Comparative Study and Analysis of Soft Computing Techniques Implemented in Secure Data Transmission
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
t-Data transmission in the wireless network is very big challenge. Several factors affect to transmit data safely. In this paper we have identified possible reasons which can affect the transmission of data. We have also shown how soft computing techniques can be helpful in secure data transmission.
Authors and Affiliations
Hemant Kumar Garg , P. C. Gupta,
Real-Time Static Devnagri Sign Language Translation using Histogram
Sign language is nowadays widely used in hearing impaired people as communication media. It has different applications in many domains like HCI (Human Computer Interaction), Robot Control, Security, Gaming, Compute...
Computaional Complexity Analysis on Water Quality Index
The computational algorithms are used to determine the features and applications from large data sets in real time environment. The computational applications are also used in environmental computing to evaluate th...
Survey on Routing in Multihop Wireless Networks Using Micropayment Schemes
In a multihop wireless network (MWN), the packets from a source node are relayed through a large number of intermediate nodes before they are delivered to the destination. But such relaying of other’s packets will...
Analysis and Experiment of MEMS based Micropump for Microfluidic Application
In this paper, we have addressed the issues related to the design and simulation of MEMS based silicon micro-needles for insertion of fluid into the dermis and subcutaneous fat layer of human skin. Microelectromechan...
“A Survey on Different Fingerprint Recognition Systems”
In this paper we are comparing various fingerprint recognition system which are based on minutiae and ridge feature extraction. Here we are comparing various methods using minutiae features only or ridge features o...