منابع مشابه
Visfer: Camera-Based Visual Data Transfer for Cross-Device Visualization
Going beyond the desktop to leverage novel devices—such as smartphones, tablets, or large displays—for visual sensemaking typically requires supporting extraneous operations for device discovery, interaction sharing, and view management. Such operations can be time-consuming and tedious, and distract the user from the actual analysis. Embodied interaction models in these multi-device environmen...
متن کاملJigsaw-based Security in Data Transfer in Computer Networks
In this paper, we present a novel encryptionless algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a “jigsaw puzzle” to break the transformed data into multiple parts where these parts form the pieces of the puzzle. Then these parts are packaged into packets and sent to the receiver. A secure and efficient mechanism is provided t...
متن کاملModeling of Power Line Transfer of Data for Computer Simulation
The paper deals with problems of data communication over power lines. This technology is referred to as PLC (Power Line Communication). A wider deployment of this technology in practice is currently hampered by a number of drawbacks. They are, in particular, interference with useful signal on lines, interference radiation, limited range of useful signal, and power grid elements that affect the ...
متن کاملA Novel Scheme for Secured Data Transfer Over Computer Networks
This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a ‘jigsaw puzzle’ to break the transformed data into multiple parts where these parts form the pieces of the puzzle. Then these parts are packaged into packets and sent to the receiver. A secure and efficient mechanism is provided to con...
متن کاملDevice-independent quantum key distribution
Quantum key distribution allows two parties connected by a quantum channel to establish a secret key that is unknown to any unauthorized third party. The secrecy of this key is based on the laws of quantum physics. For security, however, it is crucial that the honest parties are able to control their physical devices accurately and completely. The goal of device-independent quantum key distribu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Recent Contributions from Engineering, Science & IT (iJES)
سال: 2017
ISSN: 2197-8581
DOI: 10.3991/ijes.v5i2.7038