International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|

Volume-5  issue-11 November   2017


S.No Paper Title / Authors Download Paper Downloads
1

Distributed Collaborative Approach to Botnet Detection

ZAHRADDEEN GWARZO, MOHAMED ZOHDY, HUA MING, RICHARD OLAWOYIN, HANY OTHMAN
1
9
2

A Survey on: Content Based Video Classification

HANSA SHIMPI, SUDEEP THEPADE
13
9
3

Biometric Identification Using Eye Tracker

RAMEEZ ALI P, S VIJAYANAND
15
2
4

Survey on Enhanced Anomaly Based Intrusion Detection System Using Limited Labeled Data

PRADNYA PATIL
16
2
5

A Smart Traffic Communication Protocol in VANET

MONIKA PRAJAPATI, PRATEEK SINGH
17
2
6

Reliable Access Control Management and Mechanisms in Social Networks

G.V.PRABA, V.PARAMESWARI MCA., M.PHIL.
21
3
7

Location Based Management for Mobile Phones (Android) To Provide Secured Transactions

JYOTI KSHIRSAGAR, JUHI DESHPANDE, POORVA CHOUGULE
22
2
8

Street Light Automation System Using Arduino Uno

ANUSHA RAO, AKASH KONNUR
24
2
9

Application based on Voice as Medicine Guide for Visually Impaired

ANSARI KASAF, AYASHABI MASHAYAK, SAIMA SHAIKH, PATILL S.C
25
1
10

Twitter User Circle Detection Using Multi-View Network Structure

ASSIST PROF: PALLAVI PATIL, MANJUSHA JAGTAP, DHANASHRI SHINDE, SONAL SHINDE, DHANASHREE WAYDANDE
26
2
11

Power Quality Renewable Energy Effective Use of Grid by Wind Intelligent Technique

DR.P.SELVAM, M.P.SAKTHIVEL
27
3
12

A Novel Approach for Software Defect Prediction Using Learning Algorithms

MAHESWARI S, CHITRA K
31
3
13

Location based Service and Health Monitoring System for Heart Patient using IoT

ABHISHEK MANE, VAIBHAV DIGHE, RUSHAL GAWALI, SNEHA SABALE, SANTWANA GUDADHE
33
5
14

Accessing Securely DNA Database using Aggregate Queries

SHWETA MOKAL, VEDANTI GHATE, SHUBHAM SAWAKE, ANKIT MUGALI, PRF. PALLAVI AHIRE
34
3
15

A Survey on LPG Level Onitoring, Booking & Gas Leakage Detector

MADURA GHULE, KOMAL HOLE, SAYALI PATHAK , NISHIGANDHA PATIL , PROF. SANTOSH A. DARADE
35
5
16

Review on Security Model for TCP/IP Protocol Suite

PRIYANKA PAWAR, AJAY PHULRE
37
2
17

A New Approach of Classification of Alzheimer's Disease of MRI Images Using (Learning Vector Quantizer) Classifier

KAMBLE SHWETA , DR. V. V. DIXIT
38
2
18

Image Processing Techniques for Diagnosis of Malaria

CHAITANYA LAXMAN GODSE, DR. V. V. DIXIT
39
3
19

Kinect Based Classification of Accessibility from Natural Body Language

DIKSHA A. SHENDE, DR. R. S. KAWITKAR
40
2
20

A Survey on Achieving Hitless Defragmentation with Dynamic Fragmentation Using Mixed Path Algorithm

SHWETA PRATAPWAR, SWEJAL DHAMALE, ZAHID SHAIKH, ASHISH SHUKLA, PROF.F.S.GHODICHOR
41
2
21

Performance Comparison of Extracted features using Hybrid SIFT Approach

RUPAL SHROTI, PROF.AISHWARYA MISHRA
46
2
22

Cellular Automata for Mobile Adhoc Using EARP

R.STELLARANI, R. BHUWANESWARI
51
2
23

An Energy Saving In Wireless Sensor Networks over Multihop Technique

G.CHANDRAN, R.MEYANAND, M, R. BHUWANESWARI
52
3
24

A-LEACH Algorithm to Maximize the Life Span of Wireless Sensor Network

SHIBDAS BHATTACHARYA, SUBHAJIT MUKHERJEE, DIPRA MITRA, PRASUN KUMAR MITRA
53
5
25

A Survey on Riding Quality Evaluation and Driver Physiology Detection through IOT

KEDAR JOSHI, NAMRATA JATAK, ASHISH BAGWE, KIRAN GARGOTE, PROF.SUSHMA SHINDE , DR.BRIJENDRA GUPTA
58
3
26

A Comparative Study on Image Isolation and Classification Techniques in Microscopic Blood Smear Images

Renuka V Tali, Siddalingesh Bandi
45
6
27

Graphene Based Component Design

ANANT GAMBHIR , DR. D. M. BHALERAO
62
4
28

End User Friendly and Secure Architecture for Authentication of Cloud Services

APOORV KHARE, PROF. ANSHUL KHURANA
62A
4
29

A Survey on Search Recommendation Mechanism for Query with Mining Facets

ARTI R. RATHI, PROF. S. R. TODMAL
63
2
30

Emotion Identification of Human Face from Video Using Neural Network

MS.PRANOTI R. TAYADE, PROF. R. R. MAHARANA, PROF. A. O. AMLAKAR
64
4
31

Survey on Data mining based prediction of User Behaviour through sessions

TUSHAR D. KOLHE, NILESH Y. CHOUDHARY
65
2
32

A Novel Approach for Digital Image Encryption based on Pixel Explosion Techniques

SHUSAMA TRIPATHI, PROF. RISHI SHARMA
66
1
33

A Review over Secure Communication for Vehicular Ad-Hoc Network

NIRMAL SINGH CHOUHAN, ACHINT CHUGH
67
1
34

A Review of Different Approaches over MIMO Handover in LTE-OFDM Systems

VIMLESH KUMAR, PROF. SHIVNARAYAN AHIRWAR
68
2
35

Survey on File Security Using Encryption Technique over Public Cloud Environment

RUCHITA DATTA, PROF. SAURABH SHARMA
68A
2
36

Improvement in Visual Searching Process with Image and Word

MANISHA M. KUNDLE , SHITAL JADHAV
69
2
37

An Identification of Musical Genre: Sarangi as a Special case

MADHURI R. DESAI
70
1
38

Modular Software Model Checking For Distributed Systems

AMIT SINGH, RUCHI SINGH, ASTHA GAUTAM
71
2
39

Two-Factor Data Security Protection Mechanism for Cloud Storage System

PRIYA J. KHINDRE, SHITAL Y. GAIKWAD
72
1
40

System and a Method for Customer Service Survey Sentiment Classification and Neuro Analysis with Report Mining

DEEKSHITH RAJ RATHOD
73
2
41

reCAPTCHA and its Implementation: Human-Based Character Recognition via Web Security Measures

NEHA VIJ
74
2
42

Detecting Client Based HTTP Attacks on Proxy Server by XSS Attack & SQL Injection

KOMAL PATOLE
75
2
43

A Study on Blockchains and Bitcoin - A Blockchain based Cryptocurrency

RIJUL LUMAN
76
1
44

Reduction of Peak to Average Power Ratio Using Weighted OFDM

BUSHRA ZAREEN I. A. KHAN, SHIRISH L. KOTGIRE
77
2
45

A Case Study for Image Re-sizing using Content Delivery Networks (CDN)

HARSHIL KIRIT PATEL
78
2
46

An Vision Based Monitoring System for Accurate Vojta-Therapy

VAISHALIA.NIMBALKAR, PROF.V.B.RASKAR
79
1
47

Finding the Best Key Stream by Using Genetic Algorithm for Image Encryption

PRASUN KUMAR MITRA, PARTHA HALDER
80
1
48

Scaled Discrete Cosine Transform (DCT) using AAN Algorithm on FPGA

RAHUL R. BENDALE , PROF. VIJAY L. AGRAWAL
81
1
49

Privacy Preserving on multi-keyword search with Lucene Indexer over Encrypted Data in Cloud

NILAM JAMDARE, PROF. K. VISHAL REDDY
82
3
50

An Improved Task Scheduling algorithm Based on PSO for Cloud Computing

SURINDER SINGH , AMIT RANJAN
83
1
51

Automatic Controlled Digital Notice Board by Using Wireless Direction Detector

SANJIVANI R. WADEKAR, PROF. ANIL O. AMALKAR, PROF.YOGESH P. SUSHIR
84
3
52

Reverse Engineering Static Content and Dynamic Behaviour of E-Commerce Websites: A Survey

SUDHANSHU CHOUREY , PROF .PRASHANT KUMAR KOSHTA

Reverse Engineering Static Content and Dynamic Behaviour of E-Commerce Websites: A Survey

SUDHANSHU CHOUREY , PROF .PRASHANT KUMAR KOSHTA
85
1
53

SVD-DWT Amalgamated Watermarking Scheme Antagonistic to Noise Attacks

VIPIN KUMAR, PROF. ANSHUL BHATIA
86
1
54

Cloud Infrastructure Resource Allocation for BigData Applications

PRIYANKA G, ARPITA DESHPANDE, ANUSHA RAO, ASHIK G G, KAVITHA S
3
2
55

IoT Based Traffic Management System

SOWMYA M, ANUSHA P S, ASHWIN S MURTHY, JOY STEFFI JONES, LYNETTE W PINTO
4
4
56

An IOT Based Smart Home Automation

HARSHITHA B S, RAJATH ACHARYA, ISHWAR BHAT, ADITYA BHAT, MANOJ D S
9
3
57

A Survey on Distance Estimation for Bluetooth Beacon

MAYUR BHAMARE, HARSHIT PAREKH, HARSHAL SONKUSARE, MUKUL JAJU1, SWATI KESHARI
14
3
58

An Overview of Neural Networks and their Applications

NUPUR THAKUR
23
1
59

Optimizing Discrete-Event Management Systems for Arranging Events

PROF. AMOL DHAKNE, ABHISHEK BHARDWAJ, INGLE PRIYA, PRAJAKTA KHOLLAM, RUPESH PATIL
36
3
60

Revamped Data Partitioning Strategies for Market Basket Analysis using Hadoop Clusters

OMKAR HIRVE, ADITYA PARDESHI, OMKAR KURHE
44
1
61

Defending Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender Systems

DIPIKA WATTAMWAR, GAURI NERKAR, PALLAVI SHATALWAR, YADAV PRACHI, PROF. B.S SATPUTE

Defending Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender Systems

DIPIKA WATTAMWAR, GAURI NERKAR, PALLAVI SHATALWAR, YADAV PRACHI, PROF. B.S SATPUTE

Defending Suspected Users by Utilizing Specific Distance Metric in Collaborative Filtering Recommender Systems

DIPIKA WATTAMWAR, GAURI NERKAR, PALLAVI SHATALWAR, YADAV PRACHI, PROF. B.S SATPUTE
49
2
62

Blood Cell Counting and Disease detection from image using PCNN

NAMRATA DHAYGUDE, KAJAL DHUMALS , VAISHALI PATOLE
54
1
63

Storage Outsourcing with Secure Accessibility in MStorage Outsourcing with Secure Accessibility in Mobile Cloud Computing by Using LDSS

PUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMARE

obile Cloud Computing by Using LDSS

PUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMARE

Storage Outsourcing with Secure Accessibility in Mobile Cloud Computing by Using LDSS

PUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMARE

Storage Outsourcing with Secure Accessibility in Mobile Cloud Computing by Using LDSS

PUJA PINGALE, DIPANJALI GAIKWAD, ASHWINI BHAPKAR, RUTUJA PHARANDE, MONIKA WAGHMARE
55
4
64

Privacy-Preserving Location Sharing Services for Social Networks

K. SARANYA, S. SRI HARISHMA
56
2
65

A Survey on Reduction of Movie Piracy using Automated Infrared System

A.K.VEERARAGHAVAN, S.SHREYAS RAMACHANDRAN, V.KAVIARASAN
57
1
66

Presence Detection and Home Automation Using Bluetooth and Android Application

SIDDHESH GIRASE, RAMBABU VATTI, DIVYA GURNANI
60
2
67

A Survey: Remote Patient Health Care Monitoring and Alert Generation System

RANI UTEKAR, JAYANT UMALE
5
3
68

Multimodal Biometrics Fusion at Feature Level Extraction

S. P. UGALE, M. S. BORSE
6
2
69

Comparative Study and Analysis of Manual v/s Automated Product Feature Testing

NOORIN FARNAZ, ANJAN K KOUNDINYA
7
1
70

Wireless Sensor Network: A Complete Review

VISHAKHA BHATNAGAR, ANTIMA SAXENA, ANKUR GOYAL
8
1
71

Data Center Architecture Based Tor Network Using Against Attacker

C.MALA, T.SATHYA PRIYA
10
3
72

Effective Routing Mechanism in Wan Based On Traffic Analysis

SANGEETHA.V, A.SARITHA
11
3
73

Routing Control Protocol in Green Mobile Ad-Hoc Networks by Selective Broadcasting

M.SASI KALA, A.SARITHA
12
1
74

Image Enhancement Using Dual Tree Complex Wavelet Transform based Image Fusion Method -A Literature Survey

ALOKRANJAN YADAV, PROF. S.P. BHOSALE
18
1
75

GPU Accelerated Pattern Matching Algorithm for Packet Data to Detect Virus Signature

BHAGYASHRI CHHAGAN WADILE, PROF.N.R.WANKHADE
19
1
76

Ad-Hoc Method for Social Data Collection Using Foursquare

SHAMEENA V , SENTILKUMAR
20
2
77

Feasibility of Using Machine Learning to Access Control on non-Educational Links

SHAHENSHAHA MUJAWAR, BHAUSAHEB MORE, PIRSAHB TANDEL, PROF .PRASHANT ABHONKAR
28
1
78

Local Prediction Based Reversible Watermarking

P.S.SHENDGE, PROF.P.S.MALGE
29
2
79

Design and Implementation of Play-out Buffer Adaptive Windowing algorithm for real-time Voice over IP Communication Systems

SUBHAJIT MUKHERJEE, SHIBDAS BHATTACHARYA, ABHISHEK DEY, PRASUN KUMAR MITRA
30
1
80

A Survey on a Supervised Joint Topic Modeling Approach for Aspect based Sentiment Analysis and solvingCold-Start Problem

ARSHIYA SHAIKH, BHAKTI PATIL, TEJASWINI DAUNDKAR, PRANJALI UTTEKAR, PROF.PRASHANT AHIRE
32
5
81

Two-Factor Data Protection: Enhances Confidentiality of the Data

SYED SAAD, SARIKA BAGADE, RAHUL SINGH, AKSHAY SIDRAL, PROF. VANDANA P. TONDE
42
3
82

A Review on DNA Based Cryptography

RUBY CHANDRAKAR, KIRTI NAHAK
43
4
83

Hardware Co-Simulation of Sobel Edge Detection Using FPGA and System Generator

SNEHA MOON, PROF. MEENA CHAVAN
47
3
84

Automated Voice Based Home Navigation System for the Elderly and the Physically Challenged

ROHINIKANNAKE, DR.J.S.CHITODE
48
2
85

A Review on Various Visual Cryptography Schemes

MUSKAAN KALRA, HEMANT KUMAR DUA
50
2
86

Robust Real Time Bus Imprint System

NIKHIL BHOYAR, PARESH BAGDE, KUNAL VAIDYA, ROSHNI RAHANGDALE, MINAL TEMBHURNE
59
4
87

A Survey on Breast Cancer Detection Using Mammographic Images

AMRUTA B. JADHAV, DR.S.R.GANORKAR
61
6
88

Survey on Radio Frequency Identification (RFID) Passive Tags     

PRASHANTHAMURTHY H G, PAVITRA S R, SMITHA H S

88
6