International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Curvelet Image Fusion Using Decision Tree AlgorithmMUZAFAR AHMAD DAR, ASHISH SHARMA3 |
7 | |
2 | Key-Aggregate Cryptosystem for Scalable data Sharing with Time Server and Integrity Auditing in CloudstorageRUTUJA RAJKUMAR ANDHALE, PROF. SHYAM GUPTA15 |
4 | |
3 | A Survey on Social Media Based Personalized Travel Sequence RecommendationSUMIT MAHAVIR BOPALKAR, H.U.JOSHI16 |
1 | |
4 | Knowledge Management Process in ERP based Product Companies: Field ExperimentS. MALA17 |
10 | |
5 | Implementation of Robust Router Design for Area Critical ApplicationsD.VARA PRASAD, P.K. SURESH27 |
2 | |
6 | An Efficient Dynamic Authenticated Secure Routing Using Secure Elliptic Curve Cryptography in MANETV.DEEPADHARSINI, VR. NAGARAJAN28 |
2 | |
7 | Privacy-Preserving over Encrypted Data using Similarity JoinsTAMBE BHAGYASHRI, PROF. TODKARI S.V29 |
1 | |
8 | Enhanced DNA Cryptography for Wireless Body Sensor NetworksALI ABO AJEEB, AHMAD MAHMOD, BOUSHRA MAALA, AHMAD S. AHMAD30 |
5 | |
9 | Power Search Algorithm for Economic Load Dispatch Problems Considering Valve Point Loading EffectsPRAKASH A, RAVICHANDRAN C S31 |
3 | |
10 | The New Service Brokering Algorithm in Cloud Computing Based on ACOSUREKHA DIXIT, NAGENDRA KUMAR32 |
1 | |
11 | A Survey on a Novel Approach to Recommend the Places by Using User's Social Media Point of InterestSONAWANE LEENA MAHENDRA, DR. M.A.PRADHAN33 |
2 | |
12 | Personalized and Efficient Search over Encrypted Data on Cloud: A SurveySHAMAL JAMDADE, PROF. POONAM LAMBHATE40 |
1 | |
13 | Multi -Way Encryption Using Elliptic Curve CryptographyDR. NILAMBAR SETHI, BINAYAK PANDA41 |
1 | |
14 | Aspect Based Sentiment Analysis for User Generated ReviewsVAISHALI DUSANE , PROF. DR. S.A.ITKAR42 |
1 | |
15 | Leveraging SDN and WEBRTC for Rogue Access Point SecurityPROF. KANCHAN VARPE, KOMAL KHANDALE48 |
1 | |
16 | Development of Sensitivity Classification Approach for Personalized Privacy Preservation in Data Publishing (PPPDP)D.P. MANOJ KUMAR, DR. Y.P GOWRAMMA,49 |
2 | |
17 | A Study on Green Computing: Need of Technological WorldKHUSHALI GOHAR, VEDANSH DUBEY50 |
5 | |
18 | A Survey on Disease Prediction by Machine Learning Over Big Data from Healthcare CommunitiesSANTOSH S SHINDE, PROF. SHWETA JOSHI51 |
1 | |
19 | Home Security System using RFID's and Fingerprint MechanismTHAKUR RAHUL SINGH52 |
1 | |
20 | Load Balancing and its Challenges in Cloud Computing: A Review PaperSUMIT LAL, PROF. SAURABH SHARMA52A |
1 | |
21 | A Survey on Searching Trajectories by Regions of InterestPROF.VAIBHAV MUDDEBIHALKAR, AJINKYA DIWATE, SHUBHAM MANE, SHRADHA SEVADA53 |
1 | |
22 | Twitter User Social Circle Detection Using Multi-View Network StructureSNEHA RANI , PREM RANJAN, SAGAR KUMAR, CIBA TEMBHARE, SMITA KHOT54 |
4 | |
23 | Revocable Multi-Authority Scheme For Secure Data Access Control in Cloud StorageJYOTI RAVASAHEB PATIL, ASSIST. PROF. P. M. MANE55 |
2 | |
24 | Isolation and Purification of Fibrinolytic Enzyme from Microbial SourceTIBAMANSOUR, DR.ASHA SALUNKE56 |
1 | |
25 | Multimedia Data Mining-A SurveyPRACHI KOHADE, DR. K. S. THAKARE57 |
2 | |
26 | Reducing Energy Consumption in WBSNs using Statistic Test to detect Duplicated DataSALEH MASSOUD, YOUSSEF SOBH AHMAD, MOTHANNA ALKUBEILY, AHMAD S. AHMAD58 |
1 | |
27 | Review on Security Protocols in VANETYOGITA A. MORE, NILIMA P. PATIL59 |
5 | |
28 | A Survey on Two-Level QR Code for Private Message Sharing and Document Authentication Using SteganographyHARSHADA JAHAGIRDAR, HIMANGI JALGAONKAR, MADULIKA CHAUDHARI, ANJALI, ILA SAVANT60 |
1 | |
29 | Human Membrane Protein Classification Using KNN Multi Label Classifier (KNNMLC)NIJIL RAJ N, DR.T.MAHALEKSHMI61 |
1 | |
30 | Text to Speech Conversion for Vocally DisableATHARVA CHOGLE, SHWETA BAVISKAR62 |
5 | |
31 | A Competent and Speedy Symmetric Key Production with improved Latency Using Matrix Array Symmetric Key EncryptionBRAJESH KUMAR, SANTOSH KUMAR63 |
3 | |
32 | A Revolutionary Change in Education Sector: Cloud ComputingNEERAJ HARJANI , SUREN SUGHAND , TWINKLE MOTWANI , SIMRAN DEMBLA64 |
6 | |
33 | Digital Colour Image Compression using Block Truncation CodeDEV PRAKASH SINGH, DR. VINEETA SAXENA NIGAM65 |
1 | |
34 | Detection and Control of Urban Emergency Events using Social Media Big DataVAIBHAV MESHRAM, VISHAL TIWARI, MATESH DIVEKAR, SHUBHAM PAWAR, PRF. G.M. GAIKWAD66 |
1 | |
35 | A Survey on A Time-Specified Ciphertext-Policy Attribute-Based Encryption with Circuit's Technique in Cloud ComputingSURAJ LOLAGE, HEMA MANGTANI, KOMAL DONGARE, AKASH LABADE , PROF.SHIKHA PACHOULY67 |
1 | |
36 | A Study of DDoS Attacks Detection Using Supervised Machine Learning and a Comparative Cross-ValidationWEDAD ALAWAD, MOHAMED ZOHDY, DEBATOSH DEBNATH68 |
3 | |
37 | A Review Study of Cyber Security in Different Networking Dimension to Minimize Network and Data IntrusionAKHILESH NAGAR, MUKESH BHARDWAJ, APARNA SHARMA, NAGESH SHARMA69 |
5 | |
38 | Performance Evaluation of IDEA encryption model under different Fading ChannelsJAGRUTI A. PATIL, PROF. MANISH M. PATIL70 |
2 | |
39 | A Novel Approach for Resolution Recommendation for Generated TicketsPROF. V.R.GHULE, PRATIK PATIL, AMIT KUCHAN, MANGESH WAYGAND, SAI GOTETI71 |
1 | |
40 | Secure Dynamic Fragment and Replica Allocation of Data with Optimal Performance and Security in CloudASHWINI YOGESH ANIKHINDI, PROF M K KODMELWAR72 |
1 | |
41 | Elephant Vocalization Direction of Arrival Estimation under Acoustic Sensor Network with Impact of Error Rectification MethodM.DEVAKI73 |
1 | |
42 | Review on Bit Error Rate Analysis in Multicast Multiple Input Multiple Output SystemsSONAL SONAWANE, S. M. PATIL74 |
1 | |
43 | Optimal Load Balancing in Cloud Computing by Efficient Utilization of Virtual MachinesMONIKA CHATURVEDI, PROF. DEEPAK AGRAWAL75 |
1 | |
44 | A Survey on Data Protection in Cloud StorageSAKSHI NEMA, PROF. PRASHANT KUMAR KOSHTA76 |
2 | |
45 | A Survey on IoT Based Intelligent Road Traffic and Transport Management SystemsC N SIVA SUBRAMANIYAM, K.SIVARAMAN, S.SHREYAS RAMACHANDRAN, A.K.VEERARAGHAVAN5 |
1 | |
46 | Smart Lighting in Street Lights Based On IOTTANUJA MAGAR, ARTI BABAR, SUPRIYA GHATSHILE, PRAGATI JAGTAP, DEEPAK UPLAONKAR6 |
2 | |
47 | Sudoku Puzzle Detection using Image Processing Techniques and Solving: A Literature SurveyPARITOSH PUJARI, SAURABH THORAT, SURAJ THOPAT E, YASH SHAH, PRASAD KHARADE10 |
1 | |
48 | Comparative Study of Different Password Managers and Insight of Bilateral Password ManagerSHUBHAM AGARWAL, IKHLAS SHAIKH, UJJAWAL TRIPATHI, SHUBHANGI KHADE13 |
1 | |
49 | Identification System based on Biometric Concept Using Human EyeSAURABH SINGH, ARSHI KHAN, SAURABH MAYDEO, SAURABH BURANGE, PRIYEN DANG, SHIVAM SHUKLA38 |
4 | |
50 | Biometric Fingerprint based Attendance Monitoring SystemPRIYEN DANG, ANURAG SINGH, ROHAN NAYAK, SAURABH BURANGE, PRANAY RAO, CHIRAG RAO45 |
1 | |
51 | A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the CloudTRUPTI D. GANGASAGAR, ASST. PROF. SHITAL Y. GAIKWAD4 |
1 | |
52 | A Survey on Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling ApproachMINAL PATIL, MADHAVI S. DAROKAR7 |
4 | |
53 | Sentiment Analysis Using a Supervised Joint Topic Modeling ApproachANURADHA.R.S, NATARAJAN.B8 |
6 | |
54 | Summarization and Sentiment Analysis of Social ContentBHAGYASHRI B. KAMANKAR, MANESH P. PATIL9 |
2 | |
55 | Image Steganography Methods Based on Pixel Value Differencing: Review and Proposal for Enhancing the Security of Five Pixel Pair AlgorithmNAYANA KOLHE, HARISH BARAPATRE11 |
1 | |
56 | Two Factor Based Secure Data Sharing In KIDS SystemSAYALI PATIL, NILESH WANI12 |
1 | |
57 | Physical-Layer Cryptography through Massive MIMOPROF. JYOTI RAGHATWAN, ALKA TAUR47 |
2 | |
58 | Fake Currency Detection and its associated ClassificationPRIYEN DANG, ANURAG SINGH, SAURABH MAYDEO, SAURABH BURANGE, AMEYA KASBEKAR, HARJEET MATHARU46 |
4 | |
59 | Exploiting Channel-Aware Reputation System for Packet Drop Attack Detection in Wireless Ad-hoc NetworkASHWINI PRAKASH MORE, PROF. DEEPAK GUPTA44 |
1 | |
60 | Understanding of Quality of Service in Web Services – A ReviewABHISHEK SHARMA, SWATI PATEL, BRIJESH PANDEY43 |
4 | |
61 | A Survey on Product Recommendation Systems Using Social Data and Microblogging InformationKANCHAN BAGDE, PROF. JYOTI PATIL39 |
1 | |
62 | Medical Data Sharing For Protection and Intrusion Avoidance in CloudletSNEHAL GITE, PATIL S. H37 |
1 | |
63 | A Novel Approach on Effective Implication of Object Oriented Based SoftwareSWATI PATEL, DEEPALI VERMA, BRIJESH PANDEY36 |
2 | |
64 | Review on Algorithms for Video Quality MeasurementSWATI RAJU SHINDE, PROF. DR. B. D. PHULPAGAR35 |
2 | |
65 | A Survey on Mining Query Facets for Search ResultsPOOJA SHIVAJI MEHESARE, PROF. D.V.GORE34 |
1 | |
66 | A Survey on a New Approach to Travel Recommendation Using Dynamic Topic Model and Matrix Factorization BasedHARSHVARDHAN HANMNATRAO PATIL, PROF. S.D. SATAV26 |
2 | |
67 | A Survey on Mining Algorithm to Archive High Utility Item Set Using TKO With TKU.SAKSHI KARNAWAT25 |
3 | |
68 | Review Paper on Image Compression using Discrete Wavelet Transform and Discrete Cosine TransformPOOJA SUBHASH PATIL, PROF. KAMAL NIWARIA, DR. MANISH JAIN24 |
1 | |
69 | Re-Encryption and Replication for Sharing Data on Cloud with Third Party AuditorMANOJ V. MOHITE, YOGESH S.PATIL, DINESH D. PATIL23 |
1 | |
70 | Secure Energy Efficient Routing Using Jamming To Resist Networking EavesdroppersSHEETAL MODKE, PROF. PRADNYA KASTURE22 |
2 | |
71 | A Secure Scheme against Replication Attack for Heterogeneous Sensor NetworksAMRUTA GAIKWAD, PROF. RACHANA SATAO21 |
2 | |
72 | Medical Image Modalities in Lung Cancer DetectionVIJAYALAXMI MEKALI20 |
2 | |
73 | IoT Based Health Monitoring System using Raspberry Pi and ArduinoKARTIKEE UPLENCHWAR, ADITI VEDALANKAR19 |
8 | |
74 | WSN Based Smart Power Monitoring and Controlling System for Home AutomationPALLAVI JOSHI, PROF. SARITA VARMA, PROF M S KHAN, PROF MRUNMAYI JOSHI18 |
5 | |
75 | Quantifying the Error in CLT for Accurate GRN GenerationShaik Jeelan Basha, L. Rangaswamy28 |
5 | |
76 | India-Nepal relations (1950 to present): A general overviewDr. Sucheta Gupta77 |
5 | |
77 |
A Very Safe and Effective Way to Protect Privacy in Cloud Data Storage Configurations Pankit Arora, Sachin Bharadwaj 78 |
3 |