S.No Articles Ref. No
 1

Review of Role Based Access Control Method for Securing User Space in Cloud Computing

- Mrs.Sunitha B.S , Dr.Anir Ban Basu

 IJCTT-V14P106
 2

Implementation of Path Finding Algorithms in a 3-Dimentional Environment

- Firas Abdullah Thweny Al-Saedi , Fadi Khalid Ibrahim

 IJCTT-V14P107
 3

Run Time Bubble Sort – An Enhancement of Bubble Sort

- Harish Rohil , Manisha

 IJCTT-V14P109
 4

Detection of Voiced, Unvoiced and Silence Regions of Assamese Speech by Using Acoustic Features

- Bidyut Kumar Das , Ajit Das , Utpal Bhattacharjee

 IJCTT-V14P111
 5

Green Computing

- Biswajit Saha

 IJCTT-V14P112
 6

Selection of Most Appropriate Backpropagation Training Algorithm in Data Pattern Recognition

- Hindayati Mustafidah , Sri Hartati , Retantyo Wardoyo , Agus Harjoko

 IJCTT-V14P120
 7

Iris Recognition based on Wavelet Transform and Probabilistic Neural Network

- Azade Bastani

 IJCTT-V14P121
 8

Real Time and Past Positional Location Analysis of Friends in a Social Network Using Smart Devices

- Dr. Sanjeev Dhawan , Nishu Dhundwal

 IJCTT-V14P126
 9

Robust Intrusion Detection Mechanism for Mobile Adhoc Networks

- Ms. Rasagna Chinthireddy , Dr. S Arvind

 IJCTT-V14P129