📞 +91-7667918914 | ✉️ ijarcce@gmail.com
IJARCCE Logo
International Journal of Advanced Research in Computer and Communication Engineering A monthly Peer-reviewed & Refereed journal
ISSN Online 2278-1021ISSN Print 2319-5940Since 2012
IJARCCE adheres to the suggestive parameters outlined by the University Grants Commission (UGC) for peer-reviewed journals, upholding high standards of research quality, ethical publishing, and academic excellence.
← Back to Archives

VOLUME 4, ISSUE 3, MARCH 2015

Extracting Frequent Sequences from Web Log Data using Sequence Tree Algorithm

Priyanka Baraskar, Supriya Chavan, Dipshree Dhage, Samruddhi Giri, Jayashree Jha

Client Hacked Server: Application Scenario for Malicious Web Control

Ajit Prakash Alijad, Pritam Vishnu Aher, Sujata Ashok Chechare, Vishal Eknath Ghume

Weather Forecasting and Climate Changing Using Data Mining Application

Ankita Joshi, Bhagyashri Kamble, Vaibhavi Joshi, Komal Kajale, Nutan Dhange

Crime Investigation using Data Mining

S.R.Deshmukh, Arun S. Dalvi, Tushar J .Bhalerao , Ajinkya A. Dahale , Rahul S. Bharati,Chaitali R. Kadam

Cyber Crime: Prevention & Detection

Ms M Lakshmi Prasanthi, Tata A S K Ishwarya

An Automated Agricultural Robot

Leenata Vedpathak, Pooja Salape, Snehal Naik

Mindwave-A New Way to Detect an Eye Blink

Sanket Ghorpade, GurjarPooja V., TripathiGauravV., Asst.Prof. S. R. Patil

Privacy Preserving Association Rule Mining in Retail Industries

Mr. Yewale Aniket J, Mr. Rajput Virendra D, Mr. Shirapure Sagar B, Mr. Patel Hardik K

An Alternative For Database Queries:Auto Query Forms

Rohidas B. Sangore, Pratik P.Bhavsar, Manish S.Patil, Tushar M.Chaudhari

Road Quality and Ghats Complexity analysis using Android sensors

Prof. V. P. Tonde,Amol Jadhav, Shreyas Shinde, Ashish Dhoka, Sandeep Bablade

Cloud Data Security Using Third Party Auditing and Encryption

Alpesh D.Patil, Abhijit T. Sapkale, Bhushan D.Shimpi , Archana K. Bhavsar

Analysis of Human Age Estimation Process

Husain Lakdawala , Rehan Mastan , Jibran Patel, Er. Nazneen Pendhari

Image Validation by Demosaicing

Pravin Dangale, Prashant Amage,Siddharth Ubale, Dnyaneshwar Jadhav,G.M.Gaikwad

Mongo DB GUI Operation Using Python

Sarkarsinha H. Rajput, Anand S. Jain, Priyanka B. Patil, Mahesh D. Patil

Advance Computer Efficient Streaming and Sharing in the Clouds

Nitesh Chainani, Kishor Phapale, Roshan Pawar, Sagar Deshmukh, Prof. N.A. Dhawas

Congestion Control for Mobile Robots

Shashi Kant, Pushkar Shukla, Shehjar Safaya

Two Round Searchable Encrypted Data using Multi-Keywords for Cloud Computing

Mr. H.D.Gadade, Miss.Pranita U. Shinganwade, Miss. Punam S. Wanare,Miss. Vibha Badhe

Credit Card Fraud Detection using Hidden Markov Model

AashleshaBhingarde, AvnishBangar, Krutika Gupta, SnigdhaKarambe

Android Application to get Answer through Voice

Mr. Prof. P. D. Hasalkar, Ms. Masaratjahan I. Kudle, Mr. Prasad N. Chaudhari, Mr. Deepak B. Mali, Ms. Mohammadi M. Kamplee

Separable Data Hiding Using AES Algorithm

Sneha Rankhambe, Shital Sasane, Kirti Shelke

To Support Search as You type by using MySQL in Databases

Gaikwad Namrata, Mahajan Chetan, Abhishek Ranjan, Manish Kumar, Prof. Manisha Galphade

A Hybrid Piezoelectric-Solar Based Power Generation System

Ms. Bhusari Priya Govind, Ms. Chavan Deepika Limchan, Ms. Kadam Pratibha Dattatray, Mr.A.B.Vitekar

A Neural Network Approach for Real Time Emotion Recognition

Atul Chavhan, Sneha Chavan, Samiksha Dahe, Santosh Chibhade

Interior Design in Augmented Reality Environment

Prof. B.Y.Jani, Pratiksha Dahale, Ankita Nagane, Bhavika Sathe, Nilam Wadghule

Prepaid Metering System

Ms.Neha Choudhary, Ms. Namrata Patil, Ms.Snehal Chaudhari, Mr.S.H.Rajput

Web Service Recommendation Using QOS Parameters and Users Location

Asst.Prof. N.K. Patil, Priyanka pawar, Shankar More, Bhausaheb Tupe

Effective Cryptposystem using MRGA with Steganography

Kunal Jain, Jitender Singh, Rushikesh Kapadnis, Bharti Dhote

An Efficient Fuzzy Association Rule Mining Technique

Gajendra Singh Rajput, Nayna Sharma, Shashank Swami

Lung Cancer Detection Using Artificial Neural Network & Fuzzy Clustering

Masaood A. Hussain, Tabassum M. Ansari, Prarthana S. Gawas, Nabanita Nath Chowdhury

High Frequency Sound Based Device Communication

Sahil Lakhwani, Nishant Pardamwar, Nikhil Khewalkar

A 9 Slotsdual Band Microstrip Patchantenna for Wireless applications

G.Vijaya Kumari, P.Venkanna Chowdary, K.Madhulatha, M. Dinesh Kumar, K. Anand Sagar

Single-ElectronTransistor Logic for High Reliability of Moore’s Law and Low Power VLSI

P. Vidya Sekhar, M. Saran Chowdary, A.Vamsidhar, P.V.S.Sri Ram, N.Venkateswarulu

Measuring Code Quality

Ms. Dhanshree Kapse, Ms. Karishma Kabra, Ms. Madhavi Chopade, Mr. Kailas Palhal

Secure Database as a Service-a Review

Prof Swarnalata Bollavarapu, Kamal Mistry

Data Leakage Detection Using LSB

Sanchit S. Mhatre, Vaibhav V. Kakhandaki , Bhagyashri P. Yeola, Rakesh Badodekar

Hand Geometric Recognition System based on Support Vector Machines (SVM)

GafarZenAlabdeenSalh, Abdelmajid Hassan Mansour, Malaz Fatah Elrahman Mohammed

Online Social Networking Sites that are used for Specific Purpose

Dr. H Venkateswara Reddy, Tata A S K Ishwarya, Divya Bharathi Mulupuri

Performance Analysis of Various Routing Protocols in Wireless Network 

Aparna Joshi, Rahul Desai, Sachin Yadav, Avinash Thakur, Sunil Singh, Abhishek

Use of Cryptography and Secrete Sharing riven the Secrete into Multi-Cloud

Sanket Bora, Sandip Karale, Dheeraj Katariya, Ganesh Shejwal, P. P. Ahire

Secure Application Development in Academics

Ms. P.B.Alappanavar, Mr. Shashank A. Rangole

Analysis of Virtualization Tools and Techniques

Mrs. Kavita S, Mrs. Dakshyani G, Mrs. Kiruthika

Audio watermarking: A Novel approach using hybridization of DWT+DCT

Mrunali J. Patel, Dhavalsinh V. Solanki, Dr. K. R. Borisagar

Dynamic Nearest Neighbour Search With Keywords

MINOJINI N, GAYATHRI R KRISHNA, REKHA A, SOWMIYAA P

Analysis of Cry in New Born Infants

Dhanashri U.S. Talauliker , Nayana Shenvi

Association Policy for XML Query Answering By Mining Tree

Shambhu Kumar Singh, Sachinkumar S. Patil, Abhinay C. Deshmukh, Suraj C. Jadhav, Nilesh Rajput

Fault Node Recovery Algorithm for a Wireless Sensor Network

Mulla Imroj A, Shaikh Tareque A, Diware Ajinkya G, Prof.Kadam Vikas

Data Mining Techniques For Diagnosis And Prognosis Of Cancer

Jaimini Majali, Rishikesh Niranjan, Vinamra Phatak, Omkar Tadakhe

Fingerprint Based Attendance System

Karthik Krishnamurthi, S. Irudaya Mary, B. N. Sumalatha, Adler Pereira

Traffic and Weather Monitoring System Using Wireless Sensor Networks

Dinesh Kulkarni, Sohail Shaikh, Amol Shirsath, Tejaswini Kadam

Deportation of Market Manipulation using ADS

Vaishali Ingale, Mohnish Chaudhary, Rashmi Sharma , Ravinder Kumar, Vaishnavi Pimpalnerkar