International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | An Improved Approach of Text Steganography in Application with Rotational SymmetryB.RAMAPRIYA7 |
1 | |
2 | Estimation of Nitrogen and Chlorophyll Contents of Leaves Using SVMSHRADDHA SAHURKAR, PROF. B. J.CHILKE13 |
1 | |
3 | Accessing Secured Public Data Storage Using Secure Index in Cloud Computing EnvironmentM RAJASEKAR, DR M KARTHIKEYAN14 |
1 | |
4 | A Survey on Various Underwater Image Enhancement TechniquesSHRINIVAS SHIRKANDE, DR. MADHUKAR J. LENGARE15 |
3 | |
5 | Machine Learning Approach For Spam Tweets DetectionJAGTAP KALYANI LAXMAN, PROF.B.A.KHANSOLE35 |
1 | |
6 | NRE-AODV Routing Protocol to Maximize Network Lifetime of MANET Based on AODVK.MARIAPPAN, DR.M.KARNAN36 |
3 | |
7 | A Survey on Literature Review of the Usability of HCISHUBHANGI T RAUT, DR. ABHA KHANDELWAL, DR. S. B. KISHOR37 |
1 | |
8 | Performance of OFDM system for AWGN, Rayleigh and Rician ChannelPAYAL DUGAD, ASHOK KHEDKAR47 |
1 | |
9 | Minimizing Stealthy Denial of Services in Cloud ComputingDIPALEE BALU RAUT, PROF. AMRIT PRIYADARSHI48 |
3 | |
10 | Review on Text Detection, Extraction and Recognition from Images and VideosS.SHIYAMALA, DR.S.SUGANYA49 |
3 | |
11 | A Survey of Data Mining Clustering AnalysisSUMITHA MUNIAN, PAULRAJ ANANTH K.J51 |
5 | |
12 | An Medical Healthcare Information Sharing With Service Based Cloud EnvironmentS SANTHIYA, DR M KARTHIKEYAN52 |
1 | |
13 | A Review on Healthcare InformaticsDR. G. T. PRABAVATHI, M. SHANTHIPRIYA53 |
1 | |
14 | Wind Turbine Monitoring and Diagnosis Using CANYOGESH BOLEGAVE, PROF. M. U. INAMDAR54 |
1 | |
15 | Privacy Preserving for Data Perturbation Using Cryptography TechniqueA.MALATHI, DR.M.MALATHI55 |
2 | |
16 | A Blind Image Quality Assessment for Visual Quality Perception to Estimate the Quality of the ImagesK. GIRISH CHANDRA, DR. B. PRABHAKARA RAO72 |
2 | |
17 | Performance Analysis of MF Receiver: ReviewBIMLA PANDEY74 |
1 | |
18 | A Survey on Security and Privacy Issues In Cloud ComputingG.PRAVEEN KUMAR, S.KAVITHA75 |
1 | |
19 | Improved EMG Upper Limb Classification FeaturesP.SWETHA76 |
1 | |
20 | Throughput Maximization Using Spatial Reusability in Multi-Hop WirelessPRERNA BORANE, V. K. PATIL78 |
1 | |
21 | Design of Compact Wideband Key-slotted Circular Microstrip Patch Antenna with partial Ground PlaneYEESHU RELHAN, YOGITA79 |
2 | |
22 | Hybrid Technique for Image Compression Using SPIHT and BCH CodesS.VENKATA SAI PRASAD, DR.K.SATYA PRASAD80 |
1 | |
23 | Survey on Artificially Intelligent used in ChatBotA.MARI KIRTHIMA81 |
3 | |
24 | Extraction of Vegetation Regions in High Resolution Satellite Data Based On Spectral Indices and Marker Controlled Watershed SegmentationP.SWATHIKA, A. RAVI RAJA82 |
3 | |
25 | Anti Phishing Website Using Visual CryptographyMANASI ASHOKRAO DESHMUKH, PROF. R. W. DESHPANDE83 |
1 | |
26 | Automated Irrigation System Based on Arduino Controller Using SensorsSARIKA RAKSHAK, PROF. R. W. DESHPANDE84 |
1 | |
27 | Sarcasm Detection on Twitter using Feature-Based ApproachKHAN SHEHLA KULSUM, NAGESH KAMBLE87 |
2 | |
28 | A Survey on Data De-Duplication Methods in Cloud Storage SystemS. LALITHA, N. KAMAL RAJ88 |
1 | |
29 | Shape based Object Classification using Knowledge Vector CodeDR G D JASMIN89 |
1 | |
30 | Multi-Purpose Smart Card- G CardSANJANA.S.U.90 |
1 | |
31 | A Secure Data Storage and Sharing Framework Using Specialized Key in CloudPOOJA SHASHANK POL, PROF. AMRIT PRIYDARSHI91 |
1 | |
32 | Data Hiding in Digital Video for Authentication and Data SecurityNEHA GIRADKAR, DR. SMITA A. NAGTODE92 |
1 | |
33 | A Systematic Approach for Classification of Knee Osteoarthritis Using PNN AlgorithmCHENNUBOINA SOWJANYA93 |
1 | |
34 | Design and Development of Intrusion Detection System for Internet of ThingsTEJAS M. MEHARE, PROF. SNEHAL BHOSALE94 |
1 | |
35 | Analysis of Malware Propagation in Large Scale NetworkANKITA SURESH MANE, PROF. BERE S.S.95 |
2 | |
36 | A Survey on Medical Image Classification TechniquesMANASI KALEKAR96 |
2 | |
37 | A Study on Six Senses of Cognitive ComputingN.SUNDARESWARAN, A.D.C. NAVIN DHINNESH97 |
2 | |
38 | Heart Rate and Respiratory Rate Measurement Using Image ProcessingS.S.LOKHANDE , BINU K NAIR98 |
1 | |
39 | Real - Time Hybrid Contourlet, DCT & SVD Algorithms for Digital Image watermarking, Geometric Applications and Noise AdditionVENKATESWARLU ANANTHANENI, DR. USHA RANI NELAKUDITI100 |
2 | |
40 | A Study on Six Senses of Cognitive ComputingN.SUNDARESWARAN, A.D.C. NAVIN DHINNESH103 |
1 | |
41 | Review Paper on FIR Filter based on Vedic Multiplier and Kogge Stone AdderSEEMA PATIDAR AND PROF. ALOK KUMAR104 |
1 | |
42 | Design and Implementation of Power Efficient Linear Feedback Shift Register for BIST using VerilogAKHILA K, KARUNA N, KAVYA C, YASHA JYOTHI M SHIRUR4 |
2 | |
43 | Block Truncation Coding for Image using Bit Map Technique for 4×4 Block SizeAMIT KUMAR, PROF. NAVNEET KAUR10 |
1 | |
44 | Mobile to Mobile Communication Using Wi-FiJITESH R.SHARMA, M.M.JADHAV12 |
1 | |
45 | A Novel Low-complexity Multiple-input Multiple-output (MIMO) Detector modified for Single-Carrier Frequency Division-Multiple Access (SC-FDMA)V VENKATA SIVA MOULI18 |
1 | |
46 | Discussion of Different types of Noise Removal by Median FilterPALLAV PARMAR, YASHPAL YADAV, AAKANSHA WASNIK19 |
1 | |
47 | A Hybrid Approach for Image Compression using HAAR Wavelet TransformANIL KUMAR MALVIYA, PROF. ARUN KUMAR22 |
1 | |
48 | Survey on Automatic Intrusion Recognition and Tracking for Security SystemsS.S. LOKHANDE, GIRIJA RAJENDRA PANDHARE27 |
4 | |
49 | Systematic Review on Dealing Imbalanced Data –A Machine Learning ApproachSUPRIYA INDUKURI, SUGUNA KANUMURU, SOUNDARYA DANDU, ADINARAYANA SALINA28 |
4 | |
50 | A Study of Big Data Mining Techniques Used to Improve the Performance of Large Data ProcessingG.SUGANYA MCA.,29 |
1 | |
51 | Power Efficient Destination Address Generator of Direct Memory Access Controller in Multiprocessor SoCKRITIKA M.SHARMA, AISHWARYA.A, YASHA JYOTHI M SHIRUR31 |
2 | |
52 | Generating Captions for Images Using Multimodal Neural NetworksDHOOMIL SHETA, PARTH PAREKH, NISHANT SHAH, RUTVIK PAREKH, MANAN SHAH1, PROF S. C. SHRAWNE34 |
8 | |
53 | Rainfall Forecasting Using Gaussian Family of Generalized Linear RegressionBHAKTI NARVEKAR, JAY TORASAKAR, CHINMAYA KORE38 |
38 | |
54 | WI-FI enabled Mobile and USB data transfer.SHRUTI RAMANI77 |
2 | |
55 | Digital Menu Card for Restaurant Using Microcontroller 8051and CAN ControllerNITHIN NAIR, VISHAAK NARAYAN, CHAITYA LODAYA, VIJAY JOSHI99 |
2 | |
56 | A Comparative Analysis of Apache hive based on MapReduce and Impala based on distributed query enginePRASAD MITKARI, RUTUJA BANSWAL, AKSHATA SIRSAT, PROF. DAIVASHALA DESHMUKH101 |
5 | |
57 | Distanced Based Routing For Wireless Sensor NetworkRITESH GUJARKAR, PROF. B.J. CHILKE3 |
1 | |
58 | A Novel Efficient Graph Based Model for Content Based Image RetrievalPARAG V.YELORE, S. S. KEMEKAR, PROF. P. R. LAKHE5 |
1 | |
59 | Design of an 8-Bit Array for Client Server Communication for Hash List ArchitectureSHIFALI R. PANDE, PROF. R. H. DESHMUKH6 |
1 | |
60 | Smart School Bus for Children Transportation Safety Enhancement with IOTP.AMBEDKAR, P.SURESH BABU8 |
1 | |
61 | Secure Online Polling System Using Visual CryptographySWATI YOGESH SHINDE, PROF. AMRIT PRIYADARSHI9 |
1 | |
62 | Survey on Data Security Approach in Dynamic Multi Hop CommunicationDR.S.A.UBALE , ANURADHA KHARE11 |
3 | |
63 | A Ranking Model for Instance and Feature Selection Techniques for Improving Bug LocalizationC.S.DEEPTHI, P.GANGADHARA16 |
3 | |
64 | A Hybrid Scheme to Obtaining Low Latency and Low Power Consumption for NoCsV VENKATA SIVA MOULI17 |
1 | |
65 | Two-Factor Data Security Protection Mechanism for Cloud Storage SystemPRIYA J. KHINDRE, SHITAL Y. GAIKWAD20 |
3 | |
66 | Analysis of Big Data in the Data MiningS.SATHIYAKALA JAYAKANTHAN21 |
1 | |
67 | Automated Framework for Skull Damage Detection and Repair Using KNN and Template Matching MethodsNILESH T. GONJARE, DR. RAJENDRA S. KANPHADE, PROF. SAGAR V. JOSHI23 |
2 | |
68 | A Study and Comparison of Wired, Wireless and Optical NetworksHIMANSHU JHA24 |
1 | |
69 | A Survey of Drowsiness Detection System for DriversDR. V. K. KADAM, A.A. SHIRSATH26 |
5 | |
70 | Textual Notifications Using Node.JS and Cloud AntHASEEBA YASEEN, RAKHEEBA TASEEN30 |
1 | |
71 | Face Recognition Techniques: A SurveyVISHNU GANESH PHANIHARAM, BAGADI RAVIKIRAN, TUSAR KANTI MISHRA32 |
15 | |
72 | Examine the E-Mail Spam Detecting and Email Spam Filtering TechniquesV.CHARUMATHI MCA, S.THIRUMAL MCA, MPHIL.39 |
2 | |
73 | A Survey on SSO (Single Sign-On) Mechanism for Mobile AppsD. S. BARAVADE, S.A.LAKADE, V.C. DESHMUKH.40 |
4 | |
74 | Learning Search Tasks in Queries using K-meansAHILYA SATHE, PROF. DEEPAK GUPTA41 |
1 | |
75 | Providing Data Security by Hidding Large Amount of Data Using SteganographyKINGSLY.P, AKILA.R42 |
1 | |
76 | Evaluation of Secure Streaming of Files in Cloud EnvironmentNEMI RISHI43 |
1 | |
77 | Securing Vehicular Communication through Trust Management Scheme in VANETSK. KALYAN KUMAR, M.VIJAYA KANTH M.TECH,(PH.D)44 |
1 | |
78 | Simulation and Performance Analysis of a Metamaterial based Dual band Monopole Antenna using Rectangular Complemetary Split Ring Resonator in the Ground plane for GSM900 and Wi-Max ApplicationsMR. PRASANNA PAGA, DR.H.C.NAGARAJ, DR.T.S.RUKMINI45 |
1 | |
79 | Web Mining Using Lexical Chain with Interactive Genetic AlgorithmJYOTI S. PACHARE46 |
1 | |
80 | Web Services Hash Table based Automation TestingCHETAN PHALKE, PROF. K.D.BAMANE56 |
5 | |
81 | Measurability, Adaptability and Efficiency in Data Center Network using Space ShufflingVANISHREE M L57 |
1 | |
82 | Comparative Analysis of FIFO and RED QUEUE ALGORITHM for Congestion Control in MANETMEHAJABEEN FATIMA, NIVEDITA KHARE58 |
1 | |
83 | A Chord Based Decentralized Secure Service Discovery on Peer to Peer NetworksM.SUDHA, R.P. SATHIYA PRIYA59 |
1 | |
84 | Authorization in Data Access User Behaviour Profiling With Duplicate Check Measures in Social NetworkDR. V.VIJAYADEEPA, D.DEEPIKA60 |
1 | |
85 | Collision and Broadcasting Delay Management System in 5G Multimedia NetworksDR. V.VIJAYADEEPA, J.ABIRAMI61 |
1 | |
86 | A Review of Channel Estimation Techniques over MIMO OFDM SystemURMILA SHAH, PROF. HARDIKA KHANDELWAL62 |
1 | |
87 | MR Image Enhancement for Extra Axial Haemorhages ClassificationIQRA RIZVI, NARAYANAN KALLINGAL63 |
2 | |
88 | Domain Based Sentimental Analysis using Naïve Bayes Classification over TwitterGARGI, TAPAS KUMAR64 |
1 | |
89 | Heart Disease Risk Prediction using Pre-processing and Classification of Patients DataK PRASANNA JYOTHI, DR R SIVARANJANI, DR TUSAR KANTI MISHRA, S RANJAN MISHRA65 |
6 | |
90 | Survey on Brain Tumor Identification Using Segmentation and MRI ImagesP.NARENDRAN, R.DEEPA66 |
1 | |
91 | A Study on Big Data Mining - Concepts, Platforms, Issues and Challenges, Future ScopePEBILA SHANI.S, PRICILLA.S67 |
1 | |
92 | PSO Algorithm Based Reactive Power Optimization Using Matlab ProgrammingNAVEEN KUMAR, DEEPAK KUMAR GOYAL, AP MISRA68 |
1 | |
93 | Optimal and Fast Health Data Clustering Using Hybrid Meta Heuristic AlgorithmV. SHANU, S.VYDEHI69 |
1 | |
94 | A Novel Integrated Method for Detection of Salient Regions in an Image using HDCT and Local Spatial Support by RegressionMD.CHANDINI, DR.B.PRABHAKARA RAO70 |
2 | |
95 | Customer and Employee Perception towards Internet Banking Risk AssessmentDR. MINAKSHI D. BHOSALE71 |
2 | |
96 |
Classification and Feature Extraction in Artificial Intelligence-based Threat Detection using Analysing Methods Sakshi Sharma, Natasha Dutta 72 |
5 | |
97 |
Investigation and Evaluation of Strategic Approaches Critically before Approving Cloud Computing Service Frameworks Pankit Arora, Sachin
Bharadwaj |
5 | |
98 | Next-Generation Cloud Security: Leveraging AI and Machine Learning For Performance Nisha Rekha Dube 98 |
3 |