Low Cost Journal,International Peer Reviewed and Refereed Journals,Fast Paper Publication approved journal IJEDR(ISSN 2321-9939) apply for ugc care approved journal, UGC Approved Journal, ugc approved journal, ugc approved list of journal, ugc care journal, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, Low cost research journal, Online international research journal, Peer-reviewed, and Refereed Journals, scholarly journals, impact factor 7.37 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool)
INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH
(International Peer Reviewed,Refereed, Indexed, Citation Open Access Journal)
ISSN: 2321-9939 | ESTD Year: 2013
Google Scholar Impact Factor- 7.37 (Year 2020)
Impact factor 7.37 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool), Scholarly open access , Peer-reviewed, and Refereed, Multidisciplinary, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI) journal.

Current Issue

Call For Papers
March 2020

Volume 8 | Issue 1
Last Date : 29 March 2020


Review Results: Within 02-04 Days
Paper Publish: Within 02-04 Days
Impact Factor : 7.37

For Authors

Archives

Indexing Partner

Research Area

LICENSE

Facts & Figures

Visitor Statistics


NCETSE 2014 - National Conference | 25th-26th Mar 2014
The National Conference on Emerging Technologies in Software Engineering provides a forum for researchers in academia and industry to share the latest technologies and developments in this rapidly developing field. This conference stresses inter-disciplinary communication and affords valuable outreach opportunities to professionals and students alike.
Organized By
Leveraging implicit knowledge from preprocessed naming examples for detecting anomalies
Bemesha Smitha.H, M.Rekha
Full Text
Cite This Article| Downloads :482
Modeling of a Glass Tank Furnace Using Artificial Neural Network
A.Banerjee, D.Mohanty, S.Khanam
Full Text
Cite This Article| Downloads :422
Decision making from mining the comparable entites
T.Rajesh Kumar, P.DEIVANAI
Full Text
Cite This Article| Downloads :526
Merging of P-FAD and MA's alogorithm for face recognition
S.AMAL RAJ, Sasi rekha sankar
Full Text
Cite This Article| Downloads :394
A formal model to preserve knowledge in outsourced data sets
Veera Raghavan .K, Karthick.s
Full Text
Cite This Article| Downloads :455
Actionable Business Intelligence For E-commerce using Data Mining tool
Nelson Anand.M, Karthick.S
Full Text
Cite This Article| Downloads :539
Online web mining process with ranking system using XSM classifer model
S.Thivya Lakshmi, C.G.Anupama
Full Text
Cite This Article| Downloads :354
Energy analysis of compressed sensing in wireless multi media sensor network
S.Alagurani, S.Aasha Nandhini, S.Radha
Full Text
Cite This Article| Downloads :442
Opportunistic routing to forgo flooding attacks in MANET
Elakkiya.M, Dr. Edna Elizabeth.N
Full Text
Cite This Article| Downloads :497
2-Dimensional cellular automata based design of private key encryption algorithm
N.Vigneshwaran, K.J.Jegadishkumar
Full Text
Cite This Article| Downloads :466
Minimization of energy consumption using various mechanisms in WSN
S.Sangeethapriya, Dr.R.Amutha
Full Text
Cite This Article| Downloads :440
Mobile keylogger detection using machine learning
S.Vinoth kumar, Aruna sankaralingam
Full Text
Cite This Article| Downloads :473
Preventing Phishing attacks using anti-phishing prevention technique
A.Gladston Chellaiah, Arun shankaralingam
Full Text
Cite This Article| Downloads :405
A New user friendly and efficient tool for SRGM
R.Subburaj, B.Shanmugam
Full Text
Cite This Article| Downloads :396
Optimal vehicular routing and driving directions with human intelligence.
B. Karthik, S.Amudha
Full Text
Cite This Article| Downloads :409
Combinatorial Interaction testing using test case based constraints
K.Pavan Kumar, T.S.Shiney Angel
Full Text
Cite This Article| Downloads :393
Automatic online testpaper generation using STG
T.S.Kishore, Selvakumarsamy
Full Text
Cite This Article| Downloads :558
Automatic test suite generation for regression testing
S.Poornima, Selvakumarsamy
Full Text
Cite This Article| Downloads :424
Reusing test path in whitebox testing
U.Santosh, K.Vijayakumar
Full Text
Cite This Article| Downloads :354
Application testability of fault detection using dependency structure algorithm
Shah Ubaid Nisar, T.S.Shiney Angel
Full Text
Cite This Article| Downloads :524
An Ontology Based Service Specification for Enterprise Systems
S Veena Nair, G Senthil Kumar
Full Text
Cite This Article| Downloads :396
Composition and Management System of Long term Web Services
B Manoj Kumar, G Senthil Kumar
Full Text
Cite This Article| Downloads :530
Sense Match Making Approach For Semantic Web Service Discovery
G. Bharath, Mrs. Deivanai .P
Full Text
Cite This Article| Downloads :493
A Hybrid Service Discovery Approach in Peer to peer Systems
G Jahnavai Swetha, G Senthil Kumar
Full Text
Cite This Article| Downloads :441
Dynamic Load balancing in public using KP model
N Maheshwar Reddy, S.Krishnaveni
Full Text
Cite This Article| Downloads :407
Healthcare Web Services For Rural People
V Dinesh, G Senthil Kumar, J Jeyasudha
Full Text
Cite This Article| Downloads :411
Web Service Compostion and Service Selection Based On User Requirements
P Gokula Krishnan, G Senthil Kumar
Full Text
Cite This Article| Downloads :519
Simulation and Analysis of Microcantilever Sensor for enhanced Biosensing of Disease causing pathogens
P.Sangeetha, Dr.A.Vimala Juliet
Full Text
Cite This Article| Downloads :413
Energy Efficiency in Wireless Sensor Networks using Data Aggregation
S.Sahana, Dr.R.Amutha
Full Text
Cite This Article| Downloads :508
Professional based alternating open sesame using Android Mobile
G.N.Prabhakar, R.Rajasekar
Full Text
Cite This Article| Downloads :383
ZDBL:Zippy Distance Based Localization against malignant beacons
D.Poovizhi, Selva Ganapathy Ram.R, Santhiya.R
Full Text
Cite This Article| Downloads :392
A Methodology for Evaluation and Prediction of Defect-Proneness in Software
Silpa.C, Dr.K.Ramani, Jahnavi.K
Full Text
Cite This Article| Downloads :409
Video Compressed Sensing using COASMP Recovery Algorithm
Swathi P, Shiwani Hariraman, Reshma.M
Full Text
Cite This Article| Downloads :437
HQLS-PY: A New Frame Worl to Acheive High Quality in Large Scale Software Product Development using POKA-YOKE Principles
K. K. Baseer, A.Rama mohan reddy, C. Shoba Bindhu
Full Text
Cite This Article| Downloads :470
A Systematic Review on measuring and evaluating web usability in Model Driven Web Development
S.Sai Aparna, K.K.Basheer
Full Text
Cite This Article| Downloads :428
Hybrid Clustering Approach for software Module Clustering
Kishore.C, Dr.K.Ramani, Anusha G
Full Text
Cite This Article| Downloads :515
A Novel Secure Transaction and Identity Endorsement in M-Commerce
K.Shanmugam, Dr.B.Vanathi
Full Text
Cite This Article| Downloads :509
Car License Plate Detection using Structured Component Analysis
Siva Vinayaka Pavana Hiranya P, S.Venkata Suresh, T.Sabhanayagam
Full Text
Cite This Article| Downloads :528
Medical Diagnosis using Neural Networks
Sarfaraz Ahmed
Full Text
Cite This Article| Downloads :432
Blind Man’s Artificial EYE : An Innovative Idea to Help the Blind
Bhuvanesh Arasu, Senthil Kumaran
Full Text
Cite This Article| Downloads :497

ISSN Details




DOI Details



Providing A digital object identifier by DOI
How to get DOI?

For Reviewer /Referral (RMS)

Important Links

NEWS & Conference

Digital Library

Our Social Link

Open Access

This material is Open Knowledge
This material is Open Data
This material is Open Content
© Copyright 2020 IJEDR.ORG All rights reserved