2013
DOI: 10.2478/jee-2013-0033
|View full text |Cite
|
Sign up to set email alerts
|

Random Binary Sequences in Telecommunications

Abstract: Realization of modern telecommunication systems is inconceivable without use of different binary sequences. In this paper, an overview of random binary sequences used in different telecommunication systems is given. Basic principles of pseudorandom, chaotic, and true random sequence generation are presented, as well as their application in telecommunications in respect to advantages and drawbacks of the same. Moreover, particular scheme for true random binary sequence generation is given, as well as results of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
9
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 41 publications
0
9
0
Order By: Relevance
“…If there is no signal in the first delay element, throughout this operation, all memory units will be empty at the end of ‘m’ shifts. A feedback loop is required to transform the shift register's content from a delay unit to a sequence generator [8] . The feedback loop provides the contents of a particular memory unit, referred to as taps of the XOR operation [9] based on the modulo 2 adder operation.…”
Section: Introductionmentioning
confidence: 99%
“…If there is no signal in the first delay element, throughout this operation, all memory units will be empty at the end of ‘m’ shifts. A feedback loop is required to transform the shift register's content from a delay unit to a sequence generator [8] . The feedback loop provides the contents of a particular memory unit, referred to as taps of the XOR operation [9] based on the modulo 2 adder operation.…”
Section: Introductionmentioning
confidence: 99%
“…Pseudo random binary sequences (PRBS) are widely used in many applications such as wireless communications and cryptography [1][2][3][4]. In cryptography, many security protocols such as SSL/TLS, HTTP are developed based on pseudo random sequences.…”
Section: Introductionmentioning
confidence: 99%
“…Such ideal random sequences can easily be produced from natural resources, for example, atmospheric noises, radioactive decay and other natural phenomena. However, reproducibility of such sequences is impossible mathematically because of variation in natural resources [4,5]. Due to this disadvantage, sources of such true random sequences are unreliable for practical computer applications.…”
Section: Introductionmentioning
confidence: 99%
“…Due to this reason, in the literature, one can find a lot of publications on the use of chaos in this type of issue. Most of such research works apply to continuous distributions [8,9,10] and generating strings of binary values [11,12,13]. Non-uniform discrete distributions are practically not considered in the literature with the use of chaotic mappings.…”
Section: Introductionmentioning
confidence: 99%