IJEDR(ISSN 2321-9939)
(International Peer Reviewed, Open Access Journal )
ISSN: 2321-9939

Current Issue

For Authors


Indexing Partner

Research Area


Facts & Figures

Visitor Statistics

NC3N 2015 - National Conference | 25th April 2015

The National Conference on Computer Communication and Networking provides a forum for researchers in academia and industry to share the latest technologies and developments in this rapidly developing field. This conference stresses inter-disciplinary communication and affords valuable outreach opportunities to professionals and students alike.

The main aim of the conference is to bring out and share the latest research contributions in the area of Software Engineering and to gain exposure to the current demands and opportunities. The conference seeks solutions to challenging problems in different disciplines in the area of Software Engineering. The Conference is open to academicians and practitioners working in the broad area of Software Engineering. We hope to promote interaction among industry and academia through such conferences. Software is a primary enabler as well as major cost driver for our current and emerging systems.

 Title of Paper and Author Full Text

Vision Based Intelligent Traffic Analysis System For Accident Detection And Reporting System
GayathriElumalai, , O.S.P.Mathanki, , S.Swetha
Cite This Article| Downloads :327

Development Of Syllable Based Unit Selection Text-To-Speech Synthesis System For Tamil Using Three Level Fall Back Technique
V.Tamilselvi, Dr. P. Visu
Cite This Article| Downloads :301

Social Based Volunteer Computing For Sharing Cloud Resources
V.Divya, R.Nithya, A.Sneha
Cite This Article| Downloads :297

A Secure Approach For e-Voting Using Encryption And Digital Signature
Jena Catherine Bel.D, Savithra.K, Divya.M
Cite This Article| Downloads :299

A Relative Analysis Of Efficient Cluster-Based Routing Protocols In Wireless Sensor Network
N.Poornima,, M.Mahasree
Cite This Article| Downloads :365

Advanced Data Searching System With Spatial Database In PWS Framework
G.Sangeetha, G.Anishya
Cite This Article| Downloads :299

Improving Search Engine Results Using HITS Algorithm
Selva Priya K, Shrikkavi T , Sailakshmi B
Cite This Article| Downloads :318

Minimizing The Congestion For Data Transferring Tcp Impact On Rits Protocol For Wireless Network
E AnbumalarSakthe , S Mohanarangan
Cite This Article| Downloads :325

Authoritative Cropped Fingerprint Recognition Using Termination And Bifurcation
R.Sankaranarayanan, K.Shyamala
Cite This Article| Downloads :338

Enhanching Life Span for WSN Nodes Using LEACH, Huffman Data Fusion And TSP - NN Algorithm
M.Nagarajan, S.valli
Cite This Article| Downloads :326

Secured M-Commerce Transaction Using Mixed Fingerprint Authentication
K.Shanmugam, , Dr.B.vanathi, R.Arunprakash, R.Swaminathan, S.Vijayanand
Cite This Article| Downloads :360

Secure And Efficient Data Transmission In Wireless Sensor Network Using SET Protocols
K.Shanmugam, , Dr.B.vanathi, Azhagu Raja R, R.A.Priyanka, Shiyanashiny
Cite This Article| Downloads :321

Unsupervised Learning Of Video Image Model For Object Recognition Using Background Subtraction With AND-OR Template
S.Saravanan, Dr.B.vanathi, K.Shanmugam, D.Malathi, s.celinSindhya
Cite This Article| Downloads :373

Secure Data Retrieval In Wireless Networks Using Advance Encryption System
S.Shanthi, J.Nagendra Babu
Cite This Article| Downloads :325

Privacy-Preserving In Big Data With Efficient Metrics
N.Arun Kumar, S.Charumathy
Cite This Article| Downloads :388

Android Interface Based GCM Home Security System Using Object Motion Detection
R.Shalmika, Surya R , R Amirthavalli
Cite This Article| Downloads :372

Client Server Communication In Android OS Using Dynamic Key Security Algorithm
P.Kalaivani, S.Gayathri, Dr.R.Ramesh
Cite This Article| Downloads :322

Finger Print Based Attendance Management System
Sangeetha.J, Sivaranjani.S, Shalini.J
Cite This Article| Downloads :351

Context Related Policies On Data Isolation For Organizational Data Using Profiles
Vignesh.M, Aishwarya.K
Cite This Article| Downloads :327

Secure Energy Aware Anonymous Location Based Routing Protocol For Manet
Cite This Article| Downloads :297

Custom XSD Legalize Web Application Tracer Against Unsought User Request
R. Narmadha Kumari, S.E.Benita Galaxy
Cite This Article| Downloads :328

Efficient Secret Data Sharing Using Multimedia Compression Paradigm
E. Munuswamy, M.Ferni ukrit
Cite This Article| Downloads :335

Verfiable Cryptographic Based Data Transformation System
A.T.Tamilselvi, C.S.Somu
Cite This Article| Downloads :308

Validation Logic Through Turn Around Time For Collusion Attack In Wireless Sensor Environment
Christy Grace M A, Jebasheela A
Cite This Article| Downloads :352

Automatic Identification ECG Anomalus Using XML Data Processing
F.G.Anusha, A.Jeba Sheela
Cite This Article| Downloads :331

Automated Toll Plaza Verification System For An Automobile At A Check Point
N.Poornima, M.P.Arvindhan, R.Karthikeyan, S.Gokul Raj
Cite This Article| Downloads :387

Issues And The Advantages Of Wireless Network
N.Poornima, R.Abinaya, S.Gowri
Cite This Article| Downloads :328

Intensifying Security Using Multifactor Authentication For Mobile Banking
P.Rajalakshmi, R.sangeetha, Dr.B.Vanathi, K.shanmugam, S.celinsindhya
Cite This Article| Downloads :397

ISSN Details

DOI Details

Providing A digital object identifier by DOI
How to get DOI?

For Reviewer /Referral (RMS)

Important Links

NEWS & Conference

Digital Library


Our Social Link

Open Access

This material is Open Knowledge
This material is Open Data
This material is Open Content
© Copyright 2019 IJEDR.ORG All rights reserved