International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Heart Disease Prediction Approach Using Machine LearningER. KUMARI SAMRITI, ER. POONAM CHAUDHARY2 |
6 | |
2 | Drip Irrigation Based on Soil Moisture using IOTAKSHAY M J, AMULYA H N, ANCHITHA K R, NISCHITHA A C, PRIYA SATISH3 |
6 | |
3 | Microstrip Patch Antenna Array for Long Term Evolution ApplicationsNAGENDRA CHATURVEDI, PROF. ANSHUJ JAIN4 |
5 | |
4 | Review for Higher System Performance over MIMO STBC-OFDM Wireless CommunicationHIMANSHU KHARE, PROF. ANSHUJ JAIN5 |
6 | |
5 | Effective Utilization of Hello Packets for Reduce Network Partitioning and Node Mobility in MANETP.PARUTHI ILAM VAZHUTHI, DR.S.P.MANIKANDAN8 |
7 | |
6 | Fault Detection in Combinational Circuit (Full Adder) Using PrologSHUBHANGEE KISHAN VARMA, ARUNKUMAR B. PATKI7 |
8 | |
7 | Twitter Spam Detection Using Machine Learning AlgorithmsSUJATA BAHADURE, D.K. CHITRE9 |
6 | |
8 | Wheel Defect Detection SystemAISHWARYA BARGE, DIKSHA KASAT, HARSHADA GOSAVI, SAMRUDDHI KOLI, PROF. SMITA GUMASTE10 |
5 | |
9 | Analysis for Alzheimer’s Disease Using Cross Correlation of EEG DataMISS SHRADDHA S. SUTAR, PROF.SHEKHAR M.JAGADE11 |
3 | |
10 | Medical Data Security in Cloud Environment using: BlockchainAARJU JAIN, DR. ASHOK VERMA11A |
4 | |
11 | Multi-Keyword Search System on Cloud ComputingNIKHIL SHIRPURKAR, VIPUL GORE, ANIKET JAGTAP, VIRAJ N JAMDAR, PROF. AMOL LACHAKE |
4 | |
12 | Survey of Fuzzy Min Max Neural Network and VariantsPROF. KAPIL TAJANE, DEVESH DHANRALE, SAINATH UTTURKAR, ATUL WAGH, ATHARAV WAGHMARE13 |
3 | |
13 | Twitter Data VisualizationPRANJAL SHITOLE, NIDHI BANAWALI, KAJAL KUMARI14 |
4 | |
14 | Identification of Bones in the Pelvic CT Scan Images using YOLO ModelABHIGNA VOGIETY14A |
6 | |
15 | A Framework to Predict the Advertise View ability by using Machine LearningABHISHEK GANDHI, MOHIT GAWALE, PRANAV KARMARKAR, TANAY GAWALI, M. V. SADAPHULE15 |
5 | |
16 | An Advanced DDoS TCP Flood Attack Protection System in a Cloud EnvironmentVIVEK ANJAN SHRIVASTAVA, PROF. PRADEEP TRIPATHI16 |
7 | |
17 | A Comparative Study on Image Isolation and Classification Techniques in Microscopic Blood Smear ImagesRENUKA V TALI, SIDDALINGESH BANDI45 |
10 | |
18 |
Development of a Project Risk Management System based on Industry 4.0 Technology and its Practical Implications Varun Kumar Tambi, Nishan Singh 17 |
11 | |
19 |
The Suitability of Different Cybersecurity Services to Stop Smart Home Attacks Pankit Arora, Sachin Bhardwaj Sr. Risk Modeling/Analytics Analyst, Mr. Cooper, USA Assistant Manager (GRC), EXL Service Pvt Ltd. India 18 |
11 | |
20 |
Data Centre Cooling Technology's Effect on Turbo-Mode Efficiency SANJAY BHAT Lead Product Specialist – CFD and Batteries, Altair, USA 19 |
7 | |
21 |
Detection of Glaucoma based on Energy and Cup to Disk Ratio Prasanthamurthy H G, Pavitra S R, Shwetha D M 21 |
3 |