International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Distributed Collaborative Approach to Botnet DetectionZAHRADDEEN GWARZO, MOHAMED ZOHDY, HUA MING, RICHARD OLAWOYIN, HANY OTHMAN1 |
9 | |
2 | A Survey on: Content Based Video ClassificationHANSA SHIMPI, SUDEEP THEPADE13 |
9 | |
3 | Biometric Identification Using Eye TrackerRAMEEZ ALI P, S VIJAYANAND15 |
2 | |
4 | Survey on Enhanced Anomaly Based Intrusion Detection System Using Limited Labeled DataPRADNYA PATIL16 |
2 | |
5 | A Smart Traffic Communication Protocol in VANETMONIKA PRAJAPATI, PRATEEK SINGH17 |
2 | |
6 | Reliable Access Control Management and Mechanisms in Social NetworksG.V.PRABA, V.PARAMESWARI MCA., M.PHIL.21 |
3 | |
7 | Location Based Management for Mobile Phones (Android) To Provide Secured TransactionsJYOTI KSHIRSAGAR, JUHI DESHPANDE, POORVA CHOUGULE22 |
2 | |
8 | Street Light Automation System Using Arduino UnoANUSHA RAO, AKASH KONNUR24 |
2 | |
9 | Application based on Voice as Medicine Guide for Visually ImpairedANSARI KASAF, AYASHABI MASHAYAK, SAIMA SHAIKH, PATILL S.C25 |
1 | |
10 | Twitter User Circle Detection Using Multi-View Network StructureASSIST PROF: PALLAVI PATIL, MANJUSHA JAGTAP, DHANASHRI SHINDE, SONAL SHINDE, DHANASHREE WAYDANDE26 |
2 | |
11 | Power Quality Renewable Energy Effective Use of Grid by Wind Intelligent TechniqueDR.P.SELVAM, M.P.SAKTHIVEL27 |
3 | |
12 | A Novel Approach for Software Defect Prediction Using Learning AlgorithmsMAHESWARI S, CHITRA K31 |
3 | |
13 | Location based Service and Health Monitoring System for Heart Patient using IoTABHISHEK MANE, VAIBHAV DIGHE, RUSHAL GAWALI, SNEHA SABALE, SANTWANA GUDADHE33 |
5 | |
14 | Accessing Securely DNA Database using Aggregate QueriesSHWETA MOKAL, VEDANTI GHATE, SHUBHAM SAWAKE, ANKIT MUGALI, PRF. PALLAVI AHIRE34 |
3 | |
15 | A Survey on LPG Level Onitoring, Booking & Gas Leakage DetectorMADURA GHULE, KOMAL HOLE, SAYALI PATHAK , NISHIGANDHA PATIL , PROF. SANTOSH A. DARADE35 |
5 | |
16 | Review on Security Model for TCP/IP Protocol SuitePRIYANKA PAWAR, AJAY PHULRE37 |
2 | |
17 | A New Approach of Classification of Alzheimer's Disease of MRI Images Using (Learning Vector Quantizer) ClassifierKAMBLE SHWETA , DR. V. V. DIXIT38 |
2 | |
18 | Image Processing Techniques for Diagnosis of MalariaCHAITANYA LAXMAN GODSE, DR. V. V. DIXIT39 |
3 | |
19 | Kinect Based Classification of Accessibility from Natural Body LanguageDIKSHA A. SHENDE, DR. R. S. KAWITKAR40 |
2 | |
20 | A Survey on Achieving Hitless Defragmentation with Dynamic Fragmentation Using Mixed Path AlgorithmSHWETA PRATAPWAR, SWEJAL DHAMALE, ZAHID SHAIKH, ASHISH SHUKLA, PROF.F.S.GHODICHOR41 |
2 | |
21 | Performance Comparison of Extracted features using Hybrid SIFT ApproachRUPAL SHROTI, PROF.AISHWARYA MISHRA46 |
2 | |
22 | Cellular Automata for Mobile Adhoc Using EARPR.STELLARANI, R. BHUWANESWARI51 |
2 | |
23 | An Energy Saving In Wireless Sensor Networks over Multihop TechniqueG.CHANDRAN, R.MEYANAND, M, R. BHUWANESWARI52 |
3 | |
24 | A-LEACH Algorithm to Maximize the Life Span of Wireless Sensor NetworkSHIBDAS BHATTACHARYA, SUBHAJIT MUKHERJEE, DIPRA MITRA, PRASUN KUMAR MITRA53 |
5 | |
25 | A Survey on Riding Quality Evaluation and Driver Physiology Detection through IOTKEDAR JOSHI, NAMRATA JATAK, ASHISH BAGWE, KIRAN GARGOTE, PROF.SUSHMA SHINDE , DR.BRIJENDRA GUPTA58 |
3 | |
26 | A Comparative Study on Image Isolation and Classification Techniques in Microscopic Blood Smear ImagesRenuka V Tali, Siddalingesh Bandi45 |
6 | |
27 | Graphene Based Component DesignANANT GAMBHIR , DR. D. M. BHALERAO62 |
4 | |
28 | End User Friendly and Secure Architecture for Authentication of Cloud ServicesAPOORV KHARE, PROF. ANSHUL KHURANA62A |
4 | |
29 | A Survey on Search Recommendation Mechanism for Query with Mining FacetsARTI R. RATHI, PROF. S. R. TODMAL63 |
2 | |
30 | Emotion Identification of Human Face from Video Using Neural NetworkMS.PRANOTI R. TAYADE, PROF. R. R. MAHARANA, PROF. A. O. AMLAKAR64 |
4 | |
31 | Survey on Data mining based prediction of User Behaviour through sessionsTUSHAR D. KOLHE, NILESH Y. CHOUDHARY65 |
2 | |
32 | A Novel Approach for Digital Image Encryption based on Pixel Explosion TechniquesSHUSAMA TRIPATHI, PROF. RISHI SHARMA66 |
1 | |
33 | A Review over Secure Communication for Vehicular Ad-Hoc NetworkNIRMAL SINGH CHOUHAN, ACHINT CHUGH67 |
1 | |
34 | A Review of Different Approaches over MIMO Handover in LTE-OFDM SystemsVIMLESH KUMAR, PROF. SHIVNARAYAN AHIRWAR68 |
2 | |
35 | Survey on File Security Using Encryption Technique over Public Cloud EnvironmentRUCHITA DATTA, PROF. SAURABH SHARMA68A |
2 | |
36 | Improvement in Visual Searching Process with Image and WordMANISHA M. KUNDLE , SHITAL JADHAV69 |
2 | |
37 | An Identification of Musical Genre: Sarangi as a Special caseMADHURI R. DESAI70 |
1 | |
38 | Modular Software Model Checking For Distributed SystemsAMIT SINGH, RUCHI SINGH, ASTHA GAUTAM71 |
2 | |
39 | Two-Factor Data Security Protection Mechanism for Cloud Storage SystemPRIYA J. KHINDRE, SHITAL Y. GAIKWAD72 |
1 | |
40 | System and a Method for Customer Service Survey Sentiment Classification and Neuro Analysis with Report MiningDEEKSHITH RAJ RATHOD73 |
2 | |
41 | reCAPTCHA and its Implementation: Human-Based Character Recognition via Web Security MeasuresNEHA VIJ74 |
2 | |
42 | Detecting Client Based HTTP Attacks on Proxy Server by XSS Attack & SQL InjectionKOMAL PATOLE75 |
2 | |
43 | A Study on Blockchains and Bitcoin - A Blockchain based CryptocurrencyRIJUL LUMAN76 |
1 | |
44 | Reduction of Peak to Average Power Ratio Using Weighted OFDMBUSHRA ZAREEN I. A. KHAN, SHIRISH L. KOTGIRE77 |
2 | |
45 | A Case Study for Image Re-sizing using Content Delivery Networks (CDN)HARSHIL KIRIT PATEL78 |
2 | |
46 | An Vision Based Monitoring System for Accurate Vojta-TherapyVAISHALIA.NIMBALKAR, PROF.V.B.RASKAR79 |
1 | |
47 | Finding the Best Key Stream by Using Genetic Algorithm for Image EncryptionPRASUN KUMAR MITRA, PARTHA HALDER80 |
1 | |
48 | Scaled Discrete Cosine Transform (DCT) using AAN Algorithm on FPGARAHUL R. BENDALE , PROF. VIJAY L. AGRAWAL81 |
1 | |
49 | Privacy Preserving on multi-keyword search with Lucene Indexer over Encrypted Data in CloudNILAM JAMDARE, PROF. K. VISHAL REDDY82 |
3 | |
50 | An Improved Task Scheduling algorithm Based on PSO for Cloud ComputingSURINDER SINGH , AMIT RANJAN83 |
1 | |
51 | Automatic Controlled Digital Notice Board by Using Wireless Direction DetectorSANJIVANI R. WADEKAR, PROF. ANIL O. AMALKAR, PROF.YOGESH P. SUSHIR84 |
3 | |
52 | Reverse Engineering Static Content and Dynamic Behaviour of E-Commerce Websites: A SurveySUDHANSHU CHOUREY , PROF .PRASHANT KUMAR KOSHTAReverse Engineering Static Content and Dynamic Behaviour of E-Commerce Websites: A SurveySUDHANSHU CHOUREY , PROF .PRASHANT KUMAR KOSHTA85 |
1 | |
53 | SVD-DWT Amalgamated Watermarking Scheme Antagonistic to Noise AttacksVIPIN KUMAR, PROF. ANSHUL BHATIA86 |
1 | |
54 | Cloud Infrastructure Resource Allocation for BigData ApplicationsPRIYANKA G, ARPITA DESHPANDE, ANUSHA RAO, ASHIK G G, KAVITHA S3 |
2 | |
55 | IoT Based Traffic Management SystemSOWMYA M, ANUSHA P S, ASHWIN S MURTHY, JOY STEFFI JONES, LYNETTE W PINTO4 |
4 | |
56 | An IOT Based Smart Home AutomationHARSHITHA B S, RAJATH ACHARYA, ISHWAR BHAT, ADITYA BHAT, MANOJ D S9 |
3 | |
57 | A Survey on Distance Estimation for Bluetooth BeaconMAYUR BHAMARE, HARSHIT PAREKH, HARSHAL SONKUSARE, MUKUL JAJU1, SWATI KESHARI14 |
3 | |
58 | An Overview of Neural Networks and their ApplicationsNUPUR THAKUR23 |
1 | |
59 | Optimizing Discrete-Event Management Systems for Arranging EventsPROF. AMOL DHAKNE, ABHISHEK BHARDWAJ, INGLE PRIYA, PRAJAKTA KHOLLAM, RUPESH PATIL36 |
3 | |
60 | Revamped Data Partitioning Strategies for Market Basket Analysis using Hadoop ClustersOMKAR HIRVE, ADITYA PARDESHI, OMKAR KURHE44 |
1 | |
61 | Defending Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender SystemsDIPIKA WATTAMWAR, GAURI NERKAR, PALLAVI SHATALWAR, YADAV PRACHI, PROF. B.S SATPUTEDefending Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender SystemsDIPIKA WATTAMWAR, GAURI NERKAR, PALLAVI SHATALWAR, YADAV PRACHI, PROF. B.S SATPUTEDefending Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender SystemsDIPIKA WATTAMWAR, GAURI NERKAR, PALLAVI SHATALWAR, YADAV PRACHI, PROF. B.S SATPUTE49 |
2 | |
62 | Blood Cell Counting and Disease detection from image using PCNNNAMRATA DHAYGUDE, KAJAL DHUMALS , VAISHALI PATOLE54 |
1 | |
63 | Storage Outsourcing with Secure Accessibility in MStorage Outsourcing with Secure Accessibility in Mobile Cloud Computing by Using LDSSPUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMAREobile Cloud Computing by Using LDSSPUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMAREStorage Outsourcing with Secure Accessibility in Mobile Cloud Computing by Using LDSSPUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMAREStorage Outsourcing with Secure Accessibility in Mobile Cloud Computing by Using LDSSPUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMARE55 |
4 | |
64 | Privacy-Preserving Location Sharing Services for Social NetworksK. SARANYA, S. SRI HARISHMA56 |
2 | |
65 | A Survey on Reduction of Movie Piracy using Automated Infrared SystemA.K.VEERARAGHAVAN, S.SHREYAS RAMACHANDRAN, V.KAVIARASAN57 |
1 | |
66 | Presence Detection and Home Automation Using Bluetooth and Android ApplicationSIDDHESH GIRASE, RAMBABU VATTI, DIVYA GURNANI60 |
2 | |
67 | A Survey: Remote Patient Health Care Monitoring and Alert Generation SystemRANI UTEKAR, JAYANT UMALE5 |
3 | |
68 | Multimodal Biometrics Fusion at Feature Level ExtractionS. P. UGALE, M. S. BORSE6 |
2 | |
69 | Comparative Study and Analysis of Manual v/s Automated Product Feature TestingNOORIN FARNAZ, ANJAN K KOUNDINYA7 |
1 | |
70 | Wireless Sensor Network: A Complete ReviewVISHAKHA BHATNAGAR, ANTIMA SAXENA, ANKUR GOYAL8 |
1 | |
71 | Data Center Architecture Based Tor Network Using Against AttackerC.MALA, T.SATHYA PRIYA10 |
3 | |
72 | Effective Routing Mechanism in Wan Based On Traffic AnalysisSANGEETHA.V, A.SARITHA11 |
3 | |
73 | Routing Control Protocol in Green Mobile Ad-Hoc Networks by Selective BroadcastingM.SASI KALA, A.SARITHA12 |
1 | |
74 | Image Enhancement Using Dual Tree Complex Wavelet Transform based Image Fusion Method -A Literature SurveyALOKRANJAN YADAV, PROF. S.P. BHOSALE18 |
1 | |
75 | GPU Accelerated Pattern Matching Algorithm for Packet Data to Detect Virus SignatureBHAGYASHRI CHHAGAN WADILE, PROF.N.R.WANKHADE19 |
1 | |
76 | Ad-Hoc Method for Social Data Collection Using FoursquareSHAMEENA V , SENTILKUMAR20 |
2 | |
77 | Feasibility of Using Machine Learning to Access Control on non-Educational LinksSHAHENSHAHA MUJAWAR, BHAUSAHEB MORE, PIRSAHB TANDEL, PROF .PRASHANT ABHONKAR28 |
1 | |
78 | Local Prediction Based Reversible WatermarkingP.S.SHENDGE, PROF.P.S.MALGE29 |
2 | |
79 | Design and Implementation of Play-out Buffer Adaptive Windowing algorithm for real-time Voice over IP Communication SystemsSUBHAJIT MUKHERJEE, SHIBDAS BHATTACHARYA, ABHISHEK DEY, PRASUN KUMAR MITRA30 |
1 | |
80 | A Survey on a Supervised Joint Topic Modeling Approach for Aspect based Sentiment Analysis and solvingCold-Start ProblemARSHIYA SHAIKH, BHAKTI PATIL, TEJASWINI DAUNDKAR, PRANJALI UTTEKAR, PROF.PRASHANT AHIRE32 |
5 | |
81 | Two-Factor Data Protection: Enhances Confidentiality of the DataSYED SAAD, SARIKA BAGADE, RAHUL SINGH, AKSHAY SIDRAL, PROF. VANDANA P. TONDE42 |
3 | |
82 | A Review on DNA Based CryptographyRUBY CHANDRAKAR, KIRTI NAHAK43 |
4 | |
83 | Hardware Co-Simulation of Sobel Edge Detection Using FPGA and System GeneratorSNEHA MOON, PROF. MEENA CHAVAN47 |
3 | |
84 | Automated Voice Based Home Navigation System for the Elderly and the Physically ChallengedROHINIKANNAKE, DR.J.S.CHITODE48 |
2 | |
85 | A Review on Various Visual Cryptography SchemesMUSKAAN KALRA, HEMANT KUMAR DUA50 |
2 | |
86 | Robust Real Time Bus Imprint SystemNIKHIL BHOYAR, PARESH BAGDE, KUNAL VAIDYA, ROSHNI RAHANGDALE, MINAL TEMBHURNE59 |
4 | |
87 | A Survey on Breast Cancer Detection Using Mammographic ImagesAMRUTA B. JADHAV, DR.S.R.GANORKAR61 |
6 | |
88 |
Survey on Radio Frequency Identification (RFID) Passive Tags PRASHANTHAMURTHY H G, PAVITRA S R, SMITHA H S 88 |
6 |