public channel
Recently Published Documents


TOTAL DOCUMENTS

37
(FIVE YEARS 5)

H-INDEX

9
(FIVE YEARS 0)

Author(s):  
Kache Vishwamithra ◽  
G Santhosh Abhinai ◽  
S Aakash ◽  
M Rajvel

In passed-on overseeing, assets are everything considered in the cloud master's connection and dependably got the idea by the cloud clients through open channels. The key system decorations with a got channel foundation over a public channel for the ensured trades between a cloud client and a cloud ace association. The stream key design shows for passed on figuring experience the risky effects of express inconveniences, e.g., seeing low connection delay, disposing of verbalization the central issues, restoring client accreditation, and putting forth an attempt not to stun haphazardness. To manage these heaps, we propose a less testament 0-RTT dull AKA show against baffling eccentricity for secure station foundation in passed-on figuring. As a 0-RTT show, it as a rule speeds up the sensibility of the got channel foundation measure. Further, our show needn't unwind up around with the highlights of an infuriating circumstance a public key with a substance's character and beginning now and for an earnest period of time handles the check of the beginning issue. At long last, a solid security assessment of the show is other than proposed. The show doesn't just fulfill the standard security credits (e.g., known-key security, dull key-share), yet in like manner, solid security ensures, i.e., client certification and puzzling anomaly get.


Author(s):  
Arindam Sarkar

AbstractSynchronization of two neural networks through mutual learning is used to exchange the key over a public channel. In the absence of a weight vector from another party, the key challenge with neural synchronization is how to assess the coordination of two communication parties. There is an issue of delay in the current techniques in the synchronization assessment that has an impact on the security and privacy of the neural synchronization. In this paper, to assess the complete coordination of a cluster of neural networks more efficiently and timely, an important strategy for assessing coordination is presented. To approximately determine the degree of synchronization, the frequency of the two networks having the same output in prior iterations is used. The hash is used to determine if both the networks are completely synchronized exactly when a certain threshold is crossed. The improved technique makes absolute coordination between two communication parties using the weight vectors’ has value. In contrast, with existing approaches, two communicating parties who follow the proposed approach will detect complete synchronization sooner. This reduces the effective geometric likelihood. The proposed method, therefore, increases the safety of the protocol for neural key exchange. This proposed technique has been passed through different parametric tests. Simulations of the process show effectiveness in terms of cited results in the paper.


2020 ◽  
Vol 65 (11) ◽  
pp. 879-882
Author(s):  
Han Wu ◽  
Zhizhen Yin ◽  
Xinhai Tong ◽  
Peng Ding ◽  
Jianguo Xie ◽  
...  

2018 ◽  
Vol 8 (10) ◽  
pp. 1731 ◽  
Author(s):  
Chih-Ta Yen ◽  
Jen-Fa Huang ◽  
Wen-Zong Zhang

A new optical steganography scheme is proposed that transmits a stealth optical code-division multiple-access (OCDMA) signal through a public binary phase-shift keying (BPSK) channel. Polarization beam splitters and arrayed waveguide gratings are used to implement a spectral-polarization coding (SPC) system with an incoherent optical source. We employ a Walsh–Hadamard code as the signature code of the user who wants to transmit stealth information using the system. A free space optical link applied to this system maintains the polarization states of light during propagation. The secret data are extracted using correlation detection and balanced subtraction in the OCDMA decoder of the intended receiver, and the other signal from the public channel is reduced by the OCDMA decoder. At the demodulator of the public channel, BPSK demodulation eliminates the stealth signal so that the public channel is not affected by the stealth signal. The two signals cannot interfere with each other. The results of this study show that our proposed optical steganography system is highly secure. The stealth signal can be favorably hidden in the public channel when the average source power of the stealth signal, public noise, and public signal are −5, −3, and 0 dBm, respectively.


Author(s):  
Chih-Ta Yen ◽  
Jen-Fa Huang ◽  
Wen-Zong Zhang

A new optical steganography scheme is proposed that transmits a stealth optical code-division multiple-access (OCDMA) signal through a public binary phase-shift keying (BPSK) channel. Polarization beam splitters and arrayed waveguide gratings are used to implement a spectral-polarization coding (SPC) system with an incoherent optical source. We employ a Walsh–Hadamard code as the signature code of the user who wants to transmit stealth information using the system. A free space optical link applied to this system maintains the polarization states of light during propagation. The secret data is extracted using correlation detection and balanced subtraction in the OCDMA decoder of the intended receiver, and the other signal from the public channel is reduced by the OCDMA decoder. At the demodulator of the public channel, BPSK demodulation eliminates the stealth signal so that the public channel is not affected by the stealth signal. The two signals cannot interfere with each other. The results of this study show that our proposed optical steganography system is highly secure. The stealth signal can be favorably hidden in the public channel when the average source power of the stealth signal, public noise, and public signal are −5, −3, and 0 dBm, respectively.


2018 ◽  
Vol 2 (2) ◽  
Author(s):  
Nusa Idaman Said

Water pollution problem caused by household waste water in the region of DKI Jakarta, and more made worse by affecting of expanding settlement area in buffer zone around Jakarta which without provided with waste water facilities, so that all waste water thrown to public channel and finally flowing  into river bodies in region of DKI Jakarta.To overcome the mentioned above Government of Province DKI Jakarta have released Regulation of Governor Province Special District Capital of Jakarta Number 122 Year 2005 About Management Of Domestic Water Waste In Province Special District Capital Of Jakarta. According To Regulation Of Governor of DKI Jakarta Number 122 Year 2005 Section 7 express that house building and non house building is obliged to manage domestic waste water before discharge to public channel or drainage. Planning of domestic waste water treatment installation which represent environmental utilities or building represent conditions in course of publication of Permit Directing Of Usage Of Land;Ground (SIPPT), Plan Arrange Situation Building ( RTLB), Permission Found Building (IMB), and awaking up of domestic waste water treatment installation represent conditions in course of publication of Permit of Building Usage (IPB) and Elegibility Use Building (KMB), and also licensing of operational of institution in charge related to such operational.  Kata Kunci : Air limbah domestik, air limbah rumah tangga, pengelolaan.


Sign in / Sign up

Export Citation Format

Share Document