New Design Architecture of Chaotic Secure Communication System Combined with Linear Receiver
Journal Title: International Journal of Trend in Scientific Research and Development - Year 2020, Vol 5, Issue 1
Abstract
In this paper, the exponential synchronization of secure communication system is introduced and a novel secure communication design combined with linear receiver is constructed to ensure the global exponential stability of the resulting error signals. Besides, the guaranteed exponential convergence rate of the proposed secure communication system can be correctly calculated. Finally, some numerical simulations are offered to demonstrate the correctness and feasibility of the obtained results. Yeong-Jeu Sun "New Design Architecture of Chaotic Secure Communication System Combined with Linear Receiver" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38214.pdf Paper URL : https://www.ijtsrd.com/engineering/electrical-engineering/38214/new-design-architecture-of-chaotic-secure-communication-system-combined-with-linear-receiver/yeongjeu-sun
Authors and Affiliations
Yeong-Jeu Sun
Design and Construction of a 0.75KVA Inverter Power Supply for Nigerian Homes and Offices
Over the years, there have been a gradual increase in the electricity generation capacity of Nigeria, with more gas power plants installed between 1999 2003 to augment power supply from the existing hydro and thermal pow...
Analysis of the Agriculture and Industrial Segment
In this research the researcher told about the farmers of the India and the position of the farmers in India, the agriculture sector in India. The position of the agriculture sector in 19th century and before the 19th ce...
Cashless Policy and Financial Performance of Deposit Money Banks in Nigeria
The study investigated the effect of Central Bank of Nigeria Cash less Policy and the Financial Performance of Deposit Money Banks in Nigeria. A panel data were collected from a sample of 14 banks covering 6 years spanni...
Comparative Study on Analysis and Design of Skew Bridge by STAAD and ETABS Software using Finite Element Method
Skew bridges are required to cross the drains at any angle other than normal. These can be helpful in making straight crossing or utilizing the available land where normal crossing are either impossible or not suitable....
A Study on Honeypots and Deceiving Attacker using Modern Honeypot Network
A honeypot is a widely used security control to capture and analyse malicious network traffic. The main goal of honeypot is to monitor and receive log data, which can later be used to prevent future attacks. It imitates...