يعرض 1 - 20 نتائج من 155 نتيجة بحث عن '"OVSF"', وقت الاستعلام: 0.76s تنقيح النتائج
  1. 1
    Academic Journal

    المصدر: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2023, E106.A(3):445

  2. 2
    Academic Journal
  3. 3
    Academic Journal
  4. 4
    Academic Journal

    المصدر: Ingeniería e Investigación; Vol. 40 No. 3 (2020); 70-80 ; Ingeniería e Investigación; Vol. 40 Núm. 3 (2020); 70-80 ; 2248-8723 ; 0120-5609

    وصف الملف: application/pdf; text/xml

    Relation: https://revistas.unal.edu.co/index.php/ingeinv/article/view/81421/76540; https://revistas.unal.edu.co/index.php/ingeinv/article/view/81421/78139; Akhavan, A., Samsudin, A., and Akhshani, A. (2017). Cryptanalysis of an image encryption algorithm based on DNA encoding. Optics and Laser Technology, 95, 94-99. https://doi.org/10.1016/j.optlastec.2017.04.022; Asgari-Chenaghlu, M., Balafar, M. A., and Feizi-Derakhshi, M. R. (2019). A novel image encryption algorithm based on poly-nomial combination of chaotic maps and dynamic function generation. Signal Processing, 157, 1-13. https://doi.org/10.1016/j.sigpro.2018.11.010; Ballesteros, D. M., Peña, J., and Renza, D. (2018). A Novel Im-age Encryption Scheme Based on Collatz Conjecture. Entropy, 20(12), 901. https://doi.org/10.3390/e20120901; Belmeguenai, A., Ahmida, Z., Ouchtati, S., and Djemii, R. (2017). A novel approach based on stream cipher for selective speech encryption. International Journal of Speech Technology, 20(3), 685-698. https://doi.org/10.1007/s10772-017-9439-8; Broumandnia, A. (2019). Designing digital image encryption using 2D and 3D reversible modular chaotic maps. Journal of Information Security and Applications, 47, 188-198. https://doi.org/10.1016/j.jisa.2019.05.004; Chai, X., Gan, Z., Yuan, K., Chen, Y., and Liu, X. (2019). A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Computing and Applications, 31(1), 219-237. https://doi.org/10.1007/s00521-017-2993-9; Feng, W., He, Y., Li, H., and Li, C. (2019). Cryptanalysis and improvement of the image encryption scheme based on 2D logistic-adjusted-sine map. IEEE Access, 7, 12584-12597. https://doi.org/10.1109/ACCESS.2019.2893760; Fridrich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and cha-os, 8(06), 1259-1284. https://doi.org/10.1142/S021812749800098X; Hameed, Y. and Ali, N. (2018). An efficient audio encryption based on chaotic logistic map with 3D matrix. Journal of Theoretical and Applied Information Technology, 96, 5142-5152.; Hayat, U. and Azam, N. A. (2019). A novel image encryption scheme based on an elliptic curve. Signal Processing, 155, 391-402. https://doi.org/10.1016/j.sigpro.2018.10.011; Hua, Z., Jin, F., Xu, B., and Huang, H. (2018). 2D Logistic-Sine-coupling map for image encryption. Signal Processing, 149, 148-161. https://doi.org/10.1016/j.sigpro.2018.03.010; Kalpana, M., Ratnavelu, K., and Balasubramaniam, P. (2019). An audio encryption based on synchronization of robust BAM FCNNs with time delays. Multimedia Tools and Applications, 78(5), 5969-5988. https://doi.org/10.1007/s11042-018-6373-y; Khoirom, M. S., Laiphrakpam, D. S., and Themrichon, T. (2018). Cryptanalysis of multimedia encryption using elliptic curve cryptography. Optik, 168, 370-375. https://doi.org/10.1016/j.ijleo.2018.04.068; Kumar, R. and Quan, C. (2019). Asymmetric multi-user optical cryptosystem based on polar decomposition and Shearlet transform. Optics and Lasers in Engineering, 120, 118-126. https://doi.org/10.1016/j.optlaseng.2019.03.024; Li, C., Xie, T., Liu, Q., and Cheng, G. (2014). Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dynamics, 78(2), 1545-1551. https://doi.org/10.1007/s11071-014-1533-8; Liu, J. M. and Qu, Q. (2010, October). Cryptanalysis of a substitution-diffusion based image cipher using chaotic standard and logistic map. In Qingling, l., Fei, Y., and Yun L. (Eds.) 2010 IEEE Third International Symposium on Information Pro-cessing (pp. 67-69), Qingdao, China: IEEE. https://doi.org/10.1109/ISIP.2010.33; Patidar, V., Pareek, N. K., and Sud, K. K. (2009). A new substitution–diffusion-based image cipher using chaotic standard and logistic maps. Communications in Nonlinear Science and Numerical Simulation, 14(7), 3056-3075. https://doi.org/10.1016/j.cnsns.2008.11.005; Renza, D. and Mendoza, S. (2019). High-uncertainty audio signal encryption based on the Collatz conjecture. Journal of Information Security and Applications, 46, 62-69. https://doi.org/10.1016/j.jisa.2019.02.010; Robinson, D. W. (2008). Entropy and uncertainty. Entropy, 10(4), 493-506. https://doi.org/10.3390/e10040493; Saini, D. S. and Bhooshan, S. V. (2006, July). Adaptive assignment scheme for OVSF codes in WCDMA. In Dini, P., Christer, Å., Dini, C., and Borcoci, E. (Eds.) 2006 IEEE International Conference on Wireless and Mobile Communications (IC-WMC'06) (pp. 65-65), Bucharest, Romania: IEEE. https://doi.org/10.1109/ICWMC.2006.15; Saljoughi, A. S. and Mirvaziri, H. (2019). A new method for im-age encryption by 3D chaotic map. Pattern Analysis and Applications, 22(1), 243-257. https://doi.org/10.1007/s10044-018-0765-5; Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell system technical journal, 28(4), 656-715. https://doi.org/10.1002/j.1538-7305.1949.tb00928.x; Telem, A. N. K., Segning, C. M., Kenne, G., and Fotsin, H. B. (2014). A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network. Advances in Multimedia, 2014. https://doi.org/10.1155/2014/602921; Wang, B., Wei, X., and Zhang, Q. (2013). Cryptanalysis of an image cryptosystem based on logistic map. Optik, 124(14), 1773-1776. https://doi.org/10.1016/j.ijleo.2012.06.020; Wen, H., Yu, S., and Lü, J. (2019). Breaking an image encryption algorithm based on DNA encoding and spatiotemporal cha-os. Entropy, 21(3), 246. https://doi.org/10.3390/e21030246; Ye, G. and Huang, X. (2017). An efficient symmetric image encryption algorithm based on an intertwining logistic map. Neurocomputing, 251, 45-53. https://doi.org/10.1016/j.neucom.2017.04.016; Zhang, J., Fang, D., and Ren, H. (2014). Image encryption algorithm based on DNA encoding and chaotic maps. Mathematical Problems in Engineering, 2014. https://doi.org/10.1155/2014/917147; Zhu, H., Zhao, Y., and Song, Y. (2019). 2D logistic-modulated-sine-coupling-logistic chaotic map for image encryption. IEEE Access, 7, 14081-14098. https://doi.org/10.1109/ACCESS.2019.2893538; https://revistas.unal.edu.co/index.php/ingeinv/article/view/81421

  5. 5
    Academic Journal
  6. 6
    Academic Journal

    المصدر: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2020, E103.A(10):1218

  7. 7
    Academic Journal

    المؤلفون: Hassan Ibrahim, Anwar

    المصدر: Engineering, Technology & Applied Science Research, 8(2), 2834-2838, (2018-04-20)

    مصطلحات موضوعية: W-CDMA, OVSF code, PN code, AWGN, RN, bit error probability (BEP)

  8. 8
    Academic Journal
  9. 9
    Academic Journal
  10. 10
    Academic Journal
  11. 11
    Academic Journal
  12. 12
    Academic Journal
  13. 13
    Academic Journal

    المساهمون: Ministerio de Economía y Competitividad (España)

    مصطلحات موضوعية: OVSF, Multi-sequences, UMTS jamming, Telecomunicaciones

    Relation: Gobierno de España. TEC2014-59255-C3-3-R; Gil Jiménez, V. P., Garcia Armada, A., Hernando Gallego, F. & González Pizarro, N. S. (2016). Novel orthogonal multi-sequences for an efficient jamming on the UMTS signal. EURASIP Journal on Wireless Communications and Networking, 2016(270).; http://hdl.handle.net/10016/32660; https://doi.org/10.1186/s13638-016-0770-6; 270; EURASIP Journal on Wireless Communications and Networking; 2016; AR/0000019125

  14. 14
    Dissertation/ Thesis
  15. 15
    Academic Journal
  16. 16
    Report
  17. 17
    Academic Journal

    المؤلفون: Al Sasongko, Sudi Mariyanto

    المصدر: Majalah Ilmiah Teknologi Elektro; Vol 8 No 2 (2009): (July - December) Majalah Ilmiah Teknologi Elektro ; Jurnal Teknologi Elektro; Vol 8 No 2 (2009): (July - December) Majalah Ilmiah Teknologi Elektro ; 2503-2372 ; 1693-2951

    مصطلحات موضوعية: OVSF, Baseband, AWGN, NLOS, QPSK, IFFT Simetris

    وصف الملف: application/pdf

  18. 18
  19. 19
    Academic Journal
  20. 20
    Academic Journal

    المؤلفون: Miyazaki, Shuichi, Okamoto, Kazuya

    المساهمون: 宮崎, 修一, 岡本, 和也, 00303884, 60565018

    وصف الملف: application/pdf

    Relation: http://hdl.handle.net/2433/226991; Algorithms; 953; 972