-
1Academic Journal
المؤلفون: Hirokazu TANAKA, Shoichiro YAMASAKI, Tomoko K. MATSUSHIMA
المصدر: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2023, E106.A(3):445
-
2Academic Journal
المؤلفون: Dora M. Ballesteros, Diego Renza, Jimmy Peña
المصدر: Ingeniería e Investigación, Vol 40, Iss 3, Pp 70-80 (2020)
مصطلحات موضوعية: entropy, ovsf, image encryption, security, privacy, ciphered data, Engineering (General). Civil engineering (General), TA1-2040
وصف الملف: electronic resource
-
3Academic Journal
المؤلفون: Chang-Jun Ahn, Kazuki Maruta, Kazushi Shimada, Shun Kojima
المصدر: IEICE Communications Express. 2021, 10(11):852
-
4Academic Journal
المؤلفون: Ballesteros, Dora M., Renza, Diego, Peña, Jimmy
المصدر: Ingeniería e Investigación; Vol. 40 No. 3 (2020); 70-80 ; Ingeniería e Investigación; Vol. 40 Núm. 3 (2020); 70-80 ; 2248-8723 ; 0120-5609
مصطلحات موضوعية: entropy, OVSF, image encryption, security, privacy, ciphered data, Telecommunications Engineering, image processing, entropía, cifrado de imágenes, seguridad, privacidad, datos cifrados, Ingenieria en Telecomunicaciones, procesamiento de imagenes
وصف الملف: application/pdf; text/xml
Relation: https://revistas.unal.edu.co/index.php/ingeinv/article/view/81421/76540; https://revistas.unal.edu.co/index.php/ingeinv/article/view/81421/78139; Akhavan, A., Samsudin, A., and Akhshani, A. (2017). Cryptanalysis of an image encryption algorithm based on DNA encoding. Optics and Laser Technology, 95, 94-99. https://doi.org/10.1016/j.optlastec.2017.04.022; Asgari-Chenaghlu, M., Balafar, M. A., and Feizi-Derakhshi, M. R. (2019). A novel image encryption algorithm based on poly-nomial combination of chaotic maps and dynamic function generation. Signal Processing, 157, 1-13. https://doi.org/10.1016/j.sigpro.2018.11.010; Ballesteros, D. M., Peña, J., and Renza, D. (2018). A Novel Im-age Encryption Scheme Based on Collatz Conjecture. Entropy, 20(12), 901. https://doi.org/10.3390/e20120901; Belmeguenai, A., Ahmida, Z., Ouchtati, S., and Djemii, R. (2017). A novel approach based on stream cipher for selective speech encryption. International Journal of Speech Technology, 20(3), 685-698. https://doi.org/10.1007/s10772-017-9439-8; Broumandnia, A. (2019). Designing digital image encryption using 2D and 3D reversible modular chaotic maps. Journal of Information Security and Applications, 47, 188-198. https://doi.org/10.1016/j.jisa.2019.05.004; Chai, X., Gan, Z., Yuan, K., Chen, Y., and Liu, X. (2019). A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Computing and Applications, 31(1), 219-237. https://doi.org/10.1007/s00521-017-2993-9; Feng, W., He, Y., Li, H., and Li, C. (2019). Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map. IEEE Access, 7, 12584-12597. https://doi.org/10.1109/ACCESS.2019.2893760; Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and cha-os, 8(06), 1259-1284. https://doi.org/10.1142/S021812749800098X; Hameed, Y. and Ali, N. (2018). An efficient audio encryption based on chaotic logistic map with 3D matrix. Journal of Theoretical and Applied Information Technology, 96, 5142-5152.; Hayat, U. and Azam, N. A. (2019). A novel image encryption scheme based on an elliptic curve. Signal Processing, 155, 391-402. https://doi.org/10.1016/j.sigpro.2018.10.011; Hua, Z., Jin, F., Xu, B., and Huang, H. (2018). 2D Logistic-Sine-coupling map for image encryption. Signal Processing, 149, 148-161. https://doi.org/10.1016/j.sigpro.2018.03.010; Kalpana, M., Ratnavelu, K., and Balasubramaniam, P. (2019). An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimedia Tools and Applications, 78(5), 5969-5988. https://doi.org/10.1007/s11042-018-6373-y; Khoirom, M. S., Laiphrakpam, D. S., and Themrichon, T. (2018). Cryptanalysis of multimedia encryption using elliptic curve cryptography. Optik, 168, 370-375. https://doi.org/10.1016/j.ijleo.2018.04.068; Kumar, R. and Quan, C. (2019). Asymmetric multi-user optical cryptosystem based on polar decomposition and Shearlet transform. Optics and Lasers in Engineering, 120, 118-126. https://doi.org/10.1016/j.optlaseng.2019.03.024; Li, C., Xie, T., Liu, Q., and Cheng, G. (2014). Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dynamics, 78(2), 1545-1551. https://doi.org/10.1007/s11071-014-1533-8; Liu, J. M. and Qu, Q. (2010, October). Cryptanalysis of a substitution-diffusion based image cipher using chaotic standard and logistic map. In Qingling, l., Fei, Y., and Yun L. (Eds.) 2010 IEEE Third International Symposium on Information Pro-cessing (pp. 67-69), Qingdao, China: IEEE. https://doi.org/10.1109/ISIP.2010.33; Patidar, V., Pareek, N. K., and Sud, K. K. (2009). A new substitution–diffusion-based image cipher using chaotic standard and logistic maps. Communications in Nonlinear Science and Numerical Simulation, 14(7), 3056-3075. https://doi.org/10.1016/j.cnsns.2008.11.005; Renza, D. and Mendoza, S. (2019). High-uncertainty audio signal encryption based on the Collatz conjecture. Journal of Information Security and Applications, 46, 62-69. https://doi.org/10.1016/j.jisa.2019.02.010; Robinson, D. W. (2008). Entropy and uncertainty. Entropy, 10(4), 493-506. https://doi.org/10.3390/e10040493; Saini, D. S. and Bhooshan, S. V. (2006, July). Adaptive assignment scheme for OVSF codes in WCDMA. In Dini, P., Christer, Å., Dini, C., and Borcoci, E. (Eds.) 2006 IEEE International Conference on Wireless and Mobile Communications (IC-WMC'06) (pp. 65-65), Bucharest, Romania: IEEE. https://doi.org/10.1109/ICWMC.2006.15; Saljoughi, A. S. and Mirvaziri, H. (2019). A new method for im-age encryption by 3D chaotic map. Pattern Analysis and Applications, 22(1), 243-257. https://doi.org/10.1007/s10044-018-0765-5; Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell system technical journal, 28(4), 656-715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x; Telem, A. N. K., Segning, C. M., Kenne, G., and Fotsin, H. B. (2014). A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network. Advances in Multimedia, 2014. https://doi.org/10.1155/2014/602921; Wang, B., Wei, X., and Zhang, Q. (2013). Cryptanalysis of an image cryptosystem based on logistic map. Optik, 124(14), 1773-1776. https://doi.org/10.1016/j.ijleo.2012.06.020; Wen, H., Yu, S., and Lü, J. (2019). Breaking an image encryption algorithm based on DNA encoding and spatiotemporal cha-os. Entropy, 21(3), 246. https://doi.org/10.3390/e21030246; Ye, G. and Huang, X. (2017). An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing, 251, 45-53. https://doi.org/10.1016/j.neucom.2017.04.016; Zhang, J., Fang, D., and Ren, H. (2014). Image encryption algorithm based on DNA encoding and chaotic maps. Mathematical Problems in Engineering, 2014. https://doi.org/10.1155/2014/917147; Zhu, H., Zhao, Y., and Song, Y. (2019). 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access, 7, 14081-14098. https://doi.org/10.1109/ACCESS.2019.2893538; https://revistas.unal.edu.co/index.php/ingeinv/article/view/81421
-
5Academic Journal
المؤلفون: Chang-Jun Ahn, Kazuki Maruta, Kazushi Shimada, Mitsuki Takahashi, Seiya Hirano
المصدر: Journal of Signal Processing. 2021, 25(2):63
-
6Academic Journal
المؤلفون: Shoichiro YAMASAKI, Tomoko K. MATSUSHIMA
المصدر: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2020, E103.A(10):1218
-
7Academic Journal
المؤلفون: Hassan Ibrahim, Anwar
المصدر: Engineering, Technology & Applied Science Research, 8(2), 2834-2838, (2018-04-20)
Relation: https://zenodo.org/communities/etasr; https://doi.org/10.5281/zenodo.1257842; https://doi.org/10.5281/zenodo.1257843; oai:zenodo.org:1257843
-
8Academic Journal
المؤلفون: A. H. Ibrahim
المصدر: Engineering, Technology & Applied Science Research, Vol 8, Iss 2 (2018)
مصطلحات موضوعية: W-CDMA, OVSF code, PN code, AWGN, RN, bit error probability (BEP), Engineering (General). Civil engineering (General), TA1-2040, Technology (General), T1-995, Information technology, T58.5-58.64
-
9Academic Journal
المؤلفون: Saini, Davinder S, Balyan, Vipin
مصطلحات موضوعية: OVSF, Rake, Real time call, Non-real time call, OVSF code tree, Multi code
Relation: Saini, D.S. & Balyan, V. Wireless Pers Commun (2016) 90: 1799. doi:10.1007/s11277-016-3424-4; http://dx.doi.org/10.1007/s11277-016-3424-4; http://hdl.handle.net/11189/5747
-
10Academic Journal
المؤلفون: Balyan, Vipin
مصطلحات موضوعية: OVSF, Code Blocking, Code searches, Single code assignment, Call establishment delay
Relation: International Journal of Applied Engineering Research; http://hdl.handle.net/11189/6476
الاتاحة: http://hdl.handle.net/11189/6476
-
11Academic Journal
المؤلفون: Shuichi Miyazaki, Kazuya Okamoto
المصدر: Algorithms, Vol 2, Iss 3, Pp 953-972 (2009)
مصطلحات موضوعية: online OVSF code assignment, online algorithm, competitive analysis, Industrial engineering. Management engineering, T55.4-60.8, Electronic computers. Computer science, QA75.5-76.95
وصف الملف: electronic resource
-
12Academic Journal
المؤلفون: ZENG Fan-zi, TUO Ying-ying, LUO Juan, LI Ren-fa
المصدر: Tongxin xuebao, Vol 30, Pp 112-118 (2009)
مصطلحات موضوعية: UWB, multi-uers-interference, OVSF, TH, Telecommunication, TK5101-6720
وصف الملف: electronic resource
-
13Academic Journal
المؤلفون: Gil Jiménez, Víctor Pedro, García-Armada, Ana, Hernando Gallego, Francisco, Sidney Gonzalez Pizarro, Nieves
المساهمون: Ministerio de Economía y Competitividad (España)
مصطلحات موضوعية: OVSF, Multi-sequences, UMTS jamming, Telecomunicaciones
Relation: Gobierno de España. TEC2014-59255-C3-3-R; Gil Jiménez, V. P., Garcia Armada, A., Hernando Gallego, F. & González Pizarro, N. S. (2016). Novel orthogonal multi-sequences for an efficient jamming on the UMTS signal. EURASIP Journal on Wireless Communications and Networking, 2016(270).; http://hdl.handle.net/10016/32660; https://doi.org/10.1186/s13638-016-0770-6; 270; EURASIP Journal on Wireless Communications and Networking; 2016; AR/0000019125
-
14Dissertation/ Thesis
المؤلفون: Schoeman, Johan P.
Thesis Advisors: Prof L P Linde, johan.schoeman@eng.up.ac.za
مصطلحات موضوعية: Wkvvt, Kanaal modellering, Wireless communication, Bft, Cost modelle, Draadlose kommunikasie, Wcdma, Sparseness measure, Sparse data, Scrambling codes, Rrc filter, Rake receiver, Qpsk, Ovsf codes, Multipath fading, Vgs, Veelvuldige pad deining, Umts, Cost models, Swgr, Mui, Flat fading, Channelisation codes, Channel modelling, 4g, Cdma, Awgn, Ber, Kdvt, Kanalisasie kodes, Mengkodes, Kpsk, Ovsf kodes, Plat deining, Rake ontvanger, Wgc filter, Yl data, Ylheidsmaatstaf, UCTD
-
15Academic Journal
المؤلفون: Terré Michel, Vivier Emmanuelle, Fino Bernard
المصدر: EURASIP Journal on Wireless Communications and Networking, Vol 2005, Iss 4, Pp 573-578 (2005)
مصطلحات موضوعية: resource management, capacity optimisation, code division multiple access, OVSF, multiservices, Telecommunication, TK5101-6720, Electronics, TK7800-8360
وصف الملف: electronic resource
-
16Report
المؤلفون: Gil Jiménez, Victor, Garcia Armada, Ana, Hernando Gallego, Francisco, González Pizarro, Nieves
مصطلحات موضوعية: OVSF, Multi-sequences, UMTS jamming
-
17Academic Journal
المؤلفون: Al Sasongko, Sudi Mariyanto
المصدر: Majalah Ilmiah Teknologi Elektro; Vol 8 No 2 (2009): (July - December) Majalah Ilmiah Teknologi Elektro ; Jurnal Teknologi Elektro; Vol 8 No 2 (2009): (July - December) Majalah Ilmiah Teknologi Elektro ; 2503-2372 ; 1693-2951
وصف الملف: application/pdf
-
18
المؤلفون: Anwar Hassan Ibrahim
المصدر: Engineering, Technology & Applied Science Research. 8:2834-2838
مصطلحات موضوعية: RN, Scheme (programming language), SIMPLE (military communications protocol), Computer science, OVSF code, Noise (electronics), Tree (data structure), Variable (computer science), symbols.namesake, W-CDMA, Additive white Gaussian noise, Pseudorandom noise, PN code, AWGN, symbols, Code (cryptography), bit error probability (BEP), computer, Algorithm, Computer Science::Information Theory, computer.programming_language
-
19Academic Journal
المؤلفون: Sudi Mariyanto Al Sasongko
المصدر: Majalah Ilmiah Teknologi Elektro, Vol 8, Iss 2 (2009)
مصطلحات موضوعية: OVSF , Baseband, AWGN, NLOS, QPSK, IFFT Simetris, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
وصف الملف: electronic resource
-
20Academic Journal
المؤلفون: Miyazaki, Shuichi, Okamoto, Kazuya
المساهمون: 宮崎, 修一, 岡本, 和也, 00303884, 60565018
مصطلحات موضوعية: online OVSF code assignment, online algorithm, competitive analysis
وصف الملف: application/pdf
Relation: http://hdl.handle.net/2433/226991; Algorithms; 953; 972
الاتاحة: http://hdl.handle.net/2433/226991