A Review On Data Transmission Through Illumination
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 3
Abstract
Li-Fi is a new wireless technology which provides the connectivity within localized network environment. The main principle of this technology is we can transmit the data using light illumination by using light emitting diodes where radio frequency is media in Wi-Fi and LED bulb light intensity is faster than human eye can follow. One germen phycist-Prof Harald Haas an expert in optical wireless communications at the University of Edinburgh, he demonstrated how an LED bulb equipped with signal processing technology could stream a high-definition video to a computer. By using this technology a 1 watt LED light bulb would be enough to provide net connectivity to four computers. This technology termed as "light fidelity". This technology allows us to transfer data more securely with higher data rates. This technology is still under research and further exploitation could lead to wide applications.
Authors and Affiliations
Pravin Ahirwar, Devesh Sapkale, Kaushtubh Jha
slugSeparation of Respiratory Sound from Heart sound for Asthma Analysis
Heart Sound (HS) interferes with lung sound in the diagnosis of respiratory illness. In the analysis of respiratory disorders, Separation of Respiratory Sound (RS) from heart sound plays a major role. The proposed schem...
A Review on Self Compacting Concrete
Self-compacting concrete was first developed by okamura in japan in 1980 to achieve durable concrete structures. Important study on self-compacting concrete with consider to identification of mix proportions. The paper...
Implementation of the Non-Conventional Machining Technology “The Cavitation Process
This paper introduces and presents a new method of non-conventional machining by using the cavitation process. This method can be called “Cavitation Machining (CM)”. The proposed methodology on the development of Non-co...
slugBest Path Routing Algorithm for IDS
In networking there can be any type of security compromise.IDS detects such type of security threat. Information is transferred from one point to another point across the network. There may be various paths between sour...
Achieving High Secure Data Storage in Cloud Computing
Nowadays, cloud computing has attained great prominence due to various reasons for instance, on demand resource sharing and online storage of data. It is a collection of shared pool of information, resources that makes...