International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.379 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | Impact factor 8.379 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)

Volume-5  issue-8 August   2017


S.No Paper Title / Authors Download Paper Downloads
1

Survey of Machine Learning Applications

NAVDEEP SINGH JAGGI
2
2

Studying Water Quality Monitoring System Basedon Wireless Sensor Networks (WSNs)

NAHED A. ALNAHASH; MOHAMED A. ZOHDY
4
3

A Secure and Reliable Video Watermarking based on Different Wavelet Transform

DHANASHREE S. SHEDGE
2
4

Enriching Text Clustering through Cognitive Concept Based Model (CCBM) by Ensemble Neural Learning Method

K.SANGEETHA, M.V. SAYINI
1
5

Face Recognition under Different Lighting Conditions Using Multiple Feature Fusion

KOTHAMASU JAHNAVI, K.SATYA PRASAD
2
6

A Survey on Big Data

PRACHI JAIN, KANCHAN JHA
1
7

A Study of Smarthome Tech using IoT

S.DEVI MCA., M.PHIL
1
8

A Comparative Study of Intrusion Detection System tools and Techniques

SONALI NEMADE, MADHURI A. DAREKAR, JYOTI BACHHAV, SUNANYNA SHIVTHARE
2
9

STBC-OFDM using Compressive Sensing Theory for Wireless Systems

SRISHTI HAJARE, SHASHANK MANE
1
10

3D Video Compression Using Split Algorithm

GOVTHAM T, PROF. VENKATESHAPPA
1
11

Design and Implementation of Smart Energy Meter

M SWAMY, R PRAVALLIKA
1
12

Internet of Things for Innovative, Improved and Effective Smart Transport Management System in Smart City

VANI HARAVE, SNEHA BHARTI, R. LATHA
2
13

A Survey on Plausible Approach to Mitigate Security Challenge in Cloud Computing

EJEM AGBAEZE, DR. NWOKORIE E.C., NJOKU DONATUS, DR. ODII J.N., NWOKOMA F.O.
1
14

Simulation of Cloud Computing Environment and Evaluation of Resource Provisioning Algorithm using Improved Max-Min

MONIKA MISHRA
1
15

Betel Leaf Disease Detection Using Histogram of Oriented Gradients and Multiclass SVM

DR. S. K. JAYANTHI, C.LALITHA
2
16

Smart Temperature Sensor Design Using Voltage Controlled Ring Oscillator

PRAVEEN KUMAR SHARMA, GAJENDRA SUJEDIYA
1
17

Personal Authentication Using Finger Vein Biometric

POOJA CHAVAN, WRUSHALI MENDRE
1
18

Proficient Majority Logic Fault Detection and Correction to Decode Mainstream Logic Design by Using EG-LDPC Codes

K PAVAN KUMAR, R VASIM AKRAM
1
19

Automated Glaucoma Screening based on CDR Measurement

SWAPNALI BHAPKAR, VAISHALI KULKARNI
1
20

A Review of Mining High Utility Patterns

DR. S. MEENAKSHI, P. SHARMILA
1
21

Server Monitoring Using Windows Management Instrumentation and SNMP

K.BHAGYASRI, K.VELAYUDHAM , P. SRIVYSHNAVI
1
22

An Improvised Recommendation System on Top-N, Unrated and Point of Interest Recommendations Regularized with User Trust and Item Ratings

MEENAKSHI, PROF. PRAVIN NIMBALKAR
1
23

Keen Honeypot based E-Commerce Security Model

B.V.RAMA KRISHNA, B. SUSHMA
1
24

Live Virtual Reality Streaming for Student Platform

NITA RADHAKRISHNAN
1
25

An Adaptive Study for Different Methodology for Information Hiding

NAGESH SHARMA, NARENDRA KUMAR UPADHYAY, NIRMAL KUMAR SARASWAT
5
26

A Deep Survey on Mutational Testing and Test Adequacy Check

J SANTHOSH, MINI N
1
27

Face Recognition Using Enhanced Gradient Patterns

VISHNU GANESH PHANIHARAM, BAGADI RAVIKIRAN, TUSAR KANTI MISHRA
7
28

A Study on Wireless Ban Area Network for Health Care Applications

AMUTHAVEL.R, LALITHA.R
2
29

An Algorithmic Study of Link Prediction in Social Network Sites

SURYAKUMAR B, DR.E.RAMADEVI
1
30

A Review on Google Glass Technology

S.ARCHANA, N.NISHANTH
1
31

A Review on Privacy Preserving Data Access Control Mechanism in Hybrid Clouds

D. VISHWAKSEN REDDY
3
32

Priority based Job Scheduling Algorithm in Cloud Computing

PAMINI JAIN, PROF. SAPNA CHOUDHARY
1
33

Speech recognition using PNCC and AANN

R. THIRUVENGATANADHAN
1
34

Data Transmission between Two Laptops Using Optical Source

RITIKA PATHI
1
35

SLL Reduction of Spherical Array Using Thinning

K.NAGA UMA SARASWATHI, PROF. N.VENKATESWARA RAO
1
36

Enhancing Machine Based Spam Detection Using Twitter

SHINDE ASHA ASHOKRAO, SHITAL Y. GAIKWAD
1
37

An Analysis of Transformation in Teaching and Learning Methods

SHABANA PARVEEN ANSARI, PROF. MONA DESHMUKH
1
38

Load Balancing and its Challenges in Cloud Computing: A Review Paper

JAYA CHOUBEY, PROF. SATPAL SINGH, PROF. SUMIT NEMA
1
39

A Survey on Web Services Security Concern, Solution and Its Limitation

DIVYA PANDEY, PROF. SATPAL SINGH, PROF. SUMIT NEMA
1
40

Functionalities, Applications, Issues and Types of Data Mining System

KIRAN KUMAR S V N MADUPU
1
41

Secure Advanced E-Voting System using NFC and Thumb Matching

SHRADDHA R. HANDE, PROF. R. W. DESHPANDE
1
42

LAL Methodology to Mitigate Denial of Service Attacks in Fictitious Nodes Used in OLSR Protocol

ADITYA KATHERA, ADITHYA. R , G. GOKULNATH, TARUN RAJ MOTURU
5
43

Overview of Blue Eyes Technology

SAMPURNA J , VINITHA R
1
44

Analysis on Ransomwares and Prevention Approach

CHITESH RAI TULI, PANKAJ SHARMA, SAKSHI MALHOTRA

B.Tech. Student (4th year), Department of Mathematics and Computing, Delhi Technological University, Delhi, India

1
45

Framework for Key Visibility in Cloud Storage Auditing

SAPNA R, RAKESHN, CHANDAN
2
46

Implementation of a Monitoring Application in Android

AKSHIT BATHEJA, AISHWARYA KOURANI, EKTA SIRWANI, MAAZ SIRKHOT
2
47

An Exploratory Study To Find Importance Of Time Management in software Project Management

VANDANA NEMANE, TRUPTI KULKARNI, PRITI JADHAV, RUSHI DURGE
3
48

A Survey on Brain Fingerprinting

BHARTI SHARMA, DEEPESH AGRAWAL, AMOGH GADKARI , BHAVNA GUPTA
1
49

A New Authorized Secure Schema for Data Deduplication Using Convergent Key in Cloud Environment

KOLU JAGADEESH, D.GOUSIYA BEGUM
2
50

Machine Learning: Intersection of Statistics and Computer Science

Rakesh Rojanala
2
51

A Novel Hybrid Scheme Based on Virtual Circuit Switching for Reduce Communication Latency and Power of Network on Chip(NoC).

MANTRI KULLAYAPPA, DR. N. AV. PRASAD
1
52

The Architecture of Wireless Sensor Network, its Issues and Applications

DIBYAJYOTI SAIKIA
1
53

PAPR Reduction Using Hybrid Approach in OFDM

PREETY MAHAJAN, HARJINDER KAUR, SWEETY
1
54

Ensemble Model for Movie Success Prediction

P.DEEPTHI, S.BHARGAV
1
55

Deduplication of Encoded Big Data in Cloud Storage

PALLAVI G. BANGALE, PROF REKHA KULKARNI
4
56

Encoding and Decoding of LDPC Codes using Bit Flipping Algorithm in FPGA

L. SHIVA NAGENDER RAO, K.VENKATA SATHYAJITH, Y. NAGARAJU YADAV
1
57

An Approach towards Forming a Domain Dictionary to Ease the Process of Searching for Scholarly Publications

ADITYA KALIVARAPU, M KRANTHI KIRAN
1
58

Machine Learning in Financial Fraud Detection

MAYURESH PATIL
1
59

A Secure and Robust Image Watermarking Technique Based on DWT-DCT and Implemented Various Attacks on it

TANIYA PANJIYAR, YOGENDRA KATIYAR
2
60

A Survey on Social Media in Education

A.D.C. NAVIN DHINNESH, N.SUNDARESWARAN
1
61

Efficient Unflaws of Secure Data Transmission Using s-BGP

NITHYA.S, BABU.T.G
1
62

A Study of Classification Techniques of Data Mining Techniques in Health Related Research

K PRASANNA JYOTHI, DR R SIVARANJANI, DR TUSAR KANTI MISHRA, S RANJAN MISHRA
3
63

Quantifying the Error in CLT for Accurate GRN Generation

Shaik Jeelan Basha, L. Rangaswamy
1