IJEDR(ISSN 2321-9939)
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH
(International Peer Reviewed, Open Access Journal )
ISSN: 2321-9939 | ISSN approved | Approval for UGC Applied

Current Issue

Archives

For Authors

Forms / Downloads

Indexing Partner

Research Area

LICENSE

Facts & Figures

Visitor Statistics


NC3N 2015 - National Conference | 25th April 2015

The National Conference on Computer Communication and Networking provides a forum for researchers in academia and industry to share the latest technologies and developments in this rapidly developing field. This conference stresses inter-disciplinary communication and affords valuable outreach opportunities to professionals and students alike.

The main aim of the conference is to bring out and share the latest research contributions in the area of Software Engineering and to gain exposure to the current demands and opportunities. The conference seeks solutions to challenging problems in different disciplines in the area of Software Engineering. The Conference is open to academicians and practitioners working in the broad area of Software Engineering. We hope to promote interaction among industry and academia through such conferences. Software is a primary enabler as well as major cost driver for our current and emerging systems.

 Title of Paper and Author Full Text

Vision Based Intelligent Traffic Analysis System For Accident Detection And Reporting System
GayathriElumalai, , O.S.P.Mathanki, , S.Swetha
Cite This Article| Downloads :172

Development Of Syllable Based Unit Selection Text-To-Speech Synthesis System For Tamil Using Three Level Fall Back Technique
V.Tamilselvi, Dr. P. Visu
Cite This Article| Downloads :182

Social Based Volunteer Computing For Sharing Cloud Resources
V.Divya, R.Nithya, A.Sneha
Cite This Article| Downloads :174

A Secure Approach For e-Voting Using Encryption And Digital Signature
Jena Catherine Bel.D, Savithra.K, Divya.M
Cite This Article| Downloads :177

A Relative Analysis Of Efficient Cluster-Based Routing Protocols In Wireless Sensor Network
N.Poornima,, M.Mahasree
Cite This Article| Downloads :215

Advanced Data Searching System With Spatial Database In PWS Framework
G.Sangeetha, G.Anishya
Cite This Article| Downloads :184

Improving Search Engine Results Using HITS Algorithm
Selva Priya K, Shrikkavi T , Sailakshmi B
Cite This Article| Downloads :175

Minimizing The Congestion For Data Transferring Tcp Impact On Rits Protocol For Wireless Network
E AnbumalarSakthe , S Mohanarangan
Cite This Article| Downloads :175

Authoritative Cropped Fingerprint Recognition Using Termination And Bifurcation
R.Sankaranarayanan, K.Shyamala
Cite This Article| Downloads :198

Enhanching Life Span for WSN Nodes Using LEACH, Huffman Data Fusion And TSP - NN Algorithm
M.Nagarajan, S.valli
Cite This Article| Downloads :196

Secured M-Commerce Transaction Using Mixed Fingerprint Authentication
K.Shanmugam, , Dr.B.vanathi, R.Arunprakash, R.Swaminathan, S.Vijayanand
Cite This Article| Downloads :205

Secure And Efficient Data Transmission In Wireless Sensor Network Using SET Protocols
K.Shanmugam, , Dr.B.vanathi, Azhagu Raja R, R.A.Priyanka, Shiyanashiny
Cite This Article| Downloads :201

Unsupervised Learning Of Video Image Model For Object Recognition Using Background Subtraction With AND-OR Template
S.Saravanan, Dr.B.vanathi, K.Shanmugam, D.Malathi, s.celinSindhya
Cite This Article| Downloads :209

Secure Data Retrieval In Wireless Networks Using Advance Encryption System
S.Shanthi, J.Nagendra Babu
Cite This Article| Downloads :204

Privacy-Preserving In Big Data With Efficient Metrics
N.Arun Kumar, S.Charumathy
Cite This Article| Downloads :217

Android Interface Based GCM Home Security System Using Object Motion Detection
R.Shalmika, Surya R , R Amirthavalli
Cite This Article| Downloads :233

Client Server Communication In Android OS Using Dynamic Key Security Algorithm
P.Kalaivani, S.Gayathri, Dr.R.Ramesh
Cite This Article| Downloads :179

Finger Print Based Attendance Management System
Sangeetha.J, Sivaranjani.S, Shalini.J
Cite This Article| Downloads :203

Context Related Policies On Data Isolation For Organizational Data Using Profiles
Vignesh.M, Aishwarya.K
Cite This Article| Downloads :173

Secure Energy Aware Anonymous Location Based Routing Protocol For Manet
A.Kumar
Cite This Article| Downloads :177

Custom XSD Legalize Web Application Tracer Against Unsought User Request
R. Narmadha Kumari, S.E.Benita Galaxy
Cite This Article| Downloads :208

Efficient Secret Data Sharing Using Multimedia Compression Paradigm
E. Munuswamy, M.Ferni ukrit
Cite This Article| Downloads :200

Verfiable Cryptographic Based Data Transformation System
A.T.Tamilselvi, C.S.Somu
Cite This Article| Downloads :200

Validation Logic Through Turn Around Time For Collusion Attack In Wireless Sensor Environment
Christy Grace M A, Jebasheela A
Cite This Article| Downloads :199

Automatic Identification ECG Anomalus Using XML Data Processing
F.G.Anusha, A.Jeba Sheela
Cite This Article| Downloads :193

Automated Toll Plaza Verification System For An Automobile At A Check Point
N.Poornima, M.P.Arvindhan, R.Karthikeyan, S.Gokul Raj
Cite This Article| Downloads :228

Issues And The Advantages Of Wireless Network
N.Poornima, R.Abinaya, S.Gowri
Cite This Article| Downloads :194

Intensifying Security Using Multifactor Authentication For Mobile Banking
P.Rajalakshmi, R.sangeetha, Dr.B.Vanathi, K.shanmugam, S.celinsindhya
Cite This Article| Downloads :262

ISSN Details



DOI Details



Providing A digital object identifier by DOI
How to get DOI?

For Reviewer /Referral (RMS)

Important Links

NEWS & Conference

Digital Library

IJEDR RMS

Our Social Link

Open Access

This material is Open Knowledge
This material is Open Data
This material is Open Content
© Copyright 2018 IJEDR.ORG All rights reserved