International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | A Memory Scheduling Algorithm for Multi-core SystemsHYEON-JU YOON2 |
2 | |
2 | A Survey on Classification and Analysis of Chemical Similarity Search in Large DatabasePRADIP A. SARKATE, PROF. A.V.DEORANKAR6 |
1 | |
3 | A Rule Verification and Resolution Framework for Smart BuildingsJAYASHREE S. SOMANI, PROF. V. L. KOLHE7 |
1 | |
4 | Comparison of ICA Non-gaussianity Methods Using Performance Metrics as Correlation Coefficient, Average Execution Time and Computational SpeedSUPRIYA S. ANKUSHE, DR. DHARMPAL DOYE10 |
2 | |
5 | A Literature Survey on Adaptive and Effective Approach for Mobile Wireless Network with Dynamic Cluster Head SelectionVIDYA SHREE K.S, SHRADDHA C11 |
1 | |
6 | Artificial Intelligence in Predicting StrokeSUSHMITHA SURESH, D KHASIM VALI13 |
4 | |
7 | An Efficient Irrigation System with Environmental Data Analysis Using SVM TechniquesDR.M.RAMESHKUMAR, RAMYA.G,14 |
2 | |
8 | Smart Agriculture Monitoring Using Environmental Data Analysis of Support Vector Machines with Weather PredictionSATHYA RAMESH, A.N.KARTHIKEYAN15 |
2 | |
9 | Scalable and Protected Distribution of Delicate Fitness ProceedingsS.PUSHPAVALLI., P.KAMARAJAPANDIYAN25 |
1 | |
10 | An Overview of Security Techniques for Web ApplicationsFATIMA MULLA, VARSHAPRIYA J N26 |
1 | |
11 | Monitoring of Temperature and Humidity of Remote Place using Cloud ComputingMOHD.SADIM, DR. R. K.SHARMA27 |
1 | |
12 | BLE: BluePrint Finder through Android ApplicationSHASHIDHARA D, POORNIMA M32 |
1 | |
13 | Segmentation of Lung Region in CT ImageTHEJASWINI S. B, DR. NAVEENA C33 |
1 | |
14 | Ontological Information on Tumor Knowledge Management Using Text Mining TechniquesP. JYOTSNA, PROF. P. GOVINDARAJULU37 |
1 | |
15 | Network-based Spam Detection and Blocking Framework for Reviews in Online Social MediaHASNA MOHAMMED P. K, JITHA P. B40 |
1 | |
16 | PAPR Reduction of ODFM by using Shifting Null Subcarriers Among Data Subcarrier &Partial Transmit SequenceUDDHAV SHID, R.R.JAGTAP41 |
2 | |
17 | Development of OFDM based Cooperative Communication System for Mitigation of Effect of Carrier Frequency offsetANIL M. JADHAO, DR. ASHOK A. GHATOL44 |
1 | |
18 | Optimizing Handover with MIH in the New Generation Networks systemsSMKM ABBAS AHMAD, SYED UMAR, DR. VALASANI USHA SHREE45 |
2 | |
19 | With Insensitivity of Fuzzy C-Means improvising the SEP Routing ProtocolMD CHAN BASHA , SYED UMAR , SMKM ABBAS AHMAD , DR. VALASANI USHA SHREE46 |
1 | |
20 | Intelligent Realy Based Smart Mode Communications Over Mobile Adhoc NetworksA.ANJALI, M.KIRITHIKA DEVI48 |
1 | |
21 | A Review on Robust Image Transmission with OFDM over an AWGN ChannelYOGITAK. SOSE , PROF.S. P. AWARE49 |
1 | |
22 | Efficient File Resource Allocation Protocol for Lowest Average Query Delay in Mobile Adhoc NetworksD.MYNUDDIN, P. VASANTHI, DR. A.L. SRINIVASULU50 |
1 | |
23 | Classification of Sonar Images Using Neural Network Algorithm: A ReviewPALLAVI RAMAWATAR PARTANI, HEMANT M. BARADKAR52 |
3 | |
24 | The Internet of Things for Healthcare: Applications, Protocols, and SecurityDURGA KINGE, PROF. S.K.GAIKWAD53 |
1 | |
25 | Design of Low Power IC Clock TreeJAWAAZ AHMAD54 |
1 | |
26 | Dazzle Signature with Fractional Key Descriptor for Cloud ComputingGARIMA CHAUCHAN, PARUL KHULLAR55 |
1 | |
27 | A Survey on Protecting Virtualized Infrastructure in Cloud using Amplified Security TechniquesPRIYANKA, DEEPIKA GOYAL56 |
1 | |
28 | Review On Enhanced Counter Measure for Web Site Vulnerabilities with Amplified AlgorithmRASHMI, DEEPIKA GOYAL57 |
1 | |
29 | A Review on Attribute-Based Encryption based Integrity Auditing for Secure Outsourced Storage in CloudSALONI ATRE , MAYANK NAMDEV58 |
1 | |
30 | Monitoring and Controlling Of Poultry Farm Using IOTARCHANA M P, UMA S K, RAGHAVENDRA BABU T M60 |
6 | |
31 | A Review Paper on MERN Stack for Web DevelopmentPRAGATI BHARDWAJ, DR DINESH KUMAR67 |
2 | |
32 | Review on Document Clustering Using K-Means over HadoopMANISHA AGRAWAL, NISHA PANDEY68 |
1 | |
33 | Advanced Web Penetration Testing Using Kali LinuxSUBARNA PANDA, BOKOBRI LEKPELI KOISSY FRANCK OLIVIER70 |
1 | |
34 | Location Aware Query Suggestion Using Baseline and Partition Based AlgorithmsMANDURI SOMASEKHAR, A.CHANDRASEKHAR, J.RAGHUNATH71 |
3 | |
35 | Transaction Confirmation in Bitcoin BlockchainRAJANI KODAGALI, PROF.ANAND PASHUPATHIMATH72 |
2 | |
36 | Review on Accessible Shopping System for Blind and Visually Impaired IndividualsPRIYANKA KARANDE, PROF. JOGDAND S. V.73 |
1 | |
37 | Survey on Facial Expression Recognition and ApproachesANUPATHRA, RAJAKUMAR75 |
1 | |
38 | Intelligent Channel Aware Malicious Free Data Forwarding Scheme Over Wireless Sensor NetworksSHIPHRAH SHARON JAKKULA, T. SUNITHA76 |
1 | |
39 | Energy-Efficient Management In Cognitive Radio Sensor Networks With Quality-Based ActivationMARGAM SUMA, V. VIKAS77 |
2 | |
40 | An Anti-Phishing Framework Based On Visual CryptographyRAZEEM MUSTHAFA V, SUBARNA PANDA78 |
1 | |
41 | Brain Tumor Segmentation Using K-Means Clustering and Fuzzy C-Means Algorithms and Its Area Calculation and Disease Prediction Using Naive-Bayes AlgorithmSONALI MUKUND CHORE, KALPANA MALPE80 |
1 | |
42 | Text-Attentional Convolutional Neural Network for Scene Text DetectionANKITA WANKHADE, KALPANA MALPE81 |
1 | |
43 | A Hybrid Daubechies DWT based Approach for Multiple Image Video WatermarkingGARIMA BHARGAVA, ARUN JHAPATE84 |
1 | |
44 | Cloud Based Secure Document Sharing and Access Control for Corporate UserKANCHAN S. GAJGHATE, PROF. R. V. MANTE, DR. K. P.WAGH85 |
3 | |
45 | Performance Analysis of DOSN Based on Privacy Preserving and Information SharingNIKITA V. GHODPAGE, PROF. R. V. MANTE, DR. K. P. WAGH86 |
5 | |
46 | Sales Forecasting using Linear Regression and Support Vector MachinePINKI, SWATI GUPTA87 |
1 | |
47 | Diabetes Prediction using Linear Regression, Decision Tree & Least Square Support Vector MachineVAISHALI, NISHA PANDEY88 |
1 | |
48 | VANET based Self Adaptive Prioritized Traffic Signal ControlSHAIKH SHARIQUE AHMAD, PROF. HIRALAL SOLUNKE89 |
1 | |
49 | Analysis of Convex Hull's Algorithms and It's ApplicationRASHMI KULKARNI, BHAVANI K90 |
2 | |
50 | Creating Secrets Out of Packet ErasuresSHEETAL MODKE, PROF. PRADNYA KASTURE94 |
1 | |
51 | Enhancement Technique Use for Security of Digital Data in Mobile DevicesNITESH PATIL, AKSHAY KULTHE, KIRAN NAGARKAR , RUPESH SHINDE96 |
2 | |
52 | A Ranking Approach to Extracting Relevant Answer for QA SystemAJINKYA RAMCHANDRA UGALE, V.S WADNE97 |
1 | |
53 | Face Identification and Recognition Using Facial Skin MarksSUDHA MAGDUM, DR PRASHANT P. PATAVARDHAN98 |
1 | |
54 | Automation of Light and Water Control SystemSNEHAL SONAWANE, MANISH DHILE, SIDDHI KATTA, PROF.R.D.KOMATI8 |
1 | |
55 | Survey on Cloud Computing and Security IssuesRAJESWARI, VINITHA R, GREESHMA N9 |
3 | |
56 | An Efficient VLSI Architecture for Data Encryption Using AES Algorithm and Its FPGA ImplementationAKARSH B G, DARSHAN K S, DHEERAJ SHRIDHAR HARIKANT, GIRICHANDRA M TARIKERI, AKALPITA KULKARNI12 |
2 | |
57 | Hadoop MapReduce Authentication and PrivacyPRAJWAL.M.H , PUNEETH.H.V , SUKRUTH.R , CHETAN KASHYAP , RAGHAVENDRA BABU .T.M16 |
2 | |
58 | An Arduino Based Smart Meter for Demand Side Management of Electrical Load Using Real-Time Pricing.DR. JYOTI KOUJALAGI, NADEEM, FATHIMA SHIREEN17 |
1 | |
59 | Vital Parameter Monitoring for Health through IOT Using Biosensors and Medicine BoxRUCHI D. VYAWAHARE, PROF. S.P.TONDARE, PROF. DR. S.P. GAIKWAD20 |
1 | |
60 | Survey on an IOT Based Environment Monitoring System for Smart IndustriesMRUNALI PAWAR, PRAJAKTA WARGHADE, PROF. V.S. KARAMBELKAR21 |
2 | |
61 | Artificial Intelligence and Its Associated ApplicationsPRIYEN DANG, AKASH SONI, RAMESHWAREE KASAR, PRASIKA NAGVEKAR, SOHAM THAKAR, YASH SHAH22 |
1 | |
62 | IoT and GSM Based Smart Security SystemsHAREETA MALANI, SANTOSH YADAV28 |
1 | |
63 | Group Attendance Management System Using Face DetectionANJITHA GEEVARGHESE, DIVYA C, LEKSHMI SASEENDRAN, SHIFA SHAMSUDEEN, SITHU UBAID29 |
1 | |
64 | Medically E-Prescription Diagnosis IntegrationOMKAR MALWADKAR, VISHWAS LATKAR, SUHAS JAGDALE , SUYASH MULE, PROF. PRIYANKA KEDAR30 |
1 | |
65 | Health Related Prediction and Fraud Detection in Health Care System using Data MiningAPARNA KALASKAR, APARNA SHINDE, POOJA BALWADKAR, MAYA BRAMHANE, RESHMA PAWAR31 |
2 | |
66 | Smart Water Management Using PLC & SCADAPROF. MRUNALINI BHANDARKAR, PRANALI BHALEKAR, POONAM BORHADE, SAYALI CHAUDHARI34 |
1 | |
67 | Integration of Renewable Energy into Smart Power Supply System using Solar CellsPROF. MRUNALINI BHANDARKAR, KALYANI KADAM, NIKITA KADAM, SAURABH GANGALE35 |
1 | |
68 | AESC Technique for Scalable Face Image RetrievalKARCHE SONALI NANA, PROF. MULANI A.O.36 |
3 | |
69 | Smart RTO with Automated Tollbooth SystemSHUBHAM VYAVAHARE, NISHANT PARASKAR, DHIRAJ SARADE,VRUSHABH SONAVALE, PROF. JAGRUTI WAGH38 |
1 | |
70 | SMARTCRAWLER: An Efficient Approach to Find Deep-web Pages and Personalized Web SearchRATHOD PRADIP UTTAMRAO, DAWALE UDDHAV SADASHIV, KHEDEKAR PRIYANKA ASHOK, PROF.SUDAM G. PAWAR39 |
2 | |
71 | What's Up Doc: A Doctor Appointment Application System Using AndroidDHARANI KANTILAL PRAJAPATI42 |
1 | |
72 | State Management in Apache Apex using RocksDB incremental checkpointingAKASH JOSHI, AYUSHI JAIN, NEERAJ GOIDANI, PRANOTI BULAKH43 |
2 | |
73 | A Survey on Interactive Social Networking SystemGANGADHAR IMMADI, RONICA K.M, YOGITHA VARSHINEE J, RAMYA GOPALAN47 |
1 | |
74 | Lossless Image Compression Using Huffman Coding AlgorithmJYOTI A. PATIL, DIPALI M. LOHAR, PRACHI M. BADGUJAR, DIPMALA V. PATIL51 |
2 | |
75 | Identify the Deception of the Social Network to Investigate the Relationship between Dependence and Data Mining From Social NetworksTANVI HINGE, SHWETA JAMKHANDI, PROF.MAHENDRA SALUNKE59 |
1 | |
76 | Robust Sclera Recognition with Novel Hough Transform TechniqueDHANUSHA G. R, BHARATI C. BELAGALI, B. P. LIKHITHA, HARSHITHA M, MANJULA G61 |
3 | |
77 | An Approach for Secure Information Sharing Scheme in Mobile Cloud ComputingPRASHANTH S, BHARATH M, HARSHITHA GOWDA C L, AKSHATHA S R62 |
1 | |
78 | Smart Vertical Farm Using IOTABHISHEK A M, CHANDRAKANTH R, MAHESH C, MANOJ M MARIGIRI, RAMYA B K63 |
1 | |
79 | An Automated Car with Distance Sensor Using Raspberry PiAKSHAY C.S, ANUSH.J.KINI, G.PRAMUKH, PRASHANTH.S.PUJAR, PAVITRA BAI S64 |
2 | |
80 | VF-ATM Machine: Accepts Finger Prints, Voice Pin and OTP CodeHARSHAL DESHPANDE, BHAGYODAY TOKE, RAJESH DANGAT, ADITYA DABHADE, PROF.P.P.WAGHRALKAR65 |
1 | |
81 | Analysis of Stack Technology: a Case study of MEAN vs. MERN StackPRAGATI BHARDWAJ66 |
2 | |
82 | A Review on Malware Injection in Cloud ComputingROHIT K RAO, VASUDHA, SHRADDHA BHAT69 |
4 | |
83 | Emulation of BB84 Quantum Key Distribution AlgorithmNIHAL KAUL, HATIM CHATHIWALA, RISHABH SHUKLA, ABBASALI ANTELAWALA74 |
1 | |
84 | Sign to Speech Converter Gloves for Deaf and Dumb PeopleKOMAL VEDE, PRIYANKA VANJARE, PRADNYA GAIKWAD82 |
3 | |
85 | XBEE-RADIOBEE Electrical Appliance Control Network with ArduinoASHISH SURWASE, ASMITA GAVHANE, PROF. S.M.TONDARE83 |
1 | |
86 | Demo: Automated Line Following, Collision Avoiding Material Object Transporter with Facial Recognition and Audio Interface - Vision and BlueprintG.GAYATHRI, TUSAR KANTI MISHRA, RAMESH PALISETTI, ANITHA DEVI KAKI, AKHIL KANAKALA91 |
6 | |
87 | Human Action Recognition System for two Person Interaction using Edge Detection, Colour and Texture Features Classified using KNNRASHI GOYAL, NIKITA PATIL, MALVIKA JADHAV92 |
10 | |
88 | Detection and Prevention of Grayhole Attack by Using Reputation System in MANETAISHWARYA KUNDUR, CHAITALI PARHATE, MRUNALI CHOPADE, SAPNA RAYOU, UMESH TALWARE, JUBBER NADAF93 |
1 | |
89 | Automatic Lane Clearance System for Emergency VehiclesCHANNAGIRE NIKITA, DESHMUKH PALLAVI, DESHMUKH SHIVANI, SHARADA KORE95 |
3 | |
90 | IOT Based Home Security System Using Raspberry PiRUBY DINAKAR, DEEPTHI U SINGH, MIR MOHAMMED ABBAS, MIR RIYA ALEX, ABHISHEK YADAV101 |
1 | |
91 | Renewable Energy using smart Grid Embedded System in an Internet of ThingsGAURI RAUT, PROF. URMILA DESHMUKH102 |
1 | |
92 | A Time and Energy Consumption Efficient Routing Approach for Electric Vehicles in Real-World ConditionsSARIKA LAIPHRAKPAM, D. B. GOTHAWAL103 |
2 | |
93 | Unique Bio-identification for Home-Security on IoTVAIBHAV KALE, ROHIT KASHID, MEGHAN NAGVEKAR, BASWARAJ WALKE, PROF.G.M.GAIKWAD106 |
1 | |
94 | Detection and Classification of Abnormality in the Retinal ImagesRAGHAVENDRA RAVI TEJA, RAJAT P. RAYADURG, RAKSHITH S, DARSHAN K R108 |
4 | |
95 | Using Point Pattern Analysis Techniques to Describe Spatial Arrangement of Points in ImagesBARAA TAHA YASEEN, ZINAH MOHSIN ARKAH, REEM IBRAHIM HASAN, SEFER KURNAZ3 |
2 | |
96 | Opportunities and Challenges to Use ICT in Government School Education of NepalHEMANT DHITAL4 |
17 | |
97 | Brain Tumor Classification and Segmentation using PNN & FCM ClusteringSHILPA B. SANGHAVI, DR. R.J. SHELKE5 |
5 | |
98 | Grape Leaf Disease Detection Using SVM ClassifierSHWETA.S. KOTHAWALE, S.R.BARBADE , PRADNYA .P.MIRAJKAR18 |
8 | |
99 | Automatic Extraction of Policy Networks from Social Networks and SnippetJAYALAKSHMI.D, K.SASIKUMAR19 |
1 | |
100 | A Survey on Design and Implementation of Autonomous Vehicle Communication SystemASMITA KOLI23 |
1 | |
101 | An Intelligent IOT based Waste Dissociation and Monitoring SystemPRIYANKA K, RAGHAVENDRA BABU T M24 |
3 | |
102 | IACO-LB: A Navel Technique for Load Balancing in Cloud ComputingSHIVANI AGGARWAL, ER SUNIL AHUJA99 |
1 | |
103 | Survey on Edge Preserving Denoising FiltersJ. MERCY JEYA RANI100 |
1 | |
104 | A Case Study of Image Classification Based on Deep Learning Using TensorflowJUBIN DIPAKKUMAR KOTHARI101A |
3 | |
105 | Cloud Forensic Investigation using VM Snapshots and Log InformationNILIMA MITRAGOTRI, PROF M.A.NIRGUDE104 |
4 | |
106 | Extract, Refine and Visualise User Behaviour Analysis using Twitter by SVM in Big DataSEEMA FAGNA, SHWETA GAMBHIR105 |
1 | |
107 | Multi-Level Block Trunction Code Algorithm for Random Color ImageAJAY RANJAN, PROF. KAVITA KAMERIKAR107 |
2 | |
108 | Improving Performance of
Basic First Order Difference Operator as a Filter to Remove Base Line Wander
Noise in ECG
Imteyaz Ahmad |
4 | |
109 | Computer Simulation in Solving Chemical Problems of Chemistry Dr. Anil Kumar 109 |
3 |