Comparative Study and Analysis of Soft Computing Techniques Implemented in Secure Data Transmission 

Abstract

t-Data transmission in the wireless network is very big challenge. Several factors affect to transmit data safely. In this paper we have identified possible reasons which can affect the transmission of data. We have also shown how soft computing techniques can be helpful in secure data transmission.  

Authors and Affiliations

Hemant Kumar Garg , P. C. Gupta,

Keywords

Related Articles

A Survey of Performance based Secure Routing Protocols in MANET 

An ad-hoc network is a multi-hop wireless network where all nodes cooperatively maintain network connectivity without a centralized infrastructure. If these nodes change their positions dynamically, it is called a...

Performance Analysis of AODV and DSDV in Simulation Based Map  

In recent days Inter-Vehicle communication has fascinated many research communities and automotive industries .With the introduction of inter-vehicle communication it would be possible for vehicles to communicate...

WPA Exploitation In The World Of Wireless Network  

Wifi device uses security authentication protocol even though they are having some weakness. Generally wep, wpa protocols are used for security purpose. This is already proved that WEP authentication protocol is a we...

LOW POWER MULTIPLEXER BASED FULL ADDER USING PASS TRANSISTOR LOGIC 

The efficiency of a system mainly depends on the performance of the internal components present in the system. So, the internal components must be designed in such a way that they should consume less power with inc...

A Review on Otsu Image Segmentation Algorithm 

Image segmentation is the fundamental approach of digital image processing. Among all the segmentation methods, Otsu method is one of the most successful methods for image thresholding because of its simple calculat...

Download PDF file
  • EP ID EP125837
  • DOI -
  • Views 96
  • Downloads 0

How To Cite

Hemant Kumar Garg, P. C. Gupta, (2012). Comparative Study and Analysis of Soft Computing Techniques Implemented in Secure Data Transmission . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(8), 271-274. https://europub.co.uk/articles/-A-125837