International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|

Volume-5  issue-8 August   2017


S.No Paper Title / Authors Download Paper Downloads
1

Survey of Machine Learning Applications

NAVDEEP SINGH JAGGI
1
4
2

Studying Water Quality Monitoring System Basedon Wireless Sensor Networks (WSNs)

NAHED A. ALNAHASH; MOHAMED A. ZOHDY
2
4
3

A Secure and Reliable Video Watermarking based on Different Wavelet Transform

DHANASHREE S. SHEDGE
3
3
4

Enriching Text Clustering through Cognitive Concept Based Model (CCBM) by Ensemble Neural Learning Method

K.SANGEETHA, M.V. SAYINI
5
1
5

Face Recognition under Different Lighting Conditions Using Multiple Feature Fusion

KOTHAMASU JAHNAVI, K.SATYA PRASAD
6
2
6

A Survey on Big Data

PRACHI JAIN, KANCHAN JHA
8
2
7

A Study of Smarthome Tech using IoT

S.DEVI MCA., M.PHIL
9
1
8

A Comparative Study of Intrusion Detection System tools and Techniques

SONALI NEMADE, MADHURI A. DAREKAR, JYOTI BACHHAV, SUNANYNA SHIVTHARE
10
2
9

STBC-OFDM using Compressive Sensing Theory for Wireless Systems

SRISHTI HAJARE, SHASHANK MANE
14
1
10

3D Video Compression Using Split Algorithm

GOVTHAM T, PROF. VENKATESHAPPA
15
1
11

Design and Implementation of Smart Energy Meter

M SWAMY, R PRAVALLIKA
17
1
12

Internet of Things for Innovative, Improved and Effective Smart Transport Management System in Smart City

VANI HARAVE, SNEHA BHARTI, R. LATHA
19
2
13

A Survey on Plausible Approach to Mitigate Security Challenge in Cloud Computing

EJEM AGBAEZE, DR. NWOKORIE E.C., NJOKU DONATUS, DR. ODII J.N., NWOKOMA F.O.
20
2
14

Simulation of Cloud Computing Environment and Evaluation of Resource Provisioning Algorithm using Improved Max-Min

MONIKA MISHRA
21
1
15

Betel Leaf Disease Detection Using Histogram of Oriented Gradients and Multiclass SVM

DR. S. K. JAYANTHI, C.LALITHA
22
2
16

Smart Temperature Sensor Design Using Voltage Controlled Ring Oscillator

PRAVEEN KUMAR SHARMA, GAJENDRA SUJEDIYA
24
1
17

Personal Authentication Using Finger Vein Biometric

POOJA CHAVAN, WRUSHALI MENDRE
25
1
18

Proficient Majority Logic Fault Detection and Correction to Decode Mainstream Logic Design by Using EG-LDPC Codes

K PAVAN KUMAR, R VASIM AKRAM
30
1
19

Automated Glaucoma Screening based on CDR Measurement

SWAPNALI BHAPKAR, VAISHALI KULKARNI
31
1
20

A Review of Mining High Utility Patterns

DR. S. MEENAKSHI, P. SHARMILA
36
2
21

Server Monitoring Using Windows Management Instrumentation and SNMP

K.BHAGYASRI, K.VELAYUDHAM , P. SRIVYSHNAVI
33
1
22

An Improvised Recommendation System on Top-N, Unrated and Point of Interest Recommendations Regularized with User Trust and Item Ratings

MEENAKSHI, PROF. PRAVIN NIMBALKAR
36
1
23

Keen Honeypot based E-Commerce Security Model

B.V.RAMA KRISHNA, B. SUSHMA
38
1
24

Live Virtual Reality Streaming for Student Platform

NITA RADHAKRISHNAN
39
2
25

An Adaptive Study for Different Methodology for Information Hiding

NAGESH SHARMA, NARENDRA KUMAR UPADHYAY, NIRMAL KUMAR SARASWAT
40
7
26

A Deep Survey on Mutational Testing and Test Adequacy Check

J SANTHOSH, MINI N
41
1
27

Face Recognition Using Enhanced Gradient Patterns

VISHNU GANESH PHANIHARAM, BAGADI RAVIKIRAN, TUSAR KANTI MISHRA
42
10
28

A Study on Wireless Ban Area Network for Health Care Applications

AMUTHAVEL.R, LALITHA.R
45
2
29

An Algorithmic Study of Link Prediction in Social Network Sites

SURYAKUMAR B, DR.E.RAMADEVI
46
2
30

A Review on Google Glass Technology

S.ARCHANA, N.NISHANTH
49
2
31

A Review on Privacy Preserving Data Access Control Mechanism in Hybrid Clouds

D. VISHWAKSEN REDDY
50
3
32

Priority based Job Scheduling Algorithm in Cloud Computing

PAMINI JAIN, PROF. SAPNA CHOUDHARY
51
2
33

Speech recognition using PNCC and AANN

R. THIRUVENGATANADHAN
51A
1
34

Data Transmission between Two Laptops Using Optical Source

RITIKA PATHI
52
1
35

SLL Reduction of Spherical Array Using Thinning

K.NAGA UMA SARASWATHI, PROF. N.VENKATESWARA RAO
53
1
36

Enhancing Machine Based Spam Detection Using Twitter

SHINDE ASHA ASHOKRAO, SHITAL Y. GAIKWAD
54
3
37

An Analysis of Transformation in Teaching and Learning Methods

SHABANA PARVEEN ANSARI, PROF. MONA DESHMUKH
55
1
38

Load Balancing and its Challenges in Cloud Computing: A Review Paper

JAYA CHOUBEY, PROF. SATPAL SINGH, PROF. SUMIT NEMA
56
1
39

A Survey on Web Services Security Concern, Solution and Its Limitation

DIVYA PANDEY, PROF. SATPAL SINGH, PROF. SUMIT NEMA
57
3
40

Functionalities, Applications, Issues and Types of Data Mining System

KIRAN KUMAR S V N MADUPU
58
1
41

Secure Advanced E-Voting System using NFC and Thumb Matching

SHRADDHA R. HANDE, PROF. R. W. DESHPANDE
4
1
42

LAL Methodology to Mitigate Denial of Service Attacks in Fictitious Nodes Used in OLSR Protocol

ADITYA KATHERA, ADITHYA. R , G. GOKULNATH, TARUN RAJ MOTURU
7
6
43

Overview of Blue Eyes Technology

SAMPURNA J , VINITHA R
11
2
44

Analysis on Ransomwares and Prevention Approach

CHITESH RAI TULI, PANKAJ SHARMA, SAKSHI MALHOTRA

B.Tech. Student (4th year), Department of Mathematics and Computing, Delhi Technological University, Delhi, India

12
1
45

Framework for Key Visibility in Cloud Storage Auditing

SAPNA R, RAKESHN, CHANDAN
13
2
46

Implementation of a Monitoring Application in Android

AKSHIT BATHEJA, AISHWARYA KOURANI, EKTA SIRWANI, MAAZ SIRKHOT
16
4
47

An Exploratory Study To Find Importance Of Time Management in software Project Management

VANDANA NEMANE, TRUPTI KULKARNI, PRITI JADHAV, RUSHI DURGE
18
3
48

A Survey on Brain Fingerprinting

BHARTI SHARMA, DEEPESH AGRAWAL, AMOGH GADKARI , BHAVNA GUPTA
26
1
49

A New Authorized Secure Schema for Data Deduplication Using Convergent Key in Cloud Environment

KOLU JAGADEESH, D.GOUSIYA BEGUM
27
2
50

Machine Learning: Intersection of Statistics and Computer Science

Rakesh Rojanala
28A
2
51

A Novel Hybrid Scheme Based on Virtual Circuit Switching for Reduce Communication Latency and Power of Network on Chip(NoC).

MANTRI KULLAYAPPA, DR. N. AV. PRASAD
29
1
52

The Architecture of Wireless Sensor Network, its Issues and Applications

DIBYAJYOTI SAIKIA
34
1
53

PAPR Reduction Using Hybrid Approach in OFDM

PREETY MAHAJAN, HARJINDER KAUR, SWEETY
35
1
54

Ensemble Model for Movie Success Prediction

P.DEEPTHI, S.BHARGAV
37
1
55

Deduplication of Encoded Big Data in Cloud Storage

PALLAVI G. BANGALE, PROF REKHA KULKARNI
43
5
56

Encoding and Decoding of LDPC Codes using Bit Flipping Algorithm in FPGA

L. SHIVA NAGENDER RAO, K.VENKATA SATHYAJITH, Y. NAGARAJU YADAV
44
1
57

An Approach towards Forming a Domain Dictionary to Ease the Process of Searching for Scholarly Publications

ADITYA KALIVARAPU, M KRANTHI KIRAN
47
1
58

Machine Learning in Financial Fraud Detection

MAYURESH PATIL
47A
1
59

A Secure and Robust Image Watermarking Technique Based on DWT-DCT and Implemented Various Attacks on it

TANIYA PANJIYAR, YOGENDRA KATIYAR
48
2
60

A Survey on Social Media in Education

A.D.C. NAVIN DHINNESH, N.SUNDARESWARAN
33
1
61

Efficient Unflaws of Secure Data Transmission Using s-BGP

NITHYA.S, BABU.T.G
50
1
62

A Study of Classification Techniques of Data Mining Techniques in Health Related Research

K PRASANNA JYOTHI, DR R SIVARANJANI, DR TUSAR KANTI MISHRA, S RANJAN MISHRA
73
4
63

Quantifying the Error in CLT for Accurate GRN Generation

Shaik Jeelan Basha, L. Rangaswamy
28
2
64

Cloud Migration Strategies: Navigating the Shift to Modern IT Infrastructure

Krish Anil Tripathi


64
3