International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | A Review on Image based Indian Sign Language RecognitionRAVI PATEL3 |
9 | |
2 | A Survey on Digital Forensics to Address Big Data ChallengesRADHA DHEKANE4 |
1 | |
3 | A Web-Based Online Auction System: A SurveyMANASI BHAMARE, ARATI CHAME, GAURAV MORE, PROF. AMOL RINDHE5 |
1 | |
4 | Biometric Door Lock System Using MQTT ProtocolHINGOLIKAR SMITA CHANDULAL, PATANGE A.D6 |
2 | |
5 | Survey on ABS Supporting Secure Deduplication of Encrypted Data in CloudPRIYANKA BHOSALE, PROF. S. H. PATIL7 |
1 | |
6 | A Review Paper on Voice Assisted Text Reading and Google Home Smart Socket Control System for Visually Impaired Persons Using Raspberry PiCHAITALI HANDE, PROF. VIJAY WADHANKAR8 |
3 | |
7 | Detection and Identification of Artificially Ripened Fruits using MATLABSWATI KHANDARKAR, PROF. VIJAY WADHANKAR9 |
2 | |
8 | A Survey on Novel Approach for Multi-Authority Attribute-Based Encryption for Data SecurityVIKRAMSINH RAJENDRA GHATGE, PRASHANT M. MANE10 |
1 | |
9 | Data Mining: A Study on Various Applications and TechniquesASHISH B. PATEL11 |
6 | |
10 | Application of Data Mining for Customer Behaviour and Customer Relationship Management in Retail MarketingASHISH B. PATEL12 |
2 | |
11 | Defending Against RREQ Flooding Attack in AODV in MANETsSUHAIL MEHRAJ, ER. RUPALI ZAKHMI13 |
2 | |
12 | Malicious Posts Detection Mechanism in Social NetworksGURUNATH AADE, RAHUL KAPSE, EKTA UKEY14 |
1 | |
13 | Information Protection Using Data Classification Procedure in the Cloud ComputingSIDDHARTH PATEL, SAKSHI NEMA, PRASHANT KUMAR KOSHTA, SAURABH SHARMA14A |
1 | |
14 | A Survey on Big Data Process Models for E-Business, E-Management, E-Learning, and E-EducationANISH KUMAR VARUDHARAJULU, YONGSHENG MA15 |
3 | |
15 | Multilevel and Multi-class Support Vector Machine based on Affinity Propagation Clustering for Intrusion DetectionSHINEE SINGH, S. K. SHRIVASTAVA16 |
1 | |
16 | Enhanced Privacy Policy Prediction for User-Uploaded Images on Content Sharing SitesRUPALI NARKHEDE, MADHURI ZAWAR17 |
1 | |
17 | Intelligent and Effective Smart Helmet with EEG and ECG Analyzing StrategiesJ MERIN JOSHIBA, R.D.S TERESE SHEEBA, J. JOSEPHINE SHARMILA, N.S BENILA, P. BRINDHA,18 |
3 | |
18 | Automatic Toll Collection System based on Embedded systemMINAL MOHITE, PROF. VIJAY WADHANKAR19 |
2 | |
19 | Secure Reversible Image Data Hiding Over Encrypted Domain via Key ModulationP.SUDHA, R.RADHA20 |
1 | |
20 | Smart System of Using E-LicenseYUKTA GAJARE, PRAGATI BHOR, ASHWINI NALAWADE, REETIKA RANDHANVAN, PRITI KUDAL21 |
5 | |
21 | Survey of Data and Storage Security in Cloud ComputingROSHNI AGRAWAL, PROF. SAURABH SHARMA21A |
1 | |
22 | Semantic Image Segmentation with Contextual Hierarchical ModelsK.SARASWATHI, C.TAMILSELVI22 |
1 | |
23 | Detection and Prevention of Attacks from HTTP Server logsSANDEEP KUMAR TIWARI, MONIKA SONI, SAURABH SHARMA22A |
2 | |
24 | A Heuristic Approach for Web Content ExtractionTANVI LALIT SARDARE, DR. DAYANAND R. INGLE23 |
2 | |
25 | Traffic and Energy Efficient Encrypted SearchTANVI LALIT SARDARE, DR. DAYANAND R. INGLE24 |
2 | |
26 | A Survey on Machine Learning Techniques for Android Malware Detection and CategorizationNEHA SHARMA, POOJA YADAV25 |
1 | |
27 | Effort Estimation for Performance Testing of Software ApplicationsMOHAMMED ABDUL RAZACK MANIYAR, MOHD ABDUL HAKEEM, DR. MOHD KHALID MUBASHIR UZ ZAFAR26 |
2 | |
28 | Design and Implementation of Data Compression with Hybrid to Optimized SizeRAJENDRA CHOUDHARY, DR. AAKASH SAXENA27 |
1 | |
29 | Most Trending Topics with Pre-learned Knowledge in TwitterLEENA PATIL, KANCHAN DOKE28 |
1 | |
30 | Novel Approach to Construct QA SystemsTUSHAR SHEDAGE, HONEY VYAS, ANUJA ZANJE, SANKET ZURMURE30 |
1 | |
31 | Study on different Transmission Control Protocols Used in Wireless NetworksSWATHI P, KARUNAKAR POTHUGANTI30A |
1 | |
32 | 2D Position Detection of an Object Using Accelerometer DataPARMAR DURVISHA M31 |
1 | |
33 | Zero APT Technique for Evaluation of RESTORING Unbalanced VoltagesKIRTI JAWALBANKAR, K.CHANDRA OBULA REDDY33 |
1 | |
34 | A Review on Shielding Virtualized Resource in Cloud Computing using Augmented Protection TechniquesAMITA PATHANIA, DR. DINESH KUMAR34 |
2 | |
35 | Speaker Independent and text Independent Emotion Recognition System Based on Random Forest ClassifierMAY MON LYNN, CHAW SU35 |
1 | |
36 | Survey on Reversible Watermarking Techniques on Relational DatabaseJAISHRI CHAUDHARI, NILESH CHAUDHARI36 |
1 | |
37 | Semantic Hashing to Understanding short text using Neural NetworksSUNKARA MOHAN KRISHNA, GURU RAJ37 |
5 | |
38 | Implementation of Reversible Watermarking Techniques on Relational DatabaseJAISHRI CHAUDHARI, NILESH CHAUDHARI38 |
1 | |
39 | Routing Protocol for Low-Power and Lossy Networks (RPL) in IoT applications: A ReviewJUBIN DIPAKKUMAR KOTHARI38A |
2 | |
40 | AI Going Wrong Reasons behind Wrong ResponsesAKASH GHOSH, RIZWAN CHANDARKI40 |
2 |