DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter

Table of Contents - Volume 4, Issue 1,2015
Minimalist Cryptography for RFID Authentication Protocol against Compromised Tag Attack
E.Lavanya, C. Palanisamy, T.Parameswaran
DOI - Crossref   |    Google Scholar  |   View Abstract  |
3D Hand Gesture Based Computer Interaction for Non Specific User
S. Siva Kumar
DOI - Crossref   |    Google Scholar  |   View Abstract  |
Mobile User Privacy Preserving Location based Queries and Preventing Location-Based Server Contents
Salman Siddiqui, Gambhir Halse
DOI - Crossref   |    Google Scholar  |   View Abstract  |
Unknown Malware Attack by Using Intelligent Intrusion Multi Detection Systems
S.Murugan, K.Kuppusamy
DOI - Crossref   |    Google Scholar  |   View Abstract  |
Comparative Study of AODV, SAODV, DSDV and AOMDV Routing Protocols in MANET Using NS2
M.Manjunath, D.H. Manjaiah
DOI - Crossref   |    Google Scholar  |   View Abstract  |
Passive Adhoc Identity for Sybil Attack Detection Using NDD Algorithm
A. Muruganandam, R. Anitha
DOI - Crossref   |    Google Scholar  |   View Abstract  |
Outlier Detection Scheme to Handle Wireless Sensor Data
S.Sumathy, M.SundaraRajan
DOI - Crossref   |    Google Scholar  |   View Abstract  |
Trusted Attestation Key with Windows Management using Direct Anonymous Attestation Protocol
E.Padma, S.Rajalakshmi
DOI - Crossref   |    Google Scholar  |   View Abstract  |
Analyzing a Novel Approach for Virtual Cluster Migration in Cloud Computing
T.Lavanya Suja, V.Savithri
DOI - Crossref   |    Google Scholar  |   View Abstract  |
A Detection System for Denial Of Service Attacks Using Triangle Area Map Based Multivariate Correlation Analysis
V. Balaji, V.Jeyabalaraja
DOI - Crossref   |    Google Scholar  |   View Abstract  |
Slow Intelligence Based Learner Centric Information Discovery System
T.S.Baskaran, R.Sivakumar
DOI - Crossref   |    Google Scholar  |   View Abstract  |