1.A MEDICAL INFORMATION SECURITY USING CRYPTOSYSTEM FOR WIRELESS SENSOR NETWORKS
Authors : Dr .C.K.Gomathy,V.Geetha,T.Jayanthi,M.Bhargavi,P.Sai haritha
Paper Id :IJCRCST-APRIL17-01
Page No : 1-5
2.A TECHNIQUE TO CONSERVE LOCATION CENTRIC IN GEOSOCIAL NETWORKS
Authors : Dr .C.K.Gomathy,V.Geetha,T.Jayanthi, P.Charan,P.U.Kirtthikaa
Paper Id :IJCRCST-APRIL17-02
Page No : 6-9
3.AN EFFECTIVE INNOVATION TECHNOLOGY IN ENHANCING TEACHING AND LEARNING OF KNOWLEDGE USING ICT METHODS
Authors : Dr .C.K.Gomathy
Paper Id :IJCRCST-APRIL17-03
Page No : 10-13
4.AN EFFECTIVE IMPLEMENTATION OF DATA PREFETCHING TO ALLEVIATE THE STORAGE ACCESS LATENCY
Authors : V.Geetha,G.Vamsi,Dr.C.K.Gomathy,N.P.Ganesh,T.Jayanthi,G.Raheshwara Rao
Paper Id :IJCRCST-APRIL17-04
Page No : 14-17
5.AN EFFICIENT PREDICTION OF MEDICAL DISEASES USING PATTERN MINING IN DATA EXPLORATION
Authors : V.Geetha,Dr.C.K.Gomathy,T.Jayanthi, R. Jayashree, S. Indhumathi,E. Avinash
Paper Id :IJCRCST-APRIL17-05
Page No : 18-21
6.A FINGER PRINT MATCHING METHOD FOR CHECKING AUTHENTICITY IN ONLINE ELECTION SYSTEM
Authors : T.Jayanthi,Y. Sri Vyshnavi,V.Geetha,N. R.Naga Pranitha,DR. C.K Gomathy,N. V. G. S. Sarath Chandra
Paper Id :IJCRCST-APRIL17-06
Page No : 22-24
7.TRUST MANAGEMENT IN UNATTENDED WIRELESS SENSOR NETWORKS
Authors : V.R.Ramesh, N.Suresh
Paper Id :IJCRCST-APRIL17-07
Page No : 25-29
8.TOWARDS AN EFFICIENT DATA ANALYTIC MODEL FOR REAL-TIME SOCIAL-SENSOR EMOTIONS DETECTION
Authors : Lamanguluka N.Henock,P. Jyotheeswari
Paper Id :IJCRCST-APRIL17-08
Page No : 30-34
9.AN EFFICIENT CLUSTER BASED DATA COLLECTION AND ENERGY AWARE PATH SELECTION IN WIRELESS SENSOR NETWORK
Authors : S.Sakthivel, S.Menaka,A.SriChamundeswari
Paper Id :IJCRCST-APRIL17-09
Page No : 35-37
10.INTELLIGENT TRANSPORT SYSTEM
Authors : M. Satheesh Kumar,M.R. Arun Kumar,S. Amal Leo,S.Giridharan
Paper Id :IJCRCST-APRIL17-10
Page No : 38-40
11.AN IMPLEMENTATION OF EFFICIENT SEARCH ENGINE FOR TEMPLE SCULPTURES
Authors : V.Balu,M.Saraswathi
Paper Id :IJCRCST-APRIL17-11
Page No : 41-43
12.A STUDY ON DISTRIBUTED PRIORITY SCHEDULING AND MEDIUM ACCESS CONTROL IN AD HOC NETWORKS
Authors : A.Raja
Paper Id :IJCRCST-APRIL17-12
Page No : 44-47