Comparative Study and Analysis of Soft Computing Techniques Implemented in Secure Data Transmission
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
t-Data transmission in the wireless network is very big challenge. Several factors affect to transmit data safely. In this paper we have identified possible reasons which can affect the transmission of data. We have also shown how soft computing techniques can be helpful in secure data transmission.
Authors and Affiliations
Hemant Kumar Garg , P. C. Gupta,
Review of issues in automatic labelling of formatted document
The labelling framework, which is proposed to label topic models, essentially consists of a multinomial word distribution, a set of candidate labels, and a context collection. Thus it could be applied to any text m...
Optimal Design RRC Pulse Shape Polyphase FIR Decimation Filter for Multi-Standard Wireless Transceivers
Pulse Shaping Filters or Root Raised Cosine (RRC) low pass filters emerges as one of the hottest topic in field of Wireless Communication technology. Low pass filters are used for decimation and for interpolation. When...
A Novel Approach of Using Laplacian Image Enhancement
Contrast enhancement based on multiscale decomposition of images has been proven to be a far versatile and efficient method than other regular techniques. We present here contrast image enhancement by using Laplacian Pyr...
Review of Comparative Analysis of Empirical Propagation model for WiMAX
The propagation models for path loss may give different results if they are used in different environment other than in which they were designed. In this paper we review of compare the different path loss empiric...
Desktop virtualization using SaaS Architecture
Desktop virtualization is new desktop delivery method in which desktop operating system instance customized, build and runs in data centers and users can access application or the whole desktop by using their sta...