International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.625 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.625 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|

Volume-6  issue-12 December   2018


S.No Paper Title / Authors Download Paper Downloads
1

A Review on Image based Indian Sign Language Recognition

RAVI PATEL
9
2

A Survey on Digital Forensics to Address Big Data Challenges

RADHA DHEKANE
1
3

A Web-Based Online Auction System: A Survey

MANASI BHAMARE, ARATI CHAME, GAURAV MORE, PROF. AMOL RINDHE
1
4

Biometric Door Lock System Using MQTT Protocol

HINGOLIKAR SMITA CHANDULAL, PATANGE A.D
2
5

Survey on ABS Supporting Secure Deduplication of Encrypted Data in Cloud

PRIYANKA BHOSALE, PROF. S. H. PATIL
1
6

A Review Paper on Voice Assisted Text Reading and Google Home Smart Socket Control System for Visually Impaired Persons Using Raspberry Pi

CHAITALI HANDE, PROF. VIJAY WADHANKAR
3
7

Detection and Identification of Artificially Ripened Fruits using MATLAB

SWATI KHANDARKAR, PROF. VIJAY WADHANKAR
2
8

A Survey on Novel Approach for Multi-Authority Attribute-Based Encryption for Data Security

VIKRAMSINH RAJENDRA GHATGE, PRASHANT M. MANE
1
9

Data Mining: A Study on Various Applications and Techniques

ASHISH B. PATEL
5
10

Application of Data Mining for Customer Behaviour and Customer Relationship Management in Retail Marketing

ASHISH B. PATEL
2
11

Defending Against RREQ Flooding Attack in AODV in MANETs

SUHAIL MEHRAJ, ER. RUPALI ZAKHMI
2
12

Malicious Posts Detection Mechanism in Social Networks

GURUNATH AADE, RAHUL KAPSE, EKTA UKEY
1
13

Information Protection Using Data Classification Procedure in the Cloud Computing

SIDDHARTH PATEL, SAKSHI NEMA, PRASHANT KUMAR KOSHTA, SAURABH SHARMA
1
14

A Survey on Big Data Process Models for E-Business, E-Management, E-Learning, and E-Education

ANISH KUMAR VARUDHARAJULU, YONGSHENG MA
3
15

Multilevel and Multi-class Support Vector Machine based on Affinity Propagation Clustering for Intrusion Detection

SHINEE SINGH, S. K. SHRIVASTAVA
1
16

Enhanced Privacy Policy Prediction for User-Uploaded Images on Content Sharing Sites

RUPALI NARKHEDE, MADHURI ZAWAR
1
17

Intelligent and Effective Smart Helmet with EEG and ECG Analyzing Strategies

J MERIN JOSHIBA, R.D.S TERESE SHEEBA, J. JOSEPHINE SHARMILA, N.S BENILA, P. BRINDHA,
3
18

Automatic Toll Collection System based on Embedded system

MINAL MOHITE, PROF. VIJAY WADHANKAR
2
19

Secure Reversible Image Data Hiding Over Encrypted Domain via Key Modulation

P.SUDHA, R.RADHA
1
20

Smart System of Using E-License

YUKTA GAJARE, PRAGATI BHOR, ASHWINI NALAWADE, REETIKA RANDHANVAN, PRITI KUDAL
5
21

Survey of Data and Storage Security in Cloud Computing

ROSHNI AGRAWAL, PROF. SAURABH SHARMA
1
22

Semantic Image Segmentation with Contextual Hierarchical Models

K.SARASWATHI, C.TAMILSELVI
1
23

Detection and Prevention of Attacks from HTTP Server logs

SANDEEP KUMAR TIWARI, MONIKA SONI, SAURABH SHARMA
2
24

A Heuristic Approach for Web Content Extraction

TANVI LALIT SARDARE, DR. DAYANAND R. INGLE
2
25

Traffic and Energy Efficient Encrypted Search

TANVI LALIT SARDARE, DR. DAYANAND R. INGLE
2
26

A Survey on Machine Learning Techniques for Android Malware Detection and Categorization

NEHA SHARMA, POOJA YADAV
1
27

Effort Estimation for Performance Testing of Software Applications

MOHAMMED ABDUL RAZACK MANIYAR, MOHD ABDUL HAKEEM, DR. MOHD KHALID MUBASHIR UZ ZAFAR
2
28

Design and Implementation of Data Compression with Hybrid to Optimized Size

RAJENDRA CHOUDHARY, DR. AAKASH SAXENA
1
29

Most Trending Topics with Pre-learned Knowledge in Twitter

LEENA PATIL, KANCHAN DOKE
1
30

Novel Approach to Construct QA Systems

TUSHAR SHEDAGE, HONEY VYAS, ANUJA ZANJE, SANKET ZURMURE
1
31

Study on different Transmission Control Protocols Used in Wireless Networks

SWATHI P, KARUNAKAR POTHUGANTI
1
32

2D Position Detection of an Object Using Accelerometer Data

PARMAR DURVISHA M
1
33

Zero APT Technique for Evaluation of RESTORING Unbalanced Voltages

KIRTI JAWALBANKAR, K.CHANDRA OBULA REDDY
1
34

A Review on Shielding Virtualized Resource in Cloud Computing using Augmented Protection Techniques

AMITA PATHANIA, DR. DINESH KUMAR
2
35

Speaker Independent and text Independent Emotion Recognition System Based on Random Forest Classifier

MAY MON LYNN, CHAW SU
1
36

Survey on Reversible Watermarking Techniques on Relational Database

JAISHRI CHAUDHARI, NILESH CHAUDHARI
1
37

Semantic Hashing to Understanding short text using Neural Networks

SUNKARA MOHAN KRISHNA, GURU RAJ
5
38

Implementation of Reversible Watermarking Techniques on Relational Database

JAISHRI CHAUDHARI, NILESH CHAUDHARI
1
39

Routing Protocol for Low-Power and Lossy Networks (RPL) in IoT applications: A Review

JUBIN DIPAKKUMAR KOTHARI
2
40

AI Going Wrong Reasons behind Wrong Responses

AKASH GHOSH, RIZWAN CHANDARKI
2