Optimal biphase sequences with large linear complexity derived from sequences over Z4
New families of biphase sequences of size 2T-1 + I, r being a positive integer, are derived from families of in- terleaved maximal-length sequences over 24 of period 2(Zr - 1). These sequences have applications in code-division spread- spectrum multiuser communication systems. The families s...
| Main Authors: | Udaya, Paramapalli, Siddiqi, Mohammad Umar |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
1996
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/14202/ http://irep.iium.edu.my/14202/1/Optimal_Biphase_Sequences_with_Large_Linear_Complexity_Derived_from_Sequences_over_Z4.pdf |
Similar Items
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
by: Udaya, Paramapalli, et al.
Published: (1998)
by: Udaya, Paramapalli, et al.
Published: (1998)
Haar transformation of linear boolean function
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
by: Mohamed Rafiq, Hashum, et al.
Published: (2009)
Transform domain characterization of cyclic codes over Zm
by: Rajan, Sundar B., et al.
Published: (1994)
by: Rajan, Sundar B., et al.
Published: (1994)
The avalanche and propagation characteristics from Haar
perspective with extended linear and Bent Haar
conditions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
Intelligent Dynamic Traffic Light Sequence Using RFID
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2008)
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2008)
New methods of partial transmit sequence for reducing the high peak-to-average-power ratio with low complexity in the ofdm and f-ofdm systems
by: Abduljabbar, Yasir Amer
Published: (2019)
by: Abduljabbar, Yasir Amer
Published: (2019)
A critique study on phase optimized generalized discrete fourier transform based partial transmit sequence for PAPR in OFDM systems
by: Habaebi, Mohamed Hadi, et al.
Published: (2015)
by: Habaebi, Mohamed Hadi, et al.
Published: (2015)
An investigation of cryptographically generated address (CGA)-based authentication for mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
A cryptographic one-to-many reversible mapping and it's applications
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
Cryptographically Generated Addresses (CGAs): A survey and
an analysis of performance for use in mobile environment
by: Qadir, Sana, et al.
Published: (2011)
by: Qadir, Sana, et al.
Published: (2011)
Performance evaluation of a secure Low Level Reader Protocol
(LLRP) connection
by: Qadir, Sana, et al.
Published: (2009)
by: Qadir, Sana, et al.
Published: (2009)
One-to-many reversible mapping for IPV6 address generation: Simulation software development
by: Hakiem, Nashrul, et al.
Published: (2013)
by: Hakiem, Nashrul, et al.
Published: (2013)
A hybrid scheme for wireless physical layer security based on encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2014)
by: Tahir, Mohammad, et al.
Published: (2014)
The haar analysis of nonlinearity cryptographic security criterion
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Analysis of autocorrelation function of Boolean functions in Haar domain
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
The Haar-Recursive transform and its consequence to the Walsh-paley spectrum and the autocorrelation function
by: Rafiq, Hashum M., et al.
Published: (2016)
by: Rafiq, Hashum M., et al.
Published: (2016)
Haar spectrum of Bent Boolean functions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
by: Siddiqi, Mohammad Umar, et al.
Published: (2016)
Haar spectrum based construction of resilient and plateaued boolean functions
by: Rafiq, Hashum M., et al.
Published: (2017)
by: Rafiq, Hashum M., et al.
Published: (2017)
Correlation immunity and resiliency of boolean functions from haar domain perspective
by: Rafiq, Hashum M., et al.
Published: (2015)
by: Rafiq, Hashum M., et al.
Published: (2015)
Analysis and synthesis of cryptographic Boolean functions in Haar domain: Initial results
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
by: Rafiq, Hashum Mohamed, et al.
Published: (2012)
A framework for describing block cipher cryptanalysis
by: Phan, Raphael C. W., et al.
Published: (2006)
by: Phan, Raphael C. W., et al.
Published: (2006)
Optimal power allocation for the proposed asymmetric turbo code for 3G systems
by: Ramasamy, K., et al.
Published: (2009)
by: Ramasamy, K., et al.
Published: (2009)
Performance evaluation of proposed asymmetric turbo code in WCDMA HSDPA system
by: Ramasamy, K., et al.
Published: (2009)
by: Ramasamy, K., et al.
Published: (2009)
A study of CGA- (cryptographically generated address) signature based authentication of binding update messages in low-end MIPv6 node
by: Qadir , Sana, et al.
Published: (2012)
by: Qadir , Sana, et al.
Published: (2012)
Simulation study of a many-to-one mapping for IPv6 address owner identification in an enterprise local area network
by: Hakiem, Nashrul, et al.
Published: (2015)
by: Hakiem, Nashrul, et al.
Published: (2015)
Generalized discrete fourier transform based minimization
of PAPR in OFDM systems
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2014)
by: Elshirkasi, Ahmed Mohamed, et al.
Published: (2014)
Wireless physical layer security using encryption and channel pre-compensation
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Wireless physical layer security using channel state information
by: Tahir, Mohammad, et al.
Published: (2010)
by: Tahir, Mohammad, et al.
Published: (2010)
Peak to average power ratio reduction in the orthogonal frequency division multiplexing system using partial transmit sequence
by: Farhood, Hussein Mohammed
Published: (2019)
by: Farhood, Hussein Mohammed
Published: (2019)
An investigation of the merkle signature scheme (MSS) for cryptographically generated address (CGA) signatures in mobile IPv6
by: Qadir, Sana, et al.
Published: (2014)
by: Qadir, Sana, et al.
Published: (2014)
Analysing and improving the performance and security of the cryptographically Generated Address (CGA) algorithm for mobile IPv6 networks
by: Qadir, Sana, et al.
Published: (2015)
by: Qadir, Sana, et al.
Published: (2015)
Effects of inter element spacing on large antenna array characteristics
by: Muhamad Adnan, Noor Hidayah, et al.
Published: (2018)
by: Muhamad Adnan, Noor Hidayah, et al.
Published: (2018)
Energy harvesting network with wireless distributed computing
by: Alfaqawi, Mohammed, et al.
Published: (2019)
by: Alfaqawi, Mohammed, et al.
Published: (2019)
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
by: Hakiem, Nashrul, et al.
Published: (2012)
by: Hakiem, Nashrul, et al.
Published: (2012)
Collision probability of one-to-many reversible mapping for IPV6 address generation
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
by: Nashrul Hakiem, Nashrul Hakiem, et al.
Published: (2012)
Impulsive noise mitigation in Haar DWT based OFDM systems
by: Ali, Moaaz Elhag, et al.
Published: (2013)
by: Ali, Moaaz Elhag, et al.
Published: (2013)
Design of linear array antenna for smart antenna application
by: Islam, Md. Rafiqul, et al.
Published: (2011)
by: Islam, Md. Rafiqul, et al.
Published: (2011)
Randomness test of cryptographic one-to-many reversible mapping for ipv6 address generation
by: Hakiem, Nashrul, et al.
Published: (2014)
by: Hakiem, Nashrul, et al.
Published: (2014)
A study of linearization technique using a nonlinear thermistor
by: Che Mustapha, Nurul Arfah, et al.
Published: (2011)
by: Che Mustapha, Nurul Arfah, et al.
Published: (2011)
Reliability enhancement of complex networks through redundancy scaling
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2010)
by: Al-Khateeb, Wajdi Fawzi Mohammed, et al.
Published: (2010)
Similar Items
-
Optimal large linear complexity frequency hopping patterns derived from polynomial residue class rings
by: Udaya, Paramapalli, et al.
Published: (1998) -
Haar transformation of linear boolean function
by: Mohamed Rafiq, Hashum, et al.
Published: (2009) -
Transform domain characterization of cyclic codes over Zm
by: Rajan, Sundar B., et al.
Published: (1994) -
The avalanche and propagation characteristics from Haar
perspective with extended linear and Bent Haar
conditions
by: Siddiqi, Mohammad Umar, et al.
Published: (2016) -
Intelligent Dynamic Traffic Light Sequence Using RFID
by: Al-Khateeb, Khalid A. Saeed, et al.
Published: (2008)