Академический Документы
Профессиональный Документы
Культура Документы
YCCE, NAGPUR
#1
Abstract
I.
INTRODUCTION
TRANSMITTER MODULE
Fig. 2
III.
RECEIVER MODULE
IV.
FUTURE SCOPE
ACKNOWLEDGEMENT
The authors would like to thank A.R.PATIL and
A.P.DESHPANDE for their guidance.
REFERENCES
[1] Cryptology and Network Security Principles and Practices by
William Stallings
[2] Data Compression by David Salomon