International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Smart Waste Collection System based on IoT (Internet of Things)SHASHANK SHUKLA, DR. NEERAJ SHUKLA3 |
2 | |
2 | Adaptive Image Registration Based Nonuniformity Correction Algorithm for Image FiltrationSHWETA WANMALI, PROF. R.U. SHEKOKAR4 |
1 | |
3 | An Investigation of Constructivism and Cognitive Load Theory for Computer Programming ToolPAYAL GOHEL, DR. KISHOR ATKOTIYA5 |
1 | |
4 | A Survey on Datamining Based Intrusion Detection SystemB.GAYATHRI, DR. ANTONY SELVADOSS THANAMANI17 |
2 | |
5 | Revocation Methodologies Using Cloud SecurityD. DEEPIKA, DR. ANTONY SELVADOSS THANAMANI20 |
1 | |
6 | Overview of Association Rule Based on Pattern MiningK.DHARANI, DR.ANTONY SELVADOSS THANAMANI21 |
1 | |
7 | Threshold Based Efficient Data Transmission in Hybrid Wireless NetworksN.SAMUNDEESWARI, DR.S. KUMARAVEL, M.NAMASIVAYAM23 |
8 | |
8 | Detecting and Preventing Distrustful URL in Multimedia NetworkR.RAJASEKAR, N.SURESH24 |
2 | |
9 | Ant Based Routing and QoS Effective Data Collection for Mobile Wireless Sensor NetworkL.POONGODI, DR.M.NAMASIVAYAM25 |
6 | |
10 | A Secure Message Exchange and Anti-Jamming Mechanism in MANETK.SRIMUNIRATHINAM, DR.S. KUMARAVEL, M.NAMASIVAYAM26 |
6 | |
11 | Ant-Based On-Demand Clustering Routing Protocol for Mobile Ad Hoc NetworksY.P.BALAGANESH, N.SURESH27 |
1 | |
12 | A Study on Security Aspects of Grid and Cloud ComputingDR. RANJIT D. PATIL, SUJATA P. PATIL, VIDYA H. BANKAR30 |
2 | |
13 | An Exploratory Study of Wi-Fi Security: Wireless Network EncryptionSATYAWAN KUNJIR, YOGESH INGALE, SATISHKUMAR MULGI, RUSHI DURGE, RUSHIKESH KULKARNI33 |
3 | |
14 | Design an Access Control Scheme for the WBANs Using the Given SigncryptionS.SANTHIYA, N.SATHEESKUMAR34 |
1 | |
15 | User Authentication and File Encryption Technique for achieving high Cloud Computing SecuritySANDEEP KUMAR PANDEY, SUJEET KUMAR TIWARI35 |
1 | |
16 | Simulation of Cloud Computing Environment and Evaluation of Resource Provisioning AlgorithmRAJENDRA SONI, SUJEET KUMAR TIWARI36 |
2 | |
17 | Recognize Privacy and Ethical Sensitivity Knowledge by Hiding InferenceGOKULAN.S, SRIDHAR.D MCA., M.PHIL37 |
2 | |
18 | Recommending Learning Path of Student using Machine LearningPRITI B. JADHAV, DR. R. B. INGLE38 |
1 | |
19 | Intelligent Theme Based Integration of Medical CasesMANGESH MALI, DR. PARAG KULKARNI, PROF. VIRENDRA BAGADE39 |
1 | |
20 | A Survey Methods in Adaptive Background Subtraction in ImagesNEHA SAKPAL, MANOJ SABNIS40 |
3 | |
21 | Efficient Consumer Load Management by IOT TechniqueANAND S MELINAMANE41 |
1 | |
22 | Performance Analysis of MIMO Detection under Imperfect CSIPRAGYA VYAS, SHASHANK MANE42 |
2 | |
23 | Implementation of Context Aware Vehicular Handover Algorithm for Service Continuity in Heterogeneous Wireless NetworkSHWETA A. RAMTEKE, PROF. H. A. BHUTE44 |
1 | |
24 | Design of Targeted Advertising for Location Based Services and User Profile Based RecommendationNILIMA B.UMATE, PROF . V.G. BHUJADE45 |
7 | |
25 | Word Matching and Tweet Recognition for User TrackingMRUNALI OMPRAKASH THAKARE, PROF. MRUDULA NIMBARTE46 |
1 | |
26 | Comparative Study of Clustering Algorithms: Filtered Clustering and K-Means Cluttering Algorithm Using WEKAG.THANGARAJU, J.UMARANI, DR.V.POONGODI47 |
3 | |
27 | Sentiment Analysis using Ensemble ClassifierKAUSHIK HANDE48 |
3 | |
28 | Review of Phishing attacks and Anti Phishing ToolsDEEPASHREE K. MEHENDALE, RESHMA S. MASUREKAR, NEETA TAKAWALE, SHIBANI KULKARNI49 |
6 | |
29 | Reviewing Sentiment Analysis and Opinion Mining of Social MediaSHEENU CHOUDHARY, ER. DIPIKA ARORA50 |
2 | |
30 | A Study on Virtual Assistant in Artificial IntelligenceNEETA TAKAWALE, SHIBANI KULKARNI, DEEPASHREE MEHENDALE, RESHMA MASUREKAR, SHWETA AGARWAL51 |
5 | |
31 | Detection and Prevention of Grayhole, Blackhole and Wormhole Attacks in MANET Using IIRDAMANDEEP KAUR GREWAL, ER. GURPREET SINGH52 |
3 | |
32 | A Survey on Intrusion Detection TechniquesDR.V.PRAVEENA, M.SHOWMYAA, B.SATHYA53 |
5 | |
33 | Internet on Things Based Farm Watering SystemPUNAM WARKE54 |
3 | |
34 | Enhancing Power Quality to Sensitive Loads with Microgrid Using Fuzzy Logic ControllerNARASIM REDDY, P. SAIKUMAR57 |
2 | |
35 | Dynamic Proof of Storage Deduplication for Multi-User EnvironmentsM.MRUDHULA, M.V MANIKANTH58 |
1 | |
36 | Implementation of a More Secure Public Cloud ServiceYASH DHOLAKIA, SIDDHI KATE, SIDDHESH INAMDAR59 |
2 | |
37 | Simulation Software Selection using Principal Component AnalysisDR. ASHU GUPTA61 |
1 | |
38 | Comparative Analysis of Wavelet Transform Functions in Image Forgery DetectionMANJIMA MISHRA, DR.PREETI RAI62 |
1 | |
39 | Active RFID and MQTT based Child Health Monitoring systemANAHITA.G, ADITHYA KRISHNAN.G.R, JAGANNATH.S.S.V, LAVANYA SAI NARAYANAN63 |
2 | |
40 | Smart Home Using Bluetooth Low EnergyAAYUSHI KOTHARI, ANAR PANDYA64 |
1 | |
41 | A Survey of Spectrum Sensing Procedures in Cognitive Radio NetworkS.GAYATHRI PRIYA, DR. K.THILAGAM65 |
1 | |
42 | Scaling Factor Analysis of Snowfall Region in Aerial View Based On DBscan Algorithm or Data Clustering AlgorithmM.MAYILVAGANAN, R.MANICKAM67 |
1 | |
43 | Granulated Efficient Access Control for Tracery-Based Using Two-Factor Authentication in Cloud ComputingKASA DEEPA, J.RAGHUNATH, T.RAMAMOHAN69 |
1 | |
44 | Hashing and Enriching Short Texts Query Search Engine through Semantic SignalsPANDITI SANTHI, M.VENKATESH NAIK70 |
1 | |
45 | CA-Cellular Automa for Increase the Network Life Time Using Energy Aware Protocol in WSNA.SHARMILA, S.SIVAKUMAR71 |
2 | |
46 | Vision Based Human Computer Interaction Using Fingertip TrackingSUBHASH NEVHAL72 |
6 | |
47 | A Study on Opportunity and Challenges of EcommerceMALATI V. TRIBHUWAN, ASHWINI SATKAR, ASHWINI PATIL, ROHINI BHOWARE73 |
11 | |
48 | Segmenting Metals in Optical Microstructure Images using Haar FeaturesK. GAJALAKSHMI, S. PALANIVEL, S.SARAVANAN76 |
5 | |
49 | Collision Free Packet Transmission for LocalizationDR. V.VIJAYADEEPA, A. GEETHA77 |
3 | |
50 | Regression Model to Estimate Goals Scored By Football PlayersNEEL NIRAJ PATEL, MOHANRAAM S6 |
1 | |
51 | A Survey on Efficient Multicast Routing Over Secured Packet Maintenance in Wireless NetworksRAJKUMAR KALIMUTHU8 |
3 | |
52 | A Survey on Medically E-Prescription and Diagnosis Integration (MEDI)OMKAR MALWADKAR, SUHAS JAGDALE, VISHWAS LATKAR, YASH MADIKUNT, PRIYANKA KEDAR9 |
1 | |
53 | Efficient Cloud Storage System with Highly Scalable and Security for Big FileH. BINDU MADHAVI, R.SARAVANAN11 |
1 | |
54 | Remotely Sensed Image Approximation Using Tetrolet TransformSONALI SHANTARAM BANDAL, PROF. KALPANA AMRUTKAR12 |
1 | |
55 | Design and Analysis of a Novel СPW Fractal Ultra Wideband Monopole AntennaASHU PRIYA, PROF. GAURAV MORGHARE13 |
1 | |
56 | Weather Forecasting using Map-ReduceB.ANURAG, MANOJ PRAKASH, VAKEESH KANNA, PELASH CHOUDHARY14 |
3 | |
57 | Positioning of Wi-Fi Access Points for Optimum Coverage of Campus Wide NetworkANANT GAVALI, DR.RAMBABU VATTI, SHRADDHA GUPTE16 |
3 | |
58 | Parking Detection System Using IoTSWAPNA S. DESHPANDE, PROF. RENUKA S. GOUND18 |
1 | |
59 | Sharing Secure Data and Self-Destructing Scheme in CloudMOHAMMADI KAMPLEE, PROF B.R. SOLUNKE19 |
1 | |
60 | An Approach to Identify Credit Card Frauds through Support Vector Machine using Kernel TrickER. RITIKA WADHWA, ER. RITIKA MEHRA22 |
1 | |
61 | Android Shopping App using Augmented RealityAPURVA SHINDE28 |
1 | |
62 | Spelling Error Detection and Correction System for Punjabi Unicode using Hybrid ApproachRUPINDER KAUR, ER. JASDEEP SINGH MANN29 |
2 | |
63 | IoT- An Implementation of Top Technology TrendsVEMURI SREE REKHA, DR.R.PADMAVATHY31 |
1 | |
64 | Secrete Data Hiding In H.264/AVC 32 Compressed Video Bitstreams for Private Data ProtectionBHAGYASHRI RAUT, PROF.V.B.RASKAR32 |
1 | |
65 | Android Based Smart Toll System Using QR CodeMACHINDRAVETAL, PRAVIN GORE, NIKHIL PATIL, KIRANSAPATE, MANISHA SINGH43 |
1 | |
66 | Android Based Travel Route Recommendation Using Real Time PositioningPROF. P. R. KULKARNI, POONAM P. SHINDE, SNEHAL R. SONAWANE, ROHINI S. KOR, PRIYANKA S. KHATALE60 |
1 | |
67 | A Survey on E-learning by Using Gamification and Job AssistMINAKSHI MULIK, ADITI PATIL, SNEHAL SURYAVANSHI, VIRAJ NIMBALKAR, VARSHA DANGE66 |
1 | |
68 | A Survey on Data Analytics, Predictions and Visualization of Crime Patterns in IndiaSHIVAM S. BHIRUD, SHRAVANI S. SWAMI, SHEKHAR S. PATIL, JYOTI SHARMA, SHITAL V. DABHADE68 |
2 | |
69 | Survey on Various Data Encryption Algorithms Used in Cloud SecurityS.SANDHYA , U.RESHMA, DR.V.PRAVEENA73 |
6 | |
70 | A Survey on IoT based Intelligent Fire Escape SystemHANISH SHETTY, YASH DHOLAKIA, KAUSTUBH DESHMUKH, AKSHAY CHILE81 |
1 | |
71 | Designing Efficient Ontologies for Organization DevelopmentDR. ABRAR S. ALVI7 |
1 | |
72 | Dynamic Virtual Machine Consolidation in Cloud Data Centers: A StudyTALVINDER SINGH, VARUN JAIN, SATISH BABU G, AMIT KUMAR10 |
1 | |
73 | Energy Harvesting Medium Access Control in Quality of Service with Wireless Body Area NetworkAGILLA.R, K.BASKAR, C.RADHAKRISHNAN, S.SATHEESH KUMAR78 |
1 | |
74 | Publicly Verifiable Boolean Query Over Outsourced Encrypted Data- ReviewA.ANUSHA PRIYA, S.RANJANI79 |
1 | |
75 | An Exploratory Study of Magento and its FeaturesRUSHI DURGE, TRUPTI KULKARNI, URMILA KADAM, VANDANA NEMANE , RAHUL GAVHNE15 |
3 | |
76 | Audio Watermarking Based Data CryptographySWEETY KUMARI, PRINCY PATHAK82 |
1 | |
77 | Medical Disease Classification by Machine Learning with Cloud ComputingNINDIYA MAHAJAN, GURJEET KAUR83 |
1 | |
78 | Survey on Authentications Issues in Cloud ComputingVATSALA TAMRAKAR, PROF. RAJENDRA ARAKH, PROF. SUMIT NEMA84 |
6 | |
79 | An Exclusive Survey on Big Data Analytics, Applications and ToolsRENU DWIVEDI, PROF. SATPAL SINGH, PROF. SUMIT NEMA85 |
1 | |
80 | A Survey Paper on Data Privacy in Cloud ComputingNIVEDITA TAMRAKAR, PROF. RAJENDRA ARAKH, PROF. SUMIT NEMA86 |
3 | |
81 | A Survey of Intrusion Detection Systems in Cloud ComputingKIRTI RAMHARIYA, PROF. SOUMYA ASATI, PROF. SUMIT NEMA87 |
2 | |
82 | Review Paper of Digital Image Watermarking using Discrete Wavelet TransformVIPIN KUMAR, PROF. ANSHUL BHATIA88 |
2 | |
83 | Diagnosis of Fatigue using Deep Learning MethodS. Vigneswaran, K. Vinothkumar88 |
2 |