Results 51 to 60 of about 337 (159)

Optimized Method for Generating and Acquiring GPS Gold Codes

open access: yesInternational Journal of Antennas and Propagation, 2015
We propose a simpler and faster Gold codes generator, which can be efficiently initialized to any desired code, with a minimum delay. Its principle consists of generating only one sequence (code number 1) from which we can produce all the other different
Khaled Rouabah   +4 more
doaj   +1 more source

LRH‐1/NR5A2 targets mitochondrial dynamics to reprogram type 1 diabetes macrophages and dendritic cells into an immune tolerance phenotype

open access: yesClinical and Translational Medicine, Volume 14, Issue 12, December 2024.
LRH‐1/NR5A2 activation in inflammatory cells of individuals with type 1 diabetes (T1D) reduces pro‐inflammatory cell surface markers and cytokine release. LRH‐1/NR5A2 promotes a mitohormesis‐induced immuno‐resistant phenotype to pro‐inflammatory macrophages.
Nadia Cobo‐Vuilleumier   +32 more
wiley   +1 more source

Multilevel Permutation with Different Block Size/ Stream Cipher Image Encryption [PDF]

open access: yesIraqi Journal for Electrical and Electronic Engineering, 2015
In this work, a new image encryption method using a combined multilevel permutation with stream cipher is proposed. In the permutation algorithm, image is divided into blocks in each level and its blocks are rearranged by using pseudorandom permutation
Abbas A. Jasim, Hiba Hakim
doaj  

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

A memristor‐sourced key for encrypted power and data synchronous transmission in switched mode power supplies

open access: yesIET Power Electronics, Volume 17, Issue 16, Page 3093-3108, 16 December 2024.
A method is proposed to transfer the chaotic signals obtained from a memristive Chua circuit into a suitable encryption signal for data encryption in power and data synchronous transmission using switched mode power supplies. Using statistics theory, an algorithm is proposed for selecting the optimized chaotic memristive Chua circuit signal for the ...
Chiemeka L. Maxwell   +5 more
wiley   +1 more source

x2DL: A high throughput architecture for binary‐ring‐learning‐with‐error‐based post quantum cryptography schemes

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 349-359, December 2024.
An efficient architecture for BRLWE‐based PQC schemes is proposed. It comprises a modified LFSR structure to obtain less latency and high throughput compared to the existing works. Due to reduction in latency, the performance metrics such as delay and area‐delay product (ADP) are also improved.
Shaik Ahmadunnisa, Sudha Ellison Mathe
wiley   +1 more source

Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems

open access: yesمجلة بغداد للعلوم, 2020
In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack.
Riyam Noori Jawad, Faez Hassan Ali
doaj   +1 more source

Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images

open access: yesIET Image Processing, Volume 18, Issue 13, Page 4189-4206, 13 November 2024.
This research work presents a novel secured spatial steganography algorithm consisting of three stages. In the first stage, a secret message is divided into three parts, each is encrypted using a tan logistic map encryption key with a unique seed value.
Wassim Alexan   +5 more
wiley   +1 more source

Implementation of a coherent real‐time noise radar system

open access: yesIET Radar, Sonar &Navigation, Volume 18, Issue 7, Page 1002-1013, July 2024.
A real‐time noise radar system is implemented, and relevant hardware and system aspects of noise radar implementation are presented. The constructed system processes data continuously with 100 % duty cycle, and it can do so indefinitely while operating with 200 MHz bandwidth, processing a range of up to 8.5 km, and integrating each coherent processing ...
Martin Ankel   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy