Computer Independent Data Transfer Device

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Visfer: Camera-Based Visual Data Transfer for Cross-Device Visualization

Going beyond the desktop to leverage novel devices—such as smartphones, tablets, or large displays—for visual sensemaking typically requires supporting extraneous operations for device discovery, interaction sharing, and view management. Such operations can be time-consuming and tedious, and distract the user from the actual analysis. Embodied interaction models in these multi-device environmen...

متن کامل

Jigsaw-based Security in Data Transfer in Computer Networks

In this paper, we present a novel encryptionless algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a “jigsaw puzzle” to break the transformed data into multiple parts where these parts form the pieces of the puzzle. Then these parts are packaged into packets and sent to the receiver. A secure and efficient mechanism is provided t...

متن کامل

Modeling of Power Line Transfer of Data for Computer Simulation

The paper deals with problems of data communication over power lines. This technology is referred to as PLC (Power Line Communication). A wider deployment of this technology in practice is currently hampered by a number of drawbacks. They are, in particular, interference with useful signal on lines, interference radiation, limited range of useful signal, and power grid elements that affect the ...

متن کامل

A Novel Scheme for Secured Data Transfer Over Computer Networks

This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a ‘jigsaw puzzle’ to break the transformed data into multiple parts where these parts form the pieces of the puzzle. Then these parts are packaged into packets and sent to the receiver. A secure and efficient mechanism is provided to con...

متن کامل

Device-independent quantum key distribution

Quantum key distribution allows two parties connected by a quantum channel to establish a secret key that is unknown to any unauthorized third party. The secrecy of this key is based on the laws of quantum physics. For security, however, it is crucial that the honest parties are able to control their physical devices accurately and completely. The goal of device-independent quantum key distribu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Recent Contributions from Engineering, Science & IT (iJES)

سال: 2017

ISSN: 2197-8581

DOI: 10.3991/ijes.v5i2.7038