SNR Improvement and Bandwidth Optimization Technique Using PCM-DSSS Encryption Scheme
نویسندگان
چکیده
منابع مشابه
Fast Comparison Encryption Scheme using cheating text technique
The significant database performance gains can be had by implementing light-weight compression schemes and operators that work directly on compressed data. By classifying compression schemes according to a set of basic properties, operating directly on compressed data in column-oriented DBMS systems (c-store). This paper consist a new technique using cheating text (meaningful) with the FCE. It ...
متن کاملImprovement on a Threshold Authenticated Encryption Scheme
The authenticated encryption scheme allows one signer to generate an authenticated cipher-text so that no one except the designated verifier can recover the message and verify the message. In a (t, n) threshold authenticated encryption scheme, any t or more signers can generate an authenticated encryption for a message and send it to the designated verifier. Compared with the conventional encry...
متن کاملBandwidth and Gain improvement by using Suspended
In this paper the design of compact broadband Koch island fractal patch antenna for bandwidth improvement and antenna size reduction in a single design at 2.4GHz is proposed. The suspended technique is used to improve bandwidth whereas for size reduction the electrical length of the conducting patch has been increased. By space-filling property of fractal geometry, this antenna reveals lower re...
متن کاملSpeed and Current Controllers Design of BLDC Motor Using SNR Optimization Technique
In this paper, a novel tuning technique for the current and speed controllers of the Brushless DC (BLDC) motor derive system is presented. The parameters of PI controllers in the inner current control loop and outer speed control loop which vary with the operating conditions such as variation of temperature and saturation phenomena or load torque changing of the drive are adjusted in order to m...
متن کاملImprovement on a Fuzzy Identity-based Encryption Scheme
Sahai and Waters introduced a fuzzy id-based encryption (FIBE) scheme in which an identity was viewed as a set of descriptive attributes, and any user with a private key for an identity ID was allowed to decrypt a ciphertext encrypted with an identity ID′ , if and only if the identity ID and ID′were close to each other as measured by the “set overlap” distance metric. After that, Shweta Agrawal...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Advanced Science, Engineering and Information Technology
سال: 2016
ISSN: 2460-6952,2088-5334
DOI: 10.18517/ijaseit.6.5.921