Please use this identifier to cite or link to this item: http://ir.library.ui.edu.ng/handle/123456789/1647
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKamil, I. A.-
dc.contributor.authorFakolujo, O. A.-
dc.date.accessioned2018-10-09T14:21:17Z-
dc.date.available2018-10-09T14:21:17Z-
dc.date.issued2010-
dc.identifier.otherIWSSIP 2010- 17th International Conference on System, Signals and Image Processing.-
dc.identifier.otherui_inpro_kamil_chaotic_2010-
dc.identifier.urihttp://ir.library.ui.edu.ng/handle/123456789/1647-
dc.descriptionIn proceedingen_US
dc.description.abstractIn recent years, chaotic secure communication systems have attracted significant interest due to their higher unpredictability over conventional secure communications system and simplicity of implementation. This study presents the modeling of four chaotic modulation techniques. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Choa Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environmnet to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of secuirty followed by CSK while COOK gives the least level of security. The data transmission rate of the other three techniques was however twice that of DCSK.en_US
dc.language.isoen_USen_US
dc.titleChaotic Secure Communication Schemes employing Chua's Circuiten_US
dc.typeOtheren_US
Appears in Collections:scholarly works

Files in This Item:
File Description SizeFormat 
(8)ui_inpro_kamil_chaotic_2010.pdf591.76 kBAdobe PDFThumbnail
View/Open


Items in UISpace are protected by copyright, with all rights reserved, unless otherwise indicated.