Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
In this paper, we consider scanning and analyzing packets in order to detect hazardous contents using pattern matching. We introduce a hardware perfect-hashing technique to access the memory that contains the matching...
详细信息
This paper presents a secure downlink communication system where a transmitter with multiple antennas sends information to multiple single antenna users under ultra reliable and low-latency communication (uRLLC) syste...
详细信息
ISBN:
(数字)9781538683477
ISBN:
(纸本)9781538683477
This paper presents a secure downlink communication system where a transmitter with multiple antennas sends information to multiple single antenna users under ultra reliable and low-latency communication (uRLLC) system requirement. To meet uRLLC requirement and provide secrecy against multi-antenna eavesdropper (Eve), transmitter adopts a special channel training scheme called anti-eavesdropping channel estimation (ANECE) as well as a standard transmit beamforming to send secret information in short blocklength regime. Using ANECE, two or more cooperative full-duplex radio devices obtain their receive channel state information (CSI) with respect to each other while preventing Eve from obtaining a consistent estimate of its receive CSI, which improves the secrecy of subsequent transmission of information between the devices. We derive an expression for the average secrecy throughput (AST) of ANECE assisted transmission. This easy-to-evaluate expression of approximated AST in terms of blocklength and various controllable parameters leads to useful insights to maximize AST under uRLLC requirement. Finally, numerical results are presented and discussed.
This article discusses about the application of unmanned vehicles networks in several areas related to power systems. The main topics are related to the planning and mission control tools as well as coordination, comm...
详细信息
With increasing uniprocessor and SMP computation power, workstation clusters are becoming viable alternatives to high performance computing systems. Communication overhead affects the performance of parallel computers...
详细信息
We investigate the nonlinear modes in a rotating double well potential with 79T symmetry. Focus on the existence and stability of the nonlinear PT modes in this system, we found that five types of PT modes can stably ...
详细信息
We investigate the nonlinear modes in a rotating double well potential with 79T symmetry. Focus on the existence and stability of the nonlinear PT modes in this system, we found that five types of PT modes can stably exist by given certain parameter settings. The multistable area between these modes are studied numerically and the bistable and tristable areas are delimited. With different input trial wavefunctions, five types of solitary wave modes are identified. We found that the rotating of the potential can significantly affect the power flow of the fundamental harmonic mode, whose effect is absent for the other modes.
As part of the LADIMAS campaign, measurements of mesospheric and upper stratospheric water vapor concentration were made over a latitudinal range from 53 N to 63 S. The 22-GHz emission line of water vapor was observed...
As part of the LADIMAS campaign, measurements of mesospheric and upper stratospheric water vapor concentration were made over a latitudinal range from 53 N to 63 S. The 22-GHz emission line of water vapor was observed by a new, portable, cryogenically cooled microwave radiometer that was carried on board the German research vessel Polarstern as it sailed from Bremerhaven, Germany, to the Antarctic during November and December, 1991. Water vapor profiles were obtained at approximately 5 degrees latitude intervals for an altitude range of 40 to 80 km.
This paper addresses a new nonlinear gain feedback based neural adaptive dynamic surface control(DSC) method for a class of strict feedback nonlinear systems in the presence of uncertainties and external disturbance...
详细信息
ISBN:
(纸本)9781538629185
This paper addresses a new nonlinear gain feedback based neural adaptive dynamic surface control(DSC) method for a class of strict feedback nonlinear systems in the presence of uncertainties and external disturbances. Besides circumventing the problem of complexity explosion, the nonlinear gain feedback technique brings a self-regulation ability into the pioneering DSC method to improve the dynamic performance of the resulted closed-loop system. Neural networks are used to online approximating the uncertainties, the over-fitting problem occurs with small probability since the signals obtained by NNs are also handled using nonlinear gain function. It is proved rigorously by Lyapunov stability theorem that all the closed-loop signals are kept semi-globally uniformly ultimately bounded, the output tracking error and the optimal neural weight vector estimation error can all be adjusted to arbitrarily small around zero characterized by design parameters in an explicit way. Furthermore,the method proposed can be extended to the control of multiple-input-multiple-output system trivially. Comparative simulation results are presented to demonstrate the effectiveness of the proposed method.
Optimal control methods provide solutions to safety-critical problems but easily become intractable. Control Barrier Functions (CBFs) have emerged as a popular technique that facilitates their solution by provably gua...
详细信息
A new method is proposed for the fabrication of planar single crystal silicon nanowires down to 8 nm in diameter. In this method silicon lines are defined on silicon-on-insulator with electron beam lithography followe...
A new method is proposed for the fabrication of planar single crystal silicon nanowires down to 8 nm in diameter. In this method silicon lines are defined on silicon-on-insulator with electron beam lithography followed by a metal liftoff process and a silicon plasma etch. Low temperature oxidation is then used to shrink these lines to a sub-10 nm diameter. Normal stress generated by the expansion of the viscous oxide during oxidation eventually stops the reaction, leaving a small silicon core at the center of the line. The effect of the crystallographic orientation of the line and the stress complications caused by the substrate are investigated.
暂无评论