IJEDR(ISSN 2321-9939)
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH
(International Peer Reviewed, Open Access Journal )
ISSN: 2321-9939

Current Issue

Archives

For Authors

Forms / Downloads

Indexing Partner

LICENSE

Facts & Figures

Visitor Statistics


NC3N 2015 - National Conference | 25th April 2015

The National Conference on Computer Communication and Networking provides a forum for researchers in academia and industry to share the latest technologies and developments in this rapidly developing field. This conference stresses inter-disciplinary communication and affords valuable outreach opportunities to professionals and students alike.

The main aim of the conference is to bring out and share the latest research contributions in the area of Software Engineering and to gain exposure to the current demands and opportunities. The conference seeks solutions to challenging problems in different disciplines in the area of Software Engineering. The Conference is open to academicians and practitioners working in the broad area of Software Engineering. We hope to promote interaction among industry and academia through such conferences. Software is a primary enabler as well as major cost driver for our current and emerging systems.

 Title of Paper and Author Full Text

Vision Based Intelligent Traffic Analysis System For Accident Detection And Reporting System
GayathriElumalai, , O.S.P.Mathanki, , S.Swetha
Cite This Article| Downloads :68

Development Of Syllable Based Unit Selection Text-To-Speech Synthesis System For Tamil Using Three Level Fall Back Technique
V.Tamilselvi, Dr. P. Visu
Cite This Article| Downloads :73

Social Based Volunteer Computing For Sharing Cloud Resources
V.Divya, R.Nithya, A.Sneha
Cite This Article| Downloads :81

A Secure Approach For e-Voting Using Encryption And Digital Signature
Jena Catherine Bel.D, Savithra.K, Divya.M
Cite This Article| Downloads :78

A Relative Analysis Of Efficient Cluster-Based Routing Protocols In Wireless Sensor Network
N.Poornima,, M.Mahasree
Cite This Article| Downloads :104

Advanced Data Searching System With Spatial Database In PWS Framework
G.Sangeetha, G.Anishya
Cite This Article| Downloads :73

Improving Search Engine Results Using HITS Algorithm
Selva Priya K, Shrikkavi T , Sailakshmi B
Cite This Article| Downloads :61

Minimizing The Congestion For Data Transferring Tcp Impact On Rits Protocol For Wireless Network
E AnbumalarSakthe , S Mohanarangan
Cite This Article| Downloads :57

Authoritative Cropped Fingerprint Recognition Using Termination And Bifurcation
R.Sankaranarayanan, K.Shyamala
Cite This Article| Downloads :95

Enhanching Life Span for WSN Nodes Using LEACH, Huffman Data Fusion And TSP - NN Algorithm
M.Nagarajan, S.valli
Cite This Article| Downloads :95

Secured M-Commerce Transaction Using Mixed Fingerprint Authentication
K.Shanmugam, , Dr.B.vanathi, R.Arunprakash, R.Swaminathan, S.Vijayanand
Cite This Article| Downloads :92

Secure And Efficient Data Transmission In Wireless Sensor Network Using SET Protocols
K.Shanmugam, , Dr.B.vanathi, Azhagu Raja R, R.A.Priyanka, Shiyanashiny
Cite This Article| Downloads :96

Unsupervised Learning Of Video Image Model For Object Recognition Using Background Subtraction With AND-OR Template
S.Saravanan, Dr.B.vanathi, K.Shanmugam, D.Malathi, s.celinSindhya
Cite This Article| Downloads :81

Secure Data Retrieval In Wireless Networks Using Advance Encryption System
S.Shanthi, J.Nagendra Babu
Cite This Article| Downloads :110

Privacy-Preserving In Big Data With Efficient Metrics
N.Arun Kumar, S.Charumathy
Cite This Article| Downloads :97

Android Interface Based GCM Home Security System Using Object Motion Detection
R.Shalmika, Surya R , R Amirthavalli
Cite This Article| Downloads :117

Client Server Communication In Android OS Using Dynamic Key Security Algorithm
P.Kalaivani, S.Gayathri, Dr.R.Ramesh
Cite This Article| Downloads :77

Finger Print Based Attendance Management System
Sangeetha.J, Sivaranjani.S, Shalini.J
Cite This Article| Downloads :90

Context Related Policies On Data Isolation For Organizational Data Using Profiles
Vignesh.M, Aishwarya.K
Cite This Article| Downloads :80

Secure Energy Aware Anonymous Location Based Routing Protocol For Manet
A.Kumar
Cite This Article| Downloads :74

Custom XSD Legalize Web Application Tracer Against Unsought User Request
R. Narmadha Kumari, S.E.Benita Galaxy
Cite This Article| Downloads :101

Efficient Secret Data Sharing Using Multimedia Compression Paradigm
E. Munuswamy, M.Ferni ukrit
Cite This Article| Downloads :85

Verfiable Cryptographic Based Data Transformation System
A.T.Tamilselvi, C.S.Somu
Cite This Article| Downloads :108

Validation Logic Through Turn Around Time For Collusion Attack In Wireless Sensor Environment
Christy Grace M A, Jebasheela A
Cite This Article| Downloads :92

Automatic Identification ECG Anomalus Using XML Data Processing
F.G.Anusha, A.Jeba Sheela
Cite This Article| Downloads :87

Automated Toll Plaza Verification System For An Automobile At A Check Point
N.Poornima, M.P.Arvindhan, R.Karthikeyan, S.Gokul Raj
Cite This Article| Downloads :104

Issues And The Advantages Of Wireless Network
N.Poornima, R.Abinaya, S.Gowri
Cite This Article| Downloads :87

Intensifying Security Using Multifactor Authentication For Mobile Banking
P.Rajalakshmi, R.sangeetha, Dr.B.Vanathi, K.shanmugam, S.celinsindhya
Cite This Article| Downloads :152

ISSN Details



DOI Details



Providing A digital object identifier by DOI
How to get DOI?

For Reviewer /Referral (RMS)

Important Links

NEWS & Conference

Digital Library

IJEDR RMS

Our Social Link

Open Access

This material is Open Knowledge
This material is Open Data
This material is Open Content
© Copyright 2017 IJEDR.ORG All rights reserved