The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The pseudo random binary sequence plays an important role in cryptography and network security system. This paper proposes a new approach to pseudo random binary sequence over finite field and evaluates some important properties of the newly generated sequence. The sequence is generated by applying a primitive polynomial over finite field, trace function and modified mobius function. Then period,...
Pseudo random sequences play an important role in cryptography and network security system. This paper proposes a new approach for generation of pseudo random sequence over odd characteristic field. The sequence is generated by applying a primitive polynomial over odd characteristic field, trace function and möbius function. Then, some important properties of the newly generated sequence such as period,...
This paper proposes a novel approach for pseudo random ternary sequence over finite field. The sequence is generated from a primitive polynomial over finite field applying trace function and möbius function. This paper further presents some important properties such as period, autocorrelation and cross-correlation of the generated sequence. The proposed approach is experimented on various bit length...
Graph Steganography (Graphstega) provides a method of covert communication by converting a message to plotted data in a graph. Due to numerous usages of graphs in our daily life, Graphstega can hide secret message communication without arising any suspicion. This paper proposes a secured Graphstega approach aiming at a secured method of information hiding that looks like innocent and unnoticeable...
This paper proposes a new Elliptic Curve Cryptography (ECC) scheme and a data mapping technique on elliptic curve over a finite field using maximum length random sequence generation. While its implementation, this paper also proposes a new algorithm of scalar multiplication for ECC. The proposed scheme is tested on various bits length of prime field and the experimental results show very high strength...
This study clarified the neural mechanisms underlying jaw movements in pharyngolaryngeal reflexes such as swallowing in rats. After retrograde tracer injections into the ventromedial division (Vmovm) of the trigeminal motor nucleus (Vmo) containing jaw-opening (JO) motoneurons or into the dorsolateral division (Vmodl) of Vmo containing jaw-closing (JC) motoneurons, JO and JC premotoneurons were labeled...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.