International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.771 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.771 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|

Volume-5  issue-8 August   2017


S.No Paper Title / Authors Download Paper Downloads
1

Survey of Machine Learning Applications

NAVDEEP SINGH JAGGI
1



4
2

Studying Water Quality Monitoring System Basedon Wireless Sensor Networks (WSNs)

NAHED A. ALNAHASH; MOHAMED A. ZOHDY
2



4
3

A Secure and Reliable Video Watermarking based on Different Wavelet Transform

DHANASHREE S. SHEDGE
3



3
4

Enriching Text Clustering through Cognitive Concept Based Model (CCBM) by Ensemble Neural Learning Method

K.SANGEETHA, M.V. SAYINI
5



1
5

Face Recognition under Different Lighting Conditions Using Multiple Feature Fusion

KOTHAMASU JAHNAVI, K.SATYA PRASAD
6



2
6

A Survey on Big Data

PRACHI JAIN, KANCHAN JHA
8



2
7

A Study of Smarthome Tech using IoT

S.DEVI MCA., M.PHIL
9



1
8

A Comparative Study of Intrusion Detection System tools and Techniques

SONALI NEMADE, MADHURI A. DAREKAR, JYOTI BACHHAV, SUNANYNA SHIVTHARE
10



2
9

STBC-OFDM using Compressive Sensing Theory for Wireless Systems

SRISHTI HAJARE, SHASHANK MANE
14



1
10

3D Video Compression Using Split Algorithm

GOVTHAM T, PROF. VENKATESHAPPA
15



1
11

Design and Implementation of Smart Energy Meter

M SWAMY, R PRAVALLIKA
17



1
12

Internet of Things for Innovative, Improved and Effective Smart Transport Management System in Smart City

VANI HARAVE, SNEHA BHARTI, R. LATHA
19



2
13

A Survey on Plausible Approach to Mitigate Security Challenge in Cloud Computing

EJEM AGBAEZE, DR. NWOKORIE E.C., NJOKU DONATUS, DR. ODII J.N., NWOKOMA F.O.
20



2
14

Simulation of Cloud Computing Environment and Evaluation of Resource Provisioning Algorithm using Improved Max-Min

MONIKA MISHRA
21



1
15

Betel Leaf Disease Detection Using Histogram of Oriented Gradients and Multiclass SVM

DR. S. K. JAYANTHI, C.LALITHA
22



2
16

Smart Temperature Sensor Design Using Voltage Controlled Ring Oscillator

PRAVEEN KUMAR SHARMA, GAJENDRA SUJEDIYA
24



1
17

Personal Authentication Using Finger Vein Biometric

POOJA CHAVAN, WRUSHALI MENDRE
25



1
18

Proficient Majority Logic Fault Detection and Correction to Decode Mainstream Logic Design by Using EG-LDPC Codes

K PAVAN KUMAR, R VASIM AKRAM
30



1
19

Automated Glaucoma Screening based on CDR Measurement

SWAPNALI BHAPKAR, VAISHALI KULKARNI
31



1
20

A Review of Mining High Utility Patterns

DR. S. MEENAKSHI, P. SHARMILA
36



2
21

Server Monitoring Using Windows Management Instrumentation and SNMP

K.BHAGYASRI, K.VELAYUDHAM , P. SRIVYSHNAVI
33



1
22

An Improvised Recommendation System on Top-N, Unrated and Point of Interest Recommendations Regularized with User Trust and Item Ratings

MEENAKSHI, PROF. PRAVIN NIMBALKAR
36



1
23

Keen Honeypot based E-Commerce Security Model

B.V.RAMA KRISHNA, B. SUSHMA
38



1
24

Live Virtual Reality Streaming for Student Platform

NITA RADHAKRISHNAN
39



2
25

An Adaptive Study for Different Methodology for Information Hiding

NAGESH SHARMA, NARENDRA KUMAR UPADHYAY, NIRMAL KUMAR SARASWAT
40



7
26

A Deep Survey on Mutational Testing and Test Adequacy Check

J SANTHOSH, MINI N
41



1
27

Face Recognition Using Enhanced Gradient Patterns

VISHNU GANESH PHANIHARAM, BAGADI RAVIKIRAN, TUSAR KANTI MISHRA
42



10
28

A Study on Wireless Ban Area Network for Health Care Applications

AMUTHAVEL.R, LALITHA.R
45



2
29

An Algorithmic Study of Link Prediction in Social Network Sites

SURYAKUMAR B, DR.E.RAMADEVI
46



2
30

A Review on Google Glass Technology

S.ARCHANA, N.NISHANTH
49



2
31

A Review on Privacy Preserving Data Access Control Mechanism in Hybrid Clouds

D. VISHWAKSEN REDDY
50



3
32

Priority based Job Scheduling Algorithm in Cloud Computing

PAMINI JAIN, PROF. SAPNA CHOUDHARY
51



2
33

Speech recognition using PNCC and AANN

R. THIRUVENGATANADHAN
51A



1
34

Data Transmission between Two Laptops Using Optical Source

RITIKA PATHI
52



1
35

SLL Reduction of Spherical Array Using Thinning

K.NAGA UMA SARASWATHI, PROF. N.VENKATESWARA RAO
53



1
36

Enhancing Machine Based Spam Detection Using Twitter

SHINDE ASHA ASHOKRAO, SHITAL Y. GAIKWAD
54



3
37

An Analysis of Transformation in Teaching and Learning Methods

SHABANA PARVEEN ANSARI, PROF. MONA DESHMUKH
55



1
38

Load Balancing and its Challenges in Cloud Computing: A Review Paper

JAYA CHOUBEY, PROF. SATPAL SINGH, PROF. SUMIT NEMA
56



1
39

A Survey on Web Services Security Concern, Solution and Its Limitation

DIVYA PANDEY, PROF. SATPAL SINGH, PROF. SUMIT NEMA
57



3
40

Functionalities, Applications, Issues and Types of Data Mining System

KIRAN KUMAR S V N MADUPU
58



1
41

Secure Advanced E-Voting System using NFC and Thumb Matching

SHRADDHA R. HANDE, PROF. R. W. DESHPANDE
4



1
42

LAL Methodology to Mitigate Denial of Service Attacks in Fictitious Nodes Used in OLSR Protocol

ADITYA KATHERA, ADITHYA. R , G. GOKULNATH, TARUN RAJ MOTURU
7



6
43

Overview of Blue Eyes Technology

SAMPURNA J , VINITHA R
11



2
44

Analysis on Ransomwares and Prevention Approach

CHITESH RAI TULI, PANKAJ SHARMA, SAKSHI MALHOTRA

B.Tech. Student (4th year), Department of Mathematics and Computing, Delhi Technological University, Delhi, India

12



1
45

Framework for Key Visibility in Cloud Storage Auditing

SAPNA R, RAKESHN, CHANDAN
13



2
46

Implementation of a Monitoring Application in Android

AKSHIT BATHEJA, AISHWARYA KOURANI, EKTA SIRWANI, MAAZ SIRKHOT
16



4
47

An Exploratory Study To Find Importance Of Time Management in software Project Management

VANDANA NEMANE, TRUPTI KULKARNI, PRITI JADHAV, RUSHI DURGE
18



3
48

A Survey on Brain Fingerprinting

BHARTI SHARMA, DEEPESH AGRAWAL, AMOGH GADKARI , BHAVNA GUPTA
26



1
49

A New Authorized Secure Schema for Data Deduplication Using Convergent Key in Cloud Environment

KOLU JAGADEESH, D.GOUSIYA BEGUM
27



2
50

Machine Learning: Intersection of Statistics and Computer Science

Rakesh Rojanala
28A



2
51

A Novel Hybrid Scheme Based on Virtual Circuit Switching for Reduce Communication Latency and Power of Network on Chip(NoC).

MANTRI KULLAYAPPA, DR. N. AV. PRASAD
29



1
52

The Architecture of Wireless Sensor Network, its Issues and Applications

DIBYAJYOTI SAIKIA
34



1
53

PAPR Reduction Using Hybrid Approach in OFDM

PREETY MAHAJAN, HARJINDER KAUR, SWEETY
35



1
54

Ensemble Model for Movie Success Prediction

P.DEEPTHI, S.BHARGAV
37



1
55

Deduplication of Encoded Big Data in Cloud Storage

PALLAVI G. BANGALE, PROF REKHA KULKARNI
43



5
56

Encoding and Decoding of LDPC Codes using Bit Flipping Algorithm in FPGA

L. SHIVA NAGENDER RAO, K.VENKATA SATHYAJITH, Y. NAGARAJU YADAV
44



1
57

An Approach towards Forming a Domain Dictionary to Ease the Process of Searching for Scholarly Publications

ADITYA KALIVARAPU, M KRANTHI KIRAN
47



1
58

Machine Learning in Financial Fraud Detection

MAYURESH PATIL
47A



1
59

A Secure and Robust Image Watermarking Technique Based on DWT-DCT and Implemented Various Attacks on it

TANIYA PANJIYAR, YOGENDRA KATIYAR
48



2
60

A Survey on Social Media in Education

A.D.C. NAVIN DHINNESH, N.SUNDARESWARAN
33



1
61

Efficient Unflaws of Secure Data Transmission Using s-BGP

NITHYA.S, BABU.T.G
50



1
62

A Study of Classification Techniques of Data Mining Techniques in Health Related Research

K PRASANNA JYOTHI, DR R SIVARANJANI, DR TUSAR KANTI MISHRA, S RANJAN MISHRA
73



4
63

Quantifying the Error in CLT for Accurate GRN Generation

Shaik Jeelan Basha, L. Rangaswamy
28



2
64

Cloud Migration Strategies: Navigating the Shift to Modern IT Infrastructure

Krish Anil Tripathi


64



3