Full Text Available
Note: Clicking the button above will open the full text document at the original institutional repository in a new window.
Secure communication systems employing chaos have recently attracted significant interest. This is partly due to their high unpredictability and simplicity of implementation over conventional secure communications systems. This study presents the implementation of four chaotic modulation techniques...
| Format: | Article |
|---|---|
| Published: |
2012
|
| Tags: |
No Tags, Be the first to tag this record!
|