Analysis the performance of adaptive demodulator in terms of bit error rate for software defined radio
Nowadays, a lot of effort have been given to reduce hardware and software development cost. Many of today's military and commercial communication systems use Software Defined Radio (SDR) has been one of the new techniques developed to change the way the traditional wireless communication system...
| Main Authors: | Bakhraiba, Ahmed Mohamed Salih, Khatun, Sabira, Noordin, Nor Kamariah, Ismail, Alyani, Mohd Ali, Borhanuddin |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2009
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/11751/ |
Similar Items
Software-Defined Radio-Based Modulation and Demodulation Scheme
by: Bakhraiba, Ahmed Mohamed Salih
Published: (2009)
by: Bakhraiba, Ahmed Mohamed Salih
Published: (2009)
Digital modulation identification in terms of software defined radio for traffic management system
by: Bakhraiba, Ahmed Mohamed Salih, et al.
Published: (2008)
by: Bakhraiba, Ahmed Mohamed Salih, et al.
Published: (2008)
Design Of Multi-Modulation Baseband Modulator And Demodulator For Software Defined Radio
by: Chye, Yin Hui
Published: (2011)
by: Chye, Yin Hui
Published: (2011)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Proposed pixel for custom laser doppler vibrometry camera
by: Jackson, Stephen
Published: (2012)
by: Jackson, Stephen
Published: (2012)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
by: Javan, Ali
Published: (2011)
by: Javan, Ali
Published: (2011)
Network security situation awareness based on indicators extracted
by: Xie, Zeqiang
Published: (2016)
by: Xie, Zeqiang
Published: (2016)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
An efficient crime group of secured data sharing scheme in cloud
by: Rashid, Mustafa Noori
Published: (2018)
by: Rashid, Mustafa Noori
Published: (2018)
Kesedaran dan amalan keselamatan siber dalam kalangan pengguna internet di Malaysia
by: Pitchan, Muhammad Adnan
Published: (2017)
by: Pitchan, Muhammad Adnan
Published: (2017)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Modeling of post-incident root cause analysis for cross site request forgery (CSRF) attack
by: Mustafa, Mohd Nawawi
Published: (2015)
by: Mustafa, Mohd Nawawi
Published: (2015)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Demodulation and modulation of high bit data transmission in low voltage supply system
by: Abdullah, Rosmadi
Published: (2007)
by: Abdullah, Rosmadi
Published: (2007)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Software-defined routing protocol for mobile cognitive radio networks : a cross-layer perspective
by: Qusay Medhat, Salih
Published: (2022)
by: Qusay Medhat, Salih
Published: (2022)
Protecting network with Cisco solution
Published: (2008)
Published: (2008)
Honeynet as a service deployment approach in enabling virtual crime scene investigation
by: Hasheminejad, Hamidreza
Published: (2015)
by: Hasheminejad, Hamidreza
Published: (2015)
An experimental evaluation of DoS attack and its impact on throughput of IEEE 802.11 wireless networks
by: Malekzadeh, Mina, et al.
Published: (2008)
by: Malekzadeh, Mina, et al.
Published: (2008)
Electronic Book of Network Security: Introduction to Network Security
by: Hoo, Cheong Yee
Published: (2003)
by: Hoo, Cheong Yee
Published: (2003)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Dasar Keselamatan ICT Universiti Teknologi MARA / Pejabat Infrastruktur dan Infostruktur, UiTM
by: UiTM, Pejabat Infrastruktur dan Infostruktur
Published: (2018)
by: UiTM, Pejabat Infrastruktur dan Infostruktur
Published: (2018)
Secure lightweight client for cloud-based E-Health Model
by: Zhang, Xiaowei
Published: (2023)
by: Zhang, Xiaowei
Published: (2023)
Movie ticket payment via bluetooth / Mohd Shahrin Samian
by: Samian, Mohd Shahrin
Published: (2006)
by: Samian, Mohd Shahrin
Published: (2006)
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015)
by: Daryabar, Farid
Published: (2015)
Hybrid cryptography algorithm to improve security cloud storage
by: Abd Almohsen, Inam Razzaq
Published: (2017)
by: Abd Almohsen, Inam Razzaq
Published: (2017)
Cisco aims for higher productivity
Published: (2008)
Published: (2008)
An efficient anomaly intrusion detection method with evolutionary neural network
by: Sarvari, Samira
Published: (2020)
by: Sarvari, Samira
Published: (2020)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
Similar Items
-
Software-Defined Radio-Based Modulation and Demodulation Scheme
by: Bakhraiba, Ahmed Mohamed Salih
Published: (2009) -
Digital modulation identification in terms of software defined radio for traffic management system
by: Bakhraiba, Ahmed Mohamed Salih, et al.
Published: (2008) -
Design Of Multi-Modulation Baseband Modulator And Demodulator For Software Defined Radio
by: Chye, Yin Hui
Published: (2011) -
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014) -
Proposed pixel for custom laser doppler vibrometry camera
by: Jackson, Stephen
Published: (2012)