2020
DOI: 10.11591/ijeecs.v19.i1.pp248-256
|View full text |Cite
|
Sign up to set email alerts
|

Fast and robust approach for data security in communication channel using pascal matrix

Abstract: This paper described fast and robust approach of text encryption and decryption based on Pascal matrix. The technique of encryption can be applied on both Arabic and English text. The results shows that the ciphered text unintelligible and rubush for the interuder or hukers. The encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. All this done by using Pascal matrix. Encryption and decryption simulated using MATLAB version 10 and notepad ++to write the input text.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 14 publications
(14 reference statements)
0
6
0
Order By: Relevance
“…This paper mainly studies the machine learning model of smooth support vector machine (SSVM), and its loss function is shown in Eq. (1).…”
Section: Federated Learningmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper mainly studies the machine learning model of smooth support vector machine (SSVM), and its loss function is shown in Eq. (1).…”
Section: Federated Learningmentioning
confidence: 99%
“…With the development of the Internet of Things (IoTs) and Artificial Intelligence (AI) [1], emerging technologies [2,3] and applications such as autonomous driving [4][5][6][7], smart medical care [8,9], industrial automation [10], virtual reality [11] and augmented reality [12] have sprung up. The effective implementation of these intelligent applications depends on the rapid acquisition, transmission and summary processing of environmental information by different types of IoT nodes such as sensors.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the standard involves a wide range of modulation formats and different rates of coding. Different modulations type (QPSK, 8PSK, 16APSK, and 32APSK) are utilized in DVB-S2 [21][22][23][24][25]. Under the same conditions of transmission, the capacity of DVB-S2 is typically increased by 30% over DVB-S. As a result, DVB-S2 operates over a SNR range exceeding 18dB; while QPSK based on DVB-S operating range is restricted to less than 5dB [26].…”
Section: Dvb-s2 System Architecturementioning
confidence: 99%
“…Muthna Jasim Fadhil et al [16] where they used methods to decode and protect information by methods of analysis of neural networks. Oday Kamil Hamid et al [17] they described their work with a quick approach and used randomness in a matrix-pascal-mathematical way. Rahman Atiqur et al [18] recommend concepts, features, protection, and internet of things (IoT) certified privacy apps with data protection in our information-driven world.…”
Section: Introductionmentioning
confidence: 99%