International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Survey of Machine Learning ApplicationsNAVDEEP SINGH JAGGI1 |
4 | |
2 | Studying Water Quality Monitoring System Basedon Wireless Sensor Networks (WSNs)NAHED A. ALNAHASH; MOHAMED A. ZOHDY2 |
4 | |
3 | A Secure and Reliable Video Watermarking based on Different Wavelet TransformDHANASHREE S. SHEDGE3 |
3 | |
4 | Enriching Text Clustering through Cognitive Concept Based Model (CCBM) by Ensemble Neural Learning MethodK.SANGEETHA, M.V. SAYINI5 |
1 | |
5 | Face Recognition under Different Lighting Conditions Using Multiple Feature FusionKOTHAMASU JAHNAVI, K.SATYA PRASAD6 |
2 | |
6 | A Survey on Big DataPRACHI JAIN, KANCHAN JHA8 |
2 | |
7 | A Study of Smarthome Tech using IoTS.DEVI MCA., M.PHIL9 |
1 | |
8 | A Comparative Study of Intrusion Detection System tools and TechniquesSONALI NEMADE, MADHURI A. DAREKAR, JYOTI BACHHAV, SUNANYNA SHIVTHARE10 |
2 | |
9 | STBC-OFDM using Compressive Sensing Theory for Wireless SystemsSRISHTI HAJARE, SHASHANK MANE14 |
1 | |
10 | 3D Video Compression Using Split AlgorithmGOVTHAM T, PROF. VENKATESHAPPA15 |
1 | |
11 | Design and Implementation of Smart Energy MeterM SWAMY, R PRAVALLIKA17 |
1 | |
12 | Internet of Things for Innovative, Improved and Effective Smart Transport Management System in Smart CityVANI HARAVE, SNEHA BHARTI, R. LATHA19 |
2 | |
13 | A Survey on Plausible Approach to Mitigate Security Challenge in Cloud ComputingEJEM AGBAEZE, DR. NWOKORIE E.C., NJOKU DONATUS, DR. ODII J.N., NWOKOMA F.O.20 |
2 | |
14 | Simulation of Cloud Computing Environment and Evaluation of Resource Provisioning Algorithm using Improved Max-MinMONIKA MISHRA21 |
1 | |
15 | Betel Leaf Disease Detection Using Histogram of Oriented Gradients and Multiclass SVMDR. S. K. JAYANTHI, C.LALITHA22 |
2 | |
16 | Smart Temperature Sensor Design Using Voltage Controlled Ring OscillatorPRAVEEN KUMAR SHARMA, GAJENDRA SUJEDIYA24 |
1 | |
17 | Personal Authentication Using Finger Vein BiometricPOOJA CHAVAN, WRUSHALI MENDRE25 |
1 | |
18 | Proficient Majority Logic Fault Detection and Correction to Decode Mainstream Logic Design by Using EG-LDPC CodesK PAVAN KUMAR, R VASIM AKRAM30 |
1 | |
19 | Automated Glaucoma Screening based on CDR MeasurementSWAPNALI BHAPKAR, VAISHALI KULKARNI31 |
1 | |
20 | A Review of Mining High Utility PatternsDR. S. MEENAKSHI, P. SHARMILA36 |
2 | |
21 | Server Monitoring Using Windows Management Instrumentation and SNMPK.BHAGYASRI, K.VELAYUDHAM , P. SRIVYSHNAVI33 |
1 | |
22 | An Improvised Recommendation System on Top-N, Unrated and Point of Interest Recommendations Regularized with User Trust and Item RatingsMEENAKSHI, PROF. PRAVIN NIMBALKAR36 |
1 | |
23 | Keen Honeypot based E-Commerce Security ModelB.V.RAMA KRISHNA, B. SUSHMA38 |
1 | |
24 | Live Virtual Reality Streaming for Student PlatformNITA RADHAKRISHNAN39 |
2 | |
25 | An Adaptive Study for Different Methodology for Information HidingNAGESH SHARMA, NARENDRA KUMAR UPADHYAY, NIRMAL KUMAR SARASWAT40 |
7 | |
26 | A Deep Survey on Mutational Testing and Test Adequacy CheckJ SANTHOSH, MINI N41 |
1 | |
27 | Face Recognition Using Enhanced Gradient PatternsVISHNU GANESH PHANIHARAM, BAGADI RAVIKIRAN, TUSAR KANTI MISHRA42 |
10 | |
28 | A Study on Wireless Ban Area Network for Health Care ApplicationsAMUTHAVEL.R, LALITHA.R45 |
2 | |
29 | An Algorithmic Study of Link Prediction in Social Network SitesSURYAKUMAR B, DR.E.RAMADEVI46 |
2 | |
30 | A Review on Google Glass TechnologyS.ARCHANA, N.NISHANTH49 |
2 | |
31 | A Review on Privacy Preserving Data Access Control Mechanism in Hybrid CloudsD. VISHWAKSEN REDDY50 |
3 | |
32 | Priority based Job Scheduling Algorithm in Cloud ComputingPAMINI JAIN, PROF. SAPNA CHOUDHARY51 |
2 | |
33 | Speech recognition using PNCC and AANNR. THIRUVENGATANADHAN51A |
1 | |
34 | Data Transmission between Two Laptops Using Optical SourceRITIKA PATHI52 |
1 | |
35 | SLL Reduction of Spherical Array Using ThinningK.NAGA UMA SARASWATHI, PROF. N.VENKATESWARA RAO53 |
1 | |
36 | Enhancing Machine Based Spam Detection Using TwitterSHINDE ASHA ASHOKRAO, SHITAL Y. GAIKWAD54 |
3 | |
37 | An Analysis of Transformation in Teaching and Learning MethodsSHABANA PARVEEN ANSARI, PROF. MONA DESHMUKH55 |
1 | |
38 | Load Balancing and its Challenges in Cloud Computing: A Review PaperJAYA CHOUBEY, PROF. SATPAL SINGH, PROF. SUMIT NEMA56 |
1 | |
39 | A Survey on Web Services Security Concern, Solution and Its LimitationDIVYA PANDEY, PROF. SATPAL SINGH, PROF. SUMIT NEMA57 |
3 | |
40 | Functionalities, Applications, Issues and Types of Data Mining SystemKIRAN KUMAR S V N MADUPU58 |
1 | |
41 | Secure Advanced E-Voting System using NFC and Thumb MatchingSHRADDHA R. HANDE, PROF. R. W. DESHPANDE4 |
1 | |
42 | LAL Methodology to Mitigate Denial of Service Attacks in Fictitious Nodes Used in OLSR ProtocolADITYA KATHERA, ADITHYA. R , G. GOKULNATH, TARUN RAJ MOTURU7 |
6 | |
43 | Overview of Blue Eyes TechnologySAMPURNA J , VINITHA R11 |
2 | |
44 | Analysis on Ransomwares and Prevention ApproachCHITESH RAI TULI, PANKAJ SHARMA, SAKSHI MALHOTRAB.Tech. Student (4th year), Department of Mathematics and Computing, Delhi Technological University, Delhi, India 12 |
1 | |
45 | Framework for Key Visibility in Cloud Storage AuditingSAPNA R, RAKESHN, CHANDAN13 |
2 | |
46 | Implementation of a Monitoring Application in AndroidAKSHIT BATHEJA, AISHWARYA KOURANI, EKTA SIRWANI, MAAZ SIRKHOT16 |
4 | |
47 | An Exploratory Study To Find Importance Of Time Management in software Project ManagementVANDANA NEMANE, TRUPTI KULKARNI, PRITI JADHAV, RUSHI DURGE18 |
3 | |
48 | A Survey on Brain FingerprintingBHARTI SHARMA, DEEPESH AGRAWAL, AMOGH GADKARI , BHAVNA GUPTA26 |
1 | |
49 | A New Authorized Secure Schema for Data Deduplication Using Convergent Key in Cloud EnvironmentKOLU JAGADEESH, D.GOUSIYA BEGUM27 |
2 | |
50 | Machine Learning: Intersection of Statistics and Computer ScienceRakesh Rojanala28A |
2 | |
51 | A Novel Hybrid Scheme Based on Virtual Circuit Switching for Reduce Communication Latency and Power of Network on Chip(NoC).MANTRI KULLAYAPPA, DR. N. AV. PRASAD29 |
1 | |
52 | The Architecture of Wireless Sensor Network, its Issues and ApplicationsDIBYAJYOTI SAIKIA34 |
1 | |
53 | PAPR Reduction Using Hybrid Approach in OFDMPREETY MAHAJAN, HARJINDER KAUR, SWEETY35 |
1 | |
54 | Ensemble Model for Movie Success PredictionP.DEEPTHI, S.BHARGAV37 |
1 | |
55 | Deduplication of Encoded Big Data in Cloud StoragePALLAVI G. BANGALE, PROF REKHA KULKARNI43 |
5 | |
56 | Encoding and Decoding of LDPC Codes using Bit Flipping Algorithm in FPGAL. SHIVA NAGENDER RAO, K.VENKATA SATHYAJITH, Y. NAGARAJU YADAV44 |
1 | |
57 | An Approach towards Forming a Domain Dictionary to Ease the Process of Searching for Scholarly PublicationsADITYA KALIVARAPU, M KRANTHI KIRAN47 |
1 | |
58 | Machine Learning in Financial Fraud DetectionMAYURESH PATIL47A |
1 | |
59 | A Secure and Robust Image Watermarking Technique Based on DWT-DCT and Implemented Various Attacks on itTANIYA PANJIYAR, YOGENDRA KATIYAR48 |
2 | |
60 | A Survey on Social Media in EducationA.D.C. NAVIN DHINNESH, N.SUNDARESWARAN33 |
1 | |
61 | Efficient Unflaws of Secure Data Transmission Using s-BGPNITHYA.S, BABU.T.G50 |
1 | |
62 | A Study of Classification Techniques of Data Mining Techniques in Health Related ResearchK PRASANNA JYOTHI, DR R SIVARANJANI, DR TUSAR KANTI MISHRA, S RANJAN MISHRA73 |
4 | |
63 | Quantifying the Error in CLT for Accurate GRN GenerationShaik Jeelan Basha, L. Rangaswamy28 |
2 | |
64 | Cloud Migration Strategies: Navigating the Shift to Modern IT InfrastructureKrish Anil Tripathi |
3 |