Low Cost Journal,Fast Paper Publication approved journal IJEDR(ISSN 2321-9939)
(International Peer Reviewed,Refereed, Indexed, Citation Open Access Journal)
ISSN: 2321-9939 | ESTD Year: 2013

Current Issue

For Authors


Indexing Partner

Research Area


Facts & Figures

Visitor Statistics

NC3N 2015 - National Conference | 25th April 2015

The National Conference on Computer Communication and Networking provides a forum for researchers in academia and industry to share the latest technologies and developments in this rapidly developing field. This conference stresses inter-disciplinary communication and affords valuable outreach opportunities to professionals and students alike.

The main aim of the conference is to bring out and share the latest research contributions in the area of Software Engineering and to gain exposure to the current demands and opportunities. The conference seeks solutions to challenging problems in different disciplines in the area of Software Engineering. The Conference is open to academicians and practitioners working in the broad area of Software Engineering. We hope to promote interaction among industry and academia through such conferences. Software is a primary enabler as well as major cost driver for our current and emerging systems.

 Title of Paper and Author Full Text

Vision Based Intelligent Traffic Analysis System For Accident Detection And Reporting System
GayathriElumalai, , O.S.P.Mathanki, , S.Swetha
Cite This Article| Downloads :338

Development Of Syllable Based Unit Selection Text-To-Speech Synthesis System For Tamil Using Three Level Fall Back Technique
V.Tamilselvi, Dr. P. Visu
Cite This Article| Downloads :309

Social Based Volunteer Computing For Sharing Cloud Resources
V.Divya, R.Nithya, A.Sneha
Cite This Article| Downloads :305

A Secure Approach For e-Voting Using Encryption And Digital Signature
Jena Catherine Bel.D, Savithra.K, Divya.M
Cite This Article| Downloads :311

A Relative Analysis Of Efficient Cluster-Based Routing Protocols In Wireless Sensor Network
N.Poornima,, M.Mahasree
Cite This Article| Downloads :378

Advanced Data Searching System With Spatial Database In PWS Framework
G.Sangeetha, G.Anishya
Cite This Article| Downloads :308

Improving Search Engine Results Using HITS Algorithm
Selva Priya K, Shrikkavi T , Sailakshmi B
Cite This Article| Downloads :329

Minimizing The Congestion For Data Transferring Tcp Impact On Rits Protocol For Wireless Network
E AnbumalarSakthe , S Mohanarangan
Cite This Article| Downloads :337

Authoritative Cropped Fingerprint Recognition Using Termination And Bifurcation
R.Sankaranarayanan, K.Shyamala
Cite This Article| Downloads :357

Enhanching Life Span for WSN Nodes Using LEACH, Huffman Data Fusion And TSP - NN Algorithm
M.Nagarajan, S.valli
Cite This Article| Downloads :335

Secured M-Commerce Transaction Using Mixed Fingerprint Authentication
K.Shanmugam, , Dr.B.vanathi, R.Arunprakash, R.Swaminathan, S.Vijayanand
Cite This Article| Downloads :371

Secure And Efficient Data Transmission In Wireless Sensor Network Using SET Protocols
K.Shanmugam, , Dr.B.vanathi, Azhagu Raja R, R.A.Priyanka, Shiyanashiny
Cite This Article| Downloads :331

Unsupervised Learning Of Video Image Model For Object Recognition Using Background Subtraction With AND-OR Template
S.Saravanan, Dr.B.vanathi, K.Shanmugam, D.Malathi, s.celinSindhya
Cite This Article| Downloads :387

Secure Data Retrieval In Wireless Networks Using Advance Encryption System
S.Shanthi, J.Nagendra Babu
Cite This Article| Downloads :330

Privacy-Preserving In Big Data With Efficient Metrics
N.Arun Kumar, S.Charumathy
Cite This Article| Downloads :397

Android Interface Based GCM Home Security System Using Object Motion Detection
R.Shalmika, Surya R , R Amirthavalli
Cite This Article| Downloads :386

Client Server Communication In Android OS Using Dynamic Key Security Algorithm
P.Kalaivani, S.Gayathri, Dr.R.Ramesh
Cite This Article| Downloads :333

Finger Print Based Attendance Management System
Sangeetha.J, Sivaranjani.S, Shalini.J
Cite This Article| Downloads :361

Context Related Policies On Data Isolation For Organizational Data Using Profiles
Vignesh.M, Aishwarya.K
Cite This Article| Downloads :335

Secure Energy Aware Anonymous Location Based Routing Protocol For Manet
Cite This Article| Downloads :305

Custom XSD Legalize Web Application Tracer Against Unsought User Request
R. Narmadha Kumari, S.E.Benita Galaxy
Cite This Article| Downloads :334

Efficient Secret Data Sharing Using Multimedia Compression Paradigm
E. Munuswamy, M.Ferni ukrit
Cite This Article| Downloads :341

Verfiable Cryptographic Based Data Transformation System
A.T.Tamilselvi, C.S.Somu
Cite This Article| Downloads :317

Validation Logic Through Turn Around Time For Collusion Attack In Wireless Sensor Environment
Christy Grace M A, Jebasheela A
Cite This Article| Downloads :363

Automatic Identification ECG Anomalus Using XML Data Processing
F.G.Anusha, A.Jeba Sheela
Cite This Article| Downloads :339

Automated Toll Plaza Verification System For An Automobile At A Check Point
N.Poornima, M.P.Arvindhan, R.Karthikeyan, S.Gokul Raj
Cite This Article| Downloads :410

Issues And The Advantages Of Wireless Network
N.Poornima, R.Abinaya, S.Gowri
Cite This Article| Downloads :336

Intensifying Security Using Multifactor Authentication For Mobile Banking
P.Rajalakshmi, R.sangeetha, Dr.B.Vanathi, K.shanmugam, S.celinsindhya
Cite This Article| Downloads :406

ISSN Details

DOI Details

Providing A digital object identifier by DOI
How to get DOI?

For Reviewer /Referral (RMS)

Important Links

NEWS & Conference

Digital Library

Our Social Link

Open Access

This material is Open Knowledge
This material is Open Data
This material is Open Content
© Copyright 2019 IJEDR.ORG All rights reserved