نتایج جستجو برای: digital communication

تعداد نتایج: 629338  

2008
Hyo Kim

To provide subscription-based Digital TV (DTV) data, services providers scramble the data stream (program content) with some secure measures such as ECM and EMM via using control words, and send the stream to conditional access system (CAS) in the set-top box (STB). Smart card is used to decrypt the control words and accordingly to enable the STB to descramble the scrambled signal. Therefore, s...

2001
Nikolai F. Rulkov Mikhail M. Sushchik Lev S. Tsimring Alexander R. Volkovskii

Utilization of chaotic signals for covert communications remains a very promising practical application. Multiple studies indicate that the major shortcoming of recently proposed chaos-based communication schemes is their susceptibility to noise and distortions in communication channels. In this paper, we review a new approach to communication with chaotic signals, which demonstrates good perfo...

1996
Christopher Jaynes Susan Landau

We present the issues involved in information obfuscation both for the embedding of information within digital signals and the detection of the hidden information. More standard cryptographic techniques acheive security through an encoding so that an evesdropper is unable to understand the signal. Obfuscation, preceded by an encoding, provides a method for the embedding of information within ot...

2014
Lokendra Singh Anuj Sharma

In digital communication, the bandwidth efficiency is one of the most important parameter to measure different modulation schemes, while the separation of waveforms in time domain of existing modulation schemes make it difficult to improve their bandwidth efficiency. Hence, in past decade researchers and engineers continuously try to find out the way to solve out this biggest problem in the fie...

2013
Aisha Fernandes

The boom of covert communication coincides with the appearance and growth of the Internet. The rapid spread of computer networks and shift to digitization of media has created a very favourable environment for covert communication. In this paper, some Covert communication techniques have been described. Covert or secure communication includes methods such as cryptography, steganography and wate...

2011
Mohamed Al-Wohaishi Jan Zidek

Software Defined Radio is a radio communications transceiver system in which all the typical components of a communication system such as mixers, modulators/demodulators, detectors, amplifiers are implemented through software rather than hardware. This approach is helpful because there is a scope of developing a system which is compatible with more than one mobile communication standard [1]. Th...

2014
Michael Seadle

This thesis frames a new and comprehensive picture of digital scholarly communication today. The advent and pervasiveness of the internet could profoundly impact the research workflows, paving a way for Open Science. Given the growing demand by funders, society and policy-makers, it is needed to understand if this is indeed the case. Related research has suggested that adoption of innovations i...

2011
Andriy Panchenko

Privacy on the Internet is becoming a concern as an already significant and ever growing part of our daily activities is carried out online. While cryptography can be used to protect the integrity and confidentiality of contents of communication, everyone along the route on which a packet is traveling can still observe the addresses of the respective communication parties. This often is enough ...

1994
John M Lervik

This paper discusses integrated system design with emphasis on wireless audio and video communication applications. In the wireless communication scenario both source and channel coding and modulation are essential components of the system, and delay and complexity is often severely constrained. Joint optimization is a promising alternative under such conditions, and several techniques have bee...

2016
AD McCrorie C Donnelly KJ McGlade

The concept of presenting information in graphical format is not new. A number of early examples of data visualisation exist from the eighteenth century; most notably the depiction of the deck layout of the British slave ship Brookes in 17882. This information poster (see figure 1) depicted views of the reprehensible living conditions suffered by slaves during their voyage to the colonies and w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید