References
- Alamgir, H., Shariful, I., Sadek, A. (2012) Performance analysis of Barker code based on their correlation property in multiuser environment. International Journal of Information Sciences and Techniques (IJIST), 2(1), 27-39. https://ssrn.com/abstract=3812910.
- Alawida, M., Teh, J.S., Alshoura, W.H. (2023) A new image encryption algorithm based on DNA state machine for UAV data encryption. Drones, 7(1), 38. https://doi.org/10.3390/drones7010038.
- Anil Kumar, V., Mitra, A., Prasanna, S. R. M. (2007) Performance analysis of different PN sequences for speech encryption. In: Proceedings of National Conference on Communications, Kanpur, January 2007. https://www.researchgate.net/publication/327513248.
- Anusha, T., Sreedhar, M. (2022) A new DSSS system based on multiuser time division and multiple accesses. International Journal of Novel Research and Development, 7(4), 2456-4184. https://ijnrd.org/papers/IJNRD2204041.pdf.
- Atoev, S., Kwon, O., Lee, S., Kwon, K. (2018) An efficient SC-FDM modulation technique for a UAV communication link. Electronics, 7, 1-18. https://doi.org/10.3390/electronics7120352.
- Balaji, D., Durga Rao, J., Srikanth, P. and Srinivasu, CH. (2012) Performance evaluation of barker codes by using nonsinusoidal waveforms in radar signal processing. International Journal of Engineering Science and Technology (IJEST), 4(03), 1071-1079. https://www.idc-online.com/technical_references/pdfs/electronic_engineering/PERFORMANCE%20EVALUATION%20OF.pdf.
- Cai, G., Chen, B. M. and Lee, T. H. (2011) Unmanned rotorcraft systems. Springer London. doi:10.1007/978-0-85729-635-1.
- DMS. (2010) AR. Drone de Parrot. Technical Data. DMS Company - ITS Department. https://cpgegrasshopper.fr/systemes/ar-drone/dossier_technique/dossier-technique-ar-drone.pdf (in French).
- El-Iskandarani, M. A., Darwish, S. and Abuguba, S. M. (2008) A robust and secure scheme for image transmission over wireless channels. In: Proceedings of the 42nd Annual IEEE International Carnahan Conference on Security Technology, Prague, October 2008. IEEE: 51–55. doi:10.1109/CCST.2008.4751276.
- Faraji-Biregani, M., Fotohi, R. (2021) Secure communication between UAVs using a method based on smart agents in Unmanned Aerial Vehicles. The Journal of Supercomputing, 77(6), 5076–5103. doi:10.1007/s11227-020-03462-0.
- Glaviaux, A. (1990) Information theory and codage. UK: ENST Bretagne National High School of Telecommunications of Brittany, VII, 2-10.
- 12. Golomb, S. W. and Scholtz, R. A. (1965) Generalized Barker sequences. IEEE Transactions on Information Theory, 11(4), 533-537. doi: 10.1109/TIT.1965. 1053828.
- Ismael, H.M., Al-Ta’i, Z.T.M. (2021) Authentication and encryption drone communication by using HIGHT lightweight algorithm. Turkish Journal of Computer and Mathematics Education. 12(11), 5891-5908. https://www.proquest.com/docview/2639740375?pq-origsite=gscholar&fromopenview=true&sourcetype=Scholarly%20Journals.
- Jain, S., Ogale, J. V. (2018) Contribution of Barker and nested Barker code in CDMA technology. International Journal of Management, Technology and Engineering, 8(XI), 1633-1644. https://www.ijamtes.org/gallery/203-nov.pdf
- Kiranmai, B., Rajesh Kumar, P. (2014) Performance Evaluation of Barker Codes using New Pulse Compression Technique. International Journal of Computer Applications, 107(20), 975–8887. doi:10.5120/18869-0417.
- Krim, M., Ali-Pacha, A., Hadj-Said, N. (2017) New binary code combined with new chaotic map and gold code to ameliorate the quality of the transmission. Indonesian Journal of Electrical Engineering and Computer Science, 5(1), 166-180. http://doi.org/10.11591/ijeecs.v5.i1.pp166-180.
- Krim, M., Ali-Pacha, A., Hadj-Said, N. (2018) The quality of the new generator sequence improvent to spread the color system’s image transmission. TELKOMNIKA (Telecommunication Computing Electronics and Control), 16(1), 402-414. doi:10.12928/telkomnika.v16i1.6583.
- Kristanto, A., Indriyanto, T. (2023) Development of communication system for UAV ground control station with ATC based on controller pilot data link communication. Warta Penelitian Perhubungan, 35(2), 243-256. doi:10.25104/warlit.v35i2.2308.
- Li, W. K. (1991) Some Lagrange multiplier tests for seasonal differencing. Biometrika, 78(2), 381-384. https://doi.org/10.1093/biomet/78.2.381.
- Lynch, S. (2014) Dynamical systems with applications using MATLAB. Birkhauser: 2nd edition. https://doi.org/10.1007/978-3-319-06820-6.
- Mitra, A. (2007) On pseudo-random and orthogonal binary spreading sequences. International Journal of Information Technology, 4(2), 137-144.
- Qin, X. Qu, F. and Zheng, Y. R. (2019) Circular superposition spread-spectrum transmission for multiple-input multiple-output underwater acoustic communications. IEEE Communications Letters, 23(8), 1385-1388. doi:10.1109/LCOMM.2019.2917192.
- Sajid, A. Habib, A. Ali, S. Ejaz, S. (2019) Development of multi-user TDMA-based DSSS system. In: Proceedings of the 2nd International Conference on Communication, Computing and Digital Systems (C-CODE), Islamabad, March 2019, 1-5. doi: 10.1109/C-CODE.2019.8681019.
- Santos, Th. T., Gebler, L. (2021) A methodology for detection and localization of fruits in apples orchards from aerial images. In: Proceedings of the 13th Brazilian Congress of Agroinformatics, November 2021. https://doi.org/10.5753/sbiagro.2021.18369.
- Scholtz, R. (1982) The origins of spread-spectrum communications. IEEE Transactions on Communications, 30(5), 822-854. doi: 10.1109/TCOM.1982.1095547.
- Scholtz, R. (1997) The spread spectrum concept. IEEE Transactions on Communications, 25(8), 748-755. doi: 10.1109/TCOM.1977.1093907.
- Stojanovic, N., Todorovic, B.M., Ristić, V.B, Vukanic Stojanovic, I. (2024) Direct sequence spread spectrum: History, principles and modern applications. Vojnotehnicki glasnik, 72(2), 790-813. DOI:10.5937/vojtehg72-49325.
- Vishwas, C. G. M., Sanjeev Kunte, R. (2024) Chaotic map based random binary key sequence generation. International Journal of Computer Network and Information Security (IJCNIS), 16(4), 102-117. doi:10.5815/ijcnis.2024.04.07.
- Viterbi, A. J. (2002) Spread spectrum communications myths and realities. IEEE Communications Magazine, 40(5), 34-41. https://doi.org/10.1109/MCOM.2002.1006970.
- Xue, H., Wang, Sh., Meng, X. (2013) Study on one modified chaotic system based on logistic map. Research Journal of Applied Sciences, 5(3), 898-904. doi:10.19026/rjaset.5.5037.
- Zia, U., McCartney, M., Scotney, B., Martinez, J., AbuTair, M., Memon, J. & Sajjad, A. (2022) Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. International Journal of Information Security, 21, 917-935. https://doi.org/10.1007/s10207-022-00588-5.