International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.379 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | Impact factor 8.379 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)

Volume-5  issue-11 November   2017


S.No Paper Title / Authors Download Paper Downloads
1

Distributed Collaborative Approach to Botnet Detection

ZAHRADDEEN GWARZO, MOHAMED ZOHDY, HUA MING, RICHARD OLAWOYIN, HANY OTHMAN
4
2

A Survey on: Content Based Video Classification

HANSA SHIMPI, SUDEEP THEPADE
7
3

Biometric Identification Using Eye Tracker

RAMEEZ ALI P, S VIJAYANAND
1
4

Survey on Enhanced Anomaly Based Intrusion Detection System Using Limited Labeled Data

PRADNYA PATIL
1
5

A Smart Traffic Communication Protocol in VANET

MONIKA PRAJAPATI, PRATEEK SINGH
1
6

Reliable Access Control Management and Mechanisms in Social Networks

G.V.PRABA, V.PARAMESWARI MCA., M.PHIL.
1
7

Location Based Management for Mobile Phones (Android) To Provide Secured Transactions

JYOTI KSHIRSAGAR, JUHI DESHPANDE, POORVA CHOUGULE
1
8

Street Light Automation System Using Arduino Uno

ANUSHA RAO, AKASH KONNUR
1
9

Application based on Voice as Medicine Guide for Visually Impaired

ANSARI KASAF, AYASHABI MASHAYAK, SAIMA SHAIKH, PATILL S.C
1
10

Twitter User Circle Detection Using Multi-View Network Structure

ASSIST PROF: PALLAVI PATIL, MANJUSHA JAGTAP, DHANASHRI SHINDE, SONAL SHINDE, DHANASHREE WAYDANDE
1
11

Power Quality Renewable Energy Effective Use of Grid by Wind Intelligent Technique

DR.P.SELVAM, M.P.SAKTHIVEL
2
12

A Novel Approach for Software Defect Prediction Using Learning Algorithms

MAHESWARI S, CHITRA K
2
13

Location based Service and Health Monitoring System for Heart Patient using IoT

ABHISHEK MANE, VAIBHAV DIGHE, RUSHAL GAWALI, SNEHA SABALE, SANTWANA GUDADHE
3
14

Accessing Securely DNA Database using Aggregate Queries

SHWETA MOKAL, VEDANTI GHATE, SHUBHAM SAWAKE, ANKIT MUGALI, PRF. PALLAVI AHIRE
1
15

A Survey on LPG Level Onitoring, Booking & Gas Leakage Detector

MADURA GHULE, KOMAL HOLE, SAYALI PATHAK , NISHIGANDHA PATIL , PROF. SANTOSH A. DARADE
4
16

Review on Security Model for TCP/IP Protocol Suite

PRIYANKA PAWAR, AJAY PHULRE
1
17

A New Approach of Classification of Alzheimer's Disease of MRI Images Using (Learning Vector Quantizer) Classifier

KAMBLE SHWETA , DR. V. V. DIXIT
1
18

Image Processing Techniques for Diagnosis of Malaria

CHAITANYA LAXMAN GODSE, DR. V. V. DIXIT
2
19

Kinect Based Classification of Accessibility from Natural Body Language

DIKSHA A. SHENDE, DR. R. S. KAWITKAR
1
20

A Survey on Achieving Hitless Defragmentation with Dynamic Fragmentation Using Mixed Path Algorithm

SHWETA PRATAPWAR, SWEJAL DHAMALE, ZAHID SHAIKH, ASHISH SHUKLA, PROF.F.S.GHODICHOR
1
21

Performance Comparison of Extracted features using Hybrid SIFT Approach

RUPAL SHROTI, PROF.AISHWARYA MISHRA
1
22

Cellular Automata for Mobile Adhoc Using EARP

R.STELLARANI, R. BHUWANESWARI
1
23

An Energy Saving In Wireless Sensor Networks over Multihop Technique

G.CHANDRAN, R.MEYANAND, M, R. BHUWANESWARI
1
24

A-LEACH Algorithm to Maximize the Life Span of Wireless Sensor Network

SHIBDAS BHATTACHARYA, SUBHAJIT MUKHERJEE, DIPRA MITRA, PRASUN KUMAR MITRA
1
25

A Survey on Riding Quality Evaluation and Driver Physiology Detection through IOT

KEDAR JOSHI, NAMRATA JATAK, ASHISH BAGWE, KIRAN GARGOTE, PROF.SUSHMA SHINDE , DR.BRIJENDRA GUPTA
1
26

A Comparative Study on Image Isolation and Classification Techniques in Microscopic Blood Smear Images

Renuka V Tali, Siddalingesh Bandi
4
27

Graphene Based Component Design

ANANT GAMBHIR , DR. D. M. BHALERAO
1
28

End User Friendly and Secure Architecture for Authentication of Cloud Services

APOORV KHARE, PROF. ANSHUL KHURANA
2
29

A Survey on Search Recommendation Mechanism for Query with Mining Facets

ARTI R. RATHI, PROF. S. R. TODMAL
1
30

Emotion Identification of Human Face from Video Using Neural Network

MS.PRANOTI R. TAYADE, PROF. R. R. MAHARANA, PROF. A. O. AMLAKAR
1
31

Survey on Data mining based prediction of User Behaviour through sessions

TUSHAR D. KOLHE, NILESH Y. CHOUDHARY
1
32

A Novel Approach for Digital Image Encryption based on Pixel Explosion Techniques

SHUSAMA TRIPATHI, PROF. RISHI SHARMA
1
33

A Review over Secure Communication for Vehicular Ad-Hoc Network

NIRMAL SINGH CHOUHAN, ACHINT CHUGH
1
34

A Review of Different Approaches over MIMO Handover in LTE-OFDM Systems

VIMLESH KUMAR, PROF. SHIVNARAYAN AHIRWAR
1
35

Survey on File Security Using Encryption Technique over Public Cloud Environment

RUCHITA DATTA, PROF. SAURABH SHARMA
2
36

Improvement in Visual Searching Process with Image and Word

MANISHA M. KUNDLE , SHITAL JADHAV
2
37

An Identification of Musical Genre: Sarangi as a Special case

MADHURI R. DESAI
1
38

Modular Software Model Checking For Distributed Systems

AMIT SINGH, RUCHI SINGH, ASTHA GAUTAM
2
39

Two-Factor Data Security Protection Mechanism for Cloud Storage System

PRIYA J. KHINDRE, SHITAL Y. GAIKWAD
1
40

System and a Method for Customer Service Survey Sentiment Classification and Neuro Analysis with Report Mining

DEEKSHITH RAJ RATHOD
2
41

reCAPTCHA and its Implementation: Human-Based Character Recognition via Web Security Measures

NEHA VIJ
2
42

Detecting Client Based HTTP Attacks on Proxy Server by XSS Attack & SQL Injection

KOMAL PATOLE
2
43

A Study on Blockchains and Bitcoin - A Blockchain based Cryptocurrency

RIJUL LUMAN
1
44

Reduction of Peak to Average Power Ratio Using Weighted OFDM

BUSHRA ZAREEN I. A. KHAN, SHIRISH L. KOTGIRE
2
45

A Case Study for Image Re-sizing using Content Delivery Networks (CDN)

HARSHIL KIRIT PATEL
2
46

An Vision Based Monitoring System for Accurate Vojta-Therapy

VAISHALIA.NIMBALKAR, PROF.V.B.RASKAR
1
47

Finding the Best Key Stream by Using Genetic Algorithm for Image Encryption

PRASUN KUMAR MITRA, PARTHA HALDER
1
48

Scaled Discrete Cosine Transform (DCT) using AAN Algorithm on FPGA

RAHUL R. BENDALE , PROF. VIJAY L. AGRAWAL
1
49

Privacy Preserving on multi-keyword search with Lucene Indexer over Encrypted Data in Cloud

NILAM JAMDARE, PROF. K. VISHAL REDDY
3
50

An Improved Task Scheduling algorithm Based on PSO for Cloud Computing

SURINDER SINGH , AMIT RANJAN
1
51

Automatic Controlled Digital Notice Board by Using Wireless Direction Detector

SANJIVANI R. WADEKAR, PROF. ANIL O. AMALKAR, PROF.YOGESH P. SUSHIR
3
52

Reverse Engineering Static Content and Dynamic Behaviour of E-Commerce Websites: A Survey

SUDHANSHU CHOUREY , PROF .PRASHANT KUMAR KOSHTA

Reverse Engineering Static Content and Dynamic Behaviour of E-Commerce Websites: A Survey

SUDHANSHU CHOUREY , PROF .PRASHANT KUMAR KOSHTA
1
53

SVD-DWT Amalgamated Watermarking Scheme Antagonistic to Noise Attacks

VIPIN KUMAR, PROF. ANSHUL BHATIA
1
54

Cloud Infrastructure Resource Allocation for BigData Applications

PRIYANKA G, ARPITA DESHPANDE, ANUSHA RAO, ASHIK G G, KAVITHA S
2
55

IoT Based Traffic Management System

SOWMYA M, ANUSHA P S, ASHWIN S MURTHY, JOY STEFFI JONES, LYNETTE W PINTO
4
56

An IOT Based Smart Home Automation

HARSHITHA B S, RAJATH ACHARYA, ISHWAR BHAT, ADITYA BHAT, MANOJ D S
2
57

A Survey on Distance Estimation for Bluetooth Beacon

MAYUR BHAMARE, HARSHIT PAREKH, HARSHAL SONKUSARE, MUKUL JAJU1, SWATI KESHARI
2
58

An Overview of Neural Networks and their Applications

NUPUR THAKUR
1
59

Optimizing Discrete-Event Management Systems for Arranging Events

PROF. AMOL DHAKNE, ABHISHEK BHARDWAJ, INGLE PRIYA, PRAJAKTA KHOLLAM, RUPESH PATIL
3
60

Revamped Data Partitioning Strategies for Market Basket Analysis using Hadoop Clusters

OMKAR HIRVE, ADITYA PARDESHI, OMKAR KURHE
1
61

Defending Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender Systems

DIPIKA WATTAMWAR, GAURI NERKAR, PALLAVI SHATALWAR, YADAV PRACHI, PROF. B.S SATPUTE

Defending Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender Systems

DIPIKA WATTAMWAR, GAURI NERKAR, PALLAVI SHATALWAR, YADAV PRACHI, PROF. B.S SATPUTE

Defending Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender Systems

DIPIKA WATTAMWAR, GAURI NERKAR, PALLAVI SHATALWAR, YADAV PRACHI, PROF. B.S SATPUTE
2
62

Blood Cell Counting and Disease detection from image using PCNN

NAMRATA DHAYGUDE, KAJAL DHUMALS , VAISHALI PATOLE
1
63

Storage Outsourcing with Secure Accessibility in MStorage Outsourcing with Secure Accessibility in Mobile Cloud Computing by Using LDSS

PUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMARE

obile Cloud Computing by Using LDSS

PUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMARE

Storage Outsourcing with Secure Accessibility in Mobile Cloud Computing by Using LDSS

PUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMARE

Storage Outsourcing with Secure Accessibility in Mobile Cloud Computing by Using LDSS

PUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMARE
2
64

Privacy-Preserving Location Sharing Services for Social Networks

K. SARANYA, S. SRI HARISHMA
2
65

A Survey on Reduction of Movie Piracy using Automated Infrared System

A.K.VEERARAGHAVAN, S.SHREYAS RAMACHANDRAN, V.KAVIARASAN
1
66

Presence Detection and Home Automation Using Bluetooth and Android Application

SIDDHESH GIRASE, RAMBABU VATTI, DIVYA GURNANI
2
67

A Survey: Remote Patient Health Care Monitoring and Alert Generation System

RANI UTEKAR, JAYANT UMALE
1
68

Multimodal Biometrics Fusion at Feature Level Extraction

S. P. UGALE, M. S. BORSE
2
69

Comparative Study and Analysis of Manual v/s Automated Product Feature Testing

NOORIN FARNAZ, ANJAN K KOUNDINYA
1
70

Wireless Sensor Network: A Complete Review

VISHAKHA BHATNAGAR, ANTIMA SAXENA, ANKUR GOYAL
1
71

Data Center Architecture Based Tor Network Using Against Attacker

C.MALA, T.SATHYA PRIYA
3
72

Effective Routing Mechanism in Wan Based On Traffic Analysis

SANGEETHA.V, A.SARITHA
2
73

Routing Control Protocol in Green Mobile Ad-Hoc Networks by Selective Broadcasting

M.SASI KALA, A.SARITHA
1
74

Image Enhancement Using Dual Tree Complex Wavelet Transform based Image Fusion Method -A Literature Survey

ALOKRANJAN YADAV, PROF. S.P. BHOSALE
1
75

GPU Accelerated Pattern Matching Algorithm for Packet Data to Detect Virus Signature

BHAGYASHRI CHHAGAN WADILE, PROF.N.R.WANKHADE
1
76

Ad-Hoc Method for Social Data Collection Using Foursquare

SHAMEENA V , SENTILKUMAR
1
77

Feasibility of Using Machine Learning to Access Control on non-Educational Links

SHAHENSHAHA MUJAWAR, BHAUSAHEB MORE, PIRSAHB TANDEL, PROF .PRASHANT ABHONKAR
1
78

Local Prediction Based Reversible Watermarking

P.S.SHENDGE, PROF.P.S.MALGE
2
79

Design and Implementation of Play-out Buffer Adaptive Windowing algorithm for real-time Voice over IP Communication Systems

SUBHAJIT MUKHERJEE, SHIBDAS BHATTACHARYA, ABHISHEK DEY, PRASUN KUMAR MITRA
1
80

A Survey on a Supervised Joint Topic Modeling Approach for Aspect based Sentiment Analysis and solvingCold-Start Problem

ARSHIYA SHAIKH, BHAKTI PATIL, TEJASWINI DAUNDKAR, PRANJALI UTTEKAR, PROF.PRASHANT AHIRE
3
81

Two-Factor Data Protection: Enhances Confidentiality of the Data

SYED SAAD, SARIKA BAGADE, RAHUL SINGH, AKSHAY SIDRAL, PROF. VANDANA P. TONDE
2
82

A Review on DNA Based Cryptography

RUBY CHANDRAKAR, KIRTI NAHAK
2
83

Hardware Co-Simulation of Sobel Edge Detection Using FPGA and System Generator

SNEHA MOON, PROF. MEENA CHAVAN
1
84

Automated Voice Based Home Navigation System for the Elderly and the Physically Challenged

ROHINIKANNAKE, DR.J.S.CHITODE
2
85

A Review on Various Visual Cryptography Schemes

MUSKAAN KALRA, HEMANT KUMAR DUA
2
86

Robust Real Time Bus Imprint System

NIKHIL BHOYAR, PARESH BAGDE, KUNAL VAIDYA, ROSHNI RAHANGDALE, MINAL TEMBHURNE
3
87

A Survey on Breast Cancer Detection Using Mammographic Images

AMRUTA B. JADHAV, DR.S.R.GANORKAR
2