International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.625 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.625 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|

Volume-5  issue-9 September   2017


S.No Paper Title / Authors Download Paper Downloads
1

Smart Waste Collection System based on IoT (Internet of Things)

SHASHANK SHUKLA, DR. NEERAJ SHUKLA
2
2

Adaptive Image Registration Based Nonuniformity Correction Algorithm for Image Filtration

SHWETA WANMALI, PROF. R.U. SHEKOKAR
1
3

An Investigation of Constructivism and Cognitive Load Theory for Computer Programming Tool

PAYAL GOHEL, DR. KISHOR ATKOTIYA
1
4

A Survey on Datamining Based Intrusion Detection System

B.GAYATHRI, DR. ANTONY SELVADOSS THANAMANI
1
5

Revocation Methodologies Using Cloud Security

D. DEEPIKA, DR. ANTONY SELVADOSS THANAMANI
1
6

Overview of Association Rule Based on Pattern Mining

K.DHARANI, DR.ANTONY SELVADOSS THANAMANI
1
7

Threshold Based Efficient Data Transmission in Hybrid Wireless Networks

N.SAMUNDEESWARI, DR.S. KUMARAVEL, M.NAMASIVAYAM
8
8

Detecting and Preventing Distrustful URL in Multimedia Network

R.RAJASEKAR, N.SURESH
2
9

Ant Based Routing and QoS Effective Data Collection for Mobile Wireless Sensor Network

L.POONGODI, DR.M.NAMASIVAYAM
6
10

A Secure Message Exchange and Anti-Jamming Mechanism in MANET

K.SRIMUNIRATHINAM, DR.S. KUMARAVEL, M.NAMASIVAYAM
6
11

Ant-Based On-Demand Clustering Routing Protocol for Mobile Ad Hoc Networks

Y.P.BALAGANESH, N.SURESH
1
12

A Study on Security Aspects of Grid and Cloud Computing

DR. RANJIT D. PATIL, SUJATA P. PATIL, VIDYA H. BANKAR
2
13

An Exploratory Study of Wi-Fi Security: Wireless Network Encryption

SATYAWAN KUNJIR, YOGESH INGALE, SATISHKUMAR MULGI, RUSHI DURGE, RUSHIKESH KULKARNI
3
14

Design an Access Control Scheme for the WBANs Using the Given Signcryption

S.SANTHIYA, N.SATHEESKUMAR
1
15

User Authentication and File Encryption Technique for achieving high Cloud Computing Security

SANDEEP KUMAR PANDEY, SUJEET KUMAR TIWARI
1
16

Simulation of Cloud Computing Environment and Evaluation of Resource Provisioning Algorithm

RAJENDRA SONI, SUJEET KUMAR TIWARI
2
17

Recognize Privacy and Ethical Sensitivity Knowledge by Hiding Inference

GOKULAN.S, SRIDHAR.D MCA., M.PHIL
2
18

Recommending Learning Path of Student using Machine Learning

PRITI B. JADHAV, DR. R. B. INGLE
1
19

Intelligent Theme Based Integration of Medical Cases

MANGESH MALI, DR. PARAG KULKARNI, PROF. VIRENDRA BAGADE
1
20

A Survey Methods in Adaptive Background Subtraction in Images

NEHA SAKPAL, MANOJ SABNIS
3
21

Efficient Consumer Load Management by IOT Technique

ANAND S MELINAMANE
1
22

Performance Analysis of MIMO Detection under Imperfect CSI

PRAGYA VYAS, SHASHANK MANE
2
23

Implementation of Context Aware Vehicular Handover Algorithm for Service Continuity in Heterogeneous Wireless Network

SHWETA A. RAMTEKE, PROF. H. A. BHUTE
1
24

Design of Targeted Advertising for Location Based Services and User Profile Based Recommendation

NILIMA B.UMATE, PROF . V.G. BHUJADE
7
25

Word Matching and Tweet Recognition for User Tracking

MRUNALI OMPRAKASH THAKARE, PROF. MRUDULA NIMBARTE
1
26

Comparative Study of Clustering Algorithms: Filtered Clustering and K-Means Cluttering Algorithm Using WEKA

G.THANGARAJU, J.UMARANI, DR.V.POONGODI
3
27

Sentiment Analysis using Ensemble Classifier

KAUSHIK HANDE
3
28

Review of Phishing attacks and Anti Phishing Tools

DEEPASHREE K. MEHENDALE, RESHMA S. MASUREKAR, NEETA TAKAWALE, SHIBANI KULKARNI
6
29

Reviewing Sentiment Analysis and Opinion Mining of Social Media

SHEENU CHOUDHARY, ER. DIPIKA ARORA
2
30

A Study on Virtual Assistant in Artificial Intelligence

NEETA TAKAWALE, SHIBANI KULKARNI, DEEPASHREE MEHENDALE, RESHMA MASUREKAR, SHWETA AGARWAL
4
31

Detection and Prevention of Grayhole, Blackhole and Wormhole Attacks in MANET Using IIRD

AMANDEEP KAUR GREWAL, ER. GURPREET SINGH
1
32

A Survey on Intrusion Detection Techniques

DR.V.PRAVEENA, M.SHOWMYAA, B.SATHYA
5
33

Internet on Things Based Farm Watering System

PUNAM WARKE
3
34

Enhancing Power Quality to Sensitive Loads with Microgrid Using Fuzzy Logic Controller

NARASIM REDDY, P. SAIKUMAR
2
35

Dynamic Proof of Storage Deduplication for Multi-User Environments

M.MRUDHULA, M.V MANIKANTH
1
36

Implementation of a More Secure Public Cloud Service

YASH DHOLAKIA, SIDDHI KATE, SIDDHESH INAMDAR
2
37

Simulation Software Selection using Principal Component Analysis

DR. ASHU GUPTA
1
38

Comparative Analysis of Wavelet Transform Functions in Image Forgery Detection

MANJIMA MISHRA, DR.PREETI RAI
1
39

Active RFID and MQTT based Child Health Monitoring system

ANAHITA.G, ADITHYA KRISHNAN.G.R, JAGANNATH.S.S.V, LAVANYA SAI NARAYANAN
2
40

Smart Home Using Bluetooth Low Energy

AAYUSHI KOTHARI, ANAR PANDYA
1
41

A Survey of Spectrum Sensing Procedures in Cognitive Radio Network

S.GAYATHRI PRIYA, DR. K.THILAGAM
1
42

Scaling Factor Analysis of Snowfall Region in Aerial View Based On DBscan Algorithm or Data Clustering Algorithm

M.MAYILVAGANAN, R.MANICKAM
1
43

Granulated Efficient Access Control for Tracery-Based Using Two-Factor Authentication in Cloud Computing

KASA DEEPA, J.RAGHUNATH, T.RAMAMOHAN
1
44

Hashing and Enriching Short Texts Query Search Engine through Semantic Signals

PANDITI SANTHI, M.VENKATESH NAIK
1
45

CA-Cellular Automa for Increase the Network Life Time Using Energy Aware Protocol in WSN

A.SHARMILA, S.SIVAKUMAR
2
46

Vision Based Human Computer Interaction Using Fingertip Tracking

SUBHASH NEVHAL
6
47

A Study on Opportunity and Challenges of Ecommerce

MALATI V. TRIBHUWAN, ASHWINI SATKAR, ASHWINI PATIL, ROHINI BHOWARE
11
48

Segmenting Metals in Optical Microstructure Images using Haar Features

K. GAJALAKSHMI, S. PALANIVEL, S.SARAVANAN
5
49

Collision Free Packet Transmission for Localization

DR. V.VIJAYADEEPA, A. GEETHA
3
50

Regression Model to Estimate Goals Scored By Football Players

NEEL NIRAJ PATEL, MOHANRAAM S
1
51

A Survey on Efficient Multicast Routing Over Secured Packet Maintenance in Wireless Networks

RAJKUMAR KALIMUTHU
3
52

A Survey on Medically E-Prescription and Diagnosis Integration (MEDI)

OMKAR MALWADKAR, SUHAS JAGDALE, VISHWAS LATKAR, YASH MADIKUNT, PRIYANKA KEDAR
1
53

Efficient Cloud Storage System with Highly Scalable and Security for Big File

H. BINDU MADHAVI, R.SARAVANAN
1
54

Remotely Sensed Image Approximation Using Tetrolet Transform

SONALI SHANTARAM BANDAL, PROF. KALPANA AMRUTKAR
1
55

Design and Analysis of a Novel СPW Fractal Ultra Wideband Monopole Antenna

ASHU PRIYA, PROF. GAURAV MORGHARE
1
56

Weather Forecasting using Map-Reduce

B.ANURAG, MANOJ PRAKASH, VAKEESH KANNA, PELASH CHOUDHARY
3
57

Positioning of Wi-Fi Access Points for Optimum Coverage of Campus Wide Network

ANANT GAVALI, DR.RAMBABU VATTI, SHRADDHA GUPTE
3
58

Parking Detection System Using IoT

SWAPNA S. DESHPANDE, PROF. RENUKA S. GOUND
1
59

Sharing Secure Data and Self-Destructing Scheme in Cloud

MOHAMMADI KAMPLEE, PROF B.R. SOLUNKE
1
60

An Approach to Identify Credit Card Frauds through Support Vector Machine using Kernel Trick

ER. RITIKA WADHWA, ER. RITIKA MEHRA
1
61

Android Shopping App using Augmented Reality

APURVA SHINDE
1
62

Spelling Error Detection and Correction System for Punjabi Unicode using Hybrid Approach

RUPINDER KAUR, ER. JASDEEP SINGH MANN
2
63

IoT- An Implementation of Top Technology Trends

VEMURI SREE REKHA, DR.R.PADMAVATHY
1
64

Secrete Data Hiding In H.264/AVC 32 Compressed Video Bitstreams for Private Data Protection

BHAGYASHRI RAUT, PROF.V.B.RASKAR
1
65

Android Based Smart Toll System Using QR Code

MACHINDRAVETAL, PRAVIN GORE, NIKHIL PATIL, KIRANSAPATE, MANISHA SINGH
1
66

Android Based Travel Route Recommendation Using Real Time Positioning

PROF. P. R. KULKARNI, POONAM P. SHINDE, SNEHAL R. SONAWANE, ROHINI S. KOR, PRIYANKA S. KHATALE
1
67

A Survey on E-learning by Using Gamification and Job Assist

MINAKSHI MULIK, ADITI PATIL, SNEHAL SURYAVANSHI, VIRAJ NIMBALKAR, VARSHA DANGE
1
68

A Survey on Data Analytics, Predictions and Visualization of Crime Patterns in India

SHIVAM S. BHIRUD, SHRAVANI S. SWAMI, SHEKHAR S. PATIL, JYOTI SHARMA, SHITAL V. DABHADE
2
69

Survey on Various Data Encryption Algorithms Used in Cloud Security

S.SANDHYA , U.RESHMA, DR.V.PRAVEENA
6
70

A Survey on IoT based Intelligent Fire Escape System

HANISH SHETTY, YASH DHOLAKIA, KAUSTUBH DESHMUKH, AKSHAY CHILE
1
71

Designing Efficient Ontologies for Organization Development

DR. ABRAR S. ALVI
1
72

Dynamic Virtual Machine Consolidation in Cloud Data Centers: A Study

TALVINDER SINGH, VARUN JAIN, SATISH BABU G, AMIT KUMAR
1
73

Energy Harvesting Medium Access Control in Quality of Service with Wireless Body Area Network

AGILLA.R, K.BASKAR, C.RADHAKRISHNAN, S.SATHEESH KUMAR
1
74

Publicly Verifiable Boolean Query Over Outsourced Encrypted Data- Review

A.ANUSHA PRIYA, S.RANJANI
1
75

An Exploratory Study of Magento and its Features

RUSHI DURGE, TRUPTI KULKARNI, URMILA KADAM, VANDANA NEMANE , RAHUL GAVHNE
3
76

Audio Watermarking Based Data Cryptography

SWEETY KUMARI, PRINCY PATHAK
1
77

Medical Disease Classification by Machine Learning with Cloud Computing

NINDIYA MAHAJAN, GURJEET KAUR
1
78

Survey on Authentications Issues in Cloud Computing

VATSALA TAMRAKAR, PROF. RAJENDRA ARAKH, PROF. SUMIT NEMA
6
79

An Exclusive Survey on Big Data Analytics, Applications and Tools

RENU DWIVEDI, PROF. SATPAL SINGH, PROF. SUMIT NEMA
1
80

A Survey Paper on Data Privacy in Cloud Computing

NIVEDITA TAMRAKAR, PROF. RAJENDRA ARAKH, PROF. SUMIT NEMA
3
81

A Survey of Intrusion Detection Systems in Cloud Computing

KIRTI RAMHARIYA, PROF. SOUMYA ASATI, PROF. SUMIT NEMA
2
82

Review Paper of Digital Image Watermarking using Discrete Wavelet Transform

VIPIN KUMAR, PROF. ANSHUL BHATIA
2
83

Diagnosis of Fatigue using Deep Learning Method

S. Vigneswaran, K. Vinothkumar
2