Secured Data Communication using Novel Modification to Hill Cipher Algorithm with Self Repetitive Matrix
Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 3
Abstract
Secured Data Communication using Novel Modification to Hill Cipher Algorithm with Self Repetitive Matrix
Remarks on g*- Closed Sets in Digital Line
We establish the connection between two fields of Topology that until now seemed to be far away from each other, namely digital topology and the theory of generalized closed sets. In this paper we study delta-generalized...
Curvature Properties of Special (α, β)- Finsler
In Finsler space we see special metrics such as Randers metric, Kropina metric and Matsumoto metric.,etc. Curvature properties of special Finsler metrics are of different types in that mainly locally dually flatness, pro...
An Introduction to Laplace Transform
An introduction to Laplace Transform is the topic of this paper. It deals with what Laplace Transform is, and what is it actually used for. The definition of Laplace Transform and most of its important properties have be...
Enriched Encephalon Tumor Segmentation using Tessellation Automata with High Performed Levelset using Radiosurgery Applications
Enriched Encephalon Tumor Segmentation using Tessellation Automata with High Performed Levelset using Radiosurgery Applications
Security in Vehicular Ad Hoc Networks through Mix-Zones Based Privacy
Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. Vehicles need to periodically broadcast safety messages providing precise position information to nearby vehicles. Recent adva...