Abstract
The pseudo-coding can be considered of the coding techniques which are utilized for combating the effects of noise on the transmitted signals. This chapter presents the pseudo-coding using different interleaving techniques. The traditional and proposed randomizing techniques are presented in this chapter. The historical note of the chaotic encryption is discussed. It is employed in this chapter as the proposed pseudo-code. The image transmission over the WPAN Bluetooth networks is discussed in this chapter.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Howitt I (2001) WLAN and WPAN coexistence in UL band. IEEE Trans Vehicular Technol, 50(4)
Viterbi AJ (1971) Convolutional codes and their performance in communication systems. IEEE Trans Commun Technol 19(5)
Howitt I (2001) WLAN and WPAN Coexistence in UL Band. IEEE Trans Vehicular Technology 50(4)
Viterbi AJ (1971) Convolutional codes and their performance in communication systems. IEEE Trans Commun Technol 19:5
Heller JA (1968) Short constraint length convolutional codes, Jet Propulsion Lab, California Inst Technol, space programs Summary 37–54, vol III,, pp 171–177
Omura JK (1969) On the Viterbi decoding algorithm. IEEE Trans Inform Theory IT-15
Soliman NF, Albagory Y, Elbendary MA, Al-Hanafy W, El-Rabaie E-SM, Alshebeili SA, El-Samie FEA (2014) Chaotic interleaving for robust image transmission with LDPC coded OFDM. Wireless personal communications, Springer, 79(3):2141–2154
El-Bendary MAM, Abou-El-Azm AE, El-Fishawy NA, Shawki F, Abd El-Samie FE, El-Tokhy MAR, Kazemian HB (2012) Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP J Audio, Speech, and Music Processing, Springer, 1(4)
El-Bendary MA, El-Azm AA (2011) An efficient chaotic interleaver for image transmission over IEEE 802.15. 4 Zigbee network. J Telecommunications Inf Technol, 2011, pp 67–73
Mohamed M, El-Azm AA, El-Fishwy N, El-Tokhy M, El-Samie FA, Shawki F (2008) Bluetooth performance improvement with existing convolutional codes over AWGN channel. Proceedings 2nd international conference on electrical engin. design & technologies ICEEDT’08
El-Bendary MA (2017) FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multimedia Tools and Applications
Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA, El-Samie FEA, Faragallah OS (2016) Content verification of encrypted images transmitted over wireless AWGN channels. Wireless Personal Commun 88(3):479–491
El-Bendary MAM, El-Azm AEA, El-Fishawy NA, Al-Hosarey FSM, Eltokhy MA, El-Samie FEA, Kazemian HB (2012) JPEG image transmission over mobile network with an efficient channel coding and interleaving. Int J Electron 99(11):1497–1518
Abouelfadl AA, El-Bendary MAM, Shawki F (2014) Enhancing transmission over wireless image sensor networks based on ZigBee network. Life Sci J 11(8):342–354
El-Bendary MA, Abou-El-Azm AE, El-Fishawy NA, Shawki F, El-Tokhy M, El-Samie FA, Kazemian HB (2013) Image transmission over mobile Bluetooth networks with enhanced data rate packets and chaotic interleaving. Wireless Networks 19(4):517–532
Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA (2016) Secure wireless image communication using LSB steganography and chaotic baker ciphering. Wireless Personal Commun 91(3):1023–1049
Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA (2016) Efficient audio integrity verification algorithm using discrete cosine transform. Int J Speech Technol 19(1):1–8
Eldokany I, El-Rabaie ESM, Elhalafawy SM, Eldin MAZ, Shahieen MH, El-Bendary MAM (2015) Efficient transmission of encrypted images with OFDM in the presence of carrier frequency offset. Wireless Personal Commun 84(1):475–521
Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284
El-Gohary NM, El-Bendary MAM, El-Samie FEA Foud MM, Utilization of Raptor Codes for OFDM-System Performance Enhancing. Wireless Personal Communications. Springer, https://doi.org/10.1007/s11277–017-4248-6
Kasban H, Mohsen AM, El-Bendary (2016) Performance Improvement of Digital Image Transmission over Mobile WiMAX Networks,Wireless Personal Communications, Springer
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
A. M. El-Bendary, M. (2018). Simulation Scenarios of Pseudo-coding Techniques. In: Wireless Personal Communications. Signals and Communication Technology. Springer, Singapore. https://doi.org/10.1007/978-981-10-7131-7_6
Download citation
DOI: https://doi.org/10.1007/978-981-10-7131-7_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7130-0
Online ISBN: 978-981-10-7131-7
eBook Packages: EngineeringEngineering (R0)