Data transmission

Page 1 of 50 - About 500 essays
  • The For Cluster Based Wsns ( Cwsns ), Secure Data Transmission

    1495 Words  | 6 Pages

    For cluster-based WSNs (CWSNs), secure data transmission, where like dynamically and periodically the clusters are shaped. The analysis problems associated with WSNs security and knowledge aggregation with reference to the protection and security analysis against various attacks, we show the quality of being usable of the SET-IBS and SET-IBOOS protocols. For a fuzzy approach and SET-IBS formula employing a combination in our planned system, for WSNs a replacement routing technique to extend network

  • Secure Patients Data Transmission Using

    1634 Words  | 7 Pages

    Secure patients data transmission using XOR ciphering encryption and ECG steganography Shaheen S.Patel1 Prof Dr Mrs.S.V.Sankpal2 A. N. Jadhav3 1 D.Y.Patil College of Engg and Technology, Kolhapur, Maharashtra 2 Asso. Prof . D.Y. Patil College of Engg and Technology, Kolhapur, Maharashtra. 3 Asso. Prof . D.Y. Patil College of Engg and Technology, Kolhapur, Maharashtra. E-mails: 1shaheenpatel7860@gmail.com , 2sankpal16@yahoo.com, 3ajitsinhj33@gmail.com Abstract :- As no of patients that are suffering

  • Transmission of Multimedia Data over Wireless Ad-Hoc Networks

    1637 Words  | 7 Pages

    Transmission of Multimedia Data over Wireless Ad-Hoc networs A.     Berk Barutlu Abstract Ad-hoc networking has been of increasing interest and therefore recognized as an important research area in recent years. This paper is about transmission of multimedia data over wireless ad-hoc networks, the problems and the related issues. 1. Introduction 1.1     Ad-Hoc Networks An ad-hoc network is a collection of wireless mobile nodes that will dynamically

  • Data Transmission / Collection And Encryption

    1456 Words  | 6 Pages

    Data Transmission/Collection and Encryption Data collection by the ISP is basically the sharing and selling of someone’s private information. New technology makes it easier for governments and corporations to see and use all our online activities. Our privacy is not the only thing on the line though, but free speech and free media as well. We should not have to choose between new technology and keeping our information private. The biggest stakeholders in data collecting is the users, not as clients

  • A Brief Note On The Quality Of Service

    1129 Words  | 5 Pages

    Abstract: The Quality of service in general refers to capability to provide flawless, fast and consistent communication across the network. The factors that influence QoS are error rates, bandwidth, throughput, transmission delay, availability, jitter, etc. Any network must provide secure and reliable service and to achieve this it needs to consider the above factors. Hence we can say that the QoS of a network is a set of factors to efficiently use the resources of the network. I am using the above

  • Computer Network : The Connection Of Computers And Computing Peripherals

    1375 Words  | 6 Pages

    Data may be any number, alphabets, images, videos and other representation such as attendance record of student, customer information in bank. Such data needs to be sent and receive between the different location and devices. So exchange of data is called data communication. In data communication message, sender, receiver, transmission media and protocol play a vital role. Messages are the actual data to be shared and it can be in any form. Senders

  • Advantages And Disadvantages Of Block Codes

    800 Words  | 4 Pages

    noise source, such as the Additive White Gaussian noise (AWGN) which, in turn, can cause a change in the data transmission. As a result of data change or corruption, the idea of channel coding was introduced as a reliable solution to overcome this dilemma. Nowadays, we use some techniques as Forward error correction (FEC) to reduce the errors that might appear during the information transmission over the channel. In this technique, the system adds redundant (extra) bits to identify if a specific bit

  • Categories for The MAC Protocols for Wireless Sensor Networks

    589 Words  | 3 Pages

    protocol A. IEEE 802.11 Distributed Coordination Function IEEE 802.11(DCF) is widely used contention-based protocol in wireless sensor networks. The DCF is a random channel-access scheme where every station begins its transmission based on

  • Managing Virus 's Protection Of A Lan

    3071 Words  | 13 Pages

    CONTENT 1. Introduction………………………………………………. 3 2. Resources whose access can managed………………… 4 3. Level of access LAN…………………………………….5 4. Purpose of an access AUDIT trail…………………6 5. LAN performance issues……………………………..7-11 6. LAN support issues and option……………………12-13 7. Managing virus’s protection in a LAN…………14-15 8. Conclusion………………………………………………….16 9. References………………………………………………….17 INTRODUCTION OF LAN LAN known as a local area network is a computer network that connected computer within

  • Importance Of Secure Information Transmission In Mobile Adhoc Network

    852 Words  | 4 Pages

    Secure and Authenticate Jamming Attack Proof Secure Information Transmission in Mobile Adhoc Network Harsha Jain Pranita Jain Department of Computer Science Engineering Department of Computer Science Engineering SATI College SATI College Civil Lines, Vidisha, M.P., India Civil Lines, Vidisha, M.P., India harshajain98@gmail.com pranita.jain@gmail.com Abstract— An Ad-hoc mobile network is an assembly of wireless transportable nodes devotedly creating a short-lived network lacking the use of

Previous
Page12345678950