Results 51 to 60 of about 337 (159)
Optimized Method for Generating and Acquiring GPS Gold Codes
We propose a simpler and faster Gold codes generator, which can be efficiently initialized to any desired code, with a minimum delay. Its principle consists of generating only one sequence (code number 1) from which we can produce all the other different
Khaled Rouabah +4 more
doaj +1 more source
LRH‐1/NR5A2 activation in inflammatory cells of individuals with type 1 diabetes (T1D) reduces pro‐inflammatory cell surface markers and cytokine release. LRH‐1/NR5A2 promotes a mitohormesis‐induced immuno‐resistant phenotype to pro‐inflammatory macrophages.
Nadia Cobo‐Vuilleumier +32 more
wiley +1 more source
Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption [PDF]
In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation
Abbas A. Jasim, Hiba Hakim
doaj
A literature review on V2X communications security: Foundation, solutions, status, and future
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying +3 more
wiley +1 more source
A method is proposed to transfer the chaotic signals obtained from a memristive Chua circuit into a suitable encryption signal for data encryption in power and data synchronous transmission using switched mode power supplies. Using statistics theory, an algorithm is proposed for selecting the optimized chaotic memristive Chua circuit signal for the ...
Chiemeka L. Maxwell +5 more
wiley +1 more source
An efficient architecture for BRLWE‐based PQC schemes is proposed. It comprises a modified LFSR structure to obtain less latency and high throughput compared to the existing works. Due to reduction in latency, the performance metrics such as delay and area‐delay product (ADP) are also improved.
Shaik Ahmadunnisa, Sudha Ellison Mathe
wiley +1 more source
Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack.
Riyam Noori Jawad, Faez Hassan Ali
doaj +1 more source
This research work presents a novel secured spatial steganography algorithm consisting of three stages. In the first stage, a secret message is divided into three parts, each is encrypted using a tan logistic map encryption key with a unique seed value.
Wassim Alexan +5 more
wiley +1 more source
Implementation of a coherent real‐time noise radar system
A real‐time noise radar system is implemented, and relevant hardware and system aspects of noise radar implementation are presented. The constructed system processes data continuously with 100 % duty cycle, and it can do so indefinitely while operating with 200 MHz bandwidth, processing a range of up to 8.5 km, and integrating each coherent processing ...
Martin Ankel +4 more
wiley +1 more source

