International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|

Volume-5  issue-9 September   2017


S.No Paper Title / Authors Download Paper Downloads
1

Smart Waste Collection System based on IoT (Internet of Things)

SHASHANK SHUKLA, DR. NEERAJ SHUKLA
3
2
2

Adaptive Image Registration Based Nonuniformity Correction Algorithm for Image Filtration

SHWETA WANMALI, PROF. R.U. SHEKOKAR
4
1
3

An Investigation of Constructivism and Cognitive Load Theory for Computer Programming Tool

PAYAL GOHEL, DR. KISHOR ATKOTIYA
5
1
4

A Survey on Datamining Based Intrusion Detection System

B.GAYATHRI, DR. ANTONY SELVADOSS THANAMANI
17
2
5

Revocation Methodologies Using Cloud Security

D. DEEPIKA, DR. ANTONY SELVADOSS THANAMANI
20
1
6

Overview of Association Rule Based on Pattern Mining

K.DHARANI, DR.ANTONY SELVADOSS THANAMANI
21
1
7

Threshold Based Efficient Data Transmission in Hybrid Wireless Networks

N.SAMUNDEESWARI, DR.S. KUMARAVEL, M.NAMASIVAYAM
23
8
8

Detecting and Preventing Distrustful URL in Multimedia Network

R.RAJASEKAR, N.SURESH
24
2
9

Ant Based Routing and QoS Effective Data Collection for Mobile Wireless Sensor Network

L.POONGODI, DR.M.NAMASIVAYAM
25
6
10

A Secure Message Exchange and Anti-Jamming Mechanism in MANET

K.SRIMUNIRATHINAM, DR.S. KUMARAVEL, M.NAMASIVAYAM
26
6
11

Ant-Based On-Demand Clustering Routing Protocol for Mobile Ad Hoc Networks

Y.P.BALAGANESH, N.SURESH
27
1
12

A Study on Security Aspects of Grid and Cloud Computing

DR. RANJIT D. PATIL, SUJATA P. PATIL, VIDYA H. BANKAR
30
2
13

An Exploratory Study of Wi-Fi Security: Wireless Network Encryption

SATYAWAN KUNJIR, YOGESH INGALE, SATISHKUMAR MULGI, RUSHI DURGE, RUSHIKESH KULKARNI
33
3
14

Design an Access Control Scheme for the WBANs Using the Given Signcryption

S.SANTHIYA, N.SATHEESKUMAR
34
1
15

User Authentication and File Encryption Technique for achieving high Cloud Computing Security

SANDEEP KUMAR PANDEY, SUJEET KUMAR TIWARI
35
1
16

Simulation of Cloud Computing Environment and Evaluation of Resource Provisioning Algorithm

RAJENDRA SONI, SUJEET KUMAR TIWARI
36
2
17

Recognize Privacy and Ethical Sensitivity Knowledge by Hiding Inference

GOKULAN.S, SRIDHAR.D MCA., M.PHIL
37
2
18

Recommending Learning Path of Student using Machine Learning

PRITI B. JADHAV, DR. R. B. INGLE
38
1
19

Intelligent Theme Based Integration of Medical Cases

MANGESH MALI, DR. PARAG KULKARNI, PROF. VIRENDRA BAGADE
39
1
20

A Survey Methods in Adaptive Background Subtraction in Images

NEHA SAKPAL, MANOJ SABNIS
40
3
21

Efficient Consumer Load Management by IOT Technique

ANAND S MELINAMANE
41
1
22

Performance Analysis of MIMO Detection under Imperfect CSI

PRAGYA VYAS, SHASHANK MANE
42
2
23

Implementation of Context Aware Vehicular Handover Algorithm for Service Continuity in Heterogeneous Wireless Network

SHWETA A. RAMTEKE, PROF. H. A. BHUTE
44
1
24

Design of Targeted Advertising for Location Based Services and User Profile Based Recommendation

NILIMA B.UMATE, PROF . V.G. BHUJADE
45
7
25

Word Matching and Tweet Recognition for User Tracking

MRUNALI OMPRAKASH THAKARE, PROF. MRUDULA NIMBARTE
46
1
26

Comparative Study of Clustering Algorithms: Filtered Clustering and K-Means Cluttering Algorithm Using WEKA

G.THANGARAJU, J.UMARANI, DR.V.POONGODI
47
3
27

Sentiment Analysis using Ensemble Classifier

KAUSHIK HANDE
48
3
28

Review of Phishing attacks and Anti Phishing Tools

DEEPASHREE K. MEHENDALE, RESHMA S. MASUREKAR, NEETA TAKAWALE, SHIBANI KULKARNI
49
6
29

Reviewing Sentiment Analysis and Opinion Mining of Social Media

SHEENU CHOUDHARY, ER. DIPIKA ARORA
50
2
30

A Study on Virtual Assistant in Artificial Intelligence

NEETA TAKAWALE, SHIBANI KULKARNI, DEEPASHREE MEHENDALE, RESHMA MASUREKAR, SHWETA AGARWAL
51
5
31

Detection and Prevention of Grayhole, Blackhole and Wormhole Attacks in MANET Using IIRD

AMANDEEP KAUR GREWAL, ER. GURPREET SINGH
52
3
32

A Survey on Intrusion Detection Techniques

DR.V.PRAVEENA, M.SHOWMYAA, B.SATHYA
53
5
33

Internet on Things Based Farm Watering System

PUNAM WARKE
54
3
34

Enhancing Power Quality to Sensitive Loads with Microgrid Using Fuzzy Logic Controller

NARASIM REDDY, P. SAIKUMAR
57
2
35

Dynamic Proof of Storage Deduplication for Multi-User Environments

M.MRUDHULA, M.V MANIKANTH
58
1
36

Implementation of a More Secure Public Cloud Service

YASH DHOLAKIA, SIDDHI KATE, SIDDHESH INAMDAR
59
2
37

Simulation Software Selection using Principal Component Analysis

DR. ASHU GUPTA
61
1
38

Comparative Analysis of Wavelet Transform Functions in Image Forgery Detection

MANJIMA MISHRA, DR.PREETI RAI
62
1
39

Active RFID and MQTT based Child Health Monitoring system

ANAHITA.G, ADITHYA KRISHNAN.G.R, JAGANNATH.S.S.V, LAVANYA SAI NARAYANAN
63
2
40

Smart Home Using Bluetooth Low Energy

AAYUSHI KOTHARI, ANAR PANDYA
64
1
41

A Survey of Spectrum Sensing Procedures in Cognitive Radio Network

S.GAYATHRI PRIYA, DR. K.THILAGAM
65
1
42

Scaling Factor Analysis of Snowfall Region in Aerial View Based On DBscan Algorithm or Data Clustering Algorithm

M.MAYILVAGANAN, R.MANICKAM
67
1
43

Granulated Efficient Access Control for Tracery-Based Using Two-Factor Authentication in Cloud Computing

KASA DEEPA, J.RAGHUNATH, T.RAMAMOHAN
69
1
44

Hashing and Enriching Short Texts Query Search Engine through Semantic Signals

PANDITI SANTHI, M.VENKATESH NAIK
70
1
45

CA-Cellular Automa for Increase the Network Life Time Using Energy Aware Protocol in WSN

A.SHARMILA, S.SIVAKUMAR
71
2
46

Vision Based Human Computer Interaction Using Fingertip Tracking

SUBHASH NEVHAL
72
6
47

A Study on Opportunity and Challenges of Ecommerce

MALATI V. TRIBHUWAN, ASHWINI SATKAR, ASHWINI PATIL, ROHINI BHOWARE
73
11
48

Segmenting Metals in Optical Microstructure Images using Haar Features

K. GAJALAKSHMI, S. PALANIVEL, S.SARAVANAN
76
5
49

Collision Free Packet Transmission for Localization

DR. V.VIJAYADEEPA, A. GEETHA
77
3
50

Regression Model to Estimate Goals Scored By Football Players

NEEL NIRAJ PATEL, MOHANRAAM S
6
1
51

A Survey on Efficient Multicast Routing Over Secured Packet Maintenance in Wireless Networks

RAJKUMAR KALIMUTHU
8
3
52

A Survey on Medically E-Prescription and Diagnosis Integration (MEDI)

OMKAR MALWADKAR, SUHAS JAGDALE, VISHWAS LATKAR, YASH MADIKUNT, PRIYANKA KEDAR
9
1
53

Efficient Cloud Storage System with Highly Scalable and Security for Big File

H. BINDU MADHAVI, R.SARAVANAN
11
1
54

Remotely Sensed Image Approximation Using Tetrolet Transform

SONALI SHANTARAM BANDAL, PROF. KALPANA AMRUTKAR
12
1
55

Design and Analysis of a Novel СPW Fractal Ultra Wideband Monopole Antenna

ASHU PRIYA, PROF. GAURAV MORGHARE
13
1
56

Weather Forecasting using Map-Reduce

B.ANURAG, MANOJ PRAKASH, VAKEESH KANNA, PELASH CHOUDHARY
14
3
57

Positioning of Wi-Fi Access Points for Optimum Coverage of Campus Wide Network

ANANT GAVALI, DR.RAMBABU VATTI, SHRADDHA GUPTE
16
3
58

Parking Detection System Using IoT

SWAPNA S. DESHPANDE, PROF. RENUKA S. GOUND
18
1
59

Sharing Secure Data and Self-Destructing Scheme in Cloud

MOHAMMADI KAMPLEE, PROF B.R. SOLUNKE
19
1
60

An Approach to Identify Credit Card Frauds through Support Vector Machine using Kernel Trick

ER. RITIKA WADHWA, ER. RITIKA MEHRA
22
1
61

Android Shopping App using Augmented Reality

APURVA SHINDE
28
1
62

Spelling Error Detection and Correction System for Punjabi Unicode using Hybrid Approach

RUPINDER KAUR, ER. JASDEEP SINGH MANN
29
2
63

IoT- An Implementation of Top Technology Trends

VEMURI SREE REKHA, DR.R.PADMAVATHY
31
1
64

Secrete Data Hiding In H.264/AVC 32 Compressed Video Bitstreams for Private Data Protection

BHAGYASHRI RAUT, PROF.V.B.RASKAR
32
1
65

Android Based Smart Toll System Using QR Code

MACHINDRAVETAL, PRAVIN GORE, NIKHIL PATIL, KIRANSAPATE, MANISHA SINGH
43
1
66

Android Based Travel Route Recommendation Using Real Time Positioning

PROF. P. R. KULKARNI, POONAM P. SHINDE, SNEHAL R. SONAWANE, ROHINI S. KOR, PRIYANKA S. KHATALE
60
1
67

A Survey on E-learning by Using Gamification and Job Assist

MINAKSHI MULIK, ADITI PATIL, SNEHAL SURYAVANSHI, VIRAJ NIMBALKAR, VARSHA DANGE
66
1
68

A Survey on Data Analytics, Predictions and Visualization of Crime Patterns in India

SHIVAM S. BHIRUD, SHRAVANI S. SWAMI, SHEKHAR S. PATIL, JYOTI SHARMA, SHITAL V. DABHADE
68
2
69

Survey on Various Data Encryption Algorithms Used in Cloud Security

S.SANDHYA , U.RESHMA, DR.V.PRAVEENA
73
6
70

A Survey on IoT based Intelligent Fire Escape System

HANISH SHETTY, YASH DHOLAKIA, KAUSTUBH DESHMUKH, AKSHAY CHILE
81
1
71

Designing Efficient Ontologies for Organization Development

DR. ABRAR S. ALVI
7
1
72

Dynamic Virtual Machine Consolidation in Cloud Data Centers: A Study

TALVINDER SINGH, VARUN JAIN, SATISH BABU G, AMIT KUMAR
10
1
73

Energy Harvesting Medium Access Control in Quality of Service with Wireless Body Area Network

AGILLA.R, K.BASKAR, C.RADHAKRISHNAN, S.SATHEESH KUMAR
78
1
74

Publicly Verifiable Boolean Query Over Outsourced Encrypted Data- Review

A.ANUSHA PRIYA, S.RANJANI
79
1
75

An Exploratory Study of Magento and its Features

RUSHI DURGE, TRUPTI KULKARNI, URMILA KADAM, VANDANA NEMANE , RAHUL GAVHNE
15
3
76

Audio Watermarking Based Data Cryptography

SWEETY KUMARI, PRINCY PATHAK
82
1
77

Medical Disease Classification by Machine Learning with Cloud Computing

NINDIYA MAHAJAN, GURJEET KAUR
83
1
78

Survey on Authentications Issues in Cloud Computing

VATSALA TAMRAKAR, PROF. RAJENDRA ARAKH, PROF. SUMIT NEMA
84
6
79

An Exclusive Survey on Big Data Analytics, Applications and Tools

RENU DWIVEDI, PROF. SATPAL SINGH, PROF. SUMIT NEMA
85
1
80

A Survey Paper on Data Privacy in Cloud Computing

NIVEDITA TAMRAKAR, PROF. RAJENDRA ARAKH, PROF. SUMIT NEMA
86
3
81

A Survey of Intrusion Detection Systems in Cloud Computing

KIRTI RAMHARIYA, PROF. SOUMYA ASATI, PROF. SUMIT NEMA
87
2
82

Review Paper of Digital Image Watermarking using Discrete Wavelet Transform

VIPIN KUMAR, PROF. ANSHUL BHATIA
88
2
83

Diagnosis of Fatigue using Deep Learning Method

S. Vigneswaran, K. Vinothkumar
88
2