IJEDR(ISSN 2321-9939)
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH
(International Peer Reviewed, Open Access Journal )
ISSN: 2321-9939

Current Issue

Archives

For Authors

Forms / Downloads

Indexing Partner

LICENSE

Facts & Figures

Visitor Statistics


NCISECT 2015 - National Conference | 25th-26th Mar 2015

Organized By

In Association With

The National Conference on Impact of Software Engineering in Computer Technologies provides a forum for researchers in academia and industry to share the latest technologies and developments in this rapidly developing field. This conference stresses inter-disciplinary communication and affords valuable outreach opportunities to professionals and students alike.

The main aim of the conference is to bring out and share the latest research contributions in the area of Software Engineering and to gain exposure to the current demands and opportunities. The conference seeks solutions to challenging problems in different disciplines in the area of Software Engineering. The Conference is open to academicians and practitioners working in the broad area of Software Engineering. We hope to promote interaction among industry and academia through such conferences. Software is a primary enabler as well as major cost driver for our current and emerging systems.

  Brochure   Paper Format   Copyright Form Download Proceedings

 Title of Paper and Author Full Text

A Collaborative Approach to Enhance Security in Location Based Services by Answering Range Queries in WSN
Anandhi.B , Amudha.S
Cite This Article| Downloads :93

Analysis Detection And Prevention Of Users From Click Jacking Attack Using DDOS
Jeena James, Agnes.A, Hajera.S.H
Cite This Article| Downloads :90

Scheming an Hybrid Architecture for High Secure M-Commerce Applications
W.S.Callina Jeba Kumari, Mrs.P.Asha
Cite This Article| Downloads :73

Secure Biometric Cryptosystem Which Follows Multimodal Approach for Biometric Key Generation
Ankit Joshi, Nitesh Singh, K Vijayakumar
Cite This Article| Downloads :91

Secure Transmission in UAV Intelligence
P.Nirmala Deve, Dr.V.Dhanakoti
Cite This Article| Downloads :81

A Payable Secured Monitoring System for Video Streaming and Detecting Content Leakage in Trusted Networks
K.BhavanaPriya, M.Azhagiri
Cite This Article| Downloads :69

An Exclusive Survey on Cluster Based Key Management Techniques in MANET
K. Gomathi, Dr. B. Parvathavarthini
Cite This Article| Downloads :80

Data Confidentiality Enabled Deduplication Scheme Using Convergent Keys - Deduplication Scheme in Cloud Storage
Deepa.D , Revathi.M
Cite This Article| Downloads :96

Detection of Anomaly in Network Traffic utilizing SVM Classification Model
Jabez J, Dr.B.Muthu Kumar
Cite This Article| Downloads :78

Internet Protocol Version 6
Siddharth Syal, Sebu Elias, Krishnapriya S
Cite This Article| Downloads :68

Private Badges for Geosocial Networks Used In Real Time Application
R.Krithiga, V.Muthamilselvi
Cite This Article| Downloads :74

Uncompromised Query Services with Optimal Privacy Preservation Schemes
Iswarya.U , Ruhin Kouser.R
Cite This Article| Downloads :91

Proffer for Landslide Monitoring in Multi sensor Networks
Aruna Shankaralingam, Prahitha.K , Monica R
Cite This Article| Downloads :78

Attribute based Encryption and Key Distribution for Secure Storage in Clouds
R.Vaishali , M.Menaka
Cite This Article| Downloads :88

Cloud Storage System Enabling Data Security Using Third Party Auditor
Krishnaselvi.L, Kanimozhi.S
Cite This Article| Downloads :86

Enhancing Authorization of XML File Using Watermark
Arun Thomas .K, Mrs. J.Jeysasudha
Cite This Article| Downloads :88

Enhancing Quality of Multiple Access Data of the System in Cloud with Caching Algorithm
Siva Chandran R, Jothi B
Cite This Article| Downloads :84

Identity Based Multicloud Data Possession
Y MeenaPriyadarshini, Dr.P S K Patra, S Prakash
Cite This Article| Downloads :87

Ingress defined cloud based multivariate retaliation structure with caching
G.Janaki , M.Menaka
Cite This Article| Downloads :87

Privacy Proven Public Auditing Scheme in Cloud - Public Auditing For Multiple Tasks
Inbarasi.K, Dr.Arivazhagu.U.V.
Cite This Article| Downloads :74

Securing Sensitive Data in Public Cloud by Using Attribute Based Encryption and Digital Watermarking
Vishnu S, Mrs. Krishnaveni S.
Cite This Article| Downloads :76

A comparative study of effort estimation techniques using back propagation algorithm
S. Abbinaya, M. Senthil Kumar
Cite This Article| Downloads :85

An Efficient Cancer Data Clustering Based On Ant Colony Optimization
P.Lakshmidevi , K.Chinetha
Cite This Article| Downloads :74

Analysis of Information Retrieval using Query Extraction Techniques
Tagore Kumar Tummapudi, Uma M
Cite This Article| Downloads :80

Mining Current Topics Based On Client Elucidation
Bavithra.N , Rajesh.P
Cite This Article| Downloads :117

Refinement in Meta Search Engine for Effective Results Based On Relevance Feedback
Kayalvizhi.C, Swaraj Paul.C
Cite This Article| Downloads :81

An Unbiased Approach for Clustering Large Data - A Time Complexity Efficient Approach
Rajarshi dev Choudhary, Akash Goenka, Mr. S.Karthik
Cite This Article| Downloads :86

Accessing a Remote Desktop of a Client Using Remote Frame Buffer Protocol through Virtual LAN Cable
M Maheswari, Anindita Bora, Apurv Saxena
Cite This Article| Downloads :83

Expert System for Health Care Data Stored On the Cloud
Anvika , Swathy Priya
Cite This Article| Downloads :74

Smart File Sharing
V.SivaBalaSarathi, U.M.Raghuvaran, KodelaHimajaSushma, ParthSharma
Cite This Article| Downloads :84

A Path Confusion Algorithm to Prevent Intrusion
Ramesh, Senthil Kumaran, Shiny Angel
Cite This Article| Downloads :76

Online Advertising In Website through Related Latent Topic Models Using Latent Dirichlet Allocation Algorithm
M. Maheswari, Sanjana Nahar, Tanuj Agarwal
Cite This Article| Downloads :77

Secure Communication in Decentralized Disruption Tolerant Military Networks Using CP-ABE and 2PC Protocol
Nayanika Bhargava, SahilBhasin, J.Jeyasudha
Cite This Article| Downloads :85

Review on Encryption Techniques of Personal Health Records in Cloud Computing
Anparasi K, ShanthaVisalakshi U
Cite This Article| Downloads :97

An Automated Negotiation Model for SLA Based Decision Support System in Cloud Environment
P.Sujan kumar reddy, Ameneni Thanuja , Mrs.S.krishnaveni
Cite This Article| Downloads :108

An Automated Approach for suggesting Tag based Questions and their Solutions
Gulshan Vaish, Anirudh Negi, B. Jothi
Cite This Article| Downloads :105

Amalgamation- Data Redemption Model
Priyavarshini C U, R.Harish kumar, Mrs.S.krishnaveni
Cite This Article| Downloads :95

Relevant Web Document Retrieval and Summarization
P.Selvapriyavadhana, Dr.PSK. Patra, W. Mercy
Cite This Article| Downloads :98

A Secure i-Trust Scheme in Delay Tolerant Networks
S.Nathiya, J.Daphney Joann
Cite This Article| Downloads :105

Angst Management Technology
Hemanth gupta, Sasi Rekha Sankar, Deep Deb
Cite This Article| Downloads :202

ISSN Details



DOI Details



Providing A digital object identifier by DOI
How to get DOI?

For Reviewer /Referral (RMS)

Important Links

NEWS & Conference

Digital Library

IJEDR RMS

Our Social Link

Open Access

This material is Open Knowledge
This material is Open Data
This material is Open Content
© Copyright 2017 IJEDR.ORG All rights reserved