Blind identification of feedback polynomials for synchronous scramblers in a noisy environment
Abstract This paper investigates blind identification methods for linear scramblers under non‐cooperative conditions, which are essential for the inverse analysis of communication protocols using scramblers. In this paper, a blind identification scheme for feedback polynomials of synchronous scramblers is proposed.
Yong Ding, Zhiping Huang, Jing Zhou
wiley +1 more source
Design and Implementation of Sequency-Ordered Fast Walsh-Hadamard Transform (FWHT) in WCDMA
This paper presents the implementation of the Fast Walsh Hadamard Transform (FWHT) in sequence ordered method, in order to minimize the interference due to two users trying to transmit at the same time, and an attempt has made to simulate them.
Safaa M. Z. Al-Ubaidi
doaj +1 more source
Practical tera-scale Walsh-Hadamard Transform [PDF]
to appear in proceedings of Future Technologies Conference - FTC 2016, San Francisco, 6 - 7 Dec ...
openaire +3 more sources
IMAGE COMPRESSION BY USING WALSH AND FRAMELET TRANSFORM
In this paper, Framelet and Walsh transform are proposed for transformation, and then using arithmetic coding for compress an image. The goal is to achieve higher compression ratio by applying two levels Framelet transform (FLT), and then apply 2D Walsh ...
Nora H. Sultan
doaj +1 more source
Visible Light Communication: An Investigation of LED Non-Linearity Effects on VLC Utilising C-OFDM
The electro-optic output of light-emitting diodes commonly used in visible light communication systems is generally nonlinear in nature. It is particularly problematic when using advanced modulation formats, such as orthogonal frequency-division ...
Jummah Abdulwali, Said Boussakta
doaj +1 more source
Cache miss analysis of WHT algorithms [PDF]
On modern computers memory access patterns and cache utilization are as important, if not more important, than operation count in obtaining high-performance implementations of algorithms.
Mihai Furis+2 more
doaj +1 more source
Some Cryptographic Properties of Functions Based on their 2q-Nega-Hadamard Transform [PDF]
Negabent functions play a vital role in the field of cryptography and coding theory for designing secure cryptosystems. In this article, we investigate the various properties of 2q-nega-Hadamard transform (2q-NHT) of the functions from Z_q^n to Z_2q with
Deep Singh+4 more
doaj +1 more source
Two-Stage and Walsh Interleavers for Interleave Division Multiple Access Systems [PDF]
Interleavers are essential system components for interleave division multiple access (IDMA). In this paper, two-stage interleavers are proposed based on two optimization criteria combines minimum spreading distance with regular permutation and ...
Muayad Sadik Croock
doaj +1 more source
A Characterization of Generalized Boolean Functions Employed in CDMA Communications [PDF]
In design of secure cryptosystems and CDMA communications, the negabent functions play a significant role. The generalized Boolean functions have been extensively studied by Schmidt and established several important results in this setup.
Deep Singh+3 more
doaj +1 more source
A Walsh-Based Arbitrary Waveform Generator for 5G Applications in 28nm FD-SOI CMOS Technology
This paper presents the first Arbitrary Waveform Generator (AWG) based on Walsh’s theory for wideband radio frequency (RF) conversion. The architecture is dedicated to 5G-FR1 applications (sub-6GHz) to perform a direct and large bandwidth ...
Pierre Ferrer+3 more
doaj +1 more source