International Journal of Innovative Research in Computer and Communication Engineering

ISSN Approved Journal | Impact factor: 8.625 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines

|Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | High Impact Factor 8.625 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)|

Volume-6  issue-5 May   2018


S.No Paper Title / Authors Download Paper Downloads
1

Predicting Cancer Using Linear Regression and Naïve Bayes

POOJA BHATI, DR. DINESH KUMAR
4
2

Employee Management and Work Performance Measurement System

PROF. P. M. MANE, ASHUTOSH DAS, ANIKET BIDKAR, DHANASHREE PISAL, SHRADDHA NAIK
3
3

Protecting Virtualized Infrastructure in Cloud using Amplified Security Techniques

PRIYANKA, DEEPIKA GOYAL
1
4

Deadline-aware Alternate Heuristic Technique for Cloud Task Scheduling

HIMANI AGGARWAL, ER AMRITA CHAUDHARY
2
5

Arduino Controlled Automated Writing Robotic Arm

MILIND BAVISKAR, LAKSHMAN KORRA
1
6

Unipath and Multipath Reactive Routing Protocol in MANET with Fixed Pause Time and Varying Speed

VANDANA VERMA, PROF. SHIVENDU DUBEY
2
7

Document Clustering Using K-Means videHadoop

MANISHA AGRAWAL, NISHA PANDEY
1
8

Review of Fingerprint Recognition Methods and System

REENA MITTAL, DEEPIKA ARORA
2
9

Emotion Recognition from Hindi Speech Signal

MEENAKSHI SINGH, PARUL KHULLAR
1
10

Efficient Data Security by combination of Cryptography and Steganography

PUJA, DR. DINESH KUMAR
1
11

Enhanced XSS/SQL Injection Techniques for Web Site Vulnerabilities with Amplified Algorithm

RASHMI, DEEPIKA GOYAL
1
12

Implementation of Global Localization of Intelligent Vehicle in Lane Level via Lane Marking Detection and Shape Registration

NIKITA.A.WADE, ABHIJEET. V. SHINDE
1
13

Amplified Semantic Parsing of Open Street Map using KNN

POONAM DEVI, RACHNA
1
14

A Review on Vehicular Ad Hoc Networks Their Applications and Protocols

MAHAK GOEL, DEEPIKA ARORA
1
15

SEO-Search Engines Optimizations for Web Pages Using Content Based Ranking

B.KARTHIKA., R.RATHI, G.SIVAKUMAR
2
16

Analysis of Total Harmonic Distortion Using Neuro Fuzzy in Renewable Energy Systems

VINOTHINI
1
17

An Overview on Paddy Crops Ailments Detection and Prevention Utilizing Image Processing

PROF. B.H. PANSAMBAL, SNEHA J. SONTATE
1
18

A Survey Paper on Quality Assessment On Blind Video Integrity Oracle

JYOTI GOVINDRAO SURYAWANSHI, DR. S.F.SAYYAD
1
19

Secure Data Sharing for Mobile Cloud Using A Trivial Sharing Method

MUKUNTHAN B, M G DINESH
1
20

A Survey on Blind Spot Detection System Using Vision Sensor and Deep Learning Algorithm

N KUNAN, FAIZ HABEEB K, N TUTURAJA
1
21

Isolation-Preserving Key for Range Queries

T.ABILASHA., K.CHANDRAMOHAN, DR. R.UMAMAHESHWARI
1
22

Ad-Hoc Method for Social Data Collection Using Foursquare

SHAMEENA V, SENTILKUMAR
4
23

Data Transfer through Secured Routing Model in WSN

AISWARYA P.S, MS.K.SINDHUJA
1
24

Secured Data Transfer Cloud Encrypted Outsourced Data with Accurateness Enhancement

MISHA MATHEW , MS.S.BRINDHA
1
25

Image Re Rank In User Clicks And Future Search

SUDHISHNA K.S, MR.S.SENTHIL PRABHU
3
26

Machine Learning Model for Human Activity Recognition by Smartphone Dataset

KHUSHBU DEWANGAN, ABHISHEK KUMAR DEWANGAN
2
27

Analysis of Machine Learning Techniques for Intrusion Detection

ANJUM KHAN, ANJANA NIGAM
1
28

Improving Web Search by Analysing Various Facets

GUNJAN H. DESHMUKH, GOVINDA BORSE
1
29

Reactive Routing Protocols under V2V Communication in VANETs

SNEHA AWASTHI, PROF. SHIVENDU DUBEY
2
30

A Survey on Entity Extraction from the Web Pages Methodology and Application

K.B.ANUSHA
3
31

Finding Top-k competitors using Differential Evaluation

RANI R. RAUT, PROF. R. V. MANTE, DR. K. P. WAGH
1
32

Keyword Aware Representative Travel Route Recommendation with Places of Interest

PUJA P. PATIL, PROF. RAVI V. MANTE, DR.K. P. WAGH
1
33

An Ameliorated Methodology of Implementing Task Scheduler on a Multi Core Processor

SAVITHA P, VARUNISH P, GEETA S N
2
34

Detecting Spam Comments Using Spam Word Dictionary and NLP Technique

ROHINI D. WARKAR, PROF.I.R. SHAIKH
1
35

EM-CURE Algorithm for DDOS Attack Detection

PRIANKA P. NARODE, PROF.I.R.SHAIKH
1
36

Review on Map and Reduced based Semantic Parsing of Open Street Map using KNN

POONAM DEVI, RACHNA
1
37

Co-Extracting Opinion Words and Opinion Targets from Online Reviews by Topic Relation

DIPALI SATAV, SHAILAJA JADHAV
1
38

Implementation of Phase Shifted Semi-Bridgeless PFC Converter

DIGAMBAR SUTAR
2
39

Single Phase Grid-Connected Inverter for PV System with MPPT

NIKHITA KADAM, PROF. A. P. KINGE
2
40

Survey on Various 3D Brain Image Reconstruction Methods based on MRI

VIDHYA K, DR. MALA C PATIL
1
41

Implementation of Cloud based Image Scaling and Cropping using Modified Paillier Cryptosystem

NEHA TAYADE, P.M. CHOURAGADE
1
42

A Survey on Deep Learning Approaches in Healthcare

AMIT S. WALE, PROF. SHILPA S. SONAWANI
1
43

A Survey on Routing Protocols of Internet of Things

GAURI S. RAPATE, DR. N C NAVEEN
4
44

Technique for Secured Search on Encrypted Information based on Similarity Join Queries

SHITAL P. PATIL, PROF. P. B. MALI
1
45

A Survey on Geo Social Media Data Analysis for Product Review

NITHIN N V, PROF. GEORGE PHILIP C
1
46

Providing Protection on Cloud Video Surveillance Using Blowfish Algorithm

SWATI SURYAWANSHI , VAISHALI KOLHE
1
47

Cluster Data using Various Clustering Algorithms

MAYURI K. BOTRE, DR.KAILASH SHAW
2
48

Optimized Transit Alert System with Real Time Data

PRABHAKAR BHOSALE, PROF. M.S. OTARI
1
49

An Effective Algorithm & Comparison of Various Techniques using J48 Classifier

SHIVA SHARMA, U. DATTA
1
50

Enhancement of Voice Technology over Ad-Hoc Network (MANET)

DOLLY SHARMA, NISHA PANDEY
1
51

Investigation for LTE and WLAN Conjunction in NS3

MANJULA R, HEMANTH KUMAR A R
2
52

Enhanced Scheme for Mitigating Jamming Attacks in MANETs

MADHVI, NISHA PANDEY
1
53

Compact and High Speed Hardware Implementation of CLEFIA

PANKAJ V. JADHAV, VISHNU SURYAWANSHI
1
54

Survey on Various Unsupervised Learning Techniques for Anomaly Detection

ASHWINI ATHAWALE, MRS. DEEPALI M. GOHIL
1
55

Travel Sequence Recommendation by Mining User Social Interest and Travelogs Data

KISHORI P. THAKARE , HIRALAL B. SALUNKHE
1
56

Two Phase Neural Network Model for Weather Forecast Along-with Logistic and Linear Regression

ANIL KUMAR, PRAVEEN SHARMA
1
57

Speech Enhancement System using FIR Filter

NAGESH B. KALE, R. R. HARNE
1
58

Survey on IOT based Home Automation System using ATMEGA 48 Microcontroller

AMITH P S, APOORVA T, GOVINDARAJU H V
1
59

E-Learning by Using Gamification and Job Assist

MINAKSHI MULIK, ADITI PATIL, SNEHAL SURYAVANSHI, VIRAJ NIMBALKAR ,VARSHA DANGE
1
60

Seeker's Satisfaction in Community QA System

HARSHAL SHASHIKANT ANANDAS, KHAN MUBASSHIRA NOORMOHAMMED, SANYUKTA SATISH NIRMAL, NILAMBARI RAHUL PARDESHI.
1
61

Game Theoretic Study on Channel-Based Authentication in MIMO Systems

PROF. JYOTI RAGHATWAN, ALKA TAUR,
1
62

Use of SDN for Detecting and Mitigating Link Flooding Attack

PROF. KANCHAN VARPE, KOMAL KHANDALE
1
63

Privacy Protection in Healthcare System and avoidance Intrusion Detection based Cloudlet

KAVITA V. DUBEY, PROF.VINA M. LOMTE
1
64

Smart Public Transport System Using Android Application

AMRUTA SHETE, ANJALI KAPARE, KSHITIJA SALKE, SUCHITA BHOSALE, HEMANT SHINDE
3
65

Cloud Based CMIS with Offline Synchronization

REKHA M, BHARATHI K, CYNTHIA A, NOORUN NAZIRA
1
66

Helmet and Triple Riding Detection on Motorcyclists using Image Processing

PRADEEP MAIYA, SHARATH KUMAR R, SHREYAS P V, VISHWA PRAKASH H V, POORNIMA M
3
67

An Implementation of Smart Attendance System Based on Face Recognition Using Android Application

ARTI DONGARE, ICHHA GILBILE, POOJA TEKAWADE, AMITSINGH THAKUR, A.D.SAWANT
1
68

Authority Identification Using Keystroke

SHREENAND SADANAND TAMHANKAR, SANKET GULABRAO JAMBHULKAR, ANIKET NURIYA RATHOD , PRAJAKTA ANANT SHELAR , ANIKET GAUTAM GAIKWAD, PROF. G.S.KOTHAWALE, R.T.WAGHMODE
4
69

Online Service for Engineering Project Title Verification Based on Content Analysis

SHUBHAM PODHADE, SAILY DEORE, MOHINI PANDEY, PADMANABH SAOJI, PROF M. L. BANGARE
2
70

Trust and Reliability Control by Continuous Auditing: Ensuring Cloud Security

NAGORAV KOLHE, HARSHAD KHANEKAR, VISHAL JAWADWAR, PRIYANKA DHERE, PROF. MOHOLKAR K.P.
1
71

Smart Ration Card System

AISHAWARYA VARPE, SONAWANE SHRADDHA, WALAKE NIKITA, B.R.BAVISKAR
1
72

Vehicle Repair and Puncture Service App

ANKIT CHOUDHARI, BALU GOBADE, AKSHAY KHATALE, ANAND NARNAWARE, PROF. S.B. JADHAV
3
73

Autonomous RC Car Using Neural Network and Deep Learning

HIMANSHU SHARMA, MRIDUL CHAUDHARY, NITESH MANJWANI, RUCHI KULKARNI, AMITA JAJOO
3
74

Health Care System Using Qr-Code Strategy

PRADIP SHEWALE, KARAN JAVERI, PIYUSH GANDHI, MOHAMMADJAID INAMDAR, RIYAJ MUJAWAR
3
75

Brain Tumor Detection and Classification

SASNA M.S, AMRIN SHEIK UMMER, JOEL K.J, RAMEESA M.A, BINISH M.C
2
76

Production Improvement using Predictive Planning

PRATIK BURHADE, AMAN KHADE, DEVENDRA GAIKWAD, SHARVARI JIWANE, SUSHILA AGHAV
4
77

Smart Attendance System using face detection On Raspberry pi

VISHAL D. BIKKAD, PROF.DR.S.B.SONKAMBLE, SNEHAL A.MANE, SURABHI S. SARADA
2
78

Solar Powered Non-Invasive Pulse Oximeter and Heart Rate Meter

SRUSHTI CHAVAN, PRARTHANA GADEKAR, MANJUNATH PATIL, S.P. TONDARE, S.P. GAIKWAD
2
79

Solving Student Migration Issues in Interstate

FORTUNE SINGH BISTA, TEJASVI GOEL, MANISHA GUNJAL, AISHWARYA MUNDHE, S. J. PATIL
1
80

Plant Disease Detection Using Image Processing (Rural Development)

PRASAD C. SHINDE, PANKAJ NEVASE, SWAPNIL INGOLE, PROF. U. C. PATKAR
1
81

Efficient Diagnosis of Breast Cancer Patients

MUKTAI ITANKAR, VAISHNAVI BANDEWAR, NIKITA DESARDA, ANTARA DARBESHWAR
1
82

An Implementation on Securing Aggregate Queries for DNA Databases

AKSHAY BHARAM, ASHUTOSH TEKNUR, PROF. SHAILAJA JADHAV, SHUBHAM SHINDE, SANKET WANKHEDE
1
83

Implementation Paper on Rain Water Drain out Machine from Pit or Basement

SNEHAL JADHAV, RUPALI NAVALE, SENHA PATHAK, TRIVENI THIKEKAR, PROF. K.B KUNTE
1
84

Two Cloud Secure Database for Numeric-Related SQL Range Queries with Privacy Preserving

AMIT DEORE, SURAJSINGH MALAS, VAIBHAV PAWDE, PROF. ILA SAVANT
2
85

Privacy-Preserving Multi-Keyword Similarity Search Over Encrypted Data

SHUBHANGI J. WAGH, AISHWARYA G. PATIL, ARPITA D. PATIL , PALLAVI G. PATIL
2
86

Random Forest -A Machine Learning Algorithm to Predict Number of bicycles in Bicycle Rental System

HARISH MANGHNANI, MINAL VANAGE, AKSHATA NAIK, SHALINI WANKHEDE
2
87

Smart Public Transport Using IOT Technology

RAHIL KHAN, FAISAL KHAN, GAURAV PINGALE, ADVAIT KHUTWAD
1
88

Type III Digital Compensator Design for Buck Converter

SHREYAS R H, VISHRUTHA G, SHUBHA RAO K
2
89

Feasibility of Using Machine Learning to Access Control on non-Educational Links

SHAHENSHAHA MUJAWAR, BHAUSAHEB MORE, PIRSAHAB TANDEL, PROF .PRASHANT ABHONKAR
1
90

Secure De Duplication over the Cloud Environment Using Multi Authority Attribute Based Encryption

VINA M LOMTE, ASHLESHA D GAIKWAD
1
91

Implementing Collaborative Filtering Approach in Online Event Recommendation System

ROHAN KATARIYA, V KRISHNA MOHAN, SHUBHAM SURYAWANSHI, RUTURAJ DHANESHWAR, GEETHA CHILLARGE
1
92

NaturalJava: An Efficient Interface for Interpreting Natural Language into Java Code

ASHWINI G. BARI, MOHIT L. PATIL, GAYATRI V. GAIKWAD, SUSHIL D. KARANDIKAR
1
93

Two-Factor Data Security Protection Mechanism for Cloud Storage System

DEEPAK KUMBHAR, VIJAYA KADAM, PALLAVI KADAM, VARSHA SHINDE, NAVNATH BAGAL
1
94

Inference Attack on Users Browsing History with Friend Recommendation System in Twitter

SWATI KAMBLE, DHANASHREE PHALKE
1
95

Providing Secure Healthcare System on Cloud

KOMAL PANGARE, APOORVA KUKADE, RUTUJA MANE, PROF. MADHURA SANAP
1
96

High- Resolution Latent Fingerprint Time Series for Short- and Long-Term Print Age Estimation

PRIYANKA S. NIKAM, NEETA A. DESHPANDE
3
97

Mining Facets for Queries from Their Search Results

PROF. P.M.GORE, PRATHMESH KADAM, GAURAV PATIL, RAVI KHARAT, AMOL MORE
1
98

Two-Factor Data Security Protection Mechanism for Cloud Storage System

ONKAR DEHANE, SUPRIYA SANAP, PARVATI MOHITE, POOJA SUTAR, POOJA VENGURLEKAR
1
99

Active Trust Secure and Trustable Routing in Wireless Ad-hoc Networks

T.ARIVANANTHAM, RAHUL KARMORE, NIKITA SATKAR, PRIYANKA GHADGE, KARISHMA SHETE
5
100

Confidential and Essential Two-Cloud Secure Database for Numeric-Related SQL Range Queries

PROFESSOR, M.E.SANAP, KOMAL BHUJBAL, SHITAL GADEKAR , NITIN GAIKWAD , SHUBHAM GHODKE
1
101

Traffic Management System Using QR Code

NIKHIL ANKAM, POOJA KUMARI, NIDHI KUMARI, DYNANESHWARI BHALSHANKAR, PROF.H.M. KUTE
1
102

Controlling of Welding Fixture using PLC

MAYUR P. KHARAD, ABHIJEET A. CHAVAN, AKSHAY T. JAIWAL
2
103

Similarity Based and Transfer Learning Based Data Fusion Using Classifier

YOGESH SHINDE, NIKHIL GHULE, RUBINA SHAIKH, PROF. ASHISH RAMDASI
1
104

An Efficient Way of Clearing the Garbage System Using Wireless Sensors

KEERTHANA M, KOKILA S, KANAKAMBIKA RG, M S SHOBA, DR. JITTENDRANATH MUNGARA
1
105

Solar Tracking with Temp. & VTG Meter

JYOTI PATIL, AVANTI KUNALE, NIKITA PATIL, PROF.C.M.BUKEY
1
106

Energy Efficient Network Encoding By Creating Secrets of Packet Erasure Using Network Node Is Jamming Randomly

RUPALI TONAPE, NEHA NHAYADE, KIRTI DALVI, GULSHAN SINGH, TRUPTI DANGE
1
107

Enhancing Cosmetic Products Quality Using MRF and K-Means

PRACHI KUNJIR, MADHURA ARGADE, DURGESHWARI RANE
1
108

Data Acquisition from Heart through Wireless Telemetry

MAMTA, MOHINI PANDEY, PRERNA BISEN, S.P. TONDARE, DR. S.P.GAIKWAD
2
109

Plant Leaf Disease Detection Based on Image Processing Using MATLAB

RASHMI SOLLAPURE, LAXMI KARADIGUDDI, PRIYANKA HANASI, SOUMYA DADDI, PROF.BHARATI KALE
2
110

Spatial Reusability-Aware Routing in Multi -Hop Wireless Networks

IRANNA M , KALPANA C, NETRAVATI J, ARAVIND P, BHARATI K
3
111

Microcontroller Based Library Books Location Searching System

PRIYANKA MANE, MINHAJ MOMIN, BHAGYASHRI MANDE, PROF.S.M.TONDARE
2
112

A Survey and Analysis of Reliable Data Packet Delivery Ratio in Wireless Sensor Network

R.RAJKUMAR, SUNDARAMURTHY.B
1
113

Cyber Security Methods for Vehicle Networks Challenges and Solution Using UAVs Networks

MURUGESAN S, DR. NITHYA, R.BHARANIDHARAN
1
114

Big Data Vertical Grouping Attributes Dynamic Load-Balancing Using Bluemix

AGILASRI.A, DR. NITHYA, M.ANNAMALAI, MURUGESAN S,
1
115

Improvement of Direction Decision Algorithm based on Bird's Eye View Transform for Self-Driving Cars

HYEON-SEOK JEONG, SEOK-HO IM1HYEON-JU YOON
1
116

Smart Shoes: A Safe Future for the Blind

SHLESHA KHURSADE, MALAVIKA KARUNAN, IBTISAM SAYYAD, SALONI MOHANTY, PROF. B.B. GITE
2
117

Data Security Scheme: Share and Audit Our Data into Cloud using Encryption

ASHVINI JANGAM, PROF. NILESH SABLE
1
118

Wireless Fetal Heartrate Monitoring System

YATEEN RAJE, AKSHITA BAJPAI , SHINOO SWAPNIL , PROF. A. R. PATIL , PROF. HARSHADA MHETRE
2
119

Swasth Suvidha: An IOT Based Health Monitoring System

SANKET MHATRE, AKASH PATIL, YOHANTH SHETTY, SAMEER UDGIRKAR
3
120

Feature Learning and Collaborative Tagging Using Non-Personalized Social Media Images and Tags

PRIYANKA S. PADWAL, DR. NEETA A. DESHPANDE
2
121

A Advanced Approach to Construct E-Learning QA System

SHUBHANGI SURESH PAWAR, PROF.R.H.KULKARNI.
1
122

3D Perspective View for Cinema Seat

SAGAR A. NANGARE, CHETNA ACHAR
1