Most Cited, Cited

Title
Cited by
Year
A study on NSL-KDD dataset for intrusion detection system based on classification algorithms

L Dhanabal, SP Shantharajah

1042 2015
IoT based smart agriculture

N Gondchawar, RS Kawitkar

736 2016
Analysis of e-commerce and m-commerce: advantages, limitations and security issues

M Niranjanamurthy, N Kavyashree, S Jagannath, D Chahar

433 2013
A survey on image classification approaches and techniques

P Kamavisdar, S Saluja, S Agrawal

345 2013
The impact and limitations of artificial intelligence in cybersecurity: a literature review

MF Ansari, B Dash, P Sharma, N Yathiraju

224 2022
The study of e-commerce security issues and solutions

M Niranjanamurthy, D Chahar

214 2013
Network simulation tools survey

S Siraj, A Gupta, R Badgujar

202 2012
Data mining techniques and applications to agricultural yield data

D Ramesh, BV Vardhan

187 2013
Effective pre-processing activities in text mining using improved porter’s stemming algorithm

C Ramasubramanian, R Ramya

181 2013
Solar radiation machine learning production depend on training neural networks with ant colony optimization algorithms

E El-kenawy

179 2018
A comparative study on decision tree and random forest using R tool

TR Prajwala

167 2015
Web based student information management system

SR Bharamagoudar, RB Geeta, SG Totad

161 2013
A survey on machine learning techniques for intrusion detection systems

J Singh, MJ Nene

158 2013
WEKA approach for comparative study of classification algorithm

TC Sharma, M Jain

151 2013
Comparative analysis of bayes and lazy classification algorithms

S Vijayarani, M Muthulakshmi

137 2013
Big data–concepts, applications, challenges and future scope

S Mukherjee, R Shaw

135 2016
Cloud computing basics

J Srinivas, KVS Reddy, AM Qyser

134 2012
Data security and privacy in cloud storage using hybrid symmetric encryption algorithm

L Arockiam, S Monikandan

126 2013
A survey of noise removal techniques for ECG signals

B Chandrakar, OP Yadav, VK Chandra

125 2013
Overview of cyber security

PS Seemma, S Nandhini, M Sowmiya

122 2018
A leaf recognition technique for plant classification using RBPNN and Zernike moments

AH Kulkarni, HM Rai, KA Jahagirdar, PS Upparamani

110 2013
Anti-phishing techniques–a review of Cyber Defense Mechanisms

P Sharma, B Dash, MF Ansari

107 2022
A comparative analysis of image interpolation algorithms

PS Parsania, PV Virparia

104 2016
A survey on association rule mining

T Karthikeyan, N Ravikumar

102 2014
Title
Cited by
Year
A comparative study on advances in leach routing protocol for wireless sensor networks: A survey.

A Braman, GR Umapathi

99 2014
Object recognition by template matching using correlations and phase angle method

K Ahuja, P Tuli

97 2013
A brief study and comparison of snort and bro open source network intrusion detection systems

P Mehra

94 2012
Feature selection using ReliefF algorithm

RPL Durgabai, YR Bhushan

93 2014
Prediction of chronic kidney disease using machine learning algorithm

S Tekale, P Shingavi, S Wandhekar, A Chatorikar

92 2018
A study of various face detection methods

V Gupta, D Sharma

92 2014
A review paper on text summarization

DK Gaikwad, CN Mahender

90 2016
RFID based smart shopping and billing

Z Ali

87 2013
A tutorial review on Text Mining Algorithms

S Ghosh, S Roy, SK Bandyopadhyay

84 2012
Short text classification using kNN based on distance function

K Khamar

82 2013
Analysis of SEER dataset for breast cancer diagnosis using C4. 5 classification algorithm

K Rajesh, S Anand

82 2012
Intrusion detection systems: A survey and analysis of classification techniques

V Jaiganesh, S Mangayarkarasi, P Sumathi

81 2013
Internet of Things (IoT) based weather monitoring system

BS Rao, KS Rao, N Ome

80 2016
Smart home control by using raspberry pi and arduino uno

HH Hadwan, YP Reddy

Int. J. Adv. Res. Comput. Commun. Eng 5 (4), 283-288

78 2016
An analysis on opinion mining: techniques and tools

G Angulakshmi, R ManickaChezian

76 2014
Implementation of image processing on Raspberry Pi

KS Shilpashree, H Lokesha, H Shivkumar

74 2015
A survey on different noise removal techniques of EEG signals

P Khatwani, A Tiwari

74 2013
Tomato plant disease detection using image processing

S Vetal, RS Khule

71 2017
Machine learning: applications in Indian agriculture

K Kaur

71 2016
A comparative analysis: Grid, cluster and cloud computing

K Kaur, AK Rai

71 2014
Design and simulation of handwritten multiscript character recognition

N Anjum, T Bali, B Raj

68 2013
Intelligent accident identification system using GPS, GSM modem

S Sonika, K Sathiyasekar, S Jaishree

67 2014
Data mining: Task, tools, techniques and applications

SD Gheware, AS Kejkar, SM Tondare

63 2014
Dispersion compensation with dispersion compensating fibers (DCF)

M Kaur, H Sarangal, P Bagga

61 2015
Different scheduling algorithms in different cloud environment

E Shimpy, MJ Sidhu

61 2014
A novel based approach for extraction of brain tumor in MRI images using soft computing techniques

A Sivaramakrishnan, M Karnan

61 2013

and more..

Open chat
Chat with IJARCCE