Skip to main content

Simulation Scenarios of Pseudo-coding Techniques

  • Chapter
  • First Online:
  • 556 Accesses

Part of the book series: Signals and Communication Technology ((SCT))

Abstract

The pseudo-coding can be considered of the coding techniques which are utilized for combating the effects of noise on the transmitted signals. This chapter presents the pseudo-coding using different interleaving techniques. The traditional and proposed randomizing techniques are presented in this chapter. The historical note of the chaotic encryption is discussed. It is employed in this chapter as the proposed pseudo-code. The image transmission over the WPAN Bluetooth networks is discussed in this chapter.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Howitt I (2001) WLAN and WPAN coexistence in UL band. IEEE Trans Vehicular Technol, 50(4)

    Google Scholar 

  2. Viterbi AJ (1971) Convolutional codes and their performance in communication systems. IEEE Trans Commun Technol 19(5)

    Google Scholar 

  3. Howitt I (2001) WLAN and WPAN Coexistence in UL Band. IEEE Trans Vehicular Technology 50(4)

    Google Scholar 

  4. Viterbi AJ (1971) Convolutional codes and their performance in communication systems. IEEE Trans Commun Technol 19:5

    Google Scholar 

  5. Heller JA (1968) Short constraint length convolutional codes, Jet Propulsion Lab, California Inst Technol, space programs Summary 37–54, vol III,, pp 171–177

    Google Scholar 

  6. Omura JK (1969) On the Viterbi decoding algorithm. IEEE Trans Inform Theory IT-15

    Google Scholar 

  7. Soliman NF, Albagory Y, Elbendary MA, Al-Hanafy W, El-Rabaie E-SM, Alshebeili SA, El-Samie FEA (2014) Chaotic interleaving for robust image transmission with LDPC coded OFDM. Wireless personal communications, Springer, 79(3):2141–2154

    Google Scholar 

  8. El-Bendary MAM, Abou-El-Azm AE, El-Fishawy NA, Shawki F, Abd El-Samie FE, El-Tokhy MAR, Kazemian HB (2012) Performance of the audio signals transmission over wireless networks with the channel interleaving considerations. EURASIP J Audio, Speech, and Music Processing, Springer, 1(4)

    Google Scholar 

  9. El-Bendary MA, El-Azm AA (2011) An efficient chaotic interleaver for image transmission over IEEE 802.15. 4 Zigbee network. J Telecommunications Inf Technol, 2011, pp 67–73

    Google Scholar 

  10. Mohamed M, El-Azm AA, El-Fishwy N, El-Tokhy M, El-Samie FA, Shawki F (2008) Bluetooth performance improvement with existing convolutional codes over AWGN channel. Proceedings 2nd international conference on electrical engin. design & technologies ICEEDT’08

    Google Scholar 

  11. El-Bendary MA (2017) FEC merged with double security approach based on encrypted image steganography for different purpose in the presence of noise and different attacks. Multimedia Tools and Applications

    Google Scholar 

  12. Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA, El-Samie FEA, Faragallah OS (2016) Content verification of encrypted images transmitted over wireless AWGN channels. Wireless Personal Commun 88(3):479–491

    Google Scholar 

  13. El-Bendary MAM, El-Azm AEA, El-Fishawy NA, Al-Hosarey FSM, Eltokhy MA, El-Samie FEA, Kazemian HB (2012) JPEG image transmission over mobile network with an efficient channel coding and interleaving. Int J Electron 99(11):1497–1518

    Article  Google Scholar 

  14. Abouelfadl AA, El-Bendary MAM, Shawki F (2014) Enhancing transmission over wireless image sensor networks based on ZigBee network. Life Sci J 11(8):342–354

    Google Scholar 

  15. El-Bendary MA, Abou-El-Azm AE, El-Fishawy NA, Shawki F, El-Tokhy M, El-Samie FA, Kazemian HB (2013) Image transmission over mobile Bluetooth networks with enhanced data rate packets and chaotic interleaving. Wireless Networks 19(4):517–532

    Article  Google Scholar 

  16. Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA (2016) Secure wireless image communication using LSB steganography and chaotic baker ciphering. Wireless Personal Commun 91(3):1023–1049

    Article  Google Scholar 

  17. Nassar SS, Ayad NM, Kelash HM, El-Sayed HS, El-Bendary MA (2016) Efficient audio integrity verification algorithm using discrete cosine transform. Int J Speech Technol 19(1):1–8

    Article  Google Scholar 

  18. Eldokany I, El-Rabaie ESM, Elhalafawy SM, Eldin MAZ, Shahieen MH, El-Bendary MAM (2015) Efficient transmission of encrypted images with OFDM in the presence of carrier frequency offset. Wireless Personal Commun 84(1):475–521

    Article  Google Scholar 

  19. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284

    Google Scholar 

  20. El-Gohary NM, El-Bendary MAM, El-Samie FEA Foud MM, Utilization of Raptor Codes for OFDM-System Performance Enhancing. Wireless Personal Communications. Springer, https://doi.org/10.1007/s11277–017-4248-6

  21. Kasban H, Mohsen AM,  El-Bendary (2016) Performance Improvement of Digital Image Transmission over Mobile WiMAX Networks,Wireless Personal Communications, Springer

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohsen A. M. El-Bendary .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

A. M. El-Bendary, M. (2018). Simulation Scenarios of Pseudo-coding Techniques. In: Wireless Personal Communications. Signals and Communication Technology. Springer, Singapore. https://doi.org/10.1007/978-981-10-7131-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7131-7_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7130-0

  • Online ISBN: 978-981-10-7131-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics