International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|

Volume-7  issue-4 April   2019


S.No Paper Title / Authors Download Paper Downloads
1

Study on Intrusion using Enhanced Sql-Injection and XSS on Web Applications

NEERAJ DAGAR, POOJA YADAV
2
2
2

A Comparative Study of Personality Traits between General Education and Physical Education Teachers of India

NITU SHARMA, DR. ASGAR ALI
3
2
3

Evaluate and Classification based Scheme for the Heart Disease Prediction

KUMARI SAMRITI, ER. MONIKA PATHANIA
5
2
4

Technique against SQL Injection Attack

KHUSHBOO CHOUBEY, PROF. PRIYANKA JAIN
6
3
5

Intrusion Detection System using Recurrent Neural Network with Deep Learning

PRAJYOT S. AUTADE, PRAKASH N. KALAVADEKAR
7
3
6

Survey on ECG Data Compression

YASMIN P. SHAIKH, SUNITA DESHMUKH
9
2
7

Privacy Preserving Location Based Services Using Secure Spatial Top K Query Processing

MUKTHAPURAM ADITYAKAVYA, M.DHARANI KUMAR
10
4
8

Data Security in Cloud Computing Using Cryptographic Algorithms

CHANDRIKA, ER. MONIKA
12
3
9

Securing Cloud Using Various Techniques

PROF. SHUBHANGI R. KHADE
15
1
10

Edge Computing Connectivity maximization for narrowband IoT systems with NOMA for 5G Networks

M.ANU, R.NATHEA, S.KARTHICK
16
3
11

Modified ACO Cluster based Key Management Routing Mechanism for WSN Security

B.VAISHNAVI, C.P.GOWTHAMI
17
5
12

A Review on Deep Learning Technique and Its Application in Medical Image Processing

SUMIT NIRANKARI, SHALINI VASHISTH
18
2
13

A Study of Deep Learning Technique and Its Application in Medical Image Processing

SUMIT NIRANKARI, SHALINI VASHISTH
19
1
14

Heart Disease Prediction Approach Using Machine Learning

ER. KUMARI SAMRITI, ER. MONIKA PATHANIA
21
3
15

Survey on An Encryption Technique using Fusion of Multi-Biometrics Data and Prim Numbers

KADTAN MAHESH NARAYAN, DR. SADHANA CHIDRAWAR
24
2
16

User Vitality Prediction, Ranking and Providing Ads in Social Networking Services Based on Users Profile

YOGITA SHEWALE, PROF. P. R. DHOLI
25
3
17

Enabling Big Data Complex Event Processing for Quantitative Finance through a Data-Driven Execution

VENKATESH N, DR. D. G JYOTHI
27
1
18

A Novel Approach for Assisting the Visually Impaired to Recognize Objects in an Image

SUSHMA M P, GIRIJA J
28
5
19

An Analysis of Shortestpath Protocal Using VANET Connection

G.YOGESWARI, P.SATHYASUDHA
29
2
20

A Robotic Smart Receptionist Management System

KAVYA N, N. THANUJA
30
2
21

Implementation of Basic Gates and Compound Gates (AOI & OAI) using Ladder Diagram in Programmable Logic Controller (PLC)

DARSHAN HALLIYAVAR, SHWETHA M P, PUNEETH S, K. SUDHA DEEPTHI
31
3
22

Weather Prediction using Linear Regression & Support Vector Machine vide Big Data

KAVITA DEVI, NANDANI SHRAMA
34
3
23

Data Visualization Tools: Insights Collection and Decision Making

AKASH RAJENDRAKUMAR PATIL
35
2
24

Improved Efficient Data Classification Model for Ensuring Data Security in Cloud Environment

MEENAL JAIN, ASHOK VERMA
36A
2
25

Improving Label Noise Filtering by Exploiting Unlabeled Data using Supervised Learning

MOKSHADA KOTWAL, SHRADDHA KHONDE
37
2
26

A Study on Content based Chunking in Data Deduplication for Optimized Cloud Storage

Ruba S, Kalpana A M       
39A
5
27

A Survey on Hadoop Mapreduce Framework

JEET SAMIRKUMAR SHAH, PRAVINA PARMAR
4
2
28

Embedded System for LPG Gas Leakage Detection

MASUM SHAH
8
1
29

Personal Assistant and Intelligent Home Assistant via Artificial Intelligence Algorithm Using Raspberry Pi

JAHNAVI .V, U. APARNA DEVI, BHAVYA.S.N.V, SOWJANYA.R, SRI LEKHA.M
11
1
30

Online Data Sharing Using Cloud Computing

SANTANALAKSHMI SOMASUNDARAM
13
4
31

A Survey on Machine Learning: Algorithms, Performance and Applications

SUSHANTO PRAHARAJ, SHIVAM BHAT, GANASHREE K.C, DR. KRISHNAPPA H.K
14
4
32

Crop Loss Prediction, Assessment and Evidence Collection

NIDA, SINDHUSHREE.M, NAVYASHREE.C.K, SMITHA M SUTALE, DR.H.V.GOVINDARAJU
20
2
33

A Survey on Energy Efficiency Techniques in 5G Networks

SWETHA M S, DR. ANIL G N, RAMAN SHAH, SHREEJWOL DISTI
22
1
34

Spatial Crowdsourcing using Multi Skill Orientation

ABHIMANYU D. SANGALE, M. R. GAIKWAD
23
4
35

Identification of Lung Cancer and Stage prediction using Machine Learning Approach

YASH A. PATADE, KEYUR S. KARVE, SAURABH P. JOSHI, NEEL S. SHEVATKAR, NAVNATH S. BAGAL
26
1
36

Using Hidden Markov Model in Detection of Frauds in Credit Cards

REVANTH KUMAR R, PRAKRUTHI R BHARADWAJ, KURUVA LAVANYA, RAKSHITHA H V
32
5
37

Statistical Validation of Machine Learning Based Multimedia Quality Estimators

RASHMI C V, SHOBHA Y
33
4
38

Route Search on Road Networks Using User Clues

A M JAGAT, ANURAG RAMESH, RAJAT JANGRA, ZIAUR RAHMAN , SHANKAR RANA
36
1
39

Profit Maximization for Cloud Brokers in Cloud Computing

SRIKANTH S.P, MANZOOR AHMED KHAN, MANMEET SINGH SAHNI, RABEEA OMAR O, LAKSHMI PRASAD M
38
1
40

A Novel & More Secure Caesar Cipher

FAIZAN JAVAID DAR, ASIF JAVEED, AAMIR FAROOQ MIR, SHAHID MOHI UD DIN
40
1
41

NextWave Helper: Android App for Search and Rescue

MANILAL D. L., ANAND SHEKHAR, JOE DAVIS AKKARA, SARAN NARAYAN
41
4
42

Smart Traffic Control System Using Image Processing

ANISHA DESAI, NISHA SHAH
42
1
43

Traffic Management using Image Processing

CHANDANA N, ABHISHEK R, ANUSHA I ASUNDI, DARSHAN S, VANISHREE M L
43
4
44

Privacy Preserving Data Mining using Cryptography

ARATI DHAKE, TEJAL GHARATE, KOMAL MALI, SAPANA PATIL
44
1
45

Brain Tumor Prediction using Data Mining

YOGITA PATIL, REVATI PIMPARKAR, SUKANYA SONAR, NIDHI ZOPE
45
3
46

Smart Electric Meter Using IOT

JEEVAN JAWALKAR, NEHAL DHUMAL, SHAHID SHAIKH, ZAID BAIG, SANDESH PAWASKAR
46
3
47

Vehicle Health Monitoring System

SHREYA MANKAR, PRADNYA ZENDAGE, PRATHMESH SHIMPI, OMKAR BHANDARI, PROF. NITIN SHIVALE
47
3
48

Video Telegenic Watermarking Based On Visual Steganography

NEHA MANE, AAKASH PAWAR, AARTI KULKARNI, KOMAL LANDGE, SANDESH PAWASKAR
48
3
49

Product Aspect Ranking and Summarization Using Apriori Algorithm

MOHINI CHAUDHARI, SHITAL WAGH, SAMIKSHA WANI, RUCHA SONAWANE
49
3
50

Overview of Differential Privacy in Machine Learning Algorithms

MADHUSHREE M, DR.K.S JASMINE

PG Student, Department of MCA, RV College of Engineering, Bangalore, India

Associate Professor, Department of MCA, RV College of Engineering, Bangalore, India

111
2
51

Study and Development of TB-CGA Based Address Generation for IPv6

PRIYANKA SINGH BAGHEL, PROF. SATPAL SINGH, PROF. SUMIT NEMA
39
2
52

Timely and Error Free Detection and Elimination of Violation in ECG

Madhavi Nachimuthu , Kaliram Perumal , Bharathi Subramaniam , Gowrison Gengavel 
52
4
53

Access to Justice and Legal Empowerment of Tribal Communities in Jharkhand

Madhu Ranjan

53
3