Most Cited, Cited

Title
Cited by
Year
A study on NSL-KDD dataset for intrusion detection system based on classification algorithms

L Dhanabal, SP Shantharajah
938 2015
IoT based smart agriculture

N Gondchawar, RS Kawitkar
702 2016
Analysis of e-commerce and m-commerce: advantages, limitations and security issues

M Niranjanamurthy, N Kavyashree, S Jagannath, D Chahar
410 2013
A survey on image classification approaches and techniques

P Kamavisdar, S Saluja, S Agrawal
337 2013
The study of e-commerce security issues and solutions

M Niranjanamurthy, D Chahar
205 2013
Network simulation tools survey

S Siraj, A Gupta, R Badgujar
194 2012
Data mining techniques and applications to agricultural yield data

D Ramesh, BV Vardhan
187 2013
The future revolution on big data

A Syed, K Gillela, C Venugopal
180 2013
Effective pre-processing activities in text mining using improved porter’s stemming algorithm

C Ramasubramanian, R Ramya
173 2013
Medical Device Qualification Use

SS Gadde, VDR Kalli
163 2020
The impact and limitations of artificial intelligence in cybersecurity: a literature review

MF Ansari, B Dash, P Sharma, N Yathiraju
161 2022
A survey on machine learning techniques for intrusion detection systems

J Singh, MJ Nene
154 2013
Web based student information management system

SR Bharamagoudar, RB Geeta, SG Totad
153 2013
WEKA approach for comparative study of classification algorithm

TC Sharma, M Jain
146 2013
A comparative study on decision tree and random forest using R tool

TR Prajwala
142 2015
Comparative analysis of bayes and lazy classification algorithms

S Vijayarani, M Muthulakshmi
131 2013
Big data–concepts, applications, challenges and future scope

S Mukherjee, R Shaw
128 2016
Cloud computing basics

J Srinivas, KVS Reddy, AM Qyser
128 2012
A survey of noise removal techniques for ECG signals

B Chandrakar, OP Yadav, VK Chandra
126 2013
Solar radiation machine learning production depend on training neural networks with ant colony optimization algorithms

E El-kenawy
125 2018
Data security and privacy in cloud storage using hybrid symmetric encryption algorithm

L Arockiam, S Monikandan
124 2013
A leaf recognition technique for plant classification using RBPNN and Zernike moments

AH Kulkarni, HM Rai, KA Jahagirdar, PS Upparamani
117 2013
Overview of cyber security

PS Seemma, S Nandhini, M Sowmiya
112 2018
Title
Cited by
Year
Object recognition by template matching using correlations and phase angle method

K Ahuja, P Tuli
99 2013
A survey on association rule mining

T Karthikeyan, N Ravikumar
97 2014
A study of various face detection methods

V Gupta, D Sharma
96 2014
A brief study and comparison of snort and bro open source network intrusion detection systems

P Mehra
96 2012
A comparative study on advances in leach routing protocol for wireless sensor networks: A survey.

A Braman, GR Umapathi
92 2014
Feature selection using ReliefF algorithm

RPL Durgabai, YR Bhushan
90 2014
Big Data-solutions for RDBMS problems-A survey

SV Phaneendra, EM Reddy
90 2013
Anti-phishing techniques–a review of Cyber Defense Mechanisms

P Sharma, B Dash, MF Ansari
88 2022
A comparative analysis of image interpolation algorithms

PS Parsania, PV Virparia
86 2016
A review paper on text summarization

DK Gaikwad, CN Mahender
84 2016
RFID based smart shopping and billing

Z Ali
84 2013
A tutorial review on Text Mining Algorithms

S Ghosh, S Roy, SK Bandyopadhyay
83 2012
Intrusion detection systems: A survey and analysis of classification techniques

V Jaiganesh, S Mangayarkarasi, P Sumathi
81 2013
Analysis of SEER dataset for breast cancer diagnosis using C4. 5 classification algorithm

K Rajesh, S Anand
80 2012
A survey on different noise removal techniques of EEG signals

P Khatwani, A Tiwari
77 2013
Internet of Things (IoT) based weather monitoring system

BS Rao, KS Rao, N Ome
76 2016
Implementation of image processing on Raspberry Pi

KS Shilpashree, H Lokesha, H Shivkumar
76 2015
Short text classification using kNN based on distance function

K Khamar
75 2013
Prediction of chronic kidney disease using machine learning algorithm

S Tekale, P Shingavi, S Wandhekar, A Chatorikar
74 2018
Smart home control by using raspberry pi and arduino uno

HH Hadwan, YP Reddy
72 2016
A comparative analysis: Grid, cluster and cloud computing

K Kaur, AK Rai
72 2014
An analysis on opinion mining: techniques and tools

G Angulakshmi, R ManickaChezian
71 2014
Intelligent accident identification system using GPS, GSM modem

S Sonika, K Sathiyasekar, S Jaishree
71 2014
A Qualitative Comparison of Techniques for Student Modelling in Intelligent Tutoring Systems

SS Gadde, VDR Kalli
69 2020
Overview of wireless sensor network: a survey

SK Gupta, P Sinha
67 2014
A survey on feasibility and suitability of blockchain techniques for the e-voting systems

UC Çabuk, E Adiguzel, E Karaarslan
66 2020
Machine learning: applications in Indian agriculture

K Kaur
66 2016
Dispersion compensation with dispersion compensating fibers (DCF)

M Kaur, H Sarangal, P Bagga
62 2015
Data mining: Task, tools, techniques and applications

SD Gheware, AS Kejkar, SM Tondare
61 2014
Canny edge detection algorithm

AL Kabade, VG Sangam
60 2016
Different scheduling algorithms in different cloud environment

E Shimpy, MJ Sidhu
60 2014
Heart disease prediction system using Naive Bayes and Jelinek-mercer smoothing

RR Patil
60 2014
A novel based approach for extraction of brain tumor in MRI images using soft computing techniques

A Sivaramakrishnan, M Karnan
59 2013

and more..

Open chat
Chat with IJARCCE