International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | A Survey on Electronic Monitoring Systems for Healthcare ApplicationsG RAMPRABU, M DEEPA3 |
2 | |
2 | Design and Implementation of Low Power FFT Processor for OFDM Wireless CommunicationGAJENDRA SUJEDIYA5 |
1 | |
3 | Web Search Strategies and Retrieval Effectiveness: An Empirical StudyRAJESH JAIN6 |
1 | |
4 | A Survey on Social Image Re-ranking Scheme Using Image AnnotationSANJAYKUMAR J KHANDARE, PROF. PRAVIN. P. NIMBALKAR7 |
1 | |
5 | Secure Sharing Hospital Data Using Visual Cryptography.CHITRA KALPESH VASVANI, SNEHAL KOLTE8 |
3 | |
6 | Securing E-Voting System using BlockchainKOMAL K. SHARMA, PROF. MRUNALINEE PATOLE9 |
2 | |
7 | Modelling Framework for Design Pattern Using Design Pattern Modelling LanguageAKASH MANE, PROF.SONALI RANGADALE13 |
2 | |
8 | Continuous Top-K Monitoring on Document StreamsRAHUL V. MUNDHE, PROF. K. B. MANWADE14 |
1 | |
9 | A Methodology for Secure Sharing of Personal Health Records in Cloud EnvironmentSUPRIYA PATIL, PROF. SANDIP D. SATAV15 |
5 | |
10 | Moving Vehicle Detection and CountingRAHUL BADEKAR, JAYA DEWAN17 |
1 | |
11 | A New Protocal for Fine-Grained Friend Matching In Social NetworkingP.PADMAVATHI, P.VASANTHI18 |
1 | |
12 | A New Threshold Multi-Authority CP-ABE Access Control Scheme in Public Cloud StorageCHANGALA PRIYANKA, J.RAGHUNATH19 |
1 | |
13 | Intelligent Supply Chain Systems – A Research Framework Using Internet of Things (IoT)PARTHASARATHI RAMAKRISHNAN, YONGSHENG MA22 |
4 | |
14 | Railway Track Inspection Using Arduino and Image ProcessingFLAVITA JANICE PINTO, VIDYA K M23 |
3 | |
15 | A Novel Approach for Intrusion Detection System Using Genetic AlgorithmANIL DHANKHAR24 |
2 | |
16 | Predictive Analysis of Market Trends for Stock Price Predictions Using Machine Learning and Deep LearningNIRMALA CHOUDHARY25 |
1 | |
17 | Load Balancing of Data in Cloud Computing Using Packet Size: A Survey PaperBHUSHAN D. PATIL, PROF. R. B. WAGH26 |
2 | |
18 | Soil Properties Prediction using Ensemble Regression TechniqueSMRITI SINGHATIYA, DR.SHIVNATH GHOSH27 |
2 | |
19 | Information Security in Cloud Storage Space with an Enhanced Auditing ProtocolPRAKASH KRISHNA SHINDE, AMRISH ASHOKRAO PATIL, SAMEER IQBAL TAMBOLI28 |
7 | |
20 | Cluster Head Selection using Particle Swarm Optimization in Wireless Sensor NetworkARKA HALDAR, PROF. KUDA. NAGESWARA RAO34 |
1 | |
21 | A Novel Approach to Process Small HDFS Files using Apache SparkPRIYANKA DUKALE43 |
3 | |
22 | Age and Gender Identification by Indian Multilingual Speech Sample: A ReviewBARKHA SHRIVASTAVA, VINAY JAIN44 |
1 | |
23 | Intelligent Systems that Emerges ‘Visual Generic Object Recognition’MANSI PATEL45 |
2 | |
24 | Cell Breathing Technique for Load Balancing in Datacenter NetworksYAZHINI.S, DR.N.UMADEVI48 |
1 | |
25 | Content based Image Classification using Support Vector Machine AlgorithmDR.VIJAY REDDY MADIREDDY49 |
2 | |
26 | Effective Storage Architecture for Evaluation of Duplication in CloudMUTHULAKSHMI.C, N.C.SACHITHANANTHAM50 |
1 | |
27 | A Multi-agent based Cyber Physical System for Smart CampusPOOJA S AHUJA55 |
1 | |
28 | A Review on Different Techniques of Parking AutomationROMA JAIN , JIJO S. NAIR56 |
2 | |
29 | Feature Selection and Ensemble Clustering Mechanism for High Dimensional Imbalanced Class Data Using Harmony Search Technique.AVHAD ANKITA V., DR. KSHIRSAGAR D. B.57 |
1 | |
30 | Solving Linear Programming Problem using ANN based Hybrid ModelL.R.ARAVIND BABU62 |
1 | |
31 | A Partial Residue to Decimal Converter for the Moduli Set {2n- 1,2n,2n,-1}ALHASSAN ABDUL-BARIK63 |
1 | |
32 | Freeware Framework for Performance Testing of Software Web ApplicationsMOHAMMED ABDUL RAZACK MANIYAR, SURESH KOPPULA, DR. MOHD KHALID MUBASHIR UZ ZAFAR65 |
2 | |
33 | Intrusion Detection System Using SVM Classifier for Detecting DoS Attack in Cloud PlatformKIRTI RAMHARIYA, PROF. SATPAL SINGH65A |
1 | |
34 | Energy Efficient Multipath Routing Protocol based on Particle Swarm Optimization for WSNROSHNI JHA, DR.SHIVNATH GHOSH66 |
3 | |
35 | Online News Popularity Prediction using Deep Neural Network with Reduced FeaturesSHIVANGI BHARGAVA, DR.SHIVNATH GHOSH67 |
1 | |
36 | Secure and Efficient Ranked Keyword Cover Search in Cloud ComputingSANDHYARANI GALPHADE, PROF.D.R.PATIL70 |
1 | |
37 | A Methodology for Secure Sharing of Personal Health Records in Cloud EnvironmentSUPRIYA PATIL, PROF. SANDIP D. SATAV73 |
3 | |
38 | Keyword based Trip Planner with Optimized Route using TSP AlgorithmGAURAV WADGHULE, HARSHAL WAGHMODE, TEJASHREE SHAH, ABHIJEET PANCHAL2 |
15 | |
39 | A Survey on Anomaly Based Detection and Prevention of Phishing Attack in an Online Banking SystemMANISH GANESHKAR, DEVENDRA PATIL, NIHAL RAJPUROHIT , CHETAN PAGAR4 |
1 | |
40 | Review on Design and Implementation of Clinical Document Architecture for Health Information Exchange based on Cloud ComputingSHARYU C. KALE, PROF. MAHIP M. BARTERE, DR. H. R. DESHMUKH10 |
1 | |
41 | Implementation on Sentiment Analysis of Bollywood Movies Reviews by Using ML-Classifier AlgorithmN. S. MAGAR, S. N. DESHMUKH11 |
4 | |
42 | Development of Application to Recognise Hand Written Digit at run timeAFFSAN ABBRAR, DR. PRANAM PAUL12 |
3 | |
43 | An overview of Machine Learning Techniques for Student Performance AnalysisNILESH MACHALE, ASHITOSH DHAWARE, AMRUTA KHANDARE, PROF. S. R. VISPUTE16 |
1 | |
44 | Study on Various Tools of Google TechnologySUJITHA.S20 |
4 | |
45 | Survey on Real Time Hand Gesture Recognition Using Different Algorithms Based on Indian Sign LanguageSHUBHAM RAJE, ANURAG RAI, NAVEEN KUMAR SINGH, C.S.WASVAND21 |
2 | |
46 | A Comparative Study of Methods to Improve Visibility in Low Light ImagesABHISHEK GAIWKAD, TEJAS GAJARE, DIPAK BANGE, ADITYA KHADSE, PROF. DR. J. S. UMALE29 |
3 | |
47 | Survey on Anti-Phishing TechniquesPOOJA SHINDE, RADHIKA KHAMKAR, NEHA SAPKAL, POOJARANI GURAV30 |
1 | |
48 | Content Curation Engine for Youtube Learning AnalyticsPROF. Y.K.SHARMA, ALI ZAIDI, ANVAY JOSHI, VISHAL JAISWAL, ATHARVA ASHTAPUTRE32 |
1 | |
49 | Big Data Analytics for Uncertain Data Using Different Classification Techniques: A SurveyDEVASHRI KULKARNI, VEDIKA JOSHI, SUVARNA MACHPALLE, VAISHNAVI ALURKAR33 |
2 | |
50 | A Secure Re- Encryption Scheme of Data Sharing for Dynamic Group in the CloudHARSHADA DESHPANDE, RUCHIKA CHANDEKAR, PRANALI CHAVAN, AISHWARYA BHANDARE, SHWETA B. GUJA35 |
2 | |
51 | Fast Phrase Search for Encrypted Cloud StorageVARSHA PAWAR, POOJA PAWAR, SHALAKA SHEWALE, SHRUTIKA VAIRAL, A. P. TIKAR36 |
1 | |
52 | Survey On-Demand Valet Service System using Mobile ApplicationPRANALI PATIL, AKASH ARAWADE, PRAJAKTA JADHAV, SEEMA GAWADE, PROF.JYOTI DESHMUKH38 |
1 | |
53 | A Survey on Analysis of Video File Container Using Feature DescriptorKHATIB ABULAIS, SWARUP FUSE, RAHUL BHUTRA, PARAG JOSHI, SHAFALI GUPTA39 |
2 | |
54 | A Survey on Automatic Detection and Classification of Gastric Cancer using Deep LearningPROF. AKSHITA CHANCHLANI, ANJALI BHATT, PRAJAKTA AWAGHADE, SUMIT CHAUHAN, SUJAY PASALKAR42 |
4 | |
55 | Automatic Light Intensity ControlMANISH SHARMA, PRATIK PAWAR, SHUBHAM DASHPUTE, VARUN LALWANI, SANTOSH WAGHMODE47 |
1 | |
56 | Malicious Posts Detection Mechanism in Social NetworksGURUNATH AADE, RAHUL KAPSE, EKTAUKEY51 |
1 | |
57 | Automated Toll Booth Management System using QR Code ScannerSHUBHAM OBEROI52 |
2 | |
58 | Proposed IoT Approach to Ameliorate Traffic ConditionsSHUBHAM DESHPANDE, REVATI GANORKAR, MAYUR GIRI, GAURANG SUKI, ARADDHANA DESHMUKH53 |
3 | |
59 | Feature Extraction of the T Peak and Its AnalysisPRIYANKA MAYAPUR54 |
1 | |
60 | Intelligent Recommendation System for Skill Upgradation Based on Behavioral AnalysisVINITA S. PATIL58 |
1 | |
61 | A Survey on Cloud Computing Levels and Their Security ModelsASHWINI R. DHANGE, RASHMI K. DIXIT59 |
4 | |
62 | Vehicle Overloading Detection and Protection using Raspberry Pi and IOT ApplicationSHARDUL SINGH GURJAR, DR. RAVI MISHRA,60 |
1 | |
63 | A Novel Approach to Facet mining of Query with QD MinerPATIL NILANJANA N., PROF.SAMIR S .SHAIKH61 |
1 | |
64 | A Survey on Security of Smart Office by Automation SystemPOORNIMA PATIL, ANAND DESHMUKH, ASHUTOSH MOHANTY, SAUMITRA KULKARNI, KRISHNENDU NAIR64 |
2 | |
65 | Gujarat Travel Guide-An Innovative Application to Seamlessly Explore Cities of GujaratKHUSHALI UPADHYAY68 |
1 | |
66 | Smart Cognitive Bot for Attendance Marking Using Principal Component Analysis AlgorithmSURAJ RAWAT69 |
1 | |
67 | Review on Improved ReLu 70A Piecewise Activation Function used in Deep learning AlgorithmsANUSHA CHITNENI, KARUNAKAR POTHUGANTI70A |
1 | |
68 | Survey on a Car Breakdown Service Station Locator SystemPROF.AMOL D. SAWANT, SUNIL BHAKAL, POOJA SABLE, PRIYANKA JANGAM, SOUNDARYA GOSAWI71 |
3 | |
69 | Survey on IOT Based Bridge Monitoring SystemPROF.N.W.DANGARE, GHADGE SONALI, KHANDGE TEJAS, PATHARE NISHA, PATIL LAXMAN72 |
7 | |
70 | Survey on Univariate and Multivariate Electrocardiography Signal Classification using Machine LearningDR. PRADEEP KALE T72A |
1 | |
71 | Auditing For Secure Cloud Storage Scheme with Secured Key Exchanging TechniqueKANAGALAKSHMI.K, N.C.SACHITHANANTHAM49 |
2 | |
72 | Application of Machine Learning with Big Data Umang 72 |
3 | |
73 | Automated Teller MachineDr. Archana Verma74 |
3 |