Results 1 to 10 of about 592 (143)

Pseudo random bit generator in QCA for high speed communications [PDF]

open access: yesHeliyon
Quantum-dot cellular automata (QCA) technology is another new technology in the field of nanoelectronics and quantum. With the help of this technology, basic to advanced digital circuits can be designed and implemented with low energy consumption and ...
Pezhman Kiani Vosta, Mohammad Gholami
doaj   +2 more sources

Sequential logic circuit gold codes for electronics and communication technologies [PDF]

open access: yesMethodsX
The linear feedback shift register (LFSR) and Gold codes are used in telecommunications, Global Positioning System (GPS), satellite navigation, wireless systems, and code division multiple access (CDMA) dependent channel schemes for numerous radio ...
Aakanksha Devrari   +4 more
doaj   +2 more sources

Voice Security Using Hybrid Algorithm [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
This research deals with constructing and implementing a new digital voice security Algorithm based on hiding large amount of data (sound file) in a 24 bits host color image (RGB image). The proposed method starts with speech compression to convert human
Alyaa Abdul Majeed Haleem
doaj   +1 more source

Lossless Compression Using LFSRs [PDF]

open access: yesJournal of Computer Science, 2007
While lossy compression techniques are used for images, sound. where feature reproduction is more important than the actual data, it is necessary to use lossless compression for certain files containing data, programmes. Lossless compression techniques are not as effective as lossy ones and usually require a lot of computation for both compression and ...
R. Muthiah   +2 more
openaire   +1 more source

Encryption & Hiding Information in Internet Files HTML & XML [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2010
In order to achieve communication security, cryptography and information hiding in different media are used. In this work, a system for hiding text in Internet files namely, HTML and XML has been built.
Dujan Taha, Ahmed Nori, Najla Ibraheem
doaj   +1 more source

Improvement Majority Function in A5/1 stream cipher Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2016
Security is an important issue, especially in today’s technologically advanced society. Global System for Mobile Communications (GSM) is a world-wide standard for digital wireless communication.
Hala Bahjat, Mohanad Ali
doaj   +1 more source

A Design Methodology of Line Feedback Shift Registers With Quantum Cellular Automata

open access: yesIEEE Open Journal of Nanotechnology, 2021
The quantum-dot cellular automata (QCA) present great promising advantages for emerging nano logic circuits. However, feedback design in QCA sequential circuit is often a big problem. Especially in line feedback shift registers (LFSR), each feedback loop
Mingliang Zhang   +4 more
doaj   +1 more source

Construction de Bruijn sequence based on whole LFSR with 4 cycles

open access: yesTongxin xuebao, 2022
In order to improve the construction efficiency and widen the application depth of cycle-joining method, from the view of the number of cycles in the cycle structure, a method for constructing de Bruijn sequence based on whole LFSR with 4 cycles was ...
Congwei ZHOU, Bin HU, Jie GUAN
doaj   +2 more sources

Proposed Method to Encrypt Images to Mobile Device Based on the Principles of Shannon [PDF]

open access: yesEngineering and Technology Journal, 2016
In the proposed research, it has been proposed image encryption method in the mobile device based on the principles of Shannon (diffusion and confusion). Where: a large group of keys is used.
Hanna M .A .Salman, Anwar Abbas Hattab
doaj   +1 more source

Improving Keystream Generation for Sosemanuk Stream Cipher Using Twofish Block Cipher [PDF]

open access: yesEngineering and Technology Journal, 2009
This paper will introduce two proposal algorithms (Snowfish 1) and the (Snowfish 2) to improve the Sosemanuk stream cipher algorithm by benefiting from the efficient properties of the Twofish block cipher and also use its key schedule, keydependent Sbox ...
Shant K. Avakian, Rana S. Mohammed
doaj   +1 more source

Home - About - Disclaimer - Privacy