International Journal of Innovative Research in Computer and Communication Engineering
ISSN Approved Journal | Impact factor: 8.379 | ESTD: 2013 | Follows UGC CARE Journal Norms and Guidelines
Monthly, Peer-Reviewed, Refereed, Scholarly, Multidisciplinary and Open Access Journal | Impact factor 8.379 (Calculated by Google Scholar and Semantic Scholar | AI-Powered Research Tool | Indexing in all Major Database & Metadata, Citation Generator | Digital Object Identifier (DOI)
1. |
Forensic Analysis Approach Based on Metadata and Hash Values for Digital Objects in the CloudEzz El-Din Hemdan, Manjaiah D.HPDF |
2. |
Personal Autonomous Non-Collision Based Hovering Robot(PANTHER)Ashwini Iral Barboza, Jason Elroy Martis, Balasubramani RPDF |
3. |
Prediction of User Intentions in Smart TelevisionRakshith M D, Harish H Kenchannavar, Thyagaraju G SPDF |
4. |
Tricharger using MicrocontrollerVishal Verma, Shalu Agarwal, Latha A.PPDF |
5. |
An Optimal Linear Predictive Model for Missing Data Estimation in Wireless Sensor NetworkDoreswamy, Yogesh K MPDF |
6. |
Efficient Solution with Securities issue for Routing Protocol in Wireless NetworkBhagappa, Ravichandra V, Mithun D SouzaPDF |
7. |
Internet of Things in the Field of Mobile Tele-CommunicationSuman Antony Lasrado, Hancil Benedict SequeiraPDF |
8. |
Free and Open Source Software Ideology: Case StudyRamya V, Ashwini G D, Dr. Suma VPDF |
9. |
TADOOP: Traffic Analysis and Traffic Solution Using HadoopAshwini. E.M, Sunil. M.EPDF |
10. |
Air Pollution Clustering Using K-Means Algorithm in Smart CityDoreswamy , Osama A.Ghoneim, B R ManjaunathPDF |
11. |
A Compact Structure in Big Data Analytics to Substantiate the Threats in Computer-SecurityDr. Anthony Vincent. B, Rajesh HPDF |
12. |
A Comparative Analysis of Web Database and Local DatabaseShaunak Kundaiker, Larisa Pereira, Rizia Fernandes, Benson Da Silva , Hemalatha NPDF |
13. |
Rule Based Morphological Analyzer for Malayalam Nouns: Computational Analysis of Malayalam LinguisticsJancy Joseph, Dr. Babu AntoPDF |
14. |
Prosodic Features and Decision Trees in an Inter-session Speaker Verification SystemAthulya Jayakumar, Dr.Babu Anto PPDF |
15. |
In Silico Analysis of Prospective Influence of Staphylococcus Aureus Enterotoxin a on Selected NeurotransmittersJoby Pulikkan, Amitha Joy , Tony GracePDF |
16. |
Homology Modelling and Docking Analysis of CYP41 Protein in Response to Pyrethroids in Rhipicephalus microplusAmritha . A, Rajesh M.K , Gangaraj K.P , Reghu Ravindran, Tony GracePDF |
17. |
In Silico Analysis of Foxo3 Gene from African Bush Elephant (Loxodonta africana)DeepaA. V., Gangaraj K.P, Rajesh M.K, Tony GracPDF |
18. |
Conserved Phe-Arg in AVBD10 May Mediate Membrane DisruptionShalini K., Prasanth G. K, Gangaraj K. P., Rajesh M.K, Tony GracePDF |
19. |
ERepository: an ICT based E-Resource Portal Implementation for Academic InstitutionsAmar Michael SequeiraPDF |
20. |
Cloud Computing -A New Face for E-GovernanceBaretto Royce WinfredPDF |
21. |
Impact of Social Networking on Social Outlook of YouthRaisy, Clarida C Cardozo, Neesha, Yasmin MPDF |
22. |
AR Application Using Android OSAnup Raj K, Alroy D’Souza, Chandan Shanbhag, Daniel D’SouzaPDF |
23. |
A Study of Multi Dimensional - Integrated Load Balancing in Cloud Computing: Challenges and AlgorithmsSanthosh B, Tenzin YountenPDF |
24. |
Enhanced Proximity-Based Routing Policy for Service Brokering in Cloud EnvironmentSanthosh B, Aravind Prabhu,Usman,Dr Manjaiah D.HPDF |
25. |
HLF: A Dynamic Scheduling Algorithm for Task Scheduling in Cloud ComputingSanthosh B, Prachi Kaneria A , Dr. Manjaiah D.HPDF |
26. |
Marker Based Application in Augmented Reality Using AndroidMegha Shetty, Vineet Lasrado, Riyaz MohammedPDF |
27. |
A Novel AODV Routing protocol for Delay Sensitive Applications in MANETRavi.V, Vedamurthy H K, Dr. Pallapa VenkataramPDF |
28. |
Wireless Communication through Light Emitting Diodes: A New TechnologyBhavithraj, Vinaya J Rai, Ashiq P.M, Bisharath Abdul KhaderPDF |
29. |
Achieving Secure Communication in Wireless Sensor Networks using MES (Ver – I) StandardA.PraveenaPDF |
30. |
A Comparative Study on Different Hashing AlgorithmsC.G Thomas, Robin Thomas JosePDF |
31. |
A Comparative Study of Signalling Protocols Used In VoIPSuman Lasrado, Noel GonsalvesPDF |
32. |
Comparative Study on Security Issues in Mobile PlatformsC G Thomas, Poojitha APDF |
33. |
Steganography: Implementation on hidden data in a Digital ImageAkhil K.I , Nausheeda B.SPDF |
34. |
Comparative Analysis of Feature Selection AlgorithmsHancel Anacletus D’Souza, Mani Bushan D’SouzaPDF |
35. |
The Numerous Connotations Of Open Source TechnologyThanga Durai SPDF |
36. |
Sentimental Analysis using Supervised Learning AlgorithmsSachin Bharadwaj, Raghavendra U Karunakar, Vidya Lakshmi, Bharath Bhushan S. NPDF |
37. |
Comparative Analysis of Mapreduce Scheduling AlgorithmsBijoy Joseph, Mani Bushan D’SozuaPDF |
38. |
Challenges in Storage and Retrival of Healthcare Data:Review of various NoSQL TechnologiesRakesh Kumar, Florella Anna FernandesPDF |
39. |
Determining the Impact of Domain Independent Ontology over Transactional QueriesS.Ruban, Dr.S.Behin Sam, Naveen Thomas, Arun AngamalyPDF |
40. |
Role of Domain Specific Ontology in Processing Transactional QueriesS.Ruban, Dr.S.Behin Sam, Shins Sebu Kurian, Ajit LukosePDF |
41. |
Context Setting Using Ontology for Domino’s PizzaS.Ruban, Dr.S.Behin Sam, Harshitha, Lenita Veleza SerraoPDF |
42. |
A Study and Analysis of Information Retrieval ModelsS.Ruban, Dr.S.Behin Sam, Lenita Veleza Serrao, HarshithaPDF |
43. |
Web Scraping of Social NetworksRenita Crystal Pereira, Vanitha TPDF |
44. |
A Survey on Privacy Preserving Data MiningYashaswiniPDF |
45. |
Classification of Text Documents: Compressed Dictionary Based ApproachVidya Lakshmi, Sachin Bharadwaj , Prashal I S, Bharath Bhushan S. NPDF |
46. |
Optimal Search Algorithm for Text Recognition in Natural Language ProcessingKiran Philip, Manimozhi RPDF |
47. |
Structural Basis for Recognition of Gibberellin by its Receptor GID1 (GA-INSENSITIVE DWARF1) in Oil PalmShafeeq Rahman, Amal Vasu, Gangaraj K.P, Hemalatha N, Rajesh M.KPDF |
48. |
Construction of EST-SSR Marker Database in CoconutPreethi P, Divyalakshmi B, Naganeeswaran S, Hemalatha N, Rajesh M.KPDF |
49. |
Computational Analysis of Action of Fatty Acids from Coconut and Monolaurin on Peptide Deformylase of Clostridium difficileRachana K.E, Amal Vasu, Gangaraj K.P, Sabana A.A, Hemalatha N, Rajendra P., Rajesh M.KPDF |
50. |
Computational Prediction of the Secretome of Ganoderma lucidumRahul C.U, Merin Babu, Hemalatha N, Rajesh M.KPDF |
51. |
Computational Prediction of Magnesium Transporter Proteins in Rice (Oryzasativa)Hemalatha N, Praveen, Rajesh M.K, Eliza D.MPDF |
52. |
Edge Detection Techniques for Image SegmentationSrinivas B.L, Hemalatha, Jeevan K.APDF |
53. |
Identification of Therapeutic Drug for Non-Hodgkin’s Lymphoma Using Insilico MethodsEliza Denise Machado, Hemalatha NPDF |
54. |
Isolation, Structural Studies and Homology Modelling of 6-Phosphogluconate Dehydrogenase in CoconutLakshmi Jayaraj K, Amal Vasu, Gangaraj K.P, Bhavyashree U, Hemalatha N, Rajesh M.K, Anitha KarunPDF |
55. |
Block Based WLD: An Illumination Invariant Face Recognition ApproachM. Sharmila Kumari, Karthikeyan, S.M.PDF |
56. |
Analysis of β-tubulin protein in Phytophthora infestans using computational toolsGangaraj K. P., Sharadraj K. M, Prathibha V. H, Merin Babu, Hemalatha N, Rajesh M.K.PDF |
57. |
A Case Study of NGS Tools in BioinformaticsAbhirami T, Adithi P, Hemalatha NPDF |
58. |
Protein Function Prediction Using Machine Learning TechniquesSinchana H K, Hemalatha NPDF |
59. |
Medical Data Archive for Prevention of EpidemicsMohammed Manaz K A, Mohammed Murshid U M, Mahammad Zameel K, Avinash M NPDF |
60. |
A Comparative Study on Biometric Approach for Iris RecognitionRamya Prabhu, Sushma Rao, Nausheeda B.SPDF |
61. |
In silico prediction of interactionsbetween MAPK and WRKY proteins in coconutAmal Vasu, Rachana K.E, Gangaraj K.P., Hemalatha N, Rajesh M.K.PDF |
62. |
Women Micro Entrepreneurs – Issues & ChallengesJyothiPDF |
63. |
Customer Relationship Management Practices In Banking Sector - A Study With Reference To Selected Banks in Mangalore RegionThanuja, Ashwini K RPDF |
64. |
Customer Relationship Management in Hospitality Sector-A Case Study With Reference To the Gate Way Hotel, MangaloreSreeja M, Divya Jyothi, Divya P MohanPDF |
65. |
Customer Relationship Management in Banking Sector, An overviewVikram B.B, AnuradhaPDF |
66. |
eCommerce for SMEs Challenges and SolutionsShruti Jovita MenezesPDF |
67. |
Blended and M-Learning in Higher Education-A Study With Reference To Selected Private and Government Colleges of Karnataka StatePDF |
68. |
Smart Tourist GuideHarshitha, Ashwitha, Manisha, VaishnaviPDF |
69. |
Study on Electromagnetic Radiation from Cell Phone Towers and Their Effects on Animals, Plants and EnvironmentSuchetha Vijay, Asha Hegde, SushmaPDF |
70. |
"Traffic Block Alert” - A Utility Managed By a Traffic Police to Help Public to Elude From Traffic BlockBenecio Caetan Fernandes, Suman Shenoy, Hari Prasad S, Raghava ShettigarPDF |
71. |
The Impact of Social Media on YouthAnnapoorna Shetty, Reshma Rosario, Sawad HyderPDF |
72. |
Detecting Data Race Error using Enhanced Lockset AlgorithmSuchetha Vijaykumar, Roopa Karani, Shrushti AvatagiPDF |
73. |
Internet Security Based on Image ProcessingPrathvi, Roshan SuvarisPDF |
74. |
Privacy and Security Issues in Big Data with Special Reference to Healthcare SectorAbdul Mohisin, Mounika K, Rakesh KumarPDF |
75. |
A Survey of Hadoop Map Reduce Scheduling AlgorithmsMani Bushan DsouzaPDF |
76. |
Use of Agent Based Simulation Modeling in MarketingUse of Agent Based Simulation Modeling in MarketingPDF |