Low Cost Journal,International Peer Reviewed and Refereed Journals,Fast Paper Publication approved journal IJEDR(ISSN 2321-9939) apply for ugc care approved journal, UGC Approved Journal, ugc approved journal, ugc approved list of journal, ugc care journal, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, Low cost research journal, Online international research journal, Peer-reviewed, and Refereed Journals, scholarly journals, impact factor 7.37 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool)
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH
(International Peer Reviewed,Refereed, Indexed, Citation Open Access Journal)
ISSN: 2321-9939 | ESTD Year: 2013
Google Scholar Impact Factor- 7.37 (Year 2020)
Impact factor 7.37 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool), Scholarly open access , Peer-reviewed, and Refereed, Multidisciplinary, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI) journal.

Current Issue

Call For Papers
March 2020

Volume 8 | Issue 1
Last Date : 29 March 2020


Review Results: Within 02-04 Days
Paper Publish: Within 02-04 Days
Impact Factor : 7.37

For Authors

Archives

Indexing Partner

Research Area

LICENSE

Facts & Figures

Visitor Statistics


NCISECT 2015 - National Conference | 25th-26th Mar 2015

Organized By

In Association With

The National Conference on Impact of Software Engineering in Computer Technologies provides a forum for researchers in academia and industry to share the latest technologies and developments in this rapidly developing field. This conference stresses inter-disciplinary communication and affords valuable outreach opportunities to professionals and students alike.

The main aim of the conference is to bring out and share the latest research contributions in the area of Software Engineering and to gain exposure to the current demands and opportunities. The conference seeks solutions to challenging problems in different disciplines in the area of Software Engineering. The Conference is open to academicians and practitioners working in the broad area of Software Engineering. We hope to promote interaction among industry and academia through such conferences. Software is a primary enabler as well as major cost driver for our current and emerging systems.

  Brochure   Paper Format   Copyright Form Download Proceedings

 Title of Paper and Author Full Text

A Collaborative Approach to Enhance Security in Location Based Services by Answering Range Queries in WSN
Anandhi.B , Amudha.S
Cite This Article| Downloads :417

Analysis Detection And Prevention Of Users From Click Jacking Attack Using DDOS
Jeena James, Agnes.A, Hajera.S.H
Cite This Article| Downloads :378

Scheming an Hybrid Architecture for High Secure M-Commerce Applications
W.S.Callina Jeba Kumari, Mrs.P.Asha
Cite This Article| Downloads :360

Secure Biometric Cryptosystem Which Follows Multimodal Approach for Biometric Key Generation
Ankit Joshi, Nitesh Singh, K Vijayakumar
Cite This Article| Downloads :344

Secure Transmission in UAV Intelligence
P.Nirmala Deve, Dr.V.Dhanakoti
Cite This Article| Downloads :372

A Payable Secured Monitoring System for Video Streaming and Detecting Content Leakage in Trusted Networks
K.BhavanaPriya, M.Azhagiri
Cite This Article| Downloads :368

An Exclusive Survey on Cluster Based Key Management Techniques in MANET
K. Gomathi, Dr. B. Parvathavarthini
Cite This Article| Downloads :351

Data Confidentiality Enabled Deduplication Scheme Using Convergent Keys - Deduplication Scheme in Cloud Storage
Deepa.D , Revathi.M
Cite This Article| Downloads :384

Detection of Anomaly in Network Traffic utilizing SVM Classification Model
Jabez J, Dr.B.Muthu Kumar
Cite This Article| Downloads :401

Internet Protocol Version 6
Siddharth Syal, Sebu Elias, Krishnapriya S
Cite This Article| Downloads :342

Private Badges for Geosocial Networks Used In Real Time Application
R.Krithiga, V.Muthamilselvi
Cite This Article| Downloads :377

Uncompromised Query Services with Optimal Privacy Preservation Schemes
Iswarya.U , Ruhin Kouser.R
Cite This Article| Downloads :381

Proffer for Landslide Monitoring in Multi sensor Networks
Aruna Shankaralingam, Prahitha.K , Monica R
Cite This Article| Downloads :348

Attribute based Encryption and Key Distribution for Secure Storage in Clouds
R.Vaishali , M.Menaka
Cite This Article| Downloads :370

Cloud Storage System Enabling Data Security Using Third Party Auditor
Krishnaselvi.L, Kanimozhi.S
Cite This Article| Downloads :409

Enhancing Authorization of XML File Using Watermark
Arun Thomas .K, Mrs. J.Jeysasudha
Cite This Article| Downloads :350

Enhancing Quality of Multiple Access Data of the System in Cloud with Caching Algorithm
Siva Chandran R, Jothi B
Cite This Article| Downloads :320

Identity Based Multicloud Data Possession
Y MeenaPriyadarshini, Dr.P S K Patra, S Prakash
Cite This Article| Downloads :361

Ingress defined cloud based multivariate retaliation structure with caching
G.Janaki , M.Menaka
Cite This Article| Downloads :319

Privacy Proven Public Auditing Scheme in Cloud - Public Auditing For Multiple Tasks
Inbarasi.K, Dr.Arivazhagu.U.V.
Cite This Article| Downloads :411

Securing Sensitive Data in Public Cloud by Using Attribute Based Encryption and Digital Watermarking
Vishnu S, Mrs. Krishnaveni S.
Cite This Article| Downloads :316

A comparative study of effort estimation techniques using back propagation algorithm
S. Abbinaya, M. Senthil Kumar
Cite This Article| Downloads :326

An Efficient Cancer Data Clustering Based On Ant Colony Optimization
P.Lakshmidevi , K.Chinetha
Cite This Article| Downloads :382

Analysis of Information Retrieval using Query Extraction Techniques
Tagore Kumar Tummapudi, Uma M
Cite This Article| Downloads :361

Mining Current Topics Based On Client Elucidation
Bavithra.N , Rajesh.P
Cite This Article| Downloads :409

Refinement in Meta Search Engine for Effective Results Based On Relevance Feedback
Kayalvizhi.C, Swaraj Paul.C
Cite This Article| Downloads :327

An Unbiased Approach for Clustering Large Data - A Time Complexity Efficient Approach
Rajarshi dev Choudhary, Akash Goenka, Mr. S.Karthik
Cite This Article| Downloads :367

Accessing a Remote Desktop of a Client Using Remote Frame Buffer Protocol through Virtual LAN Cable
M Maheswari, Anindita Bora, Apurv Saxena
Cite This Article| Downloads :360

Expert System for Health Care Data Stored On the Cloud
Anvika , Swathy Priya
Cite This Article| Downloads :370

Smart File Sharing
V.SivaBalaSarathi, U.M.Raghuvaran, KodelaHimajaSushma, ParthSharma
Cite This Article| Downloads :312

A Path Confusion Algorithm to Prevent Intrusion
Ramesh, Senthil Kumaran, Shiny Angel
Cite This Article| Downloads :370

Online Advertising In Website through Related Latent Topic Models Using Latent Dirichlet Allocation Algorithm
M. Maheswari, Sanjana Nahar, Tanuj Agarwal
Cite This Article| Downloads :301

Secure Communication in Decentralized Disruption Tolerant Military Networks Using CP-ABE and 2PC Protocol
Nayanika Bhargava, SahilBhasin, J.Jeyasudha
Cite This Article| Downloads :341

Review on Encryption Techniques of Personal Health Records in Cloud Computing
Anparasi K, ShanthaVisalakshi U
Cite This Article| Downloads :353

An Automated Negotiation Model for SLA Based Decision Support System in Cloud Environment
P.Sujan kumar reddy, Ameneni Thanuja , Mrs.S.krishnaveni
Cite This Article| Downloads :396

An Automated Approach for suggesting Tag based Questions and their Solutions
Gulshan Vaish, Anirudh Negi, B. Jothi
Cite This Article| Downloads :357

Amalgamation- Data Redemption Model
Priyavarshini C U, R.Harish kumar, Mrs.S.krishnaveni
Cite This Article| Downloads :372

Relevant Web Document Retrieval and Summarization
P.Selvapriyavadhana, Dr.PSK. Patra, W. Mercy
Cite This Article| Downloads :316

A Secure i-Trust Scheme in Delay Tolerant Networks
S.Nathiya, J.Daphney Joann
Cite This Article| Downloads :465

Angst Management Technology
Hemanth gupta, Sasi Rekha Sankar, Deep Deb
Cite This Article| Downloads :551

ISSN Details




DOI Details



Providing A digital object identifier by DOI
How to get DOI?

For Reviewer /Referral (RMS)

Important Links

NEWS & Conference

Digital Library

Our Social Link

Open Access

This material is Open Knowledge
This material is Open Data
This material is Open Content
© Copyright 2020 IJEDR.ORG All rights reserved