IJCTT - Volume 14 - No 1 Aug 2014

  Title/Author Name Paper ID
  Review of Role Based Access Control Method for Securing User Space in Cloud Computing
- Mrs.Sunitha B.S , Dr.Anir Ban Basu
 IJCTT-V14P106
  Implementation of Path Finding Algorithms in a 3-Dimentional Environment
- Firas Abdullah Thweny Al-Saedi , Fadi Khalid Ibrahim
 IJCTT-V14P107
  Run Time Bubble Sort – An Enhancement of Bubble Sort
- Harish Rohil , Manisha
 IJCTT-V14P109
  Detection of Voiced, Unvoiced and Silence Regions of Assamese Speech by Using Acoustic Features
- Bidyut Kumar Das , Ajit Das , Utpal Bhattacharjee
 IJCTT-V14P111
  Green Computing
- Biswajit Saha
 IJCTT-V14P112
  Selection of Most Appropriate Backpropagation Training Algorithm in Data Pattern Recognition
- Hindayati Mustafidah , Sri Hartati , Retantyo Wardoyo , Agus Harjoko
 IJCTT-V14P120
  Iris Recognition based on Wavelet Transform and Probabilistic Neural Network
- Azade Bastani
 IJCTT-V14P121
  Real Time and Past Positional Location Analysis of Friends in a Social Network Using Smart Devices
- Dr. Sanjeev Dhawan , Nishu Dhundwal
 IJCTT-V14P126
  Robust Intrusion Detection Mechanism for Mobile Adhoc Networks
- Ms. Rasagna Chinthireddy , Dr. S Arvind
 IJCTT-V14P129