IJCTT - Volume 14 - No 2 Aug 2014

S.No Title/Author Name Paper ID
11. Detection of Voiced, Unvoiced and Silence Regions of Assamese Speech by Using Acoustic Features
- Bidyut Kumar Das , Ajit Das , Utpal Bhattacharjee
 IJCTT-V14P111
12. Green Computing
- Biswajit Saha
 IJCTT-V14P112
13. A Credit Based Framework to Mitigating Multiple Hole Attack in Reactive Routing Protocol
- Vrutik Shah , Dr.Nilesh Modi
 IJCTT-V14P113
14. Using the Model Driven Architecture Approach To Manage the expenses
- Lamlili El Mazoui Nadori yasser , Roubi Sarra , Boubnad Mohamed Amine , Mohammed Erramdani
 IJCTT-V14P114
15. Securing Data through Re-Encryption in Unreliable clouds
- Dandaveni Santhosh Kumar , B. Madhuravani
 IJCTT-V14P115
16. Finding Similarity between Search Results from Web Databases using Clustering Algorithm
- C.Renuga , M.Menaka , V.Dineshkumar
 IJCTT-V14P116
17. A Survey on Primary User Emulation Detection Mechanisms in Cognitive Radio Networks
- V. Jayasree , R. Suganya
 IJCTT-V14P117
18. EFSR: Evolutionary Fisheye State Routing Protocol in Mobile Ad Hoc Networks
- A.Samuel Chellathurai , E.George Dharma Prakash Raj
 IJCTT-V14P118
19. The Paper has been removed  
20. Selection of Most Appropriate Backpropagation Training Algorithm in Data Pattern Recognition
- Hindayati Mustafidah , Sri Hartati , Retantyo Wardoyo , Agus Harjoko
 IJCTT-V14P120