- DocumentoRegression Based Comparative Study for Continuous BP Measurement Using Pulse Transit Timecargado porEditor IJRITCC
- DocumentoA Review of 2D &3D Image Steganography Techniquescargado porEditor IJRITCC
- DocumentoA Review of Wearable Antenna for Body Area Network Applicationcargado porEditor IJRITCC
- DocumentoChannel Estimation Techniques over MIMO-OFDM Systemcargado porEditor IJRITCC
- DocumentoIJRITCC Call for Papers (November 2018 Issue) Citation in Google Scholar Impact Factor 5.837 DOI (CrossRef USA) for each paper, IC Value 5.075cargado porEditor IJRITCC
- DocumentoPerformance Analysis of Image Restoration Techniques at Different Noisescargado porEditor IJRITCC
- DocumentoComparative Analysis of Hybrid Algorithms in Information Hidingcargado porEditor IJRITCC
- DocumentoImportance of Similarity Measures in Effective Web Information Retrievalcargado porEditor IJRITCC
- DocumentoChannel Estimation Techniques over MIMO-OFDM Systemcargado porEditor IJRITCC
- DocumentoA Review of 2D &3D Image Steganography Techniquescargado porEditor IJRITCC
- DocumentoA Review of Wearable Antenna for Body Area Network Applicationcargado porEditor IJRITCC
- Documento7 1534938100_22-08-2018cargado porEditor IJRITCC
- DocumentoModeling Heterogeneous Vehicle Routing Problem with Strict Time Schedulecargado porEditor IJRITCC
- DocumentoFuzzy Logic A Soft Computing Approach For E-Learningcargado porEditor IJRITCC
- DocumentoNetwork Approach based Hindi Numeral Recognitioncargado porEditor IJRITCC
- DocumentoEfficient Techniques for Image Compressioncargado porEditor IJRITCC
- DocumentoA Study of Focused Web Crawling Techniquescargado porEditor IJRITCC
- DocumentoPrediction of Crop Yield Using LS-SVMcargado porEditor IJRITCC
- DocumentoPredictive Analysis for Diabetes using Tableaucargado porEditor IJRITCC
- DocumentoSimulation of Vector Controlled Adjustable Speed System of Doubly Fed Induction Machinecargado porEditor IJRITCC
- DocumentoiTimer - Count On Your Timecargado porEditor IJRITCC
- DocumentoHybrid Algorithm for Enhanced Watermark Security with Robust Detectioncargado porEditor IJRITCC
- DocumentoVehicular Ad-hoc Network, its Security and Issuescargado porEditor IJRITCC
- DocumentoIoT and Fingerprint Based Door Looking Systemcargado porEditor IJRITCC
- DocumentoSafeguarding Data Privacy by Placing Multi-level Access Restrictionscargado porEditor IJRITCC
- DocumentoKinematic Hardening Parameters Identification with Finite Element Simulation of Low Cycle Fatigue using Genetic Algorithm Approachcargado porEditor IJRITCC
- DocumentoA Clustering and Associativity Analysis Based Probabilistic Method for Web Page Predictioncargado porEditor IJRITCC
- DocumentoImage Restoration Techniques Using Fusion to Remove Motion Blurcargado porEditor IJRITCC
- DocumentoSpace Complexity Analysis of RSA and ECC Based Security Algorithms in Cloud Datacargado porEditor IJRITCC
- DocumentoA Content Based Region Separation and Analysis Approach for SAR Image Classificationcargado porEditor IJRITCC
- DocumentoMotif and Conglomeration of Software Process Improvement Modelcargado porEditor IJRITCC
- DocumentoNovel Approach for Comparative Analysis of Networking Routing Protocolcargado porEditor IJRITCC
- DocumentoRobust Analysis for AODV Protocol in Vehicular Adhoc Network under Black Hole Attack in NS 2cargado porEditor IJRITCC
- DocumentoDual Image Watermarking Scheme based on DWT-SVDcargado porEditor IJRITCC
- DocumentoThe Fuzzy Decision Operations for Satisfying the Criteria of Customer Satisfactioncargado porEditor IJRITCC
- DocumentoA Novel Approach of Steganography using Bit plane Slicing and Catalan-Lucas Number Sequencecargado porEditor IJRITCC
- DocumentoStudies on the Dynamics of Two Mutually Coupled Colpitts Oscillatorscargado porEditor IJRITCC
- DocumentoPAScargado porEditor IJRITCC
- DocumentoBUSINESS DIARY - An Interactive and Intelligent Platform for SME’scargado porEditor IJRITCC
- DocumentoLift Control System Based on PLCcargado porEditor IJRITCC
- DocumentoFinest Execution Time Approach for Optimal Execution Time in Mobile and Cloud Computingcargado porEditor IJRITCC
- DocumentoEnergy Efficiency Comparative Analysis of Different Routing Protocol In MANET for Healthcare Environmentcargado porEditor IJRITCC
- DocumentoEmerging Issues on GSTcargado porEditor IJRITCC
- DocumentoSarcasm Detection and User Behaviour Analysiscargado porEditor IJRITCC
- DocumentoPaper on Design and Analysis of Wheel set assembly & Disassembly Hydraulic Press Machinecargado porEditor IJRITCC
- DocumentoPaper on Design Improvement and Analysis of Rotary Air Compressor Bladescargado porEditor IJRITCC
- DocumentoIoT Based Water Level Monitoring System with an Android Applicationcargado porEditor IJRITCC
- DocumentoA Study of An Optical Mouse to Customize Ii for Implementation of Wireless Draw Pencargado porEditor IJRITCC
- DocumentoNovel Method for Denoising Medical Image Using 2nd Level Discrete Wavelet Transform and Bilinear Filtercargado porEditor IJRITCC