Notice Board :

Call for Paper
Vol. 6 Issue 3

Submission Start Date:
March 01, 2020

Acceptence Notification Start:
March 20, 2020

Submission End:
March 25, 2020

Final ManuScript Due:
March 31, 2020

Publication Date:
March 31, 2020
                         Notice Board: Call for PaperVol. 6 Issue 3      Submission Start Date: March 01, 2020      Acceptence Notification Start: March 20, 2020      Submission End: March 25, 2020      Final ManuScript Due: March 31, 2020      Publication Date: March 31, 2020



Volume II Issue V

Author Name
Govind Ballabh Khan, Prof. Sandeep Pratap Singh
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
Noise is an important factor which when get added to an image reduces its quality and appearance. So in order to enhance the image qualities, it has to be removed with preserving the textural information and structural features of image. There are different types of noises exist who corrupt the images. Selection of the denoising algorithm is application dependent. Noise removal from a contaminated image signal is a prominent field of research and many researchers have suggested a large number of algorithms and compared their results.
PaperID
IJETAS/MAY/2016/21010

Author Name
Sachinkumar Shahare, Prof. Vijay Prakash Singh
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
In the current generation microstrip patch antenna was planned at variety of substrate plane (partial, triangular, elliptical, and circular) for different result analysis of gain and directivity. In this communication grow of the Wi-Fi and Wi-max in wireless communication, multi band microstrip patch antenna plats a major player of the sector.
PaperID
IJETAS/MAY/2016/21012

Author Name
Aditi Singh Rathore, Kailash Patidar, Gajendra Singh Chandel
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 5
Abstract
To protect image data, image encryption is an appropriate way. There is a unique feature of image and text data. The available encryption algorithms are good for text data. But it is not suitable for multimedia data because the characteristic of multimedia data is totally different from text data. All multimedia data has got a lot of redundancy but text data does not possess any redundancy. The pixel value of a location is highly correlated to values of its neighboring pixels. Like, a sound sample is correlated to its next sample and its previous samples. This correlation proves to be attack points to any standard encryption algorithm.
PaperID
IJETAS/MAY/2016/21015