DEPARTMENT OF ELECTRICAL AND ELECTRONIC ENGINEERING

Permanent URI for this communityhttps://repository.ui.edu.ng/handle/123456789/478

Browse

Search Results

Now showing 1 - 4 of 4
  • Thumbnail Image
    Item
    Lorenz-based chaotic secure communication schemes
    (Research Insight Publishing Corporation, 2012) Kamil, I. A.; Fakolujo, O. A.
    Secure communication systems employing chaos have recently attracted significant interest. This is partly due to their high unpredictability and simplicity of implementation over conventional secure communications systems. This study presents the implementation of four chaotic modulation techniques employing Lorenz system as chaos generator. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Chaos Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environment to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of security followed by CSK while COOK gives the least level of security.
  • Thumbnail Image
    Item
    Demonstration of chaos in selected chaotic systems
    (Scholarlink Research Institute Journals, 2012) Kamil, I. A.
    Chaos is one of the most important behavioural modes exhibited by dynamical systems and refers to the unpredictable, seemingly random, motion of trajectories of a dynamical system. In recent time, non-linear dynamics and chaos have become familiar in the technical vocabulary of most sciences and technology due to the various applications of chaos in these areas. Chaotic systems display chaotic behaviours only for specific range of values of their parameters. It is therefore important to understand the chaotic features as well as parameter values resulting in its emergence in systems. In this paper, the emergence of chaos in six chaotic systems was demonstrated using Simulink with specific initial conditions and parameter values. The simulation results obtained in form of time series illustrated noise-like waveforms which were unpredictable even after a long interval of time, while the phase portraits were irregular and sponge-like in appearance. The noise-like and unpredictable trajectories as well strange attractors observed clearly demonstrated the emergence of chaos the chosen parameter values.
  • Thumbnail Image
    Item
    Chaotic secure communication schemes employing Chua's Circuit
    (2010) Kamil, I. A.; Fakolujo, O. A.
    In recent years, chaotic secure communication systems have attracted significant interest due to their higher unpredictability over conventional secure communications systems and simplicity of implementation. This study presents the modeling of four chaotic modulation techniques. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Chaos Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environment to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of security followed by CSK while COOK gives the least level of security. The data transmission rate of the other three techniques was however twice that of DCSK.
  • Thumbnail Image
    Item
    Chaotic Secure Communication Schemes employing Chua's Circuit
    (2010) Kamil, I. A.; Fakolujo, O. A.
    In recent years, chaotic secure communication systems have attracted significant interest due to their higher unpredictability over conventional secure communications system and simplicity of implementation. This study presents the modeling of four chaotic modulation techniques. The techniques are Chaotic Masking (CM), Chaos Shift Keying (CSK), Chaos On-Off Keying (COOK), and Differential Choa Shift Keying (DCSK). Simulations were carried out using Simulink in Matlab environmnet to implement these techniques. A qualitative evaluation of the transmitted signal waveforms in all the cases considered showed that DCSK gives the highest level of secuirty followed by CSK while COOK gives the least level of security. The data transmission rate of the other three techniques was however twice that of DCSK.