International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
IRAJ Home
IJACEN Home
About IJACEN
Call For Paper
Guidelines
Author's Guidelines
Reviewer Guidelines
Special Issues
Special Issues
Special Issue-1 June 2015 ( Jun, 2015 )
Indexing
Editiorial Borad
Join Us
Join Editiorial Borad
Resources
Publisher
Review Process
Contact
current issues
Volume-12,Issue-12 ( Dec, 2024 )
View More
Past issues
Volume-12,Issue-11 ( Nov, 2024 )
Volume-12,Issue-10 ( Oct, 2024 )
Volume-12,Issue-9 ( Sep, 2024 )
Volume-12,Issue-8 ( Aug, 2024 )
Volume-12,Issue-7 ( Jul, 2024 )
Volume-12,Issue-6 ( Jun, 2024 )
Volume-12,Issue-5 ( May, 2024 )
Volume-12,Issue-4 ( Apr, 2024 )
Volume-12,Issue-3 ( Mar, 2024 )
Volume-12,Issue-2 ( Feb, 2024 )
Volume-12,Issue-1 ( Jan, 2024 )
Volume-11,Issue-12 ( Dec, 2023 )
Volume-11,Issue-11 ( Nov, 2023 )
Volume-11,Issue-10 ( Oct, 2023 )
Volume-11,Issue-9 ( Sep, 2023 )
Volume-11,Issue-8 ( Aug, 2023 )
Volume-11,Issue-7 ( Jul, 2023 )
Volume-11,Issue-6 ( Jun, 2023 )
Volume-11,Issue-5 ( May, 2023 )
Volume-11,Issue-4 ( Apr, 2023 )
Volume-11,Issue-3 ( Mar, 2023 )
Volume-11,Issue-2 ( Feb, 2023 )
Volume-11,Issue-1 ( Jan, 2023 )
Volume-10,Issue-12 ( Dec, 2022 )
Volume-10,Issue-11 ( Nov, 2022 )
Volume-10,Issue-10 ( Oct, 2022 )
Volume-10,Issue-9 ( Sep, 2022 )
Volume-10,Issue-8 ( Aug, 2022 )
Volume-10,Issue-7 ( Jul, 2022 )
Volume-10,Issue-6 ( Jun, 2022 )
Volume-10,Issue-5 ( May, 2022 )
Volume-10,Issue-4 ( Apr, 2022 )
Volume-10,Issue-3 ( Mar, 2022 )
Volume-10,Issue-2 ( Feb, 2022 )
Volume-10,Issue-1 ( Jan, 2022 )
Volume-9,Issue-12 ( Dec, 2021 )
Volume-9,Issue-11 ( Nov, 2021 )
Volume-9,Issue-10 ( Oct, 2021 )
Volume-9,Issue-9 ( Sep, 2021 )
Volume-9,Issue-8 ( Aug, 2021 )
Volume-9,Issue-7 ( Jul, 2021 )
Volume-9,Issue-6 ( Jun, 2021 )
Volume-9,Issue-5 ( May, 2021 )
Volume-9,Issue-4 ( Apr, 2021 )
Volume-9,Issue-3 ( Mar, 2021 )
Volume-9,Issue-2 ( Feb, 2021 )
Volume-9,Issue-1 ( Jan, 2021 )
Volume-8,Issue-12 ( Dec, 2020 )
Volume-8,Issue-11 ( Nov, 2020 )
Volume-8,Issue-10 ( Oct, 2020 )
Volume-8,Issue-9 ( Sep, 2020 )
Volume-8,Issue-8 ( Aug, 2020 )
Volume-8,Issue-7 ( Jul, 2020 )
Volume-8,Issue-6 ( Jun, 2020 )
Volume-8,Issue-5 ( May, 2020 )
Volume-8,Issue-4 ( Apr, 2020 )
Volume-8,Issue-3 ( Mar, 2020 )
Volume-8,Issue-2 ( Feb, 2020 )
Volume-8,Issue-1 ( Jan, 2020 )
Volume-7,Issue-12 ( Dec, 2019 )
Volume-7,Issue-11 ( Nov, 2019 )
Volume-7, Issue-10 ( Oct, 2019 )
Volume-7, Issue-9 ( Sep, 2019 )
Volume-7, Issue-8 ( Aug, 2019 )
Volume-7, Issue-7 ( Jul, 2019 )
Volume-7, Issue-6 ( Jun, 2019 )
Volume-7, Issue-5 ( May, 2019 )
Volume-7, Issue-4 ( Apr, 2019 )
Volume-7, Issue-3 ( Mar, 2019 )
Volume-7, Issue-2 ( Feb, 2019 )
Volume-7, Issue-1 ( Jan, 2019 )
Volume-6, Issue-12 ( Dec, 2018 )
Volume-6, Issue-11 ( Nov, 2018 )
Volume-6, Issue-10 ( Oct, 2018 )
Volume-6, Issue-9 ( Sep, 2018 )
Volume-6, Issue-8 ( Aug, 2018 )
Volume-6, Issue-7 ( Jul, 2018 )
Volume-6, Issue-6 ( Jun, 2018 )
Volume-6, Issue-5 ( May, 2018 )
Volume-6, Issue-4 ( Apr, 2018 )
Volume-6, Issue-3 ( Mar, 2018 )
Volume-6, Issue-2 ( Feb, 2018 )
Volume-6, Issue-1 ( Jan, 2018 )
Volume-5,Issue-12 ( Dec, 2017 )
Volume-5,Issue-11 ( Nov, 2017 )
Volume-5,Issue-10 ( Oct, 2017 )
Volume-5,Issue-9 ( Sep, 2017 )
Volume-5,Issue-8 ( Aug, 2017 )
Volume-5,Issue-7 ( Jul, 2017 )
Volume-5,Issue-6 ( Jun, 2017 )
Volume-5,Issue-5 ( May, 2017 )
Volume-5, Issue-4 ( Apr, 2017 )
Volume-5, Issue-3 ( Mar, 2017 )
Volume-5, Issue-2 ( Feb, 2017 )
Volume-5, Issue-1 ( Jan, 2017 )
Volume-4, Issue-12 ( Dec, 2016 )
Volume-4, Issue-11 ( Nov, 2016 )
Volume-4, Issue-10 ( Oct, 2016 )
Volume-4, Issue-9 ( Sep, 2016 )
Volume-4, Issue-8 ( Aug, 2016 )
Volume-4, Issue-7 ( Jul, 2016 )
Volume-4, Issue-6 ( Jun, 2016 )
Volume-4,Issue-5 ( May, 2016 )
Volume-4,Issue-4 ( Apr, 2016 )
Volume-4,Issue-3 ( Mar, 2016 )
Volume-4,Issue-2 ( Feb, 2016 )
Volume-4,Issue-1 ( Jan, 2016 )
Volume-3,Issue-12 ( Dec, 2015 )
Volume-3,Issue-11 ( Nov, 2015 )
Volume-3, Issue-10 ( Oct, 2015 )
Volume-3, Issue-9 ( Sep, 2015 )
Volume-3, Issue-8 ( Aug, 2015 )
Volume-3, Issue-7 ( Jul, 2015 )
Volume-3, Issue-6 ( Jun, 2015 )
Volume-3, Issue-5 ( May, 2015 )
Volume-3, Issue-4 ( Apr, 2015 )
Volume-3, Issue-3 ( Mar, 2015 )
Volume-3, Issue-2 ( Feb, 2015 )
Volume-3, Issue-1 ( Jan, 2015 )
Volume-2, Issue-12 ( Dec, 2014 )
Volume-2,Issue-11 ( Nov, 2014 )
Volume-2,Issue-10 ( Oct, 2014 )
Volume-2,Issue-9 ( Sep, 2014 )
Volume-2,Issue-8 ( Aug, 2014 )
Volume-2,Issue-7 ( Jul, 2014 )
Volume-2,Issue-6 ( Jun, 2014 )
Volume-2,Issue-5 ( May, 2014 )
Volume-5, Issue-5 ( May, 2014 )
Volume-2,Issue-4 ( Apr, 2014 )
Volume-2,Issue-3 ( Mar, 2014 )
Volume-2,Issue-2 ( Feb, 2014 )
Volume-2,Issue-1 ( Jan, 2014 )
Volume-1,Issue-10 ( Dec, 2013 )
Volume-1,Issue-9 ( Nov, 2013 )
Volume-1,Issue-8 ( Oct, 2013 )
Volume-1,Issue-7 ( Sep, 2013 )
Volume-1,Issue-6 ( Aug, 2013 )
Volume-1,Issue-5 ( Jul, 2013 )
Volume-1,Issue-4 ( Jun, 2013 )
Volume-1,Issue-3 ( May, 2013 )
Volume-1,Issue-2 ( Apr, 2013 )
Volume-1,Issue-1 ( Mar, 2013 )
View More
Statistics report
May. 2025
Submitted Papers
:
80
Accepted Papers
:
10
Rejected Papers
:
70
Acc. Perc
:
12%
Issue Published
:
144
Paper Published
:
1690
No. of Authors
:
4493
About DOIONLINE
Contact
Download Product Flyer
Copyright Form
Publication Charges
Download Sample Paper
Publication Ethics and Publication Malpractice Statement
Join Us
Join Editorial Board
Become a Reviewer
Recommend to Library
Volume-2,Issue-8 ( Aug, 2014 )
Total Viewed 1071
Download Citation
Download Citation
Part 1
1
Opportunistic Routing In Cognitive Radio Networks Using Reinforcement Learning
Jitisha R. Patel, Sunita S. Barve
Page 1-3
|
Quick Abstract
|
PDF
|
Viewed - 60
2
A Survey On Clustering Techniques Used In Vehicular AD HOC Network
Tadiparthi Priyanka, T. P. Sharma
Page 4-9
|
Quick Abstract
|
PDF
|
Viewed - 56
3
Privacy In Vehicular Ad Hoc Networks: A Review
Tadiparthi Priyanka, T. P. Sharma
Page 10-16
|
Quick Abstract
|
PDF
|
Viewed - 55
4
Investigations On Mesh Discretization Error In Fem Based Structural Analysis Using Ansys
Naik Nithesh, George Varghese, Suhas Kowshik CS
Page 17-22
|
Quick Abstract
|
PDF
|
Viewed - 47
5
OPTAR: Optional PIR Based Trusted Address Resolution For DNS
Radhakrishna Bhat, N R Sunitha
Page 23-28
|
Quick Abstract
|
PDF
|
Viewed - 65
6
Architecture Of Beverage Vending Machine Leveraging The Automated Teller Machine
Srivatsan Sridharan, Sridhar Jammalamadaka
Page 29-33
|
Quick Abstract
|
PDF
|
Viewed - 51
7
A New Cryptosystem Based On Polyalphabetic Substitution Scheme With Multiple Number Of Vigenere Table
Ranju S Kartha, Varghese Paul
Page 34-38
|
Quick Abstract
|
PDF
|
Viewed - 55
8
Trust Management Schemes For Intrusion Detection Systems -A Survey
Deepa S, Supriya M
Page 39-43
|
Quick Abstract
|
PDF
|
Viewed - 54
9
Object Detection And Tracking: Experiences With Conventional Image Processing Techniques On Vehicular Traffic Video
Rashmit Singh Girvar Singh Sukhmani, Prasun Kumar Gupta, Swapnil Jha
Page 44-49
|
Quick Abstract
|
PDF
|
Viewed - 51
10
An Automated Trust Model For Client-Server And Peer-To-Peer System
Lanke Pravin, Sachin Malve
Page 50-55
|
Quick Abstract
|
PDF
|
Viewed - 46
11
Excess Entropy Based Outlier Detection In Categorical Data Set
Ashwini G. Sagade, Ritesh Thakur
Page 56-61
|
Quick Abstract
|
PDF
|
Viewed - 58
12
An Enhanced Secure Routing Algorithm Against Sinkhole Attack In Wireless Sensor Networks
Vandana Salve, Leena Ragha, Nilesh Marathe
Page 62-67
|
Quick Abstract
|
PDF
|
Viewed - 44
13
Scalable Privacy Preservation Of EHRS Using Data Anonymization On Mapreduce Framework
Yasir Hamid Wani, Vivekanandreddy, Inam Ul Islam Wani
Page 68-72
|
Quick Abstract
|
PDF
|
Viewed - 55
14
A Variational Approach To Pixel-Wise Adaptive Threshoding For An Accurate Moving Object Detection
Suregha K R, Muhammad Asif A Raibag
Page 73-76
|
Quick Abstract
|
PDF
|
Viewed - 55
15
World Tourister – An Android Application As Travel Mate
Amit Dhanwani, Ruhi Bajaj
Page 77-82
|
Quick Abstract
|
PDF
|
Viewed - 66
16
Key Frame Selection From Video Based On Weighted Minkowski Distance
Arun Kumar Gautam
Page 83-86
|
Quick Abstract
|
PDF
|
Viewed - 45
17
Securing DCIM For Maintaining Cache Consistency In WMN Using Rc6
Ankita Umale, Priyanka Fulare
Page 87-92
|
Quick Abstract
|
PDF
|
Viewed - 50
18
A Survey Of Moving Object Tracking In Video Frame Sequences
Sindhu.K, Revathi.A.R, Merlin Pauliesther
Page 93-98
|
Quick Abstract
|
PDF
|
Viewed - 58
19
Schemes For Providing Routing Security In Manet - A Survey
Anu C. S., Supriya M.
Page 99-103
|
Quick Abstract
|
PDF
|
Viewed - 54
20
Common Facts Publishing For Privacy Preserve Portable Strength Monitoring
G. Suneel Kumar Reddy, S. Shafiullah, M.Giri
Page 104-110
|
Quick Abstract
|
PDF
|
Viewed - 44
21
A Global Flow-Based Technique For Analysis Of Inherent Interaction On Wikipedia
T.Kiran Kumar Reddy, S.Abdul Jeelan, M.Giri
Page 111-117
|
Quick Abstract
|
PDF
|
Viewed - 44
22
Token Based Method For Controlling Packet Loss
K J Bharath Kumar Yadhav, J S Ananda Kumar
Page 118-121
|
Quick Abstract
|
PDF
|
Viewed - 46
IRAJ Other Journals
View More
View More
View More
View More
View More
View More
View More
View More
View More
View More
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World
IRAJ Upcoming Conference
This work is licensed under a
Creative Commons Attribution 4.0 International License.
JOURNAL
SUPPORTED BY