International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Application of Data Mining for understanding Supply Chain Management in Retailing ASHISH B. PATEL |
6 | |
2 | Application of Data Mining for understanding Storefront Operations in RetailingASHISH B. PATEL2 |
3 | |
3 | OTP over SMS: Time Delay Issues and CausesDHANASHRI GHOSALKAR, SHWETA PATIL4 |
1 | |
4 | D2H vs IP Video Delivery ComparisonAISHWARYA KANETKAR, MADULIKA CHAUDHARI5 |
1 | |
5 | A Critical Study of ICT Implementation in School Education with Special Reference to the Selected Schools of Satara DistrictANITA A. PATIL, DR. A.V. NIKAM6 |
1 | |
6 | Face Spoofing Detection Using Machine Learning ApproachRAGHAVENDRA R J, DR. R SANJEEV KUNTE7 |
3 | |
7 | Data Protection and Reliability in Public Cloud Computing Based on RSA Partial Homomorphic CryptographyANJANI KUSHWAHA, PROF. DEEPAK AGRAWAL, PROF. AKSHAT KHASKALAM8 |
1 | |
8 | Fake News Detection using Convolution Neural Network in Deep LearningS.ANANTH, DR.K.RADHA, DR.S.PREMA, K.NIRAJAN10 |
5 | |
9 | Design and Analysis of Novel Charge Pump Architecture for Phase Locked LoopMANOJ SHARMA, GAJENDRA SUJEDIYADesign and Analysis of |
1 | |
10 | Design and implemented low power Conventional Wallace Multiplier in CMOS TechnologyNEHA BAYA, RAHUL MOUDDesign and implemented low |
5 | |
11 | Design and Analysis of a Conventional Wallace Multiplier in 180nm CMOS TechnologyNEHA BAYA, RAHUL MOUDDesign and Analysis of a Conventional |
3 | |
12 | Review on Extracting Geo-Spatial Information From Open Street Map using Expat Semantic Parser and Support Vector MachineANITA JANMEDA, DR.DINESH KUMARReview on Extracting |
1 | |
13 | Data Security in Cloud Computing Using Cryptographic Algorithms: A ReviewCHANDRIKA, ER. SAHIL DALWALData Security in Cloud |
1 | |
14 | Review on Acoustic Performance of Muffler Unit by Changing Its Cross-SectionSHRUTI S. MANWATKAR, PROF. R. G. GOREReview on Acoustic Performance |
2 | |
15 | Design and Analysis of a Conventional Wallace Multiplier in 180nm CMOS TechnologyNEHA BAYA, RAHUL MOUD15 |
1 | |
16 | Review on Extracting Geo-Spatial Information From Open Street Map using Expat Semantic Parser and Support Vector MachineANITA JANMEDA, DR.DINESH KUMAR16 |
1 | |
17 | Data Security in Cloud Computing Using Cryptographic Algorithms: A ReviewCHANDRIKA, ER. SAHIL DALWAL17 |
1 | |
18 | Review on Acoustic Performance of Muffler Unit by Changing Its Cross-SectionSHRUTI S. MANWATKAR, PROF. R. G. GORE19 |
1 | |
19 | A Study on Product Recommendation System vide Machine Learning using Big DataPRIYANKA, SHALINI20 |
1 | |
20 | Relevance Feedback Using Auditing Scheme in Content-based Image Retrieval in Cloud Computing EnvironmentSONALI PANCHAL, SHITAL GAIKWAD21 |
2 | |
21 | Search History in Ranking Page Based on User Preference SuggestionS.SASIREKA, C.MARIYAMMAL22 |
1 | |
22 | Optimized Load Sharing using Enhanced Genetic Algorithm in LTE NetworkDr. Kavitha B23A |
4 | |
23 | Human Age Estimation through Face Recognition using Stacked Neural Network based Deep Learning ApproachKHEMCHANDRA PATEL, DR. KAMLESH NAMDEV24 |
3 | |
24 | A Study on Weather Forecasting using Machine Learning in Big DataKAVITA DEVI, NANDANI SHRAMA25 |
1 | |
25 | An Epigrammatic Study on NLP -Tools, Challenges and it’s ApplicationsKAVYASHREE E D, SOWMYA SHREE P, ANIL KUMAR C J, KIRAN B26 |
4 | |
26 | Social Partitioning and Replication Middleware for Scaling Online NetworksBEEGUM SUFIYA .J.S27 |
2 | |
27 | Efficient Method for Video Summarization Using Support Vector MachineMAHANTHESHA NAIK H, DR.GIRIJAMMA.H.A28 |
1 | |
28 | Solution for Sustainable Clean Energy: Smart GridSHERYL BERNARD29 |
1 | |
29 | Survey Paper on Pipelined Distributed Arithmetic-Based Multi-rate Approach based Adaptive FilterVIKASH NIGAM, JITENDRA KUMAR MISHRA30 |
1 | |
30 | A Hybrid Feature Extraction Approach for Human Action Recognition System based on Skeleton DataTIN ZAR WINT CHO, MAY THU WIN31 |
1 | |
31 | A Review on TCP Flood, DDOS Attack in Cloud Environment & Their SolutionsANUPRIYA DUBEY, PROF. PANKAJ JAIN31 |
1 | |
32 | An Improved Authentication System Using Finger Vein ImagingN.ANGAYARKANNI, DR.V.SAI SHANMUGARAJA32 |
4 | |
33 | Efficient Double Encryption in Cloud ComputingS.DURGA, P.ALAGUSUNDARAM33 |
2 | |
34 | Empirical Analysis of Skin Cancer Identification Using Multi- SVM ClassifierM.ISHWARYA, J.SUDHA34 |
3 | |
35 | Multi Attribute-Based Proxy Re-Encryption Method for Cloud Storage Security Improvement and Performance StrategiesK. PUSHPARAJ M.TECH.,, C. ARUL JOHNSI35 |
1 | |
36 | Energy Efficient and Secured Cloud Data Handling with Multi-User Access Control StrategiesK.NITHYA, S. ILAKKIYA36 |
1 | |
37 | Estimation of Student Performance Using Artificial Intelligence with LMS StrategiesC.PALANICHAMY, DR. R.KAVITHA, V.PODHUM PONNU37 |
1 | |
38 | Efficient File Download Time Reduction System for Multi-Client Fog/Cloud EnvironmentK.PRIYANGA, V.JANAKIRAMAN38 |
2 | |
39 | PhishFind - An Enhanced Adaptive Neuro-Fuzzy Inference System Phishing Detection over Fog NetworksB.SEETHA, V.ILAYARAJA39 |
5 | |
40 | Effective Energy Preserved Data Transmission Scheme over Wireless Sensor Network EnvironmentC.SRUTHI, P.PONVASAN40 |
1 | |
41 | Implementation of Enterprise CA Organization Based on PKIKARISHMA TYAGI, PROF. DEEPAK AGRAWAL41 |
2 | |
42 | Capabilities and Key Benefits of Sap NetWeaver GatewayYeshwanth Valaboju42A |
3 | |
43 | Experimental Analysis of Network Based Malware and Spam Prediction and Declining ModelR.VIMALASREE, P.PONVASAN43 |
1 | |
44 | Effective Skin Cancer Identification Scheme Using Multi-SVM (MSVM) StrategiesM.KIRITHIKA DEVI, DR. R.KAVITHA, M.VINITHA44 |
1 | |
45 | Designing and Implementation of Charge Pump for Fast-Locking and Low-Power PLLNITESH PAREEK, RAHUL MOUD |
1 | |
46 | Web Services Security Concern, Solution and Its Limitation: A SurveyPREETI PATEL, SAURABH SHARMA46 |
2 | |
47 | A Survey Paper on Opinion mining using Association Rule mining techniques together with Removing Stop words, Emoji’s and Negation HandlingSUNAYANA PARIKH |
2 | |
48 | Modified VM-Assign Load Balancing Algorithm of Cloud Computing in CloudSimPRITHPAL MOHINI SINGH, SHAVETA ANGURALA48 |
1 | |
49 | A System to Counteract Sniffing Assaults Over SystemSONIYA LAZARUS, PROF. DEEPAK PARANJAPE48A |
1 | |
50 | Water Quality Monitoring System Based on IOTSHALAKA V. SHINDE, SUSHANT MURUMKAR, AMOL GAGARE, SAGAR PALWE49 |
1 | |
51 | Survey on IOT Assisted Farming and Crop SelectionNIKITA BAGUL, DEEPIKA SHINDE, POOJA CHAUHAN, ALISHA WAGHMARE, PROF. AMRIN SHEIKH50 |
2 | |
52 | Design & Development of ARM-7 Based Embedded System for Temperature IndicatorSUDHINDRA.F, ANNARAO.S.J, VANI.R.M51 |
2 | |
53 | A Survey on an Effective Video Provisioning Scheme for Content Delivery NetworkSURAJ B. PATIL, PROF. SANTOSH T. WAGHMODE52 |
1 | |
54 | An Unique Approach for Private Keyword Search Over Encrypted Data in Cloud ComputingG.VASAVISUDHA, N.ASHAJYOTHI53 |
1 | |
55 | Multi-Scale Hashing of Nearest Keyword Search in Multi-Dimensional DatasetsCHINNI BALAVIJAYA DURGA, DR. G. RAMA MOHAN BABU.M.TECH.,PH.D54 |
1 | |
56 | Implementing an I2C Master Bus Controller in a FPGAMANGESH SHINDE55 |
1 | |
57 | An Efficient Approach to Forensic Investigation in Cloud using VM Snapshots: An OverviewRAHILA A. SAYEDA, PROF. SHARDHA KHONDE |
2 | |
58 | Online Subjective Answer Text Matching Using Semantic Approach: An OverviewSHWETA V. DEOTARE, PROF. RUBEENA A. KHAN58 |
2 | |
59 | Leveraging File Replication in Data-Intensive Clusters with Energy AdaptabilityANKITA D. GAIKWAD, PROF.K.N.SHEDGE59 |
1 | |
60 | Survey on Forecasting Events over Social Media using Chrono-Spatial ModelANKIT KABRA, PROF. M. P. WANKHADE60 |
1 | |
61 | A Survey on Emotion Recognition on TwitterNIRMALA N. PANSARE, PROF. KURHADE N. V.61 |
2 | |
62 | A Survey on Computer Vision and Image ProcessingTANMAYI SAMANT7 |
3 | |
63 | Artificial Intelligence and Its Related Application in the Cognitive LearningANURAG SINGH, KRISHNA YADAV, AMOGH CHAVAN, PRANAY RAO, YASH SHAH, SOHAM THAKER9 |
7 | |
64 | Automated Pesticide Spraying, Bird Repellent and Watering System for AgricultureB.AISHWARYA, S.DILIP KUMAR10 |
1 | |
65 | Smart Supply Chain Management System for Apple fruits in IndiaRICHA OJHA, RISHABH OJHA, AMBER JAIN, PANKAJ JAIN18 |
1 | |
66 | A Survey on Emotion Based Music Recommendation System Using Facial RecognitionSAHIL THOOL, SHUBHAM GHODE, SAURABH SHAH, OMKAR NATE, Y.V.DONGRE56 |
6 | |
67 | A Review of an Online Fund Transfer System by Using Steganography and Visual CryptographySONALI M. BHAKARE, HIRENDRA R. HAJARE, CHHAYA C. PRASADB.E Student, Dept. of CSE, Ballarpur Institute of Technology, Ballarpur, Gondwana University (MS), India Asst. Professor & HOD, Dept. of CSE, Ballarpur Institute of Technology, Ballarpur, Gondwana University (MS), India B.E Student, Dept. of CSE, Ballarpur Institute of Technology, Ballarpur, Gondwana University (MS), India 2 New |
2 | |
68 | Intelligent Fine-Grained Data Access with Attribute Based Reencryption Norms over Cloud PlatformC. SRIDEVI, V.MANJU42 |
5 | |
69 | Human Age Estimation through Face Recognition using Stacked Neural Network based Deep Learning ApproachKHEMCHANDRA PATEL, DR. KAMLESH NAMDEV23 |
2 | |
70 | Essentiality of Computer Basics for ChildrenDr. Abhilasha Alha70 |
3 | |
71 |
Generation of Soil Erosion and Groundwater Prospect Map Bhagyalakshmi T M, Anand C, S K Shashi Kumar 71 |
6 |