1.RANDOM POLYNOMIAL BASED SECRET SHARING SCHEME FOR SECURING KEY IN THE CLOUD ENVIRONMENT
Authors : S.Ahamed Ali,Dr.M.Ramakrishnan
Paper Id :IJCRCST-NOVEMBER16-01
Page No : 1062-1065
2.A STUDY ON FOL-MINE – FIRST OCCURRENCE LIST MINE
Authors : S.Prabhu,R.Kalaivani
Paper Id :IJCRCST-NOVEMBER16-02
Page No : 1066-1069
3.SURVEY ON BIG DATA TOOLS AND TECHNIQUES
Authors : K. Syed Mohamed Bukari
Paper Id :IJCRCST-NOVEMBER16-03
Page No : 1070-1072
4.DATA MANAGEMENT SYSTEM FOR HOSPITALS BY INSERTING DATA IN A LIVE VIDEO USING WATERMARK
Authors : K.Sivachandran,M.Suguna,D.Nithyapriya,R.Deepan
Paper Id :IJCRCST-NOVEMBER16-04
Page No : 1073-1076
5.HOME AUTOMATION BASED ON INTERNET OF THINGS
Authors : P.Thilagavathi,P.Jeevananthan,T.Lakshmanakumar
Paper Id :IJCRCST-NOVEMBER16-05
Page No : 1077-1080
6.A REVIEW ON MAXIMUM WEIGHTED SCHEDULING IN AD HOC NETWORKS
Authors : B.SindhuPiriyaa ,Dr.D.Maruthanayagam
Paper Id :IJCRCST-NOVEMBER16-06
Page No : 1081-1085
7.SOCIAL NETWORKS AS THE SUPPORT OF THE E-LEARNING IN HIGHER EDUCATION
Authors : Dr I. Lakshmi
Paper Id :IJCRCST-NOVEMBER16-07
Page No : 1086-1088