International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Generation of Nanometer Optical Tweezers Used for Optical Communication NetworksA.NIKOUKAR, I.S.AMIRI, J.ALI0 |
3 | |
2 | Detection of Edges Using Fuzzy Inference SystemABHRADITA DEEPAK BORKAR, MITHILESH ATULKAR1 |
2 | |
3 | Cloud Cluster NexusPROF B.B.GITE, ANKUR JAISWAR, ALISHA TELRANDHE, SANDEEP MASKE2 |
2 | |
4 | Efficient Remote Data Possession Checking In Critical Information Infrastructures Ensuring Data Storage Security In Cloud ComputingDR. T.NALINI, DR.K.MANIVANNAN,VAISHNAVI MOORTHY3 |
1 | |
5 | A Vector Quantization Technique for Image Compression using Modified Fuzzy Possibilistic C-Means with Weighted Mahalanobis DistanceDR. S.SATHAPPAN3A |
1 | |
6 | Privacy Preserving & Access Control to Intrusion Detection in Cloud SystemSWATI P. RAMTEKE, PRIYA S.KAREMORE, S.S.GOLAIT4 |
2 | |
7 | Book Tracking Application in Android For Library using GPSAKHIL CHOUDARI, SANKALP JOSHI, AKSHAY BEMBALKAR, NAINESH MARATHE, L.J.SANKPAL5 |
4 | |
8 | Privacy Conserving Approach to Anonymous DatabaseJAIMIN MARFATIA, NAINISH MODI, NIRAJ LAD, VAISHALI PATEL, JIGNASA PATEL6 |
1 | |
9 | 3D Face Recognition Using Pose and Illumination CompensationDR.A.MUTHU KUMARAVEL7D |
1 | |
10 | A Social Collaboration Platform for SchoolsANURESH KOTHARI, AAKASH GHOGARE, PIYUSH NANDAN, BHARATI SHINDE7 |
1 | |
11 | Mobile Messaging using Wi-Fi Adhoc NetworkPIYUSH VILAS SHEWALE, AMIT SUBHASH SHELKE, SOURABH MADHUKAR DARANGE8 |
2 | |
12 | Automatic Overtaking for Accident Avoidance and Automatic Windscreen WiperMS.SAMIKSHA P.NATE, MS.SHWETA B.BANSUDE, MS.ANUJA M.BHOSALE, PROF. A.S.SHITOLE9 |
2 | |
13 | Education-As-A-ServiceKALAIPRASATH.R, R. UDAYAKUMAR, R. ELANKAVI9A |
2 | |
14 | An Energy-Efficient, Cross Layer Approach for Time-Critical Applications in Underwater Sensor NetworksRAKESH V S, SRIMATHI C10 |
2 | |
15 | The Efficiency of the Scalable Architecture for Revealing and Observing the Environment using Wireless SensorB.SUNDAR RAJ11 |
1 | |
16 | A Study on Cloud Resource Management TechniquesD.MAHENDRAN, M.GOPI, S. PRIYADHARSHINI, R.KARTHICK13A |
3 | |
17 | Mock Manager ToolPRIYANKA BANSAL, MAMTA VADHARIYA, APURVA NARASIMHAN, ANKIT MEHTA, MRS. SHWETA TIWASKAR11 |
2 | |
18 | Automate and Secure Your Home Using Zigbee TechnologyNAUSHEEN BELIM, HARSHADA BHAMBURE, PRIYANKA KUMBHAR, SIMRANJIT TUTEJA12 |
2 | |
19 | Performance Comparison of Single Channel Speech Enhancement Techniques for Personal CommunicationMILIND U. NEMADE, PROF. SATISH K.SHAH13 |
1 | |
20 | Textile Reinforced Structural Composites for Advanced ApplicationsARVIND VASHISHTHA14 |
10 | |
21 | Image Retrieval Using Personalized and Non-Personalized SearchDR.A.MUTHU KUMARAVEL15 |
1 | |
22 | Survey of Attacks on Wireless NetworkANKUR BAWISKAR, DR. B.B.MESHRAM15 |
1 | |
23 | Generation of New Julia Sets and Mandelbrot Sets for Inverse Sine FunctionRAJESHRI RANA, YASHWANT SINGH CHAUHAN16 |
1 | |
24 | Hybrid Algorithm for 2D Image Compression using Wavelet TransformC.PRIYA16A |
1 | |
25 | Open Loop Travelling Salesman Problem using Genetic AlgorithmAKSHATHA .P.S, VASUDHA VASHISHT, TANUPRIYA CHOUDHURY17 |
2 | |
26 | Wide band LH Circular Polarized Antenna; Design and AnalysisK.PRAVEEN KUMAR, K.SANJEEVA RAO, V.MALLIKARJUNA RAO, N.ANJANEYA VARAPRASAD, C.MURALIMOHAN18 |
1 | |
27 | Intelligent Train Engine For The Fastest New Age TechnologyANIL KUMAR VERMA, DHARMENDRA KUMAR, GOPAL KRISHNA GOLE, JITENDRA KUMAR19 |
1 | |
28 | Fault Diagnosis Using LP-TPG for Random Logic CircuitsJ. KAUSHIK, M. JAYASANTHI19A |
1 | |
29 | A Technique for changing or adding the attribute of shape files through mobile device in a distributed system environmentRITIK SHARMA , SAURABH KAUSHIK, SHUBHANGI GARG, HIMANSHU SETIYA20 |
1 | |
30 | Analysis of Software Functional Programming and Imperative ProgrammingV.Thangadurai, Dr.K.P.Yadav, Dr.K.Krishnamoorthy21 |
3 | |
31 | Number Plate Detection with Application to Electronic Toll Collection SystemKANNAN SUBRAMANIAN22 |
1 | |
32 | XML Path Algorithm for Matching XML Elements with Different QueriesK.KARTHIBAN, M.ARUL JOTHI, G S MAGTHALIN NISHA, V.SINDHU23 |
1 | |
33 | Five Level Inverter with SARC Boost Converter for PV ApplicationsT.RANGANATHAN,J.SUNIL KUMAR24 |
2 | |
34 | Efficient Email Spam Prediction using Feedback Clustering TechniqueVenkata Sai Sriharsha Sammeta, K Jairam Naik, K Ram Mohan Rao25 |
1 | |
35 | Network Attacks and Their CountermeasuresAJIT KOTKAR, ALOK NALAWADE, SIDDHESH GAWAS, ANIKET PATWARDHAN35 |
7 | |
36 | A Customized Three Estimate Value Model of Requirements for a Business ModelVENKATESWARLU S, VIDUSHI SARMA
36
|
6 |