International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Context Aware in Intermittently Connected Network RoutingAHMED B. ALTAMIMI3 |
9 | |
2 | A Review on Face Recognition for Faster Processing PowerDEEPAK SHARMA, AMAN KUMAR, ASTHA GAUTAM4 |
6 | |
3 | Literature Review on Fuzzy Score Based Short Text Understanding from Corpus Data Using Semantic DiscoveryS.MANIMEGALAI, D.UMANANDHINI5 |
3 | |
4 | An Enhanced Cross Layer Architecture for Wireless Multihop NetworksK.KALAIARASAN, S.R.KARTHIKEYAN, C.KARTHIKEYAN6 |
3 | |
5 | IOT Based Women Tracking and Security with Auto Defender System: A ReviewROSHNI S. SUNE, M. H. NERKAR7 |
3 | |
6 | A Study on Big Data with Indexing Technique for Searching and Retrieval of Data FastlyPOOJA ANAND, DR. SANDEEP MAAN8 |
8 | |
7 | Review on Car Traffic Sign AnnunciatorG. K. ANDURKAR, SAMATA BANSOD9 |
2 | |
8 | Security in Geo-Social Applications Through Preserving Location PrivacyDHANASHREE PATIL, YOGESHWARI S. BORSE10 |
4 | |
9 | Blockchain based Security Mechanism for Internet of Things (IoT)ZAINIYA MANJIYANI11 |
2 | |
10 | A Generic Strategy for Cold-Start Rating Prediction Problem Using RAPAREVIJAYALAKSHMI S, RAMYA J12 |
2 | |
11 | Security in Vehicular Ad-hoc NetworkYOGITA A. MORE, NILIMA P. PATIL13 |
7 | |
12 | A Review on Hindi Numeral RecognitionPOOJA SINGH, PROF. ROVIN TIWARI14 |
2 | |
13 | A Review on Different Load Flow Technique for LVDC distribution SystemARTI KUSHWAHA, PROF. KAPIL GUPTA16 |
3 | |
14 | Survey on Sign language to Speech ConversionASHISH G. BAIRAGI, Y.D. KAPSE17 |
1 | |
15 | An Approach to Extract Features from Speech Signal for Efficient Recognition of SpeechNARENDRA KUMAR SAINI, VIPRA BOHARA, LAXMI NARAYAN BALAI19 |
3 | |
16 | Efficient Exploitation of All Wireless Networks around Us – The Right ApproachAMIRTHARAJ S, SABAPATHI T21 |
3 | |
17 | A Smart System to Manage and Control Home AppliancesSHAMIMA AKTER, MOHAMMAD JAHANGIR ALAM , DR. MD. NURUL MUSTAFA22 |
2 | |
18 | Hybrid Cryptography Approach for Securing MANETs – A SurveyZUHI SUBEDAR, SATISH DESHPANDE24 |
3 | |
19 | Virtual Remote Lab Access over TCP /IP ServerVAISHALI BOBADE, SHASHANK MANE25 |
1 | |
20 | Biometric Door Lock System over MQTT ProtocallHINGOLIKAR SMITA CHANDULAL27 |
1 | |
21 | Using Text Mining Algorithm to Track Job Seeker Search Patterns in GhanaDELALI KWASI DAKE30 |
1 | |
22 | A Car Breakdown Service Station Locator SystemNEELIMA SUTAR, POOJA DORGE, MONIKA KADAM, PROF. RASHMI TUNDALWAR33 |
1 | |
23 | Artificial Intelligence Using Forward Chaining and Backward ChainingKAJAL JAISINGHANI34 |
2 | |
24 | A Survey on New Approach for Integrity Checking on Cloudstorage DataNEHA R. PATIL, PROF. S. R. PATIL35 |
1 | |
25 | Performance Analysis of RabbitMQ as a Message BusSNEHA SHAILESH, KIRAN JOSHI, KAUSTUBH PURANDARE36 |
1 | |
26 | Artificial Intelligence Corroborated By Blockchain Will Lead To an Unhackable World of MachinesSHREEYASH AMIT YENDE38 |
1 | |
27 | A Comprehensive Survey on Techniques of Reversible Data Hiding in Encrypted ImagesNILAM N. SHAIKH, PRATIBHA S. RANE, PRARTHANA M. MODAK39 |
1 | |
28 | Performance analysis of RabbitMQ as a Message BusSNEHA SHAILESH, KIRAN JOSHI, KAUSTUBH PURANDARE40 |
1 | |
29 | Smart Helmet: A Protective Headgear SystemNILESH M. VERULKAR, SWATI S. PATIL, NAMRATA A. GANDHI, KOMAL B. TODKAR41 |
2 | |
30 | A Survey on E-commerce Trends and Popularity in Indian YouthsARCHANA PATIL45 |
2 | |
31 | Study of Data Deduplication Techniques on CloudPOOJA KHARADE, ZAHEED SHAIKH47 |
1 | |
32 | An Approach to Energy Optimization in WSN Using Hybrid Leach and Bird Swarm AlgorithmKRITIKA VARMA, SAHIL DALWAL50 |
2 | |
33 | Improving Hadoop Performance by Decouple Shuffle and Reduce with MapReduceSINDHUJA.R, PRIYADHARSHINI.P51 |
1 | |
34 | Time Sliced and Priority Based Load BalancerMONIKA CHATURVEDI, PROF. DEEPAK AGRAWAL51A |
1 | |
35 | Automated Detection of Cardiac Arrest using Heart Beat Sensor and Provision of Therapy through Wearable DefibrillatorM. GNANA GURU, S. JOTHIRAJ, M. YOGARAJAN., KUMAR KANDUKURI54 |
11 | |
36 | Android App for Temperature Count with RaspberryRUCHIKA KHADATKAR, KARISHMA BOBDE, GOPAL SAKARKAR55 |
1 | |
37 | Security and Privacy Issues in Cloud Computing Environment: A SurveySRISHTI JAIN , PROF. SATPAL SINGH55A |
5 | |
38 | Design and Analysis of Compact Dual – Band slotted Microstrip Antenna for WLAN ApplicationBADISA GEYA LAKSHMI SOWJANYA, A.VANAJA56 |
1 | |
39 | Power Price Forecasting In the Smart Grid Using Differential Evolution Based SVM ClassifierRAMYA DEVI. C, AMUDHA. L58 |
1 | |
40 | A Review over LTE for Vehicular Ad-Hoc Network using IEEE 802.11pRESHMA CHHATANI, PROF. MOHD AMZAD60 |
3 | |
41 | Analysis of Different Approaches for Recognition of Road Traffic SignsRICHA JAIN, PROF. DEEPA GIANCHANDANI61 |
1 | |
42 | A Survey on Different Features and Technique over LTE-5G TechnologySHWETA CHATURVEDI, PROF. ANOOP TIWARI62 |
1 | |
43 | Review for Higher System Performance over MIMO STBC-OFDM Wireless CommunicationPANKAJ KUMAR BHARTI, DR. PARESH RAWAT63 |
1 | |
44 | Analysis of Colour Reconstruction for 3D RGB-D SystemASHISH MISHRA, DR. BHARTI CHAURASIYA, PROF. ANSHUJ JAIN64 |
2 | |
45 | A Review on Opinion Mining and Sentiment Analysis in Data MiningSONAM SISODIA, JAYSHREE BOADDH, PROF. DURGESH WADBUDE65 |
1 | |
46 | Performance Analysis of NEAHC and NEAHRC Routing Protocol in WSNRAGIBA QARI, ABHISHEK BHARDWAJ, VARSHA SAHNI66 |
2 | |
47 | A Survey on Multi-Keyword Ranked Search Scheme over Encrypted Cloud StorageSHAIKH SANIYA, SHERKAR SHILPA, KULKARNI ADITI, KULKARNI MEDHA, PROF.S.P.VIDHATE67 |
2 | |
48 | Onion Loss Detection, Automatic Roof Opening and Closing against Rain & Optimum Ventilation Providing SystemSAGAR A. PAWAR, PRADIP V. SHINDE68 |
1 | |
49 | Spreadsheet Macro Generation through Query Building ToolEKATA R. KADAM, B. R. SOLUNKE75 |
1 | |
50 | Modulo 2n±1 Adder/Subtractors for DSP ApplicationsVARSHA NARASIMHA MURTHY78 |
1 | |
51 | Comprehensive Study on Negative Effects of Mobile Phone/ Smart Phone on Human HealthASOKE NATH79 |
4 | |
52 | An Integrated Fuzzy ANP and TOPSIS Methodology for Software Selection under MCDM PerspectiveBIJOYETA ROY, SANTANU KR. MISRA82 |
2 | |
53 | Copyrights Protection Techniques:A SurveySHIVAM TIWARI, DR. NEERAJ SHUKLA83 |
1 | |
54 | Enhanced Secure Mechanism for ARP Poisoning and MITM AttackPRIYANKA LAKHANPAL , PROF. DEEPAK AGRAWAL86 |
1 | |
55 | A Framework to Prevent Sniffing Attacks Over NetworkMILKY JHA, RAGHAVENDRA KUMAR87 |
1 | |
56 | Comparison of Different Classification Techniques Using WEKA for Diabetic DiagnosisARKA HALDAR, G.PRUDHVI RAJ , S.V.S.S LAKSHMI15 |
11 | |
57 | Analysis on Image Compression & EncryptionRIDHI JAYESH SHAH, YASHASHRI SUNIL HARYAN18 |
5 | |
58 | Detection of Phishing Website Using Machine LearningRITIKA SAKPAL, SHUBHAM SHIRKE, ADITYA SHINDE, TEJAS SHENOY20 |
4 | |
59 | Accident Reporting and Vehicle Monitoring SystemSHIVANI VYAS, RAJVI SHAH, AMEY TAMHANKAR, HARSHAL VENGURLEKAR23 |
3 | |
60 | BSIOTR Info: An Android Application for College CampusABHISHEK GHATGE, AKSHAY MANAL, KEVAL AVHAD, GORAKSHNATH DAULE, VISHAL MHASE, PROF. AMOL BAVISKAR26 |
1 | |
61 | Understanding Smartphone Sensor and App Data for Enhancing the Security of Secret QuestionsSMITA CHOUDHARY, JAYWANT JAGTAP, GINNY PUNJABI, VISHAL BARDE, KRANTI CHOUDHARY28 |
3 | |
62 | Stock Market Prediction in BSE Using Long Short-Term Memory (LSTM) AlgorithmDr.Vijay Reddy Madireddy29 |
4 | |
63 | A Review of Segmentation and Object Detection Methods for Real-Time Image Processing for Detecting PedestriansMITALI MEHTA, VASVI DESAI, ROHAN GUPTA, AVANI SHAH31 |
1 | |
64 | Grammatically Correct Speech by Using Speech RecognitionVRUSHALI BHAMARE, PRIYANKA KALOKHE, KETAKI KULKARNI32 |
2 | |
65 | Emotion Based Music Player through Face Recognition SystemMOHIL PATIL, GITANJALI LABADE, VARSHA SUTAR, SAURABH PATIL, DR.B.K. SARKAR42 |
2 | |
66 | Diagnosis Support System for Lung Cancer Detection Using Artificial IntelligenceK. V. BAWANE, A. V. SHINDE46 |
1 | |
67 | A Survey on Image Processing to Detect and Count the Object using Color Differentiation ConceptVEENETHA.K.C, YOGALAKSHMI.T, VINODHA.D48 |
2 | |
68 | A Survey on Cloud Computing for Big Data ApplicationSINDHU T, VAISHALI M, SUREKA V49 |
1 | |
69 | A Machine Learning Approach to Stock ForecastingDHRUV PATHAK, HIMA KARAN KADALI, PRAYAG SARAIYA52 |
9 | |
70 | BIG DATA Analytics: A Comprehensive Study on Present and Future TrendsASOKE NATH, ANWESHA CHAKRABORTY, TRINA DUTTA, SUSHMITA MONDAL53 |
2 | |
71 | Control and Performance Analysis of Three Tank Flow Control System Using Linear & Non-Linear ControllerARNOB SENAPATI, AKASH MAITRA, SNEHANJALY BATABYAL, ABHISHEK KUMAR KASHYAP57 |
1 | |
72 | Sentiment and Intent Analysis for Business IntelligenceLALIT PATHAK , SANJANA MULCHANDANI , MAYURI KATE, KAJAL KHATWANI , SUJATA KHEDKAR59 |
5 | |
73 | A Survey: User Review Based Recommendation SystemASHISH DHASE, ARATI NALLA, AISHWARYA KALYANARAMAN69 |
1 | |
74 | SupportBot: An Artificial Agent Useful for Gathering College DetailsNIRANJANI V, NIVETHITHA K, PREETHA S, SANGEETHA S70 |
1 | |
75 | User Based Event Retrieval SystemT. ROGER JEES SMITH, P.PAVITHRA, V.PREETHI71 |
1 | |
76 | Survey of Different Load Balancing Approach-Based Algorithms in Cloud Computing: A Comprehensive ReviewMONIKA VERMA, SAURABH SHARMA71A |
1 | |
77 | Privacy Preserving By Third Party Auditing Using Frequent Itemset In Data Mining With Md5 AlgorithmD.J. HANI MARY SHENIHA, G. KRITHIGA, S. KALAIVANI72 |
1 | |
78 | Design and Implementation of Real-Time Secured Industrial Monitoring System Using IoT with an Android ApplicationSUDHA RAJESH, PAVITHRA.P, PRAKALYA.M73 |
2 | |
79 | Utilizing Business Principles for Anticipating Transaction to Prevent Money CheatsS.ARAVIND KUMAR, S.PAUL KINGSLEY, R.SANTHOSH74 |
1 | |
80 | A Productive Arrangement for Smart Card Based on Password-Authentication Using Key AgreementS. GAYATHRI, D. PAVITHRA, T. SIVARANJANI76 |
2 | |
81 | A Survey on Enhanced Social Media Spamming Detection Framework Based Upon Activity and Text AnalysisRAMYA DEVI.K, KAMESHWARAN.T, DINESH KUMAR.P, KALIMUDEEN.S80 |
2 | |
82 | Interactive Virtual Learning Environment for Information Technology AcademiaMAYURI PAWAR, ROOPANSHI PAWAR, ROHAN BHANGALE, SHUBHAM DAHIWALKAR, ABHAY PATIL81 |
17 | |
83 | Survey on Cloud Storage Integration on Mobile Application and Message Passing Using XMPP protocolA. SARAVANA PERUMAL, R. VISHNU RAJAN, M. VENKATA SATHYASAI, DR. G. UMARANI SRIKANTH29 |
2 |