Notice Board :

Call for Paper
Vol. 10 Issue 9

Submission Start Date:
September 1, 2024

Acceptence Notification Start:
September 20, 2024

Submission End:
September 26, 2024

Final ManuScript Due:
September 28, 2024

Publication Date:
September 30, 2024
                         Notice Board: Call for PaperVol. 10 Issue 9      Submission Start Date: September 1, 2024      Acceptence Notification Start: September 20, 2024      Submission End: September 26, 2024      Final ManuScript Due: September 28, 2024      Publication Date: September 30, 2024



Volume III Issue VI

Author Name
Priyanka Tiwari, Swatantra Tiwari
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
To identify the present or absent of licensed users, spectrum sensing techniques are used. Matched filter detection, Energy detection, and Cyclo-stationary feature detection are the three conventional methods used for spectrum sensing.
PaperID
IJETAS/June/2017/27

Author Name
Sheela Patel, Shivendra Dubey, Mukesh Dixit
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
The aim of this analysis is the creation and associate build up the system to forestall an organism against each well-known and new attacks, and functions as an adaptive distributed defense system or adaptive artificial system.
PaperID
IJETAS/June/2017/49

Author Name
Vineeta Patel, Geetesh Wagadre, , Jitendra Kumar Mishra
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
The state of the art of all the motion detection techniques that are being employed currently in real time motion sensing systems. The work discusses mechanisms like Optical Flow, Frame differencing, Running Gaussian average as viable mechanisms for motion sensing and also their limitations.
PaperID
IJETAS/June/2017/13

Author Name
Deepak Kumar, Prof.Pritaj Yadav, Prof.Mukesh Kumar
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
Cloud computing has been acknowledged in concert of the prevailing models for providing IT capacities. The computing paradigm that comes with cloud computing has incurred nice considerations on the protection of knowledge
PaperID
IJETAS/June/2017/31

Author Name
Shalini Kumari, Prof.Pritaj Yadav, Prof.Mukesh Kumar
Year Of Publication
2017
Volume and Issue
Volume 3 Issue 6
Abstract
Increased connectivity and also the use of the web have exposed the security and safety issue in front of the organizations, therefore need to use of intrusion detection system to protect data
PaperID
IJETAS/June/2017/33