International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|
S.No | Paper Title / Authors | Download Paper | Downloads |
---|---|---|---|
1 | Predicting Cancer Using Linear Regression and Naïve BayesPOOJA BHATI, DR. DINESH KUMAR3 |
4 | |
2 | Employee Management and Work Performance Measurement SystemPROF. P. M. MANE, ASHUTOSH DAS, ANIKET BIDKAR, DHANASHREE PISAL, SHRADDHA NAIK6 |
3 | |
3 | Protecting Virtualized Infrastructure in Cloud using Amplified Security TechniquesPRIYANKA, DEEPIKA GOYAL13 |
1 | |
4 | Deadline-aware Alternate Heuristic Technique for Cloud Task SchedulingHIMANI AGGARWAL, ER AMRITA CHAUDHARY14 |
2 | |
5 | Arduino Controlled Automated Writing Robotic ArmMILIND BAVISKAR, LAKSHMAN KORRA22 |
1 | |
6 | Unipath and Multipath Reactive Routing Protocol in MANET with Fixed Pause Time and Varying SpeedVANDANA VERMA, PROF. SHIVENDU DUBEY22A |
2 | |
7 | Document Clustering Using K-Means videHadoopMANISHA AGRAWAL, NISHA PANDEY23 |
1 | |
8 | Review of Fingerprint Recognition Methods and SystemREENA MITTAL, DEEPIKA ARORA24 |
2 | |
9 | Emotion Recognition from Hindi Speech SignalMEENAKSHI SINGH, PARUL KHULLAR26 |
1 | |
10 | Efficient Data Security by combination of Cryptography and SteganographyPUJA, DR. DINESH KUMAR27 |
1 | |
11 | Enhanced XSS/SQL Injection Techniques for Web Site Vulnerabilities with Amplified AlgorithmRASHMI, DEEPIKA GOYAL31 |
1 | |
12 | Implementation of Global Localization of Intelligent Vehicle in Lane Level via Lane Marking Detection and Shape RegistrationNIKITA.A.WADE, ABHIJEET. V. SHINDE43 |
1 | |
13 | Amplified Semantic Parsing of Open Street Map using KNNPOONAM DEVI, RACHNA46 |
1 | |
14 | A Review on Vehicular Ad Hoc Networks Their Applications and ProtocolsMAHAK GOEL, DEEPIKA ARORA48 |
1 | |
15 | SEO-Search Engines Optimizations for Web Pages Using Content Based RankingB.KARTHIKA., R.RATHI, G.SIVAKUMAR53 |
2 | |
16 | Analysis of Total Harmonic Distortion Using Neuro Fuzzy in Renewable Energy SystemsVINOTHINI54 |
1 | |
17 | An Overview on Paddy Crops Ailments Detection and Prevention Utilizing Image ProcessingPROF. B.H. PANSAMBAL, SNEHA J. SONTATE58 |
1 | |
18 | A Survey Paper on Quality Assessment On Blind Video Integrity OracleJYOTI GOVINDRAO SURYAWANSHI, DR. S.F.SAYYAD59A |
1 | |
19 | Secure Data Sharing for Mobile Cloud Using A Trivial Sharing MethodMUKUNTHAN B, M G DINESH63 |
1 | |
20 | A Survey on Blind Spot Detection System Using Vision Sensor and Deep Learning AlgorithmN KUNAN, FAIZ HABEEB K, N TUTURAJA64 |
1 | |
21 | Isolation-Preserving Key for Range QueriesT.ABILASHA., K.CHANDRAMOHAN, DR. R.UMAMAHESHWARI67 |
1 | |
22 | Ad-Hoc Method for Social Data Collection Using FoursquareSHAMEENA V, SENTILKUMAR68 |
4 | |
23 | Data Transfer through Secured Routing Model in WSNAISWARYA P.S, MS.K.SINDHUJA72 |
1 | |
24 | Secured Data Transfer Cloud Encrypted Outsourced Data with Accurateness EnhancementMISHA MATHEW , MS.S.BRINDHA73 |
1 | |
25 | Image Re Rank In User Clicks And Future SearchSUDHISHNA K.S, MR.S.SENTHIL PRABHU74 |
3 | |
26 | Machine Learning Model for Human Activity Recognition by Smartphone DatasetKHUSHBU DEWANGAN, ABHISHEK KUMAR DEWANGAN75 |
2 | |
27 | Analysis of Machine Learning Techniques for Intrusion DetectionANJUM KHAN, ANJANA NIGAM76 |
1 | |
28 | Improving Web Search by Analysing Various FacetsGUNJAN H. DESHMUKH, GOVINDA BORSE82 |
1 | |
29 | Reactive Routing Protocols under V2V Communication in VANETsSNEHA AWASTHI, PROF. SHIVENDU DUBEY85A |
2 | |
30 | A Survey on Entity Extraction from the Web Pages Methodology and ApplicationK.B.ANUSHA87 |
3 | |
31 | Finding Top-k competitors using Differential EvaluationRANI R. RAUT, PROF. R. V. MANTE, DR. K. P. WAGH88 |
3 | |
32 | Keyword Aware Representative Travel Route Recommendation with Places of InterestPUJA P. PATIL, PROF. RAVI V. MANTE, DR.K. P. WAGH89 |
3 | |
33 | An Ameliorated Methodology of Implementing Task Scheduler on a Multi Core ProcessorSAVITHA P, VARUNISH P, GEETA S N91 |
2 | |
34 | Detecting Spam Comments Using Spam Word Dictionary and NLP TechniqueROHINI D. WARKAR, PROF.I.R. SHAIKH97 |
1 | |
35 | EM-CURE Algorithm for DDOS Attack DetectionPRIANKA P. NARODE, PROF.I.R.SHAIKH98 |
1 | |
36 | Review on Map and Reduced based Semantic Parsing of Open Street Map using KNNPOONAM DEVI, RACHNA99 |
1 | |
37 | Co-Extracting Opinion Words and Opinion Targets from Online Reviews by Topic RelationDIPALI SATAV, SHAILAJA JADHAV100 |
1 | |
38 | Implementation of Phase Shifted Semi-Bridgeless PFC ConverterDIGAMBAR SUTAR101 |
2 | |
39 | Single Phase Grid-Connected Inverter for PV System with MPPTNIKHITA KADAM, PROF. A. P. KINGE103 |
2 | |
40 | Survey on Various 3D Brain Image Reconstruction Methods based on MRIVIDHYA K, DR. MALA C PATIL104 |
1 | |
41 | Implementation of Cloud based Image Scaling and Cropping using Modified Paillier CryptosystemNEHA TAYADE, P.M. CHOURAGADE105 |
1 | |
42 | A Survey on Deep Learning Approaches in HealthcareAMIT S. WALE, PROF. SHILPA S. SONAWANI106 |
1 | |
43 | A Survey on Routing Protocols of Internet of ThingsGAURI S. RAPATE, DR. N C NAVEEN107 |
4 | |
44 | Technique for Secured Search on Encrypted Information based on Similarity Join QueriesSHITAL P. PATIL, PROF. P. B. MALI108 |
1 | |
45 | A Survey on Geo Social Media Data Analysis for Product ReviewNITHIN N V, PROF. GEORGE PHILIP C110 |
1 | |
46 | Providing Protection on Cloud Video Surveillance Using Blowfish AlgorithmSWATI SURYAWANSHI , VAISHALI KOLHE111 |
1 | |
47 | Cluster Data using Various Clustering AlgorithmsMAYURI K. BOTRE, DR.KAILASH SHAW113 |
2 | |
48 | Optimized Transit Alert System with Real Time DataPRABHAKAR BHOSALE, PROF. M.S. OTARI114 |
1 | |
49 | An Effective Algorithm & Comparison of Various Techniques using J48 ClassifierSHIVA SHARMA, U. DATTA115 |
1 | |
50 | Enhancement of Voice Technology over Ad-Hoc Network (MANET)DOLLY SHARMA, NISHA PANDEY116 |
1 | |
51 | Investigation for LTE and WLAN Conjunction in NS3MANJULA R, HEMANTH KUMAR A R120 |
2 | |
52 | Enhanced Scheme for Mitigating Jamming Attacks in MANETsMADHVI, NISHA PANDEY121 |
1 | |
53 | Compact and High Speed Hardware Implementation of CLEFIAPANKAJ V. JADHAV, VISHNU SURYAWANSHI122 |
1 | |
54 | Survey on Various Unsupervised Learning Techniques for Anomaly DetectionASHWINI ATHAWALE, MRS. DEEPALI M. GOHIL124 |
1 | |
55 | Travel Sequence Recommendation by Mining User Social Interest and Travelogs DataKISHORI P. THAKARE , HIRALAL B. SALUNKHE126 |
1 | |
56 | Two Phase Neural Network Model for Weather Forecast Along-with Logistic and Linear RegressionANIL KUMAR, PRAVEEN SHARMA127 |
1 | |
57 | Speech Enhancement System using FIR FilterNAGESH B. KALE, R. R. HARNE128 |
1 | |
58 | Survey on IOT based Home Automation System using ATMEGA 48 MicrocontrollerAMITH P S, APOORVA T, GOVINDARAJU H V2 |
1 | |
59 | E-Learning by Using Gamification and Job AssistMINAKSHI MULIK, ADITI PATIL, SNEHAL SURYAVANSHI, VIRAJ NIMBALKAR ,VARSHA DANGE4 |
2 | |
60 | Seeker's Satisfaction in Community QA SystemHARSHAL SHASHIKANT ANANDAS, KHAN MUBASSHIRA NOORMOHAMMED, SANYUKTA SATISH NIRMAL, NILAMBARI RAHUL PARDESHI.5 |
1 | |
61 | Game Theoretic Study on Channel-Based Authentication in MIMO SystemsPROF. JYOTI RAGHATWAN, ALKA TAUR,7 |
1 | |
62 | Use of SDN for Detecting and Mitigating Link Flooding AttackPROF. KANCHAN VARPE, KOMAL KHANDALE9 |
1 | |
63 | Privacy Protection in Healthcare System and avoidance Intrusion Detection based CloudletKAVITA V. DUBEY, PROF.VINA M. LOMTE10 |
1 | |
64 | Smart Public Transport System Using Android ApplicationAMRUTA SHETE, ANJALI KAPARE, KSHITIJA SALKE, SUCHITA BHOSALE, HEMANT SHINDE11 |
3 | |
65 | Cloud Based CMIS with Offline SynchronizationREKHA M, BHARATHI K, CYNTHIA A, NOORUN NAZIRA12 |
1 | |
66 | Helmet and Triple Riding Detection on Motorcyclists using Image ProcessingPRADEEP MAIYA, SHARATH KUMAR R, SHREYAS P V, VISHWA PRAKASH H V, POORNIMA M16 |
3 | |
67 | An Implementation of Smart Attendance System Based on Face Recognition Using Android ApplicationARTI DONGARE, ICHHA GILBILE, POOJA TEKAWADE, AMITSINGH THAKUR, A.D.SAWANT17 |
1 | |
68 | Authority Identification Using KeystrokeSHREENAND SADANAND TAMHANKAR, SANKET GULABRAO JAMBHULKAR, ANIKET NURIYA RATHOD , PRAJAKTA ANANT SHELAR , ANIKET GAUTAM GAIKWAD, PROF. G.S.KOTHAWALE, R.T.WAGHMODE18 |
4 | |
69 | Online Service for Engineering Project Title Verification Based on Content AnalysisSHUBHAM PODHADE, SAILY DEORE, MOHINI PANDEY, PADMANABH SAOJI, PROF M. L. BANGARE19 |
3 | |
70 | Trust and Reliability Control by Continuous Auditing: Ensuring Cloud SecurityNAGORAV KOLHE, HARSHAD KHANEKAR, VISHAL JAWADWAR, PRIYANKA DHERE, PROF. MOHOLKAR K.P.25 |
1 | |
71 | Smart Ration Card SystemAISHAWARYA VARPE, SONAWANE SHRADDHA, WALAKE NIKITA, B.R.BAVISKAR28 |
1 | |
72 | Vehicle Repair and Puncture Service AppANKIT CHOUDHARI, BALU GOBADE, AKSHAY KHATALE, ANAND NARNAWARE, PROF. S.B. JADHAV29 |
3 | |
73 | Autonomous RC Car Using Neural Network and Deep LearningHIMANSHU SHARMA, MRIDUL CHAUDHARY, NITESH MANJWANI, RUCHI KULKARNI, AMITA JAJOO30 |
3 | |
74 | Health Care System Using Qr-Code StrategyPRADIP SHEWALE, KARAN JAVERI, PIYUSH GANDHI, MOHAMMADJAID INAMDAR, RIYAJ MUJAWAR32 |
3 | |
75 | Brain Tumor Detection and ClassificationSASNA M.S, AMRIN SHEIK UMMER, JOEL K.J, RAMEESA M.A, BINISH M.C33 |
2 | |
76 | Production Improvement using Predictive PlanningPRATIK BURHADE, AMAN KHADE, DEVENDRA GAIKWAD, SHARVARI JIWANE, SUSHILA AGHAV34 |
4 | |
77 | Smart Attendance System using face detection On Raspberry piVISHAL D. BIKKAD, PROF.DR.S.B.SONKAMBLE, SNEHAL A.MANE, SURABHI S. SARADA35 |
2 | |
78 | Solar Powered Non-Invasive Pulse Oximeter and Heart Rate MeterSRUSHTI CHAVAN, PRARTHANA GADEKAR, MANJUNATH PATIL, S.P. TONDARE, S.P. GAIKWAD36 |
2 | |
79 | Solving Student Migration Issues in InterstateFORTUNE SINGH BISTA, TEJASVI GOEL, MANISHA GUNJAL, AISHWARYA MUNDHE, S. J. PATIL37 |
2 | |
80 | Plant Disease Detection Using Image Processing (Rural Development)PRASAD C. SHINDE, PANKAJ NEVASE, SWAPNIL INGOLE, PROF. U. C. PATKAR38 |
1 | |
81 | Efficient Diagnosis of Breast Cancer PatientsMUKTAI ITANKAR, VAISHNAVI BANDEWAR, NIKITA DESARDA, ANTARA DARBESHWAR39 |
1 | |
82 | An Implementation on Securing Aggregate Queries for DNA DatabasesAKSHAY BHARAM, ASHUTOSH TEKNUR, PROF. SHAILAJA JADHAV, SHUBHAM SHINDE, SANKET WANKHEDE40 |
1 | |
83 | Implementation Paper on Rain Water Drain out Machine from Pit or BasementSNEHAL JADHAV, RUPALI NAVALE, SENHA PATHAK, TRIVENI THIKEKAR, PROF. K.B KUNTE41 |
1 | |
84 | Two Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy PreservingAMIT DEORE, SURAJSINGH MALAS, VAIBHAV PAWDE, PROF. ILA SAVANT42 |
2 | |
85 | Privacy-Preserving Multi-Keyword Similarity Search Over Encrypted DataSHUBHANGI J. WAGH, AISHWARYA G. PATIL, ARPITA D. PATIL , PALLAVI G. PATIL44 |
2 | |
86 | Random Forest -A Machine Learning Algorithm to Predict Number of bicycles in Bicycle Rental SystemHARISH MANGHNANI, MINAL VANAGE, AKSHATA NAIK, SHALINI WANKHEDE45 |
2 | |
87 | Smart Public Transport Using IOT TechnologyRAHIL KHAN, FAISAL KHAN, GAURAV PINGALE, ADVAIT KHUTWAD47 |
2 | |
88 | Type III Digital Compensator Design for Buck ConverterSHREYAS R H, VISHRUTHA G, SHUBHA RAO K49 |
2 | |
89 | Feasibility of Using Machine Learning to Access Control on non-Educational LinksSHAHENSHAHA MUJAWAR, BHAUSAHEB MORE, PIRSAHAB TANDEL, PROF .PRASHANT ABHONKAR50 |
1 | |
90 | Secure De Duplication over the Cloud Environment Using Multi Authority Attribute Based EncryptionVINA M LOMTE, ASHLESHA D GAIKWAD52 |
1 | |
91 | Implementing Collaborative Filtering Approach in Online Event Recommendation SystemROHAN KATARIYA, V KRISHNA MOHAN, SHUBHAM SURYAWANSHI, RUTURAJ DHANESHWAR, GEETHA CHILLARGE55 |
1 | |
92 | NaturalJava: An Efficient Interface for Interpreting Natural Language into Java CodeASHWINI G. BARI, MOHIT L. PATIL, GAYATRI V. GAIKWAD, SUSHIL D. KARANDIKAR56 |
1 | |
93 | Two-Factor Data Security Protection Mechanism for Cloud Storage SystemDEEPAK KUMBHAR, VIJAYA KADAM, PALLAVI KADAM, VARSHA SHINDE, NAVNATH BAGAL57 |
1 | |
94 | Inference Attack on Users Browsing History with Friend Recommendation System in TwitterSWATI KAMBLE, DHANASHREE PHALKE60 |
1 | |
95 | Providing Secure Healthcare System on CloudKOMAL PANGARE, APOORVA KUKADE, RUTUJA MANE, PROF. MADHURA SANAP61 |
1 | |
96 | High- Resolution Latent Fingerprint Time Series for Short- and Long-Term Print Age EstimationPRIYANKA S. NIKAM, NEETA A. DESHPANDE62 |
4 | |
97 | Mining Facets for Queries from Their Search ResultsPROF. P.M.GORE, PRATHMESH KADAM, GAURAV PATIL, RAVI KHARAT, AMOL MORE65 |
1 | |
98 | Two-Factor Data Security Protection Mechanism for Cloud Storage SystemONKAR DEHANE, SUPRIYA SANAP, PARVATI MOHITE, POOJA SUTAR, POOJA VENGURLEKAR66 |
1 | |
99 | Active Trust Secure and Trustable Routing in Wireless Ad-hoc NetworksT.ARIVANANTHAM, RAHUL KARMORE, NIKITA SATKAR, PRIYANKA GHADGE, KARISHMA SHETE69 |
5 | |
100 | Confidential and Essential Two-Cloud Secure Database for Numeric-Related SQL Range QueriesPROFESSOR, M.E.SANAP, KOMAL BHUJBAL, SHITAL GADEKAR , NITIN GAIKWAD , SHUBHAM GHODKE70 |
1 | |
101 | Traffic Management System Using QR CodeNIKHIL ANKAM, POOJA KUMARI, NIDHI KUMARI, DYNANESHWARI BHALSHANKAR, PROF.H.M. KUTE71 |
1 | |
102 | Controlling of Welding Fixture using PLCMAYUR P. KHARAD, ABHIJEET A. CHAVAN, AKSHAY T. JAIWAL77 |
2 | |
103 | Similarity Based and Transfer Learning Based Data Fusion Using ClassifierYOGESH SHINDE, NIKHIL GHULE, RUBINA SHAIKH, PROF. ASHISH RAMDASI78 |
1 | |
104 | An Efficient Way of Clearing the Garbage System Using Wireless SensorsKEERTHANA M, KOKILA S, KANAKAMBIKA RG, M S SHOBA, DR. JITTENDRANATH MUNGARA79 |
1 | |
105 | Solar Tracking with Temp. & VTG MeterJYOTI PATIL, AVANTI KUNALE, NIKITA PATIL, PROF.C.M.BUKEY80 |
1 | |
106 | Energy Efficient Network Encoding By Creating Secrets of Packet Erasure Using Network Node Is Jamming RandomlyRUPALI TONAPE, NEHA NHAYADE, KIRTI DALVI, GULSHAN SINGH, TRUPTI DANGE81 |
1 | |
107 | Enhancing Cosmetic Products Quality Using MRF and K-MeansPRACHI KUNJIR, MADHURA ARGADE, DURGESHWARI RANE83 |
1 | |
108 | Data Acquisition from Heart through Wireless TelemetryMAMTA, MOHINI PANDEY, PRERNA BISEN, S.P. TONDARE, DR. S.P.GAIKWAD84 |
2 | |
109 | Plant Leaf Disease Detection Based on Image Processing Using MATLABRASHMI SOLLAPURE, LAXMI KARADIGUDDI, PRIYANKA HANASI, SOUMYA DADDI, PROF.BHARATI KALE85 |
2 | |
110 | Spatial Reusability-Aware Routing in Multi -Hop Wireless NetworksIRANNA M , KALPANA C, NETRAVATI J, ARAVIND P, BHARATI K86 |
3 | |
111 | Microcontroller Based Library Books Location Searching SystemPRIYANKA MANE, MINHAJ MOMIN, BHAGYASHRI MANDE, PROF.S.M.TONDARE90 |
2 | |
112 | A Survey and Analysis of Reliable Data Packet Delivery Ratio in Wireless Sensor NetworkR.RAJKUMAR, SUNDARAMURTHY.B92 |
1 | |
113 | Cyber Security Methods for Vehicle Networks Challenges and Solution Using UAVs NetworksMURUGESAN S, DR. NITHYA, R.BHARANIDHARAN93 |
1 | |
114 | Big Data Vertical Grouping Attributes Dynamic Load-Balancing Using BluemixAGILASRI.A, DR. NITHYA, M.ANNAMALAI, MURUGESAN S,94 |
1 | |
115 | Improvement of Direction Decision Algorithm based on Bird's Eye View Transform for Self-Driving CarsHYEON-SEOK JEONG, SEOK-HO IM1HYEON-JU YOON95 |
1 | |
116 | Smart Shoes: A Safe Future for the BlindSHLESHA KHURSADE, MALAVIKA KARUNAN, IBTISAM SAYYAD, SALONI MOHANTY, PROF. B.B. GITE96 |
2 | |
117 | Data Security Scheme: Share and Audit Our Data into Cloud using EncryptionASHVINI JANGAM, PROF. NILESH SABLE102 |
1 | |
118 | Wireless Fetal Heartrate Monitoring SystemYATEEN RAJE, AKSHITA BAJPAI , SHINOO SWAPNIL , PROF. A. R. PATIL , PROF. HARSHADA MHETRE109 |
3 | |
119 | Swasth Suvidha: An IOT Based Health Monitoring SystemSANKET MHATRE, AKASH PATIL, YOHANTH SHETTY, SAMEER UDGIRKAR112 |
3 | |
120 | Feature Learning and Collaborative Tagging Using Non-Personalized Social Media Images and TagsPRIYANKA S. PADWAL, DR. NEETA A. DESHPANDE117 |
3 | |
121 | A Advanced Approach to Construct E-Learning QA SystemSHUBHANGI SURESH PAWAR, PROF.R.H.KULKARNI.118 |
1 | |
122 | 3D Perspective View for Cinema SeatSAGAR A. NANGARE, CHETNA ACHAR123 |
1 |