- DocumentoRegression Based Comparative Study for Continuous BP Measurement Using Pulse Transit Timeenviado porEditor IJRITCC
- DocumentoA Review of Wearable Antenna for Body Area Network Applicationenviado porEditor IJRITCC
- DocumentoChannel Estimation Techniques over MIMO-OFDM Systemenviado porEditor IJRITCC
- DocumentoA Review of 2D &3D Image Steganography Techniquesenviado porEditor IJRITCC
- DocumentoIJRITCC Call for Papers (November 2018 Issue) Citation in Google Scholar Impact Factor 5.837 DOI (CrossRef USA) for each paper, IC Value 5.075enviado porEditor IJRITCC
- DocumentoPerformance Analysis of Image Restoration Techniques at Different Noisesenviado porEditor IJRITCC
- DocumentoComparative Analysis of Hybrid Algorithms in Information Hidingenviado porEditor IJRITCC
- DocumentoImportance of Similarity Measures in Effective Web Information Retrievalenviado porEditor IJRITCC
- DocumentoChannel Estimation Techniques over MIMO-OFDM Systemenviado porEditor IJRITCC
- DocumentoA Review of 2D &3D Image Steganography Techniquesenviado porEditor IJRITCC
- DocumentoA Review of Wearable Antenna for Body Area Network Applicationenviado porEditor IJRITCC
- Documento7 1534938100_22-08-2018enviado porEditor IJRITCC
- DocumentoModeling Heterogeneous Vehicle Routing Problem with Strict Time Scheduleenviado porEditor IJRITCC
- DocumentoFuzzy Logic A Soft Computing Approach For E-Learningenviado porEditor IJRITCC
- DocumentoNetwork Approach based Hindi Numeral Recognitionenviado porEditor IJRITCC
- DocumentoEfficient Techniques for Image Compressionenviado porEditor IJRITCC
- DocumentoA Study of Focused Web Crawling Techniquesenviado porEditor IJRITCC
- DocumentoPrediction of Crop Yield Using LS-SVMenviado porEditor IJRITCC
- DocumentoPredictive Analysis for Diabetes using Tableauenviado porEditor IJRITCC
- DocumentoSimulation of Vector Controlled Adjustable Speed System of Doubly Fed Induction Machineenviado porEditor IJRITCC
- DocumentoiTimer - Count On Your Timeenviado porEditor IJRITCC
- DocumentoHybrid Algorithm for Enhanced Watermark Security with Robust Detectionenviado porEditor IJRITCC
- DocumentoVehicular Ad-hoc Network, its Security and Issuesenviado porEditor IJRITCC
- DocumentoIoT and Fingerprint Based Door Looking Systemenviado porEditor IJRITCC
- DocumentoSafeguarding Data Privacy by Placing Multi-level Access Restrictionsenviado porEditor IJRITCC
- DocumentoKinematic Hardening Parameters Identification with Finite Element Simulation of Low Cycle Fatigue using Genetic Algorithm Approachenviado porEditor IJRITCC
- DocumentoA Clustering and Associativity Analysis Based Probabilistic Method for Web Page Predictionenviado porEditor IJRITCC
- DocumentoImage Restoration Techniques Using Fusion to Remove Motion Blurenviado porEditor IJRITCC
- DocumentoSpace Complexity Analysis of RSA and ECC Based Security Algorithms in Cloud Dataenviado porEditor IJRITCC
- DocumentoA Content Based Region Separation and Analysis Approach for SAR Image Classificationenviado porEditor IJRITCC
- DocumentoMotif and Conglomeration of Software Process Improvement Modelenviado porEditor IJRITCC
- DocumentoNovel Approach for Comparative Analysis of Networking Routing Protocolenviado porEditor IJRITCC
- DocumentoRobust Analysis for AODV Protocol in Vehicular Adhoc Network under Black Hole Attack in NS 2enviado porEditor IJRITCC
- DocumentoDual Image Watermarking Scheme based on DWT-SVDenviado porEditor IJRITCC
- DocumentoThe Fuzzy Decision Operations for Satisfying the Criteria of Customer Satisfactionenviado porEditor IJRITCC
- DocumentoA Novel Approach of Steganography using Bit plane Slicing and Catalan-Lucas Number Sequenceenviado porEditor IJRITCC
- DocumentoStudies on the Dynamics of Two Mutually Coupled Colpitts Oscillatorsenviado porEditor IJRITCC
- DocumentoPASenviado porEditor IJRITCC
- DocumentoBUSINESS DIARY - An Interactive and Intelligent Platform for SME’senviado porEditor IJRITCC
- DocumentoLift Control System Based on PLCenviado porEditor IJRITCC
- DocumentoFinest Execution Time Approach for Optimal Execution Time in Mobile and Cloud Computingenviado porEditor IJRITCC
- DocumentoEnergy Efficiency Comparative Analysis of Different Routing Protocol In MANET for Healthcare Environmentenviado porEditor IJRITCC
- DocumentoEmerging Issues on GSTenviado porEditor IJRITCC
- DocumentoSarcasm Detection and User Behaviour Analysisenviado porEditor IJRITCC
- DocumentoPaper on Design and Analysis of Wheel set assembly & Disassembly Hydraulic Press Machineenviado porEditor IJRITCC
- DocumentoPaper on Design Improvement and Analysis of Rotary Air Compressor Bladesenviado porEditor IJRITCC
- DocumentoIoT Based Water Level Monitoring System with an Android Applicationenviado porEditor IJRITCC
- DocumentoA Study of An Optical Mouse to Customize Ii for Implementation of Wireless Draw Penenviado porEditor IJRITCC
- DocumentoNovel Method for Denoising Medical Image Using 2nd Level Discrete Wavelet Transform and Bilinear Filterenviado porEditor IJRITCC