Topics in coding, cryptography and information security
| Other Authors: | Siddiqi, Mohammad Umar |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/21293/ http://irep.iium.edu.my/21293/1/Book.pdf |
Similar Items
Coding, cryptography, information security and OFDM
Published: (2011)
Published: (2011)
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009)
by: Zaidan , A. A., et al.
Published: (2009)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012)
by: Khalaf, Emad T
Published: (2012)
OSCDMA double weight code: A simplified fornula code construction technique
by: A., Mohammed, et al.
Published: (2007)
by: A., Mohammed, et al.
Published: (2007)
Scalable Subband Coding Of Images
by: Ng, Mow Song
Published: (2006)
by: Ng, Mow Song
Published: (2006)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Spectral amplitude coding OCDMA: Performance analysis on detection schemes using vectors combinatorial code families
by: Ahmed, H.Y., et al.
Published: (2009)
by: Ahmed, H.Y., et al.
Published: (2009)
Optical code division multiple access
by: Ong, Chia Jye
Published: (2011)
by: Ong, Chia Jye
Published: (2011)
Complexity evaluation in scalable video coding
by: Maarif, Haris Al Qodri, et al.
Published: (2010)
by: Maarif, Haris Al Qodri, et al.
Published: (2010)
Generator Polynomial in Turbo Code System
by: Looi, Chun
Published: (2012)
by: Looi, Chun
Published: (2012)
Accelerating Erasure Code with Multi-Processing
by: Loh, Hong Khai
Published: (2016)
by: Loh, Hong Khai
Published: (2016)
Improving The Network Throughput With Coding Theory
by: Khoo, Zong Chen
Published: (2016)
by: Khoo, Zong Chen
Published: (2016)
Optical spectrum CDMA: A new code construction with zero cross correlation for double weight code family
by: E.I., Babekir, et al.
Published: (2007)
by: E.I., Babekir, et al.
Published: (2007)
The performance of correlative coding in MIMO-OFDM systems
by: Syed-Yusof, Sharifah K., et al.
Published: (2005)
by: Syed-Yusof, Sharifah K., et al.
Published: (2005)
Pulse Coded Neural Network Implementation In VLSI
by: Shaikh-Husin, Nasir, et al.
Published: (2000)
by: Shaikh-Husin, Nasir, et al.
Published: (2000)
The performance of correlative coding in MIMO-OFDM systems
by: Syed Yusof, Sharifah Kamilah, et al.
Published: (2005)
by: Syed Yusof, Sharifah Kamilah, et al.
Published: (2005)
Rateless Erasure Codes for Short Messages Transmission
by: Chong, Zan Kai
Published: (2016)
by: Chong, Zan Kai
Published: (2016)
MAP Decoding Algorithm in Turbo Code System
by: Tan, Chau
Published: (2012)
by: Tan, Chau
Published: (2012)
Digital watermarking scheme for QR code security
by: Tan Lei Lei, Joanna, et al.
Published: (2021)
by: Tan Lei Lei, Joanna, et al.
Published: (2021)
Correlative coding with clipping and filtering technique in OFDM Systems
by: Yusof, S. K., et al.
Published: (2003)
by: Yusof, S. K., et al.
Published: (2003)
Another perspective in generating and using gray code word
by: Ahmad, Anita
Published: (2007)
by: Ahmad, Anita
Published: (2007)
Digital security locking system – USB based GSM security system
by: Chai, Chong Yi
Published: (2011)
by: Chai, Chong Yi
Published: (2011)
RISC32-E cryptography performance evaluation
by: Teo, Sei Hau
Published: (2022)
by: Teo, Sei Hau
Published: (2022)
Security performance of QKD
by: Ali, Sellami, et al.
Published: (2011)
by: Ali, Sellami, et al.
Published: (2011)
Modeling and simulation of the double weight code family detection schemes
by: A., Mohammed, et al.
Published: (2007)
by: A., Mohammed, et al.
Published: (2007)
Delay and Throughput Performance of Optical WCDMA Network with Code Sharing
by: Jain, V.K., et al.
Published: (2009)
by: Jain, V.K., et al.
Published: (2009)
Quantitative assessment on remote code execution vulnerability in web apps
by: Md. Maruf, Hassan, et al.
Published: (2019)
by: Md. Maruf, Hassan, et al.
Published: (2019)
A study on channel coding for 5G / Xu Wei
by: Xu , Wei
Published: (2019)
by: Xu , Wei
Published: (2019)
GSM car security system
by: Mohd Azwan, Ramlan
Published: (2012)
by: Mohd Azwan, Ramlan
Published: (2012)
Redundant Residue Number System Code for Fault-Tolerant
Hybrid Memories
by: Haron, Nor Zaidi
Published: (2011)
by: Haron, Nor Zaidi
Published: (2011)
Redundant Residue Number System Code for Fault-Tolerant
Hybrid Memories
by: Haron, Nor Zaidi, et al.
Published: (2011)
by: Haron, Nor Zaidi, et al.
Published: (2011)
New design of spectral amplitude coding in OCDMA with zero cross-correlation
by: N., Saad, et al.
Published: (2009)
by: N., Saad, et al.
Published: (2009)
OSCDMA double weight code: Analysis on the detection scheme for the mapping technique
by: A., Mohammed, et al.
Published: (2007)
by: A., Mohammed, et al.
Published: (2007)
Language identification system using Matlab: design, implementation, and sample codes
by: Husain, Rashida, et al.
Published: (2017)
by: Husain, Rashida, et al.
Published: (2017)
Investigation of integer-coefficient partial response coding in STBC-OFDM system
by: Syed-Yusof, Sharifah Kamilah, et al.
Published: (2005)
by: Syed-Yusof, Sharifah Kamilah, et al.
Published: (2005)
PAPR reduction in WLAN-OFDM system using code repetition
technique
by: Ngajikin, N. H., et al.
Published: (2003)
by: Ngajikin, N. H., et al.
Published: (2003)
Design and evaluation of multidimensional turbo product coded MIMO-OFDM system
by: Muladi, Muladi
Published: (2007)
by: Muladi, Muladi
Published: (2007)
Using Multiscale Edge Detection For Low Bit-Rate Subband Video Coding
by: Ashourian, Mohsen, et al.
Published: (2001)
by: Ashourian, Mohsen, et al.
Published: (2001)
Development of unit commitment assessment technique based on Malaysia grid code requirement
by: Hashim, Baharin
Published: (2007)
by: Hashim, Baharin
Published: (2007)
Similar Items
-
Coding, cryptography, information security and OFDM
Published: (2011) -
Securing cover-file without limitation of hidden data size using computation between cryptography and steganography
by: Zaidan , A. A., et al.
Published: (2009) -
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012) -
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
by: Khalaf, Emad T
Published: (2012) -
OSCDMA double weight code: A simplified fornula code construction technique
by: A., Mohammed, et al.
Published: (2007)