International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.625 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.625 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|

Volume-5  issue-12 December   2017


S.No Paper Title / Authors Download Paper Downloads
1

Curvelet Image Fusion Using Decision Tree Algorithm

MUZAFAR AHMAD DAR, ASHISH SHARMA
7
2

Key-Aggregate Cryptosystem for Scalable data Sharing with Time Server and Integrity Auditing in Cloudstorage

RUTUJA RAJKUMAR ANDHALE, PROF. SHYAM GUPTA
4
3

A Survey on Social Media Based Personalized Travel Sequence Recommendation

SUMIT MAHAVIR BOPALKAR, H.U.JOSHI
1
4

Knowledge Management Process in ERP based Product Companies: Field Experiment

S. MALA
10
5

Implementation of Robust Router Design for Area Critical Applications

D.VARA PRASAD, P.K. SURESH
2
6

An Efficient Dynamic Authenticated Secure Routing Using Secure Elliptic Curve Cryptography in MANET

V.DEEPADHARSINI, VR. NAGARAJAN
2
7

Privacy-Preserving over Encrypted Data using Similarity Joins

TAMBE BHAGYASHRI, PROF. TODKARI S.V
1
8

Enhanced DNA Cryptography for Wireless Body Sensor Networks

ALI ABO AJEEB, AHMAD MAHMOD, BOUSHRA MAALA, AHMAD S. AHMAD
5
9

Power Search Algorithm for Economic Load Dispatch Problems Considering Valve Point Loading Effects

PRAKASH A, RAVICHANDRAN C S
3
10

The New Service Brokering Algorithm in Cloud Computing Based on ACO

SUREKHA DIXIT, NAGENDRA KUMAR
1
11

A Survey on a Novel Approach to Recommend the Places by Using User's Social Media Point of Interest

SONAWANE LEENA MAHENDRA, DR. M.A.PRADHAN
2
12

Personalized and Efficient Search over Encrypted Data on Cloud: A Survey

SHAMAL JAMDADE, PROF. POONAM LAMBHATE
1
13

Multi -Way Encryption Using Elliptic Curve Cryptography

DR. NILAMBAR SETHI, BINAYAK PANDA
1
14

Aspect Based Sentiment Analysis for User Generated Reviews

VAISHALI DUSANE , PROF. DR. S.A.ITKAR
1
15

Leveraging SDN and WEBRTC for Rogue Access Point Security

PROF. KANCHAN VARPE, KOMAL KHANDALE
1
16

Development of Sensitivity Classification Approach for Personalized Privacy Preservation in Data Publishing (PPPDP)

D.P. MANOJ KUMAR, DR. Y.P GOWRAMMA,
2
17

A Study on Green Computing: Need of Technological World

KHUSHALI GOHAR, VEDANSH DUBEY
5
18

A Survey on Disease Prediction by Machine Learning Over Big Data from Healthcare Communities

SANTOSH S SHINDE, PROF. SHWETA JOSHI
1
19

Home Security System using RFID's and Fingerprint Mechanism

THAKUR RAHUL SINGH
1
20

Load Balancing and its Challenges in Cloud Computing: A Review Paper

SUMIT LAL, PROF. SAURABH SHARMA
1
21

A Survey on Searching Trajectories by Regions of Interest

PROF.VAIBHAV MUDDEBIHALKAR, AJINKYA DIWATE, SHUBHAM MANE, SHRADHA SEVADA
1
22

Twitter User Social Circle Detection Using Multi-View Network Structure

SNEHA RANI , PREM RANJAN, SAGAR KUMAR, CIBA TEMBHARE, SMITA KHOT
4
23

Revocable Multi-Authority Scheme For Secure Data Access Control in Cloud Storage

JYOTI RAVASAHEB PATIL, ASSIST. PROF. P. M. MANE
2
24

Isolation and Purification of Fibrinolytic Enzyme from Microbial Source

TIBAMANSOUR, DR.ASHA SALUNKE
1
25

Multimedia Data Mining-A Survey

PRACHI KOHADE, DR. K. S. THAKARE
2
26

Reducing Energy Consumption in WBSNs using Statistic Test to detect Duplicated Data

SALEH MASSOUD, YOUSSEF SOBH AHMAD, MOTHANNA ALKUBEILY, AHMAD S. AHMAD
1
27

Review on Security Protocols in VANET

YOGITA A. MORE, NILIMA P. PATIL
4
28

A Survey on Two-Level QR Code for Private Message Sharing and Document Authentication Using Steganography

HARSHADA JAHAGIRDAR, HIMANGI JALGAONKAR, MADULIKA CHAUDHARI, ANJALI, ILA SAVANT
1
29

Human Membrane Protein Classification Using KNN Multi Label Classifier (KNNMLC)

NIJIL RAJ N, DR.T.MAHALEKSHMI
1
30

Text to Speech Conversion for Vocally Disable

ATHARVA CHOGLE, SHWETA BAVISKAR
4
31

A Competent and Speedy Symmetric Key Production with improved Latency Using Matrix Array Symmetric Key Encryption

BRAJESH KUMAR, SANTOSH KUMAR
1
32

A Revolutionary Change in Education Sector: Cloud Computing

NEERAJ HARJANI , SUREN SUGHAND , TWINKLE MOTWANI , SIMRAN DEMBLA
6
33

Digital Colour Image Compression using Block Truncation Code

DEV PRAKASH SINGH, DR. VINEETA SAXENA NIGAM
1
34

Detection and Control of Urban Emergency Events using Social Media Big Data

VAIBHAV MESHRAM, VISHAL TIWARI, MATESH DIVEKAR, SHUBHAM PAWAR, PRF. G.M. GAIKWAD
1
35

A Survey on A Time-Specified Ciphertext-Policy Attribute-Based Encryption with Circuit's Technique in Cloud Computing

SURAJ LOLAGE, HEMA MANGTANI, KOMAL DONGARE, AKASH LABADE , PROF.SHIKHA PACHOULY
1
36

A Study of DDoS Attacks Detection Using Supervised Machine Learning and a Comparative Cross-Validation

WEDAD ALAWAD, MOHAMED ZOHDY, DEBATOSH DEBNATH
2
37

A Review Study of Cyber Security in Different Networking Dimension to Minimize Network and Data Intrusion

AKHILESH NAGAR, MUKESH BHARDWAJ, APARNA SHARMA, NAGESH SHARMA
5
38

Performance Evaluation of IDEA encryption model under different Fading Channels

JAGRUTI A. PATIL, PROF. MANISH M. PATIL
2
39

A Novel Approach for Resolution Recommendation for Generated Tickets

PROF. V.R.GHULE, PRATIK PATIL, AMIT KUCHAN, MANGESH WAYGAND, SAI GOTETI
1
40

Secure Dynamic Fragment and Replica Allocation of Data with Optimal Performance and Security in Cloud

ASHWINI YOGESH ANIKHINDI, PROF M K KODMELWAR
1
41

Elephant Vocalization Direction of Arrival Estimation under Acoustic Sensor Network with Impact of Error Rectification Method

M.DEVAKI
1
42

Review on Bit Error Rate Analysis in Multicast Multiple Input Multiple Output Systems

SONAL SONAWANE, S. M. PATIL
1
43

Optimal Load Balancing in Cloud Computing by Efficient Utilization of Virtual Machines

MONIKA CHATURVEDI, PROF. DEEPAK AGRAWAL
1
44

A Survey on Data Protection in Cloud Storage

SAKSHI NEMA, PROF. PRASHANT KUMAR KOSHTA
2
45

A Survey on IoT Based Intelligent Road Traffic and Transport Management Systems

C N SIVA SUBRAMANIYAM, K.SIVARAMAN, S.SHREYAS RAMACHANDRAN, A.K.VEERARAGHAVAN
1
46

Smart Lighting in Street Lights Based On IOT

TANUJA MAGAR, ARTI BABAR, SUPRIYA GHATSHILE, PRAGATI JAGTAP, DEEPAK UPLAONKAR
2
47

Sudoku Puzzle Detection using Image Processing Techniques and Solving: A Literature Survey

PARITOSH PUJARI, SAURABH THORAT, SURAJ THOPAT E, YASH SHAH, PRASAD KHARADE
1
48

Comparative Study of Different Password Managers and Insight of Bilateral Password Manager

SHUBHAM AGARWAL, IKHLAS SHAIKH, UJJAWAL TRIPATHI, SHUBHANGI KHADE
1
49

Identification System based on Biometric Concept Using Human Eye

SAURABH SINGH, ARSHI KHAN, SAURABH MAYDEO, SAURABH BURANGE, PRIYEN DANG, SHIVAM SHUKLA
3
50

Biometric Fingerprint based Attendance Monitoring System

PRIYEN DANG, ANURAG SINGH, ROHAN NAYAK, SAURABH BURANGE, PRANAY RAO, CHIRAG RAO
1
51

A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud

TRUPTI D. GANGASAGAR, ASST. PROF. SHITAL Y. GAIKWAD
1
52

A Survey on Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach

MINAL PATIL, MADHAVI S. DAROKAR
4
53

Sentiment Analysis Using a Supervised Joint Topic Modeling Approach

ANURADHA.R.S, NATARAJAN.B
6
54

Summarization and Sentiment Analysis of Social Content

BHAGYASHRI B. KAMANKAR, MANESH P. PATIL
2
55

Image Steganography Methods Based on Pixel Value Differencing: Review and Proposal for Enhancing the Security of Five Pixel Pair Algorithm

NAYANA KOLHE, HARISH BARAPATRE
1
56

Two Factor Based Secure Data Sharing In KIDS System

SAYALI PATIL, NILESH WANI
1
57

Physical-Layer Cryptography through Massive MIMO

PROF. JYOTI RAGHATWAN, ALKA TAUR
1
58

Fake Currency Detection and its associated Classification

PRIYEN DANG, ANURAG SINGH, SAURABH MAYDEO, SAURABH BURANGE, AMEYA KASBEKAR, HARJEET MATHARU
4
59

Exploiting Channel-Aware Reputation System for Packet Drop Attack Detection in Wireless Ad-hoc Network

ASHWINI PRAKASH MORE, PROF. DEEPAK GUPTA
1
60

Understanding of Quality of Service in Web Services – A Review

ABHISHEK SHARMA, SWATI PATEL, BRIJESH PANDEY
4
61

A Survey on Product Recommendation Systems Using Social Data and Microblogging Information

KANCHAN BAGDE, PROF. JYOTI PATIL
1
62

Medical Data Sharing For Protection and Intrusion Avoidance in Cloudlet

SNEHAL GITE, PATIL S. H
1
63

A Novel Approach on Effective Implication of Object Oriented Based Software

SWATI PATEL, DEEPALI VERMA, BRIJESH PANDEY
2
64

Review on Algorithms for Video Quality Measurement

SWATI RAJU SHINDE, PROF. DR. B. D. PHULPAGAR
1
65

A Survey on Mining Query Facets for Search Results

POOJA SHIVAJI MEHESARE, PROF. D.V.GORE
1
66

A Survey on a New Approach to Travel Recommendation Using Dynamic Topic Model and Matrix Factorization Based

HARSHVARDHAN HANMNATRAO PATIL, PROF. S.D. SATAV
2
67

A Survey on Mining Algorithm to Archive High Utility Item Set Using TKO With TKU.

SAKSHI KARNAWAT
3
68

Review Paper on Image Compression using Discrete Wavelet Transform and Discrete Cosine Transform

POOJA SUBHASH PATIL, PROF. KAMAL NIWARIA, DR. MANISH JAIN
1
69

Re-Encryption and Replication for Sharing Data on Cloud with Third Party Auditor

MANOJ V. MOHITE, YOGESH S.PATIL, DINESH D. PATIL
1
70

Secure Energy Efficient Routing Using Jamming To Resist Networking Eavesdroppers

SHEETAL MODKE, PROF. PRADNYA KASTURE
2
71

A Secure Scheme against Replication Attack for Heterogeneous Sensor Networks

AMRUTA GAIKWAD, PROF. RACHANA SATAO
2
72

Medical Image Modalities in Lung Cancer Detection

VIJAYALAXMI MEKALI
2
73

IoT Based Health Monitoring System using Raspberry Pi and Arduino

KARTIKEE UPLENCHWAR, ADITI VEDALANKAR
8
74

WSN Based Smart Power Monitoring and Controlling System for Home Automation

PALLAVI JOSHI, PROF. SARITA VARMA, PROF M S KHAN, PROF MRUNMAYI JOSHI
5
75

Quantifying the Error in CLT for Accurate GRN Generation

Shaik Jeelan Basha, L. Rangaswamy
5
76

India-Nepal relations (1950 to present): A general overview

Dr. Sucheta Gupta

4
77

A Very Safe and Effective Way to Protect Privacy in Cloud Data Storage Configurations


Pankit Arora, Sachin Bharadwaj

2