Want to Publish your original paper on IJCRCST, Email to: editor@ijcrcst.com


Volume 2 Issue 3 (March -2016)


  1. EFFICIENTLY SECURING SYSTEM USING GRAPHICAL CAPTCHA
    Authors :K.Gomathi,K.Mythily,S.Poovarasi,S.Selvakanmani
    Paper Id :IJCRCST-MARCH16-01
    Page No : 487 - 490


  2. EFFECTIVE RISK MANAGEMENT FOR MOBILE APPLICATION
    Authors :G.Preethi,Dr.P.Marikkannu
    Paper Id :IJCRCST-MARCH16-02
    Page No : 491 - 494


  3. LOCATING THE WISECRACKERS USING SPOOFER
    Authors :B.Praveen Kumar,N.Haripreethi,S.Shilpa,B.Bharathi
    Paper Id :IJCRCST-MARCH16-03
    Page No : 495 - 499


  4. CONCURRENT PROGRESSIVE APPROACH FOR DETECTING THE DUPLICATION
    Authors :B.Praveen Kumar,M.R.Priyanka,C.Radhika,A.Subashini
    Paper Id :IJCRCST-MARCH16-04
    Page No : 500- 504


  5. CLOUD BASED RESOURCE ALLOCATION AND STALLING PREVENTION FOR VIDEO STREAMING APPLICATION
    Authors :Pranamita Nanda,P.Revathy,V.Gayathri,V.Mahalakshmi
    Paper Id :IJCRCST-MARCH16-05
    Page No : 505- 509


  6. GENERATING SUMMARY RISK SCORES FOR MOBILE APPLICATIONS
    Authors :Dr.M.Newlin Rajkumar,S.Mohan Kumar,V.Dhurka
    Paper Id :IJCRCST-MARCH16-06
    Page No : 510- 512


  7. CLOUD AUDITING USING REGENERATING CODES WITH ENCRYPTED KEYS FOR EXTENSIVE SECURITY
    Authors : R.Raja, V.Nishanthi,B.Keerthana,S.Monisha
    Paper Id :IJCRCST-MARCH16-07
    Page No : 513- 516


  8. AN INTELLECTUAL BASED RE-RANKING FOR IMAGE SEARCH IN WEB
    Authors : S.Aiswarya,B.Gayatri,S.Gayathri,M.Archana Devi
    Paper Id :IJCRCST-MARCH16-08
    Page No : 517- 519


  9. TOWARD EFFICIENT CLOUD DATA ANALYSIS SERVICE FOR LARGE-SCALE SOCIAL NETWORKS
    Authors : K.Tamilarasi,J.Dhanajeyan,K.P.Nithin Kumar,T.Naveen Kumar
    Paper Id :IJCRCST-MARCH16-09
    Page No : 520- 523


  10. RANKING FRAUD DETECTION SYSTEM FOR MOBILE APPS
    Authors : Dr. Soundararajan,Janaat.V,Pothireddy Akhila,Keerthana.M
    Paper Id :IJCRCST-MARCH16-10
    Page No : 524- 527


  11. CONTINGENCY COEFFICIENT MEASURES FOR WEB FORUM USERS AND SENTIMENT ANALYSIS
    Authors : Aswin Kumar.P,Bhagavan Iyyappan.J,Murali Krishna Kumar.U,Chitra.R
    Paper Id :IJCRCST-MARCH16-11
    Page No : 528- 530


  12. WIRELESS HANDHELD VISITOR GUIDE AND TRACKING SYSTEM FOR SECURITY PURPOSE
    Authors : Sunil Anarase,Pratik Padher,Govind Thavre,Swati Gawhale
    Paper Id :IJCRCST-MARCH16-12
    Page No : 531- 533


  13. A THREE LEVEL HIERARCHICAL SIGNATURE ON ADS-B SUPPORTING BATCH VERIFICATION
    Authors : Shilpa Mary Philips,N.Raja Rajeswari,B.Hema
    Paper Id :IJCRCST-MARCH16-13
    Page No : 534- 537


  14. SPEAKING ATM USING SPEECH SYNTHESIS
    Authors : V. Manoj Kumar,S.Prathap,B.Gowtham,G.Sriram
    Paper Id :IJCRCST-MARCH16-14
    Page No : 538- 541


  15. SENTIMENT ANALYSIS USING POS TECHNIQUE WITH NLP TOOL
    Authors : Vignesh.S,Visnu.S,Hariharan.R,Pranamitha Nanda
    Paper Id :IJCRCST-MARCH16-15
    Page No : 542- 546


  16. ENHANCING SECURITY OF RESOURCE MATCHMAKING BY PARTITIONING FILES ACROSS MULTIPLE CLOUDS
    Authors : Pranamitha Nanda,B.Daniel Nepoleon,M.Mohamed Faizal Shariff,K.Nethajhi
    Paper Id :IJCRCST-MARCH16-16
    Page No : 547- 550


  17. REMOVAL OF MALICIOUS SIDE INFORMATION IN WEB DOCUMENTS
    Authors : E. Silambarasan,M.Sindhuja,T.Pragathi,S.Siva Abbirammi,K.Gayathri
    Paper Id :IJCRCST-MARCH16-17
    Page No : 551- 554


  18. AUTOMATIC PROTOCOL BLOCKER FOR PRIVACY PRESERVING PUBLIC AUDITING IN CLOUD COMPUING
    Authors : Aniket Rajkiran Sontakke,Chetna Jaywant Sonawane,Kiran Ashok Hingmire
    Paper Id :IJCRCST-MARCH16-18
    Page No : 555- 557


  19. PREDICTING ACCURATE BUS ARRIVAL TIME USING GPS WITH MOBILE PHONE
    Authors : Dr. N.Kumaresan,S.Shiny,K.Sudha,S.Mehala
    Paper Id :IJCRCST-MARCH16-19
    Page No : 558- 560


  20. FACE RECOGNITION SYSTEM FOR ENHANCING PRIVACY OF PHOTO SHARING IN ONLINE SOCIAL NETWORK
    Authors : E.Silambarasan,V.Amrudha Devi,A.Abirekha,P.Bhavani Devi
    Paper Id :IJCRCST-MARCH16-20
    Page No : 561- 563


  21. PRIVACY PRESERVING IN HEALTH RECORDS
    Authors :DLK.Vijaybharath,S.Arvind,R.Rohith
    Paper Id :IJCRCST-MARCH16-21
    Page No : 564- 566


  22. C4.5 QUERY BASED SEARCH OVER DATABASE
    Authors : Aiswarya.S,Santhiya.T,Harini.R,Vinitha.S
    Paper Id :IJCRCST-MARCH16-22
    Page No : 567- 569


  23. ROBUST BIOMETRIC BASED AUTHENTICATION USING WATERMARKING
    Authors : P.Revathi,P.R.Jaya Kavitha,R.Nithya
    Paper Id :IJCRCST-MARCH16-23
    Page No : 570- 573


  24. ACHIEVING QUERY OPTIMIZATION OF ENHANCED PARALLEL PROCESSING IN CLOUD
    Authors : T.Sneha,E.Karthiyayeni,P.Sailaja
    Paper Id :IJCRCST-MARCH16-24
    Page No : 574- 576


  25. PRIORITY BASED PROCESS SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMPUTING
    Authors : S.Harini,R.Priyankaa,K.G.Gnaaneeshwari,S.Rajeshkumar
    Paper Id :IJCRCST-MARCH16-25
    Page No : 577- 581


  26. DETECTION AND BLOCKING OF SYBILS USING VOTE TRUST IN ONLINE SOCIAL NETWORKING
    Authors : R.Uma,G.Kiruba,D.Devi,D.Selvamani,B.Vaishnavi
    Paper Id :IJCRCST-MARCH16-26
    Page No : 582- 584


  27. AUDIT-FREE CLOUD STORAGE VIA RANDOMIZED KEY PROTOCOL
    Authors : H.Anila Glory,P.S.Revathy,S.Anusha,G.Sandhya
    Paper Id :IJCRCST-MARCH16-27
    Page No : 585- 587


  28. EFFECTIVE CLASSIFICATION OF TEXT AND IMPROVING LEARNING EXPERIENCE
    Authors : I.Anisha Agnes,K.Nivetha,M.Rajeswari
    Paper Id :IJCRCST-MARCH16-28
    Page No : 588- 590


  29. SECURED SOCIAL MEDIA USING ASPECT BASED SENTIMENT ANALYSIS
    Authors : Banu.M ,Muthra.S, Hema.S ,Nalini.S
    Paper Id :IJCRCST-MARCH16-29
    Page No : 591- 595


  30. DETECTION AND NORMALIZATION OF MEDICAL SEMANTICS FOR PERSONALIZED HEALTH SERVICES
    Authors :Arunjunai Selvi.M,Deekshitha.L,Nithiyalakshmi.V,Nithiyalakshmi.V
    Paper Id :IJCRCST-MARCH16-30
    Page No : 596- 599


  31. VOICE COMMAND EXECUTION WITH SPEECH RECOGNITION AND SYNTHESIZER (A VOICE INTERFACE)
    Authors : Kalpana.A.V,Ram Kumar.C,Avinash.R,Venketaramanan.B
    Paper Id :IJCRCST-MARCH16-31
    Page No : 600- 604


  32. A HOLISTIC VIEW OF RANKING FRAUD DETECTION SYSTEM FOR MOBILE APPS
    Authors : N.Bhavani,A.Gayathri,T.Eswari,K.Kalaivani,K.Kalaivani
    Paper Id :IJCRCST-MARCH16-32
    Page No : 605- 608


  33. FIDOOP: PARALLEL MINING OF FREQUENT ITEMSETS USING CURA AND IWD ALGORITHM
    Authors : Raja.R ,Sathya Narayanan.R.K,Vasanth.P,Dinesh Babu.P
    Paper Id :IJCRCST-MARCH16-33
    Page No : 609- 612


  34. FAST FINDING REGION BY USING PUSH MODEL AND R-TREE METHOD IN LOCATION BASED SERVICE
    Authors : S.Uthra,M.Hemavathi,R.Vinitha,K.Balachander
    Paper Id :IJCRCST-MARCH16-34
    Page No : 613- 617


  35. GROUP USER REVOCATION FOR SHARED DYNAMIC DATA ON AUDITING VIA CLOUD STORAGE
    Authors : Roselinmary.A,Saranya.R,Jeevitha.B,Dr.Sugumar.R
    Paper Id :IJCRCST-MARCH16-35
    Page No : 618- 621


  36. THREE LEVEL ENCRYPTION SCHEME FOR CLOUD IN HEALTH CARE SYSTEMS
    Authors : Abinaya.J,Chitra.R,Sangeetha.B,Sree Keerthi.V.K,
    Paper Id :IJCRCST-MARCH16-36
    Page No : 622- 625


  37. A SCALABLE ONLINE DYNAMIC MONITORING SYSTEM
    Authors : Dr.Murugeshwari.B, Padmapriya.B,KirupaMano.S,Subang.K
    Paper Id :IJCRCST-MARCH16-37
    Page No : 626- 629


  38. ENHANCED K-ANONYMITY WITH PRIVACY PRESERVATION USING MICROAGGREGATION
    Authors : S.Nathiya ,U.Gowrisankar
    Paper Id :IJCRCST-MARCH16-38
    Page No : 630- 632


  39. AN IMPROVED PARALLEL PROCESSING BY QUERY OPTIMIZATION IN CLOUD ENVIRONMENT
    Authors : Praveen chander, S.E.Siva Ram,C.A.Bhuvaneshwaran
    Paper Id :IJCRCST-MARCH16-39
    Page No : 633- 635


  40. ENHANCING THE PERFORMANCE OF FILTERING USING CANNY EDGE DETECTION ALGORITHM FOR REAL TIME BIG DATA WITH HADOOP
    Authors : K. Akshaya,K.Gangatharan,R.Vishnu Priya,N. Suresh Kumar
    Paper Id :IJCRCST-MARCH16-40
    Page No : 636- 640


  41. SMART HEALTH CARE SYSTEM IMPLEMENTED USING IoT
    Authors : S.Sivagami,D.Revathy,L.Nithyabharathi
    Paper Id :IJCRCST-MARCH16-41
    Page No : 641- 646


  42. ENERGY AWARE WEB BROWSING ON HAND HELD SMART DEVICES USING ATTENTION TIME PREDICTION
    Authors :G.R. Hemalakshmi,S.Ananthi,G. Emima Pon Glory
    Paper Id :IJCRCST-MARCH16-42
    Page No : 647- 649


  43. CYBERCRIME RISK AVOIDANCE ON ONLINE SERVICE
    Authors :Swetha.S,Dhivya.V,Ramani.E, Dr.R.Sugumar
    Paper Id :IJCRCST-MARCH16-43
    Page No : 650- 658


  44. CLOUD BASED LOG STORAGE AND ARCHIVAL WITH REAL TIME SEARCH CAPABILITY
    Authors :Maria Michael Visuwasam,Abijith Krishna.U,Balakumaran.M
    Paper Id :IJCRCST-MARCH16-44
    Page No : 659- 661


  45. ENHANCING SECURITY BY IDENTIFICATION OF PROVENANCE FORGERY AND PACKET DROP ATTACKS IN WIRELESS SENSOR NETWORKS
    Authors :M.Linda Alice,S.Karpaga Jothi,A.Sathya
    Paper Id :IJCRCST-MARCH16-45
    Page No : 662- 664


  46. EFFICIENT WEB SERVICE SELECTION METHODOLOGY BASED ON QUALITY OF EXPERIENCE
    Authors :M.Suchithra,T.Sowntharya,V.Priyanka
    Paper Id :IJCRCST-MARCH16-46
    Page No : 665- 667


  47. SECURITY OPERATIONS OF VITAL ROUTING PROTOCOLS IN WIRELESS AD HOC NETWORKS
    Authors :K.S.Saravanan,Dr.N.Rajendran
    Paper Id :IJCRCST-MARCH16-47
    Page No : 668- 674


  48. SURVEY ON SENTIMENT ANALYSIS
    Authors : N.Jagadish Kumar,E.Abirami,S.Rajakumari
    Paper Id :IJCRCST-MARCH16-48
    Page No : 675- 676


  49. ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES (AALTM)-AN IMPLEMENTATION OF LOCATION BASED SERVICES
    Authors : R.Sankareshwari, A.Shunmuga Sankari,G.R.Hema Lakshmi
    Paper Id :IJCRCST-MARCH16-49
    Page No : 677- 678


  50. AUTHENTICATION AND UNCORKING SMART PHONES BY HAND-WAVE GESTURE
    Authors : R.Pavithra,N.Sandhya,K.Balachander
    Paper Id :IJCRCST-MARCH16-50
    Page No : 679- 682


  51. A SURVEY ON EXAMINES THE PREDICTION DATA ANALYSIS SYSTEMS IN DATA MINING
    Authors : P.Kowsalyadevi,Dr.K.Thangadurai,
    Paper Id :IJCRCST-MARCH16-51
    Page No : 683- 686



Get in Touch

  • Phone:
    +91 -8973 378 618
    +91 -9659 284 868
    +91 -4288 284 868
  • Email:
    editor@ijcrcst.com
  • Address:
    ExtroMind Publications,
    #2/358,Murugan Plaza,
    Syndicate Bank Upstairs,
    Salem Main Road,
    Tiruchengode,
    Tamilnadu, India-637 211.