[PDF][PDF] On properties of PN sequences generated by LFSR–a generalized study and simulation modeling

A Ahmad, SS Al-Busaidi… - Indian Journal …, 2013 - sciresol.s3.us-east-2.amazonaws …
This paper presents a study and developed simulation models for testing properties of
pseudo-noise sequences. A generalized approach is considered while presenting the study …

[PDF][PDF] Design of a probabilistic based software tool for evaluating controllability, observability and testability models of digital systems

A Ahmad, MAK Rizvi, A Al-Lawati, D Al-Abri… - Indian Journal of …, 2014 - Citeseer
This paper presents a probabilistic based software tool for estimation of digital systems'
testability. The tool allows fast computation to estimate testability in linear time complexity …

[PDF][PDF] Design of a pseudo-random binary code generator via a developed simulation model

A Ahmad, D Al-Abri - … Journal on Information Technology (ACEEE-Journal), 2012 - Citeseer
Random Binary Code generator (PRBCG). Based on extensive study of LFSR theory we
developed the simulation model of PRBCG. The developed model is faster and simulates …

[PDF][PDF] Computing and listing of number of possible m-sequence generators of order n

A Ahmad, SS Al-Busaidi… - Indian Journal …, 2013 - sciresol.s3.us-east-2.amazonaws …
Abstract Design of maximal length sequence (m-sequence) generators of order n has many
controlling parameters. In the design process of the generators it is essential to ensure that …

Investigation of some quite interesting divisibility situations in a signature analyzer implementation

A Ahmad - WSEAS Transactions on Circuits and Systems, 2011 - dl.acm.org
When designing error detecting and correcting systems, cryptographic apparatus,
scramblers and other secure, safe and authenticated communication and digital system …

On determination of LFSR structures to assure more reliable and secure designs of cryptographic systems

A Ahmad, S Arora, A Al Maashri… - Proceedings of 3rd …, 2014 - ieeexplore.ieee.org
This paper presents an algorithmic procedure for determining the cryptographic key
properties and hence matching with the required complexity and strength to assure a more …

[PDF][PDF] On design of 16-bit signature analyzer circuits equipped with primitive characteristic polynomials

A Ahmad, L Hayat - Proc. 1st Taibah Univ. Int. Conf. Comput. Inf …, 2012 - researchgate.net
This paper presents structures of 16-bit signature analyzer circuit. The structure of signature
analyzer is implemented using linear feedback shift registers along with exclusive-OR logic …

[PDF][PDF] Moving towards Reliable and Fault-Tolerant Smart Grid Systems

A Ahmad, P Lavanya, A El Haffar - International Journal of Advanced …, 2023 - academia.edu
Smart Grid is significantly being initiated in all fields due to their extensive use of IT,
monitoring, protection, and automation control. Safety, integrity, privacy and dependability of …

[PDF][PDF] On Implementation of Reconfigurable Cyclic Redundancy Check for EVS Applications

A Ahmad, FM Senan, SS Al Busaidi… - International Journal of …, 2023 - researchgate.net
The rising of Internet of Things (IoTs), Unmanned Aerial Vehicles (UAVs), 5G/6G
technologies, and many other technologies, render the need for high-speed, low footprint …

[PDF][PDF] Design of an automated system for proper utilization of travel time variability of public transport system

A Ahmad, MAK Rizvi, N Mohanan, YZ Sait… - … Journal of Applied …, 2014 - researchgate.net
Traffic congestion is as one of the biggest challenges facing by the developing countries'
transportation systems. Apart from other causes that create delays in commuting time, the …