International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Study on Intrusion using Enhanced Sql-Injection and XSS on Web ApplicationsNEERAJ DAGAR, POOJA YADAV2 |
2 | |
2 | A Comparative Study of Personality Traits between General Education and Physical Education Teachers of IndiaNITU SHARMA, DR. ASGAR ALI3 |
2 | |
3 | Evaluate and Classification based Scheme for the Heart Disease PredictionKUMARI SAMRITI, ER. MONIKA PATHANIA5 |
2 | |
4 | Technique against SQL Injection AttackKHUSHBOO CHOUBEY, PROF. PRIYANKA JAIN6 |
3 | |
5 | Intrusion Detection System using Recurrent Neural Network with Deep LearningPRAJYOT S. AUTADE, PRAKASH N. KALAVADEKAR7 |
3 | |
6 | Survey on ECG Data CompressionYASMIN P. SHAIKH, SUNITA DESHMUKH9 |
2 | |
7 | Privacy Preserving Location Based Services Using Secure Spatial Top K Query ProcessingMUKTHAPURAM ADITYAKAVYA, M.DHARANI KUMAR10 |
4 | |
8 | Data Security in Cloud Computing Using Cryptographic AlgorithmsCHANDRIKA, ER. MONIKA12 |
3 | |
9 | Securing Cloud Using Various TechniquesPROF. SHUBHANGI R. KHADE15 |
1 | |
10 | Edge Computing Connectivity maximization for narrowband IoT systems with NOMA for 5G NetworksM.ANU, R.NATHEA, S.KARTHICK16 |
3 | |
11 | Modified ACO Cluster based Key Management Routing Mechanism for WSN SecurityB.VAISHNAVI, C.P.GOWTHAMI17 |
5 | |
12 | A Review on Deep Learning Technique and Its Application in Medical Image ProcessingSUMIT NIRANKARI, SHALINI VASHISTH18 |
2 | |
13 | A Study of Deep Learning Technique and Its Application in Medical Image ProcessingSUMIT NIRANKARI, SHALINI VASHISTH19 |
1 | |
14 | Heart Disease Prediction Approach Using Machine LearningER. KUMARI SAMRITI, ER. MONIKA PATHANIA21 |
3 | |
15 | Survey on An Encryption Technique using Fusion of Multi-Biometrics Data and Prim NumbersKADTAN MAHESH NARAYAN, DR. SADHANA CHIDRAWAR24 |
2 | |
16 | User Vitality Prediction, Ranking and Providing Ads in Social Networking Services Based on Users ProfileYOGITA SHEWALE, PROF. P. R. DHOLI25 |
3 | |
17 | Enabling Big Data Complex Event Processing for Quantitative Finance through a Data-Driven ExecutionVENKATESH N, DR. D. G JYOTHI27 |
1 | |
18 | A Novel Approach for Assisting the Visually Impaired to Recognize Objects in an ImageSUSHMA M P, GIRIJA J28 |
5 | |
19 | An Analysis of Shortestpath Protocal Using VANET ConnectionG.YOGESWARI, P.SATHYASUDHA29 |
2 | |
20 | A Robotic Smart Receptionist Management SystemKAVYA N, N. THANUJA30 |
2 | |
21 | Implementation of Basic Gates and Compound Gates (AOI & OAI) using Ladder Diagram in Programmable Logic Controller (PLC)DARSHAN HALLIYAVAR, SHWETHA M P, PUNEETH S, K. SUDHA DEEPTHI31 |
3 | |
22 | Weather Prediction using Linear Regression & Support Vector Machine vide Big DataKAVITA DEVI, NANDANI SHRAMA34 |
3 | |
23 | Data Visualization Tools: Insights Collection and Decision MakingAKASH RAJENDRAKUMAR PATIL35 |
2 | |
24 | Improved Efficient Data Classification Model for Ensuring Data Security in Cloud EnvironmentMEENAL JAIN, ASHOK VERMA36A |
2 | |
25 | Improving Label Noise Filtering by Exploiting Unlabeled Data using Supervised LearningMOKSHADA KOTWAL, SHRADDHA KHONDE37 |
2 | |
26 | A Study on Content based Chunking in Data Deduplication for Optimized Cloud StorageRuba S, Kalpana A M39A |
5 | |
27 | A Survey on Hadoop Mapreduce FrameworkJEET SAMIRKUMAR SHAH, PRAVINA PARMAR4 |
2 | |
28 | Embedded System for LPG Gas Leakage DetectionMASUM SHAH8 |
1 | |
29 | Personal Assistant and Intelligent Home Assistant via Artificial Intelligence Algorithm Using Raspberry PiJAHNAVI .V, U. APARNA DEVI, BHAVYA.S.N.V, SOWJANYA.R, SRI LEKHA.M11 |
1 | |
30 | Online Data Sharing Using Cloud ComputingSANTANALAKSHMI SOMASUNDARAM13 |
4 | |
31 | A Survey on Machine Learning: Algorithms, Performance and ApplicationsSUSHANTO PRAHARAJ, SHIVAM BHAT, GANASHREE K.C, DR. KRISHNAPPA H.K14 |
4 | |
32 | Crop Loss Prediction, Assessment and Evidence CollectionNIDA, SINDHUSHREE.M, NAVYASHREE.C.K, SMITHA M SUTALE, DR.H.V.GOVINDARAJU20 |
2 | |
33 | A Survey on Energy Efficiency Techniques in 5G NetworksSWETHA M S, DR. ANIL G N, RAMAN SHAH, SHREEJWOL DISTI22 |
1 | |
34 | Spatial Crowdsourcing using Multi Skill OrientationABHIMANYU D. SANGALE, M. R. GAIKWAD23 |
4 | |
35 | Identification of Lung Cancer and Stage prediction using Machine Learning ApproachYASH A. PATADE, KEYUR S. KARVE, SAURABH P. JOSHI, NEEL S. SHEVATKAR, NAVNATH S. BAGAL26 |
1 | |
36 | Using Hidden Markov Model in Detection of Frauds in Credit CardsREVANTH KUMAR R, PRAKRUTHI R BHARADWAJ, KURUVA LAVANYA, RAKSHITHA H V32 |
5 | |
37 | Statistical Validation of Machine Learning Based Multimedia Quality EstimatorsRASHMI C V, SHOBHA Y33 |
4 | |
38 | Route Search on Road Networks Using User CluesA M JAGAT, ANURAG RAMESH, RAJAT JANGRA, ZIAUR RAHMAN , SHANKAR RANA36 |
1 | |
39 | Profit Maximization for Cloud Brokers in Cloud ComputingSRIKANTH S.P, MANZOOR AHMED KHAN, MANMEET SINGH SAHNI, RABEEA OMAR O, LAKSHMI PRASAD M38 |
1 | |
40 | A Novel & More Secure Caesar CipherFAIZAN JAVAID DAR, ASIF JAVEED, AAMIR FAROOQ MIR, SHAHID MOHI UD DIN40 |
1 | |
41 | NextWave Helper: Android App for Search and RescueMANILAL D. L., ANAND SHEKHAR, JOE DAVIS AKKARA, SARAN NARAYAN41 |
4 | |
42 | Smart Traffic Control System Using Image ProcessingANISHA DESAI, NISHA SHAH42 |
1 | |
43 | Traffic Management using Image ProcessingCHANDANA N, ABHISHEK R, ANUSHA I ASUNDI, DARSHAN S, VANISHREE M L43 |
4 | |
44 | Privacy Preserving Data Mining using CryptographyARATI DHAKE, TEJAL GHARATE, KOMAL MALI, SAPANA PATIL44 |
1 | |
45 | Brain Tumor Prediction using Data MiningYOGITA PATIL, REVATI PIMPARKAR, SUKANYA SONAR, NIDHI ZOPE45 |
3 | |
46 | Smart Electric Meter Using IOTJEEVAN JAWALKAR, NEHAL DHUMAL, SHAHID SHAIKH, ZAID BAIG, SANDESH PAWASKAR46 |
3 | |
47 | Vehicle Health Monitoring SystemSHREYA MANKAR, PRADNYA ZENDAGE, PRATHMESH SHIMPI, OMKAR BHANDARI, PROF. NITIN SHIVALE47 |
3 | |
48 | Video Telegenic Watermarking Based On Visual SteganographyNEHA MANE, AAKASH PAWAR, AARTI KULKARNI, KOMAL LANDGE, SANDESH PAWASKAR48 |
3 | |
49 | Product Aspect Ranking and Summarization Using Apriori AlgorithmMOHINI CHAUDHARI, SHITAL WAGH, SAMIKSHA WANI, RUCHA SONAWANE49 |
3 | |
50 | Overview of Differential Privacy in Machine Learning AlgorithmsMADHUSHREE M, DR.K.S JASMINEPG Student, Department of MCA, RV College of Engineering, Bangalore, India Associate Professor, Department of MCA, RV College of Engineering, Bangalore, India 111 |
2 | |
51 | Study and Development of TB-CGA Based Address Generation for IPv6PRIYANKA SINGH BAGHEL, PROF. SATPAL SINGH, PROF. SUMIT NEMA39 |
2 | |
52 | Timely and Error Free Detection and Elimination of Violation in ECGMadhavi Nachimuthu , Kaliram Perumal , Bharathi Subramaniam , Gowrison Gengavel52 |
4 | |
53 | Access to Justice and Legal Empowerment of Tribal Communities in JharkhandMadhu Ranjan
53
|
3 |