Please use this identifier to cite or link to this item: http://ir.library.ui.edu.ng/handle/123456789/1718
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKamil, I. A.-
dc.contributor.authorFakolujo, O. A.-
dc.date.accessioned2018-10-10T09:28:47Z-
dc.date.available2018-10-10T09:28:47Z-
dc.date.issued2012-
dc.identifier.issn1994-4608-
dc.identifier.otherUbiquitous Computing and Communication Journal 7(2), pp. 1248-1254-
dc.identifier.otherui_art_kamil_lorenz-based_2012-
dc.identifier.urihttp://ir.library.ui.edu.ng/handle/123456789/1718-
dc.description.abstractSecure communication systems employing chaos have recently attracted significant interest. This is partly due to their high unpredictability and simplicity of implementation over conventional secure communications systems. This study presents the implementation of four chaotic modulation techniques employing Lorenz system as chaos generator. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Chaos Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environment to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of security followed by CSK while COOK gives the least level of security.en_US
dc.language.isoenen_US
dc.publisherResearch Insight Publishing Corporationen_US
dc.titleLorenz-based chaotic secure communication schemesen_US
dc.typeArticleen_US
Appears in Collections:scholarly works

Files in This Item:
File Description SizeFormat 
(6)ui_art_kamil_lorenz-based_2012.pdf1.1 MBAdobe PDFThumbnail
View/Open


Items in UISpace are protected by copyright, with all rights reserved, unless otherwise indicated.