Implementation of DSSS system of image using MATLAB

In direct sequence spread spectrum systems, pseudo sequence random (PN) are used to spreading data bits. There are various type of PN sequences are available with good correlation properties, on mostly are generating pn by linear feedback shift register (LFSR). Will examine in this paper we describe...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammed, Samir Jasim (Author), Kaittan, Kadhim Hassan (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2020-09-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02396 am a22003013u 4500
001 ijeecs21562_14118
042 |a dc 
100 1 0 |a Mohammed, Samir Jasim  |e author 
100 1 0 |e contributor 
700 1 0 |a Kaittan, Kadhim Hassan  |e author 
245 0 0 |a Implementation of DSSS system of image using MATLAB 
260 |b Institute of Advanced Engineering and Science,   |c 2020-09-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/21562 
520 |a In direct sequence spread spectrum systems, pseudo sequence random (PN) are used to spreading data bits. There are various type of PN sequences are available with good correlation properties, on mostly are generating pn by linear feedback shift register (LFSR). Will examine in this paper we describe spreading binary random and spreading the image As well as studying probability bit error rate of DSSS system with change of the channel (Add white Gaussian noise channel, Rayleigh fading channel, Rician fading channel). Our study will be performed using MATLAB. Terms of completed my articles in building system developed to security transmitter and receiver the information of theft against communication digital system talk as well as the increase of data rate information. Was this design a way process of his used in applications military and have a major role also in the most applications requiring protect high for many information binary data and image. So that the system designed as fits practice and prevent the overlap the outside after it has become send signals in communication system exhibition penetration and Intentional attacks or other breaches. 
540 |a Copyright (c) 2020 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690
690 |a AWGN; Reyleighn Rician; Spread spectrum; Correlation; BER 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 19, No 3: September 2020; 1358-1366 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v19.i3 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/21562/14118 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/21562/14118  |z Get fulltext