Notice Board :

Call for Paper
Vol. 5 Issue 12

Submission Start Date:
December 01, 2019

Acceptence Notification Start:
December 20, 2019

Submission End:
December 25, 2019

Final ManuScript Due:
December 28, 2019

Publication Date:
December 31, 2019
                         Notice Board: Call for PaperVol. 5 Issue 12      Submission Start Date: December 01, 2019      Acceptence Notification Start: December 20, 2019      Submission End: December 25, 2019      Final ManuScript Due: December 28, 2019      Publication Date: December 31, 2019



Volume III Issue VI

Author Name
Priyanka Tiwari, Swatantra Tiwari
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
To identify the present or absent of licensed users, spectrum sensing techniques are used. Matched filter detection, Energy detection, and Cyclo-stationary feature detection are the three conventional methods used for spectrum sensing.
PaperID
IJETAS/June/2017/27

Author Name
Sheela Patel, Shivendra Dubey, Mukesh Dixit
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
The aim of this analysis is the creation and associate build up the system to forestall an organism against each well-known and new attacks, and functions as an adaptive distributed defense system or adaptive artificial system.
PaperID
IJETAS/June/2017/49

Author Name
Vineeta Patel, Geetesh Wagadre, , Jitendra Kumar Mishra
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
The state of the art of all the motion detection techniques that are being employed currently in real time motion sensing systems. The work discusses mechanisms like Optical Flow, Frame differencing, Running Gaussian average as viable mechanisms for motion sensing and also their limitations.
PaperID
IJETAS/June/2017/13

Author Name
Deepak Kumar, Prof.Pritaj Yadav, Prof.Mukesh Kumar
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
Cloud computing has been acknowledged in concert of the prevailing models for providing IT capacities. The computing paradigm that comes with cloud computing has incurred nice considerations on the protection of knowledge
PaperID
IJETAS/June/2017/31

Author Name
Shalini Kumari, Prof.Pritaj Yadav, Prof.Mukesh Kumar
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
Increased connectivity and also the use of the web have exposed the security and safety issue in front of the organizations, therefore need to use of intrusion detection system to protect data
PaperID
IJETAS/June/2017/33