Notice Board :

Call for Paper
Vol. 9 Issue 1

Submission Start Date:
January 1, 2023

Acceptence Notification Start:
January 20, 2023

Submission End:
January 26, 2023

Final ManuScript Due:
January 28, 2023

Publication Date:
January 31, 2023
                         Notice Board: Call for PaperVol. 9 Issue 1      Submission Start Date: January 1, 2023      Acceptence Notification Start: January 20, 2023      Submission End: January 26, 2023      Final ManuScript Due: January 28, 2023      Publication Date: January 31, 2023



Volume III Issue VI

Author Name
Priyanka Tiwari, Swatantra Tiwari
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
To identify the present or absent of licensed users, spectrum sensing techniques are used. Matched filter detection, Energy detection, and Cyclo-stationary feature detection are the three conventional methods used for spectrum sensing.
PaperID
IJETAS/June/2017/27

Author Name
Sheela Patel, Shivendra Dubey, Mukesh Dixit
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
The aim of this analysis is the creation and associate build up the system to forestall an organism against each well-known and new attacks, and functions as an adaptive distributed defense system or adaptive artificial system.
PaperID
IJETAS/June/2017/49

Author Name
Vineeta Patel, Geetesh Wagadre, , Jitendra Kumar Mishra
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
The state of the art of all the motion detection techniques that are being employed currently in real time motion sensing systems. The work discusses mechanisms like Optical Flow, Frame differencing, Running Gaussian average as viable mechanisms for motion sensing and also their limitations.
PaperID
IJETAS/June/2017/13

Author Name
Deepak Kumar, Prof.Pritaj Yadav, Prof.Mukesh Kumar
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
Cloud computing has been acknowledged in concert of the prevailing models for providing IT capacities. The computing paradigm that comes with cloud computing has incurred nice considerations on the protection of knowledge
PaperID
IJETAS/June/2017/31

Author Name
Shalini Kumari, Prof.Pritaj Yadav, Prof.Mukesh Kumar
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
Increased connectivity and also the use of the web have exposed the security and safety issue in front of the organizations, therefore need to use of intrusion detection system to protect data
PaperID
IJETAS/June/2017/33