nov, 2020 )
  8. Volume-8,Issue-10  ( Oct, 2020 )
  9. Volume-8,Issue-9  ( Sep, 2020 )
  10. Volume-8,Issue-8  ( Aug, 2020 )

Statistics report
Oct. 2021
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 101
Paper Published : 1315
No. of Authors : 3319
    Volume-2, Issue-12  ( Dec, 2014 )
Total Viewed 1437
Download Citation    
Download Citation    

Part 1

1
Secure Connectivity in Wireless Sensor Networks by Providing a New Scalable Key Management Scheme
C.THUMMALAPPA, A.K.PUNEETH KUMAR
 
Page 1-8

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1513   View Here
| Quick Abstract | PDF |
Viewed - 95
2
Network Intrusion Node Clone Detection In Virtual Network Systems
R.ASHOK, S.KOKILA, M.GIRI
 
Page 9-14

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1514   View Here
| Quick Abstract | PDF |
Viewed - 64
3
Fuzzy Logic Used for Network Service Maximization
R.NAGA POORNIMA, K.KOTESWAR RAO
 
Page 15-22

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1515   View Here
| Quick Abstract | PDF |
Viewed - 63
4
Disruption-Based Position Of Links Efficiency Maximization
M.Niranjan, K.Lakshmi Narayana, M.Giri
 
Page 23-27

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1517   View Here
| Quick Abstract | PDF |
Viewed - 66
5
Intact Analysis With Compiler And Security Editor
I.Harihara Prasad, K.Narayana, I.Kasthuri
 
Page 28-33

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1518   View Here
| Quick Abstract | PDF |
Viewed - 65
6
A Review On The Concept Of Knowledge And Knowledge Sharing
Sajjad Shalikar, Mohammad Mobin Rupani, Nooh Abu Bakar, Mohammad Amin Borjali
 
Page 34-37

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1532   View Here
| Quick Abstract | PDF |
Viewed - 67
7
UAMPP: Unauthorized Access Model For Peer–To–Peer System
Sai Divya Kalagatla, Ramana Reddy B., Mohana Roopa M.
 
Page 38-42

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1533   View Here
| Quick Abstract | PDF |
Viewed - 71
8
A Rough Set Based Feature Selection Approach For The Prediction Of Learning Disabilities
Sabu M.K
 
Page 43-48

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1534   View Here
| Quick Abstract | PDF |
Viewed - 74
9
Avionics Control Using 3D Gestures
Kumar Amit, Rachna Shivangi
 
Page 49-54

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1535   View Here
| Quick Abstract | PDF |
Viewed - 63
10
Authentication Model For Cloud Computing Using Single Sign-On
Aniesh Krishna K, Balagopalan A S
 
Page 55-60

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1536   View Here
| Quick Abstract | PDF |
Viewed - 70
11
Implementation of three block mat0063hing search algorithms in h. 264 on CUDA
Renuka Joshi, Jancy James, Sagar Karwande, Darshan Pawar
 
Page 61-65

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1537   View Here
| Quick Abstract | PDF |
Viewed - 75
12
Static Detection of Unsafe Component Loadings on Windows
Sneha D. Patel, Tareek M. Pattewar
 
Page 66-71

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1538   View Here
| Quick Abstract | PDF |
Viewed - 62
13
Enhancing Access Control And Efficiency In Attribute Based Data Sharing Using JMA
Nazneen Banu, K.Vinay Kumar
 
Page 72-77

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1539   View Here
| Quick Abstract | PDF |
Viewed - 62
14
SMAC: Revolutionary Technology & Security: Rip?
Moutan Sarkar, Arjun Chetry
 
Page 78-80

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1540   View Here
| Quick Abstract | PDF |
Viewed - 85
15
A Study On Electronic Medical Record System For Clinical Data Storage In The Selected Hospitals
Rajesh R Mane, R.V.Kulkarni
 
Page 81-84

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1541   View Here
| Quick Abstract | PDF |
Viewed - 69
16
LFSR Based Stream Cipher (Enhanced A5/1)
Amandeep Singh Bhal, Zhilmil Dhillon
 
Page 85-90

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1542   View Here
| Quick Abstract | PDF |
Viewed - 66
17
Uses The Bagging Algorithm of Classification Method With Weka Tool For Prediction Technique
Pooja Shrivastava, Manoj Shukla
 
Page 91-95

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1543   View Here
| Quick Abstract | PDF |
Viewed - 70
18
Implementation Of IHS Fusion Technique And Comparative Analysis With PCA Fusion Technique For Cotton Contaminants Detection
Vijendra Kumar, Maitreyee Dutta, Surender Singh Saini
 
Page 96-100

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1593   View Here
| Quick Abstract | PDF |
Viewed - 88
19
Adaptive Hierarchical Leader Follower with Evolutionary Computing Algorithm for Email Classification
U. Surya Kameswari, I. Ramesh Babu
 
Page 101-104

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1545   View Here
| Quick Abstract | PDF |
Viewed - 78
20
Cloud Computing And Virtual Resources That Maintain And Secure Educlouds
S.Ambareesh, Silambarasan.K
 
Page 105-108

DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-1590   View Here
| Quick Abstract | PDF |
Viewed - 76

   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY