Comparative Study and Analysis of Soft Computing Techniques Implemented in Secure Data Transmission
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
t-Data transmission in the wireless network is very big challenge. Several factors affect to transmit data safely. In this paper we have identified possible reasons which can affect the transmission of data. We have also shown how soft computing techniques can be helpful in secure data transmission.
Authors and Affiliations
Hemant Kumar Garg , P. C. Gupta,
A Survey of Performance based Secure Routing Protocols in MANET
An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a...
Performance Analysis of AODV and DSDV in Simulation Based Map
In recent days Inter-Vehicle communication has fascinated many research communities and automotive industries .With the introduction of inter-vehicle communication it would be possible for vehicles to communicate...
WPA Exploitation In The World Of Wireless Network
Wifi device uses security authentication protocol even though they are having some weakness. Generally wep, wpa protocols are used for security purpose. This is already proved that WEP authentication protocol is a we...
LOW POWER MULTIPLEXER BASED FULL ADDER USING PASS TRANSISTOR LOGIC
The efficiency of a system mainly depends on the performance of the internal components present in the system. So, the internal components must be designed in such a way that they should consume less power with inc...
A Review on Otsu Image Segmentation Algorithm
Image segmentation is the fundamental approach of digital image processing. Among all the segmentation methods, Otsu method is one of the most successful methods for image thresholding because of its simple calculat...