1.EFFICIENTLY SECURING SYSTEM USING GRAPHICAL CAPTCHA
Authors :K.Gomathi,K.Mythily,S.Poovarasi,S.Selvakanmani
Paper Id :IJCRCST-MARCH16-01
Page No : 487 – 490
2.EFFECTIVE RISK MANAGEMENT FOR MOBILE APPLICATION
Authors :G.Preethi,Dr.P.Marikkannu
Paper Id :IJCRCST-MARCH16-02
Page No : 491 – 494
3.LOCATING THE WISECRACKERS USING SPOOFER
Authors :B.Praveen Kumar,N.Haripreethi,S.Shilpa,B.Bharathi
Paper Id :IJCRCST-MARCH16-03
Page No : 495 – 499
4.CONCURRENT PROGRESSIVE APPROACH FOR DETECTING THE DUPLICATION
Authors :B.Praveen Kumar,M.R.Priyanka,C.Radhika,A.Subashini
Paper Id :IJCRCST-MARCH16-04
Page No : 500- 504
5.CLOUD BASED RESOURCE ALLOCATION AND STALLING PREVENTION FOR VIDEO STREAMING APPLICATION
Authors :Pranamita Nanda,P.Revathy,V.Gayathri,V.Mahalakshmi
Paper Id :IJCRCST-MARCH16-05
Page No : 505- 509
6.GENERATING SUMMARY RISK SCORES FOR MOBILE APPLICATIONS
Authors :Dr.M.Newlin Rajkumar,S.Mohan Kumar,V.Dhurka
Paper Id :IJCRCST-MARCH16-06
Page No : 510- 512
7.CLOUD AUDITING USING REGENERATING CODES WITH ENCRYPTED KEYS FOR EXTENSIVE SECURITY
Authors : R.Raja, V.Nishanthi,B.Keerthana,S.Monisha
Paper Id :IJCRCST-MARCH16-07
Page No : 513- 516
8.AN INTELLECTUAL BASED RE-RANKING FOR IMAGE SEARCH IN WEB
Authors : S.Aiswarya,B.Gayatri,S.Gayathri,M.Archana Devi
Paper Id :IJCRCST-MARCH16-08
Page No : 517- 519
9.TOWARD EFFICIENT CLOUD DATA ANALYSIS SERVICE FOR LARGE-SCALE SOCIAL NETWORKS
Authors : K.Tamilarasi,J.Dhanajeyan,K.P.Nithin Kumar,T.Naveen Kumar
Paper Id :IJCRCST-MARCH16-09
Page No : 520- 523
10.RANKING FRAUD DETECTION SYSTEM FOR MOBILE APPS
Authors : Dr. Soundararajan,Janaat.V,Pothireddy Akhila,Keerthana.M
Paper Id :IJCRCST-MARCH16-10
Page No : 524- 527
11.CONTINGENCY COEFFICIENT MEASURES FOR WEB FORUM USERS AND SENTIMENT ANALYSIS
Authors : Aswin Kumar.P,Bhagavan Iyyappan.J,Murali Krishna Kumar.U,Chitra.R
Paper Id :IJCRCST-MARCH16-11
Page No : 528- 530
12.WIRELESS HANDHELD VISITOR GUIDE AND TRACKING SYSTEM FOR SECURITY PURPOSE
Authors : Sunil Anarase,Pratik Padher,Govind Thavre,Swati Gawhale
Paper Id :IJCRCST-MARCH16-12
Page No : 531- 533
13.A THREE LEVEL HIERARCHICAL SIGNATURE ON ADS-B SUPPORTING BATCH VERIFICATION
Authors : Shilpa Mary Philips,N.Raja Rajeswari,B.Hema
Paper Id :IJCRCST-MARCH16-13
Page No : 534- 537
14.SPEAKING ATM USING SPEECH SYNTHESIS
Authors : V. Manoj Kumar,S.Prathap,B.Gowtham,G.Sriram
Paper Id :IJCRCST-MARCH16-14
Page No : 538- 541
15.SENTIMENT ANALYSIS USING POS TECHNIQUE WITH NLP TOOL
Authors : Vignesh.S,Visnu.S,Hariharan.R,Pranamitha Nanda
Paper Id :IJCRCST-MARCH16-15
Page No : 542- 546
16.ENHANCING SECURITY OF RESOURCE MATCHMAKING BY PARTITIONING FILES ACROSS MULTIPLE CLOUDS
Authors : Pranamitha Nanda,B.Daniel Nepoleon,M.Mohamed Faizal Shariff,K.Nethajhi
Paper Id :IJCRCST-MARCH16-16
Page No : 547- 550
17.REMOVAL OF MALICIOUS SIDE INFORMATION IN WEB DOCUMENTS
Authors : E. Silambarasan,M.Sindhuja,T.Pragathi,S.Siva Abbirammi,K.Gayathri
Paper Id :IJCRCST-MARCH16-17
Page No : 551- 554
18.AUTOMATIC PROTOCOL BLOCKER FOR PRIVACY PRESERVING PUBLIC AUDITING IN CLOUD COMPUING
Authors : Aniket Rajkiran Sontakke,Chetna Jaywant Sonawane,Kiran Ashok Hingmire
Paper Id :IJCRCST-MARCH16-18
Page No : 555- 557
19.PREDICTING ACCURATE BUS ARRIVAL TIME USING GPS WITH MOBILE PHONE
Authors : Dr. N.Kumaresan,S.Shiny,K.Sudha,S.Mehala
Paper Id :IJCRCST-MARCH16-19
Page No : 558- 560
20.FACE RECOGNITION SYSTEM FOR ENHANCING PRIVACY OF PHOTO SHARING IN ONLINE SOCIAL NETWORK
Authors : E.Silambarasan,V.Amrudha Devi,A.Abirekha,P.Bhavani Devi
Paper Id :IJCRCST-MARCH16-20
Page No : 561- 563
21.PRIVACY PRESERVING IN HEALTH RECORDS
Authors :DLK.Vijaybharath,S.Arvind,R.Rohith
Paper Id :IJCRCST-MARCH16-21
Page No : 564- 566
22.C4.5 QUERY BASED SEARCH OVER DATABASE
Authors : Aiswarya.S,Santhiya.T,Harini.R,Vinitha.S
Paper Id :IJCRCST-MARCH16-22
Page No : 567- 569
23.ROBUST BIOMETRIC BASED AUTHENTICATION USING WATERMARKING
Authors : P.Revathi,P.R.Jaya Kavitha,R.Nithya
Paper Id :IJCRCST-MARCH16-23
Page No : 570- 573
24.ACHIEVING QUERY OPTIMIZATION OF ENHANCED PARALLEL PROCESSING IN CLOUD
Authors : T.Sneha,E.Karthiyayeni,P.Sailaja
Paper Id :IJCRCST-MARCH16-24
Page No : 574- 576
25.PRIORITY BASED PROCESS SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMPUTING
Authors : S.Harini,R.Priyankaa,K.G.Gnaaneeshwari,S.Rajeshkumar
Paper Id :IJCRCST-MARCH16-25
Page No : 577- 581
26.DETECTION AND BLOCKING OF SYBILS USING VOTE TRUST IN ONLINE SOCIAL NETWORKING
Authors : R.Uma,G.Kiruba,D.Devi,D.Selvamani,B.Vaishnavi
Paper Id :IJCRCST-MARCH16-26
Page No : 582- 584
27.AUDIT-FREE CLOUD STORAGE VIA RANDOMIZED KEY PROTOCOL
Authors : H.Anila Glory,P.S.Revathy,S.Anusha,G.Sandhya
Paper Id :IJCRCST-MARCH16-27
Page No : 585- 587
28.EFFECTIVE CLASSIFICATION OF TEXT AND IMPROVING LEARNING EXPERIENCE
Authors : I.Anisha Agnes,K.Nivetha,M.Rajeswari
Paper Id :IJCRCST-MARCH16-28
Page No : 588- 590
29.SECURED SOCIAL MEDIA USING ASPECT BASED SENTIMENT ANALYSIS
Authors : Banu.M ,Muthra.S, Hema.S ,Nalini.S
Paper Id :IJCRCST-MARCH16-29
Page No : 591- 595
30.DETECTION AND NORMALIZATION OF MEDICAL SEMANTICS FOR PERSONALIZED HEALTH SERVICES
Authors :Arunjunai Selvi.M,Deekshitha.L,Nithiyalakshmi.V,Nithiyalakshmi.V
Paper Id :IJCRCST-MARCH16-30
Page No : 596- 599
31.VOICE COMMAND EXECUTION WITH SPEECH RECOGNITION AND SYNTHESIZER (A VOICE INTERFACE)
Authors : Kalpana.A.V,Ram Kumar.C,Avinash.R,Venketaramanan.B
Paper Id :IJCRCST-MARCH16-31
Page No : 600- 604
32.A HOLISTIC VIEW OF RANKING FRAUD DETECTION SYSTEM FOR MOBILE APPS
Authors : N.Bhavani,A.Gayathri,T.Eswari,K.Kalaivani,K.Kalaivani
Paper Id :IJCRCST-MARCH16-32
Page No : 605- 608
33.FIDOOP: PARALLEL MINING OF FREQUENT ITEMSETS USING CURA AND IWD ALGORITHM
Authors : Raja.R ,Sathya Narayanan.R.K,Vasanth.P,Dinesh Babu.P
Paper Id :IJCRCST-MARCH16-33
Page No : 609- 612
34.FAST FINDING REGION BY USING PUSH MODEL AND R-TREE METHOD IN LOCATION BASED SERVICE
Authors : S.Uthra,M.Hemavathi,R.Vinitha,K.Balachander
Paper Id :IJCRCST-MARCH16-34
Page No : 613- 617
35.GROUP USER REVOCATION FOR SHARED DYNAMIC DATA ON AUDITING VIA CLOUD STORAGE
Authors : Roselinmary.A,Saranya.R,Jeevitha.B,Dr.Sugumar.R
Paper Id :IJCRCST-MARCH16-35
Page No : 618- 621
36.THREE LEVEL ENCRYPTION SCHEME FOR CLOUD IN HEALTH CARE SYSTEMS
Authors : Abinaya.J,Chitra.R,Sangeetha.B,Sree Keerthi.V.K,
Paper Id :IJCRCST-MARCH16-36
Page No : 622- 625
37.A SCALABLE ONLINE DYNAMIC MONITORING SYSTEM
Authors : Dr.Murugeshwari.B, Padmapriya.B,KirupaMano.S,Subang.K
Paper Id :IJCRCST-MARCH16-37
Page No : 626- 629
38.ENHANCED K-ANONYMITY WITH PRIVACY PRESERVATION USING MICROAGGREGATION
Authors : S.Nathiya ,U.Gowrisankar
Paper Id :IJCRCST-MARCH16-38
Page No : 630- 632
39.AN IMPROVED PARALLEL PROCESSING BY QUERY OPTIMIZATION IN CLOUD ENVIRONMENT
Authors : Praveen chander, S.E.Siva Ram,C.A.Bhuvaneshwaran
Paper Id :IJCRCST-MARCH16-39
Page No : 633- 635
40.ENHANCING THE PERFORMANCE OF FILTERING USING CANNY EDGE DETECTION ALGORITHM FOR REAL TIME BIG DATA WITH HADOOP
Authors : K. Akshaya,K.Gangatharan,R.Vishnu Priya,N. Suresh Kumar
Paper Id :IJCRCST-MARCH16-40
Page No : 636- 640
41.SMART HEALTH CARE SYSTEM IMPLEMENTED USING IoT
Authors : S.Sivagami,D.Revathy,L.Nithyabharathi
Paper Id :IJCRCST-MARCH16-41
Page No : 641- 646
42.ENERGY AWARE WEB BROWSING ON HAND HELD SMART DEVICES USING ATTENTION TIME PREDICTION
Authors :G.R. Hemalakshmi,S.Ananthi,G. Emima Pon Glory
Paper Id :IJCRCST-MARCH16-42
Page No : 647- 649
43.CYBERCRIME RISK AVOIDANCE ON ONLINE SERVICE
Authors :Swetha.S,Dhivya.V,Ramani.E, Dr.R.Sugumar
Paper Id :IJCRCST-MARCH16-43
Page No : 650- 658
44.CLOUD BASED LOG STORAGE AND ARCHIVAL WITH REAL TIME SEARCH CAPABILITY
Authors :Maria Michael Visuwasam,Abijith Krishna.U,Balakumaran.M
Paper Id :IJCRCST-MARCH16-44
Page No : 659- 661
45.ENHANCING SECURITY BY IDENTIFICATION OF PROVENANCE FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS
Authors :M.Linda Alice,S.Karpaga Jothi,A.Sathya
Paper Id :IJCRCST-MARCH16-45
Page No : 662- 664
46.EFFICIENT WEB SERVICE SELECTION METHODOLOGY BASED ON QUALITY OF EXPERIENCE
Authors :M.Suchithra,T.Sowntharya,V.Priyanka
Paper Id :IJCRCST-MARCH16-46
Page No : 665- 667
47.SECURITY OPERATIONS OF VITAL ROUTING PROTOCOLS IN WIRELESS AD HOC NETWORKS
Authors :K.S.Saravanan,Dr.N.Rajendran
Paper Id :IJCRCST-MARCH16-47
Page No : 668- 674
48.SURVEY ON SENTIMENT ANALYSIS
Authors : N.Jagadish Kumar,E.Abirami,S.Rajakumari
Paper Id :IJCRCST-MARCH16-48
Page No : 675- 676
49.ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES (AALTM)-AN IMPLEMENTATION OF LOCATION BASED SERVICES
Authors : R.Sankareshwari, A.Shunmuga Sankari,G.R.Hema Lakshmi
Paper Id :IJCRCST-MARCH16-49
Page No : 677- 678
50.AUTHENTICATION AND UNCORKING SMART PHONES BY HAND-WAVE GESTURE
Authors : R.Pavithra,N.Sandhya,K.Balachander
Paper Id :IJCRCST-MARCH16-50
Page No : 679- 682
51.A SURVEY ON EXAMINES THE PREDICTION DATA ANALYSIS SYSTEMS IN DATA MINING
Authors : P.Kowsalyadevi,Dr.K.Thangadurai,
Paper Id :IJCRCST-MARCH16-51
Page No : 683- 686