📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to Archives

NCORETECH-16

NCORETECH-16

An Efficient Annotation of SRRS Based on XML

Thushara K P, Varsha Philip

A Feasibility Study on Real-Time Gender Recognition

Jacob Joseph, Dr. K A Navas

|PDF

A Survey of Computer Vision based methods for Violent action Representation and Recognition

Febin I P, Jayasree K

|PDF

A Secure Payment Scheme in Multihop Wireless Network Using Shortest Reliable Routing

Ms. Jyothi Padmanabhan, Ms. Navya E K

|PDF

Enhanced Broker-Less Publish/Subscribe System

Monisha P Mohanan, Shanjana C

|PDF

A Comparison of SIFT and SURF Algorithm for the Recognition of an Efficient Iris Biometric System

Sheena S, Sheena Mathew

|PDF

Cost-effective and Secure Data Sharing in MANET

Lincy M, Anju J

|PDF

Encryption with Ordered Bucketization and Dynamic Query Forms

Shameema Thasneem, Pragisha K

|PDF

Enhanced Face Recognition in RGB-D Images

Amrutha Damodaran, Pragisha.K

|PDF

A New Way of Topic Modeling Using MALLET for Current Job Trends

Athira M, Bhavya K, Soorya K, Ajeesh Ramanujan, Anoop V.S

|PDF

Integrating Cloud Computing For Internet of Things Based Intelligent Transport System

Amrutha M

|PDF

Smart App based Shopping Trolley Assisted by RFID

Ameen Abdul Hameed P, Nineesha P

|PDF

Recent Trends in Image Retrieval Techniques for the Big Data Platform: A Survey

O K Girija, M. Sudheep Elayidom

|PDF

Wavelet Based Resolution Enhancement with Noise Reduction Method for Panoramic Dental X-ray Images

Shanida K, Shayini R, Sindhu C S

|PDF

Sec-DiDrip: A Distributed Data Dissemination Protocol with Enhanced Security

Sruthi K, Binoy DM Panicker

|PDF

Retinal blood vessel extraction

Surya G, Pratheesh M Vincent, Shanida K

|PDF

English Text to Malayalam Speech Translation

Deepthy P S

|PDF

Prevention of Dos and DDoS Attack Using Cryptographic Techniques

Soumya Suresh, Kiran V K

|PDF

An Efficient and Secured way of Routing in Hybrid WSN

Aswani Raj N P, Kiran V K

|PDF

Secured Self Destructing Data System Based on Active Storage Framework

Swathi J, Anagha Achuthan

|PDF

A Survey on Quality Enhancing Local Descriptor for Biometric Spoofing Detection Using Various Techniques

Sneha B K, T V Mridula

|PDF

Enhanced Image Security via Cryptography and Sound Steganography

Sukina K, Reshna T

|PDF

Advancements in Machine Translation as a part of Natural Language Processing in Python

Fathimath Shouna Shayyam C A, Pragisha K

|PDF

A Fast and Secure Scheme for Search over Encrypted Data

Malihabi V P, Kiran V K

|PDF

ASMR: Anonymous Secure Multicast Routing

Sudhesh K M, Kiran V K

|PDF

Cloud Security using EHASBE

Vinisha .C, Anju .J

|PDF

A General Decentralized Clustering Using K-Harmonic Means

Shabana AS, Rajesh Kumar PM

|PDF

Threshold Cryptography-based Group Authentication Scheme for the Smart Home Environments

Geetha A V, Rajesh Kumar PM

|PDF

Provable Dynamic Multi Data Copy Possession in Cloud Storage

Sneha Josmi Sam, Vinodu George

|PDF

Multi-Hop Communication for Home Automation with Enhanced Security Using ARM and RTOS

Jithesh Puthenkovilakam

|PDF

Transliteration in Malayalam Using Deep Learning

Shilpa Krishnan, Usha K

|PDF

SecDedup: A Secure Way for Maximizing Space Savings in Cloud Storage

Bushra K.R., Sindhu S

|PDF

Trust Aware Watchdog Mechanism to Detect Selfish Node in MANET

Resmi C. S, Sindhu S

|PDF

Key Aggregate Cryptosystem for Scalable Data Sharing with Policy Based File Assured Deletion for Secure Data Storage in Cloud

Dhanya K K, Sindhu S

|PDF

Authentication to Cloud Using Modified Double Ceasar Cipher

Chanda Raju, Arif Mohammad Abdul, M Kiran Sastry

|PDF

Sentiment Analysis in Malayalam

Thulasi P K

|PDF

An EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION USING DITHERING

Amina Shereen O V, Lijina S S

|PDF

A Survey on Various Techniques for Detection of Diabetic Retinopathy in Retinal Fundus Images

Archana K, Praveen Kumar K

|PDF