Notice Board :

Call for Paper
Vol. 5 Issue 12

Submission Start Date:
December 01, 2019

Acceptence Notification Start:
December 20, 2019

Submission End:
December 25, 2019

Final ManuScript Due:
December 28, 2019

Publication Date:
December 31, 2019
                         Notice Board: Call for PaperVol. 5 Issue 12      Submission Start Date: December 01, 2019      Acceptence Notification Start: December 20, 2019      Submission End: December 25, 2019      Final ManuScript Due: December 28, 2019      Publication Date: December 31, 2019



Volume II Issue V

Author Name
Govind Ballabh Khan, Prof. Sandeep Pratap Singh
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
Noise is an important factor which when get added to an image reduces its quality and appearance. So in order to enhance the image qualities, it has to be removed with preserving the textural information and structural features of image. There are different types of noises exist who corrupt the images. Selection of the denoising algorithm is application dependent. Noise removal from a contaminated image signal is a prominent field of research and many researchers have suggested a large number of algorithms and compared their results.
PaperID
IJETAS/MAY/2016/21010

Author Name
Sachinkumar Shahare, Prof. Vijay Prakash Singh
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
In the current generation microstrip patch antenna was planned at variety of substrate plane (partial, triangular, elliptical, and circular) for different result analysis of gain and directivity. In this communication grow of the Wi-Fi and Wi-max in wireless communication, multi band microstrip patch antenna plats a major player of the sector.
PaperID
IJETAS/MAY/2016/21012

Author Name
Aditi Singh Rathore, Kailash Patidar, Gajendra Singh Chandel
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
To protect image data, image encryption is an appropriate way. There is a unique feature of image and text data. The available encryption algorithms are good for text data. But it is not suitable for multimedia data because the characteristic of multimedia data is totally different from text data. All multimedia data has got a lot of redundancy but text data does not possess any redundancy. The pixel value of a location is highly correlated to values of its neighboring pixels. Like, a sound sample is correlated to its next sample and its previous samples. This correlation proves to be attack points to any standard encryption algorithm.
PaperID
IJETAS/MAY/2016/21015