1.DUAL CROSS VERIFICATION LAYER FOR CONTENT CONSISTENCY IN CLOUD COMPUTING
Authors : K.Ramiah Ilango,K.Jeya Aishwarya,N.Ananthi,M.Madhuvathani
Paper Id :IJCRCST-MARCH17-01
Page No : 1-4
2.USER AUTHENTICATION IN WSN USING RSA ENCRYPTION
Authors : D.Thamaraiselvi,Dr.M.Ramakrishnan
Paper Id :IJCRCST-MARCH17-02
Page No : 5-9
3.RATING PREDICTION BASED ON SENTIMENTAL ANALYSIS OF REVIEWS FROM ONLINE TRENDING FORUMS
Authors : Abhishek J,Mouli J E,Abi Ezhilan,S.Nalini
Paper Id :IJCRCST-MARCH17-03
Page No : 10-14
4.PATIENT HEALTHCARE SYSTEM
Authors : Lakshmi Priya.S, Priya.K,Subathra.S ,Vanmathi.R,Indumathi.G
Paper Id :IJCRCST-MARCH17-04
Page No : 15-19
5.RELEVANCE SCORE BASED MULTI-KEYWORD SEARCH
Authors : P.Suganthi,S.Dhivya,M.Asrumathi,E.Keerthiga
Paper Id :IJCRCST-MARCH17-05
Page No : 20-23
6.A MULTI-HOP BROADCAST PROTOCOL FROM EMERGENCY MESSAGE DISSEMINATION IN URBAN VEHICULAR AD-HOC NETWORK
Authors : G.Prethija,A.Jafrin john,M.Bhahirathi,V.Sushmitha
Paper Id :IJCRCST-MARCH17-06
Page No : 24-26
7.IOT BASED INDOOR GARDEN MONITORING SYSTEM
Authors : S.Abirami,M.Hemalatha
Paper Id :IJCRCST-MARCH17-07
Page No : 27-29