IJCTT - Volume 14 - No 1 Aug 2014
|
Title/Author Name |
Paper ID |
♦ |
Review of Role Based Access Control Method for Securing User Space in Cloud Computing - Mrs.Sunitha B.S , Dr.Anir Ban Basu |
IJCTT-V14P106 |
♦ |
Implementation of Path Finding Algorithms in a 3-Dimentional Environment - Firas Abdullah Thweny Al-Saedi , Fadi Khalid Ibrahim |
IJCTT-V14P107 |
♦ |
Run Time Bubble Sort – An Enhancement of Bubble Sort - Harish Rohil , Manisha |
IJCTT-V14P109 |
♦ |
Detection of Voiced, Unvoiced and Silence Regions of Assamese Speech by Using Acoustic Features - Bidyut Kumar Das , Ajit Das , Utpal Bhattacharjee |
IJCTT-V14P111 |
♦ |
Green Computing - Biswajit Saha |
IJCTT-V14P112 |
♦ |
Selection of Most Appropriate Backpropagation Training Algorithm in Data Pattern Recognition - Hindayati Mustafidah , Sri Hartati , Retantyo Wardoyo , Agus Harjoko |
IJCTT-V14P120 |
♦ |
Iris Recognition based on Wavelet Transform and Probabilistic Neural Network - Azade Bastani |
IJCTT-V14P121 |
♦ |
Real Time and Past Positional Location Analysis of Friends in a Social Network Using Smart Devices - Dr. Sanjeev Dhawan , Nishu Dhundwal |
IJCTT-V14P126 |
♦ |
Robust Intrusion Detection Mechanism for Mobile Adhoc Networks - Ms. Rasagna Chinthireddy , Dr. S Arvind |
IJCTT-V14P129 |