The Security of the Transferred Information for Critical Applications in Wireless Communication
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 6
Abstract
The development of wireless communication has changed the way of live. : Cellular Telephone Systems, Cordless Phones and Satellite Networks are common place, and many users carry devices that can double as wireless computers, sending text messages, photos and files on the go. Wireless technology has also had an enormous impact in the workplace, improving communication, in this paper developed a security for sending and receiving the text and images in critical application in this paper proposed a frame work for providing the security and also increasing efficiency and introducing new ways of performing many different business tasks.
Authors and Affiliations
Mr. Yannam Apparao, Mrs. K. Laxminarayanamma, Mr. Vijay Katturi
Sixth Sense on Personal Assistance
This paper mainly focuses on dealing with the problems faced by the deaf and the dumb community in India in using the future technologies mainly personal assistance tools, may it be Alexa home or Amazon echo. We propose...
Study on Alternative Materials-Expanded Polystyrene and Glass Powder for Construction
Expanded Polystyrene (EPS) that was used in the research work was in the form of ‘EPS Beads’ which were spherical in shape and size varied in between 6 mm to 8 mm in diameter. Beads were made up of pre-extended Polystyre...
Miscellaneous Techniques of Detecting Groundwater
A significant amount of water for daily use is extracted from ground known as groundwater. Choosing right techniques for detecting groundwater is very important, especially in those area where surface water is not much a...
Verilog HDL using LTE Implementation MAP Algorithm
In many communication systems, turbo coding Techniques for Encoding and Decoding are employed to repair errors. As compared to other error correction codes, turbo codes provide great error correcting capabilities. For th...
Satiating A User-Delineated Time Constraints While Scheduling Workflow in Cloud Environments
Cloud computing is used to achieve sustainability in terms of computing. It reduces energy and resource consumption. Most of the companies have been moving their applications to the cloud to reduce power, energy re-so...