International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.379 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | Impact factor 8.379 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)

Volume-5  issue-7 July   2017


S.No Paper Title / Authors Download Paper Downloads
1

An Improved Approach of Text Steganography in Application with Rotational Symmetry

B.RAMAPRIYA
1
2

Estimation of Nitrogen and Chlorophyll Contents of Leaves Using SVM

SHRADDHA SAHURKAR, PROF. B. J.CHILKE
1
3

Accessing Secured Public Data Storage Using Secure Index in Cloud Computing Environment

M RAJASEKAR, DR M KARTHIKEYAN
1
4

A Survey on Various Underwater Image Enhancement Techniques

SHRINIVAS SHIRKANDE, DR. MADHUKAR J. LENGARE
3
5

Machine Learning Approach For Spam Tweets Detection

JAGTAP KALYANI LAXMAN, PROF.B.A.KHANSOLE
1
6

NRE-AODV Routing Protocol to Maximize Network Lifetime of MANET Based on AODV

K.MARIAPPAN, DR.M.KARNAN
2
7

A Survey on Literature Review of the Usability of HCI

SHUBHANGI T RAUT, DR. ABHA KHANDELWAL, DR. S. B. KISHOR
1
8

Performance of OFDM system for AWGN, Rayleigh and Rician Channel

PAYAL DUGAD, ASHOK KHEDKAR
1
9

Minimizing Stealthy Denial of Services in Cloud Computing

DIPALEE BALU RAUT, PROF. AMRIT PRIYADARSHI
3
10

Review on Text Detection, Extraction and Recognition from Images and Videos

S.SHIYAMALA, DR.S.SUGANYA
3
11

A Survey of Data Mining Clustering Analysis

SUMITHA MUNIAN, PAULRAJ ANANTH K.J
5
12

An Medical Healthcare Information Sharing With Service Based Cloud Environment

S SANTHIYA, DR M KARTHIKEYAN
1
13

A Review on Healthcare Informatics

DR. G. T. PRABAVATHI, M. SHANTHIPRIYA
1
14

Wind Turbine Monitoring and Diagnosis Using CAN

YOGESH BOLEGAVE, PROF. M. U. INAMDAR
1
15

Privacy Preserving for Data Perturbation Using Cryptography Technique

A.MALATHI, DR.M.MALATHI
1
16

A Blind Image Quality Assessment for Visual Quality Perception to Estimate the Quality of the Images

K. GIRISH CHANDRA, DR. B. PRABHAKARA RAO
1
17

Performance Analysis of MF Receiver: Review

BIMLA PANDEY
1
18

A Survey on Security and Privacy Issues In Cloud Computing

G.PRAVEEN KUMAR, S.KAVITHA
1
19

Improved EMG Upper Limb Classification Features

P.SWETHA
1
20

Throughput Maximization Using Spatial Reusability in Multi-Hop Wireless

PRERNA BORANE, V. K. PATIL
1
21

Design of Compact Wideband Key-slotted Circular Microstrip Patch Antenna with partial Ground Plane

YEESHU RELHAN, YOGITA
2
22

Hybrid Technique for Image Compression Using SPIHT and BCH Codes

S.VENKATA SAI PRASAD, DR.K.SATYA PRASAD
1
23

Survey on Artificially Intelligent used in ChatBot

A.MARI KIRTHIMA
3
24

Extraction of Vegetation Regions in High Resolution Satellite Data Based On Spectral Indices and Marker Controlled Watershed Segmentation

P.SWATHIKA, A. RAVI RAJA
3
25

Anti Phishing Website Using Visual Cryptography

MANASI ASHOKRAO DESHMUKH, PROF. R. W. DESHPANDE
1
26

Automated Irrigation System Based on Arduino Controller Using Sensors

SARIKA RAKSHAK, PROF. R. W. DESHPANDE
1
27

Sarcasm Detection on Twitter using Feature-Based Approach

KHAN SHEHLA KULSUM, NAGESH KAMBLE
2
28

A Survey on Data De-Duplication Methods in Cloud Storage System

S. LALITHA, N. KAMAL RAJ
1
29

Shape based Object Classification using Knowledge Vector Code

DR G D JASMIN
1
30

Multi-Purpose Smart Card- G Card

SANJANA.S.U.
1
31

A Secure Data Storage and Sharing Framework Using Specialized Key in Cloud

POOJA SHASHANK POL, PROF. AMRIT PRIYDARSHI
1
32

Data Hiding in Digital Video for Authentication and Data Security

NEHA GIRADKAR, DR. SMITA A. NAGTODE
1
33

A Systematic Approach for Classification of Knee Osteoarthritis Using PNN Algorithm

CHENNUBOINA SOWJANYA
1
34

Design and Development of Intrusion Detection System for Internet of Things

TEJAS M. MEHARE, PROF. SNEHAL BHOSALE
1
35

Analysis of Malware Propagation in Large Scale Network

ANKITA SURESH MANE, PROF. BERE S.S.
2
36

A Survey on Medical Image Classification Techniques

MANASI KALEKAR
2
37

A Study on Six Senses of Cognitive Computing

N.SUNDARESWARAN, A.D.C. NAVIN DHINNESH
2
38

Heart Rate and Respiratory Rate Measurement Using Image Processing

S.S.LOKHANDE , BINU K NAIR
1
39

Real - Time Hybrid Contourlet, DCT & SVD Algorithms for Digital Image watermarking, Geometric Applications and Noise Addition

VENKATESWARLU ANANTHANENI, DR. USHA RANI NELAKUDITI
2
40

A Study on Six Senses of Cognitive Computing

N.SUNDARESWARAN, A.D.C. NAVIN DHINNESH
1
41

Review Paper on FIR Filter based on Vedic Multiplier and Kogge Stone Adder

SEEMA PATIDAR AND PROF. ALOK KUMAR
1
42

Design and Implementation of Power Efficient Linear Feedback Shift Register for BIST using Verilog

AKHILA K, KARUNA N, KAVYA C, YASHA JYOTHI M SHIRUR
2
43

Block Truncation Coding for Image using Bit Map Technique for 4×4 Block Size

AMIT KUMAR, PROF. NAVNEET KAUR
1
44

Mobile to Mobile Communication Using Wi-Fi

JITESH R.SHARMA, M.M.JADHAV
1
45

A Novel Low-complexity Multiple-input Multiple-output (MIMO) Detector modified for Single-Carrier Frequency Division-Multiple Access (SC-FDMA)

V VENKATA SIVA MOULI
1
46

Discussion of Different types of Noise Removal by Median Filter

PALLAV PARMAR, YASHPAL YADAV, AAKANSHA WASNIK
1
47

A Hybrid Approach for Image Compression using HAAR Wavelet Transform

ANIL KUMAR MALVIYA, PROF. ARUN KUMAR
1
48

Survey on Automatic Intrusion Recognition and Tracking for Security Systems

S.S. LOKHANDE, GIRIJA RAJENDRA PANDHARE
4
49

Systematic Review on Dealing Imbalanced Data –A Machine Learning Approach

SUPRIYA INDUKURI, SUGUNA KANUMURU, SOUNDARYA DANDU, ADINARAYANA SALINA
4
50

A Study of Big Data Mining Techniques Used to Improve the Performance of Large Data Processing

G.SUGANYA MCA.,
1
51

Power Efficient Destination Address Generator of Direct Memory Access Controller in Multiprocessor SoC

KRITIKA M.SHARMA, AISHWARYA.A, YASHA JYOTHI M SHIRUR
1
52

Generating Captions for Images Using Multimodal Neural Networks

DHOOMIL SHETA, PARTH PAREKH, NISHANT SHAH, RUTVIK PAREKH, MANAN SHAH1, PROF S. C. SHRAWNE
2
53

Rainfall Forecasting Using Gaussian Family of Generalized Linear Regression

BHAKTI NARVEKAR, JAY TORASAKAR, CHINMAYA KORE
4
54

WI-FI enabled Mobile and USB data transfer.

SHRUTI RAMANI
2
55

Digital Menu Card for Restaurant Using Microcontroller 8051and CAN Controller

NITHIN NAIR, VISHAAK NARAYAN, CHAITYA LODAYA, VIJAY JOSHI
2
56

A Comparative Analysis of Apache hive based on MapReduce and Impala based on distributed query engine

PRASAD MITKARI, RUTUJA BANSWAL, AKSHATA SIRSAT, PROF. DAIVASHALA DESHMUKH
4
57

Distanced Based Routing For Wireless Sensor Network

RITESH GUJARKAR, PROF. B.J. CHILKE
1
58

A Novel Efficient Graph Based Model for Content Based Image Retrieval

PARAG V.YELORE, S. S. KEMEKAR, PROF. P. R. LAKHE
1
59

Design of an 8-Bit Array for Client Server Communication for Hash List Architecture

SHIFALI R. PANDE, PROF. R. H. DESHMUKH
1
60

Smart School Bus for Children Transportation Safety Enhancement with IOT

P.AMBEDKAR, P.SURESH BABU
1
61

Secure Online Polling System Using Visual Cryptography

SWATI YOGESH SHINDE, PROF. AMRIT PRIYADARSHI
1
62

Survey on Data Security Approach in Dynamic Multi Hop Communication

DR.S.A.UBALE , ANURADHA KHARE
3
63

A Ranking Model for Instance and Feature Selection Techniques for Improving Bug Localization

C.S.DEEPTHI, P.GANGADHARA
3
64

A Hybrid Scheme to Obtaining Low Latency and Low Power Consumption for NoCs

V VENKATA SIVA MOULI
1
65

Two-Factor Data Security Protection Mechanism for Cloud Storage System

PRIYA J. KHINDRE, SHITAL Y. GAIKWAD
1
66

Analysis of Big Data in the Data Mining

S.SATHIYAKALA JAYAKANTHAN
1
67

Automated Framework for Skull Damage Detection and Repair Using KNN and Template Matching Methods

NILESH T. GONJARE, DR. RAJENDRA S. KANPHADE, PROF. SAGAR V. JOSHI
2
68

A Study and Comparison of Wired, Wireless and Optical Networks

HIMANSHU JHA
1
69

A Survey of Drowsiness Detection System for Drivers

DR. V. K. KADAM, A.A. SHIRSATH
4
70

Textual Notifications Using Node.JS and Cloud Ant

HASEEBA YASEEN, RAKHEEBA TASEEN
1
71

Face Recognition Techniques: A Survey

VISHNU GANESH PHANIHARAM, BAGADI RAVIKIRAN, TUSAR KANTI MISHRA
11
72

Examine the E-Mail Spam Detecting and Email Spam Filtering Techniques

V.CHARUMATHI MCA, S.THIRUMAL MCA, MPHIL.
2
73

A Survey on SSO (Single Sign-On) Mechanism for Mobile Apps

D. S. BARAVADE, S.A.LAKADE, V.C. DESHMUKH.
4
74

Learning Search Tasks in Queries using K-means

AHILYA SATHE, PROF. DEEPAK GUPTA
1
75

Providing Data Security by Hidding Large Amount of Data Using Steganography

KINGSLY.P, AKILA.R
1
76

Evaluation of Secure Streaming of Files in Cloud Environment

NEMI RISHI
1
77

Securing Vehicular Communication through Trust Management Scheme in VANETS

K. KALYAN KUMAR, M.VIJAYA KANTH M.TECH,(PH.D)
1
78

Simulation and Performance Analysis of a Metamaterial based Dual band Monopole Antenna using Rectangular Complemetary Split Ring Resonator in the Ground plane for GSM900 and Wi-Max Applications

MR. PRASANNA PAGA, DR.H.C.NAGARAJ, DR.T.S.RUKMINI
1
79

Web Mining Using Lexical Chain with Interactive Genetic Algorithm

JYOTI S. PACHARE
1
80

Web Services Hash Table based Automation Testing

CHETAN PHALKE, PROF. K.D.BAMANE
5
81

Measurability, Adaptability and Efficiency in Data Center Network using Space Shuffling

VANISHREE M L
1
82

Comparative Analysis of FIFO and RED QUEUE ALGORITHM for Congestion Control in MANET

MEHAJABEEN FATIMA, NIVEDITA KHARE
1
83

A Chord Based Decentralized Secure Service Discovery on Peer to Peer Networks

M.SUDHA, R.P. SATHIYA PRIYA
1
84

Authorization in Data Access User Behaviour Profiling With Duplicate Check Measures in Social Network

DR. V.VIJAYADEEPA, D.DEEPIKA
1
85

Collision and Broadcasting Delay Management System in 5G Multimedia Networks

DR. V.VIJAYADEEPA, J.ABIRAMI
1
86

A Review of Channel Estimation Techniques over MIMO OFDM System

URMILA SHAH, PROF. HARDIKA KHANDELWAL
1
87

MR Image Enhancement for Extra Axial Haemorhages Classification

IQRA RIZVI, NARAYANAN KALLINGAL
2
88

Domain Based Sentimental Analysis using Naïve Bayes Classification over Twitter

GARGI, TAPAS KUMAR
1
89

Heart Disease Risk Prediction using Pre-processing and Classification of Patients Data

K PRASANNA JYOTHI, DR R SIVARANJANI, DR TUSAR KANTI MISHRA, S RANJAN MISHRA
6
90

Survey on Brain Tumor Identification Using Segmentation and MRI Images

P.NARENDRAN, R.DEEPA
1
91

A Study on Big Data Mining - Concepts, Platforms, Issues and Challenges, Future Scope

PEBILA SHANI.S, PRICILLA.S
1
92

PSO Algorithm Based Reactive Power Optimization Using Matlab Programming

NAVEEN KUMAR, DEEPAK KUMAR GOYAL, AP MISRA
1
93

Optimal and Fast Health Data Clustering Using Hybrid Meta Heuristic Algorithm

V. SHANU, S.VYDEHI
1
94

A Novel Integrated Method for Detection of Salient Regions in an Image using HDCT and Local Spatial Support by Regression

MD.CHANDINI, DR.B.PRABHAKARA RAO
1
95

Customer and Employee Perception towards Internet Banking Risk Assessment

DR. MINAKSHI D. BHOSALE
1