SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD38214 | Volume – 5 | Issue – 1 | November-December 2020 Page 1394
New Design Architecture of Chaotic Secure Communication
System Combined with Linear Receiver
Yeong-Jeu Sun
Professor, Department of Electrical Engineering, I-Shou University, Kaohsiung, Taiwan
ABSTRACT
In this paper, the exponential synchronization of secure communication
system is introducedanda novel securecommunication designcombinedwith
linear receiver is constructed to ensure the global exponential stability of the
resulting error signals. Besides, the guaranteed exponential convergence rate
of the proposed secure communication system can be correctly calculated.
Finally, some numerical simulations are offered to demonstrate the
correctness and feasibility of the obtained results.
KEYWORDS: Linear receiver, novel secure communication system, exponential
synchronization, Zhao’s hyperchaotic system
How to cite this paper: Yeong-Jeu Sun
"New Design Architecture of Chaotic
Secure Communication SystemCombined
with Linear Receiver" Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-5 | Issue-1,
December 2020,
pp.1394-1396, URL:
www.ijtsrd.com/papers/ijtsrd38214.pdf
Copyright © 2020 by author (s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
1. INTRODUCTION
Since the chaotic system has high sensitivity to initial
conditions and its output behavior is similar to random
signals, several kinds of chaotic systems have been widely
applied in various applications such as secure
communication, system identification, image encryption,
biological systems, chemical reactions, ecological systems,
and master-slave chaotic systems; see, for example, [1]-[9]
and the references therein.
Over the past decade, numerous secure communications
have been extensively explored; see, for instance,[8]andthe
references therein. Generally speaking, a secure
communication is composed of transmitter and receiver. In
particular, linear receiver has the advantages of low price
and easy implementation. Therefore, searching a lower-
dimensional linear receiver for the secure chaotic
communication system constitutes an important area for
practical control design.
In this paper, we will firstly proposenewdesignarchitecture
of secure communication system with linear receiver will be
constructed to ensure that the resulting error signals can
converge to zero in some exponential convergence rate. In
addition, the guaranteed exponential convergencerateofthe
proposed chaotic secure communication system can be
accurately estimated. Finally, some numerical simulations
are given to exhibit the capability and correctness of the
main results.
This paper is organized as follows. The problemformulation
and main results are presented in Section 2. Several
numerical simulations are given in Section 3 to illustrate the
main result. Finally, conclusions are made in Section 4.
Throughout this paper, n
ℜ denotes the n-dimensional
Euclideanspace, xxx T
⋅=: denotesthe Euclideannormof
the column vector x, and a denotes the absolute value of a
real number a.
2. PROBLEM FORMULATION AND MAIN RESULTS
In this paper, we constructed a new chaotic secure
communication system with a linear receiver and its block
diagram shown in Figure 1.
Transmitter:
( ) ( ) ( ),22111 txatxatx +=& (1a)
( ) ( ) ( ) ( )
( ) ( ),316
4524132
txtxa
txatxatxatx
+
++=&
(1b)
( ) ( ) ( ),2
18373 txatxatx +=& (1c)
( ) ( ) ( ) ( ),3210494 txtxatxatx +=& (1d)
( ) ( ) ( ),2211 txtxty αα += (1e)
( ) ( ) ( ) .0, ≥∀+= tthtxCt Thφ (1f)
Receiver:
( ) ( ) ,
2
2
12
2
1
11 y
a
tzaatz
αα
α
+







−=& (2a)
IJTSRD38214
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD38214 | Volume – 5 | Issue – 1 | November-December 2020 Page 1395
( ) ( ) ( ),
1
2
1
2
1
2 tytztz
αα
α
+
−
= (2b)
( ) ( ) ( ) ,0,1 ≥∀−= ttzCtth Rhφ (2c)
where ( ) ( ) ( ) ( ) ( )[ ] 14
4321: ×
ℜ∈=
T
txtxtxtxtx is the state
vector of transmitter, ( ) ℜ∈ty is the output of transmitter,
( ) ( ) ( )[ ] 12
21: ×
ℜ∈=
T
tztztz is the state vector of receiver,
[ ] 41
43 00 ×
ℜ∈= ααTC , [ ] 21
43
×
ℜ∈= ααRC , { }10,,2,1, L∈iai
are system’s parameters with 02 ≠a , { }4,3,2,1, ∈iiα are
custom parameters of communication system with
12
2
1
aa >
α
α
, ( )th is the information vector, and ( )th1 is the
signal recovered from ( )th . It is worth mentioning that the
Zhao’s chaotic system is the special case of the system (1)
with
,9.11,14,20 4321 −==−=−= aaaa (3a)
1,5.2,1,1 8765 =−=−== aaaa . (3b)
1.0,19.0,1 1098 −=== aaa . (3b)
Besides, it has been verified in [9] that the Lyapunov
exponent of Zhao’s hyperchaotic system is higher than that
of other well-known chaotic systems. Undoubtedly, a good
secure communication system means that we can recover
the message ( )th in the receiver system; i.e., the errorvector
( ) ( ) ( )ththte −= 1: can converge to zero in some sense.
Before presenting the main result, let us introduce a
definition which will be used in the main theorem.
Definition 1: The system (1) with (2) is called secure
communication system with exponential convergencetypeif
there are positive numbers k and α such that
( ) ( ) ( ) ( ) 0,exp: 1 ≥∀−≤−= ttkththte α .
In this case, the positive number α is called the exponential
convergence rate.
Now we present the main results for secure communication
system of (1) with (2).
Theorem 1: The system (1) with (2) is a secure
communication system with exponential convergence type.
Besides, the guaranted exponential convergence rateisgiven
by
12
2
1
aa −=
α
α
α .
Proof. Define
( ) ( ) ( )[ ]
( ) ( ) ( ) ( )[ ] .2
2211
21
ℜ∈−−=
=
T
T
tztxtztx
ttt ψψψ
(4)
Thus, from (1), (2), and (4), one has
( ) 1112
2
1
1111 αψ
α
α
ψ −=−







−−=−= zxaazx &&&
and ( ) .1
2
1
11
2
1
222 ψ
α
α
α
α
ψ
−
=−
−
=−= zxzx
It yields that
( ) ( )
( ) ( )




≥∀
−
=
=
−
−
.0,0
,0
1
2
1
2
11
tet
et
t
t
ψ
α
α
ψ
ψψ
α
α
(5)
It can be readily obtained that
( ) ( ) ( )
( ) ( ) ( ) ( )
( ) ( )
( ) ( )
( ) ( )
( ) ( ) ,0,00 1
2
41
13
2413
2413
2413
2413
1
≥∀








+≤
+≤
+=
++
−−−=
−=
−
te
tt
tt
txtx
ttztzt
ththte
t
hh
α
ψ
α
αα
ψα
ψαψα
ψαψα
αα
φααφ
in view of (1), (2), and (5). This completes the proof.
Remark 1: It should be pointed out that the proposed
receiver of (2) is linear and has dual advantages of low price
and easy implementation by electronic circuit.
Remark 2: It has been verified in [9] that the Lyapunov
exponent of Zhao’s chaotic system is higher than that of
other well-known hyperchaotic systems. The higher the
Lyapunov exponent, the greater the sensitivity of the
trajectory of the time-domain signal to the initial value; in
other words, the higher theLyapunovexponentofa dynamic
system, the more difficult it is to predict its trajectory.
3. NUMERICAL SIMULATIONS
Consider the novel secure communication system of (1)-(3)
with 4,3,1 4321 ==== αααα . By Theorem 1, the
synchronization of signals ( )th and ( )th1 for the proposed
secure communication (1)-(3) can be achieved with
guaranteed exponential converence rate 40=α . The real
message ( )th , the recoverd message ( )th1 , and the error
signal are depicted in Figure 2-Figure 4, respectively, which
clearly indicateds that the real message ( )th is recoved after
0.5 seconds.
4. CONCLUSION
In this paper, the exponential synchronization of secure
communication system has been introduced and a new
secure communication design combined with linear receiver
has been developed to guarantee the global exponential
stability of the resulting error signals. Meanwhile, the
guaranteed exponential convergence rate of the proposed
secure communication system can be correctly estimated.
Finally, some numerical simulations have been proposed to
show the effectiveness and feasibility of the obtained results.
ACKNOWLEDGEMENT
The author thanks the Ministry of Science and Technology of
Republic of China forsupportingthisworkundergrantMOST
109-2221-E-214-014. Besides, the authorisgrateful toChair
Professor Jer-Guang Hsieh for the useful comments.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD38214 | Volume – 5 | Issue – 1 | November-December 2020 Page 1396
REFERENCES
[1] Raymond S. T. Lee, “Chaotic type-2 transient-fuzzy
deep neuro-oscillatory network (CT2TFDNN) for
worldwide financial prediction,” IEEE Transactionson
Fuzzy Systems, vol. 28, pp. 731-745, 2020.
[2] W. Luo, H. Jin, H. Li, X. Fang, and R. Zhou, “Optimal
performance and application for firework algorithm
using a novel chaotic approach,” IEEE Access, vol. 8,
pp. 120798-120817, 2020.
[3] L. Zhou, F. Tan, and F. Yu, “A robust synchronization-
based chaotic secure communication scheme with
double-layered and multiple hybrid networks,” IEEE
Systems Journal, vol. 14, pp. 2508-2519, 2020.
[4] Y. Wang, Z. Li, and J. Sun, “Three-variable chaotic
oscillatory system based on DNA strand displacement
and its coupling combination synchronization,” IEEE
Transactions on NanoBioscience, vol. 19,pp.434-445,
2020.
[5] Z. Hua, Y. Zhang, and Y. Zhou, “Two-dimensional
modular chaotification system for improving chaos
complexity,” IEEE Transactions on Signal Processing,
vol. 68, pp. 1937-1949, 2020.
[6] Y. Huang, L. Huang, Y. Wang, Y. Peng, and F. Yu, “Shape
synchronization in driver-response of 4-D chaotic
system and its application in image encryption,” IEEE
Access, vol. 8, pp. 135308-135319, 2020.
[7] L. Zhang, Z. Chen, W. Rao, and Z. Wu, “Efficient and
secure non-coherent OFDM-basedoverlappedchaotic
chip position shift keying system: design and
performance analysis,” IEEE Transactions on Circuits
and Systems I: Regular Papers, vol. 67, pp. 309-321,
2020.
[8] S. Liu, N. Jiang, A. Zhao, Y. Zhang, and K. Qiu, “Secure
optical communication based on cluster chaos
synchronization in semiconductor lasers network,”
IEEE Access, vol. 8, pp. 11872-11879, 2020.
[9] Y. Zhao, C. Gao, J. Liu, and S. Dong, “A self-perturbed
pseudo-random sequence generator based on
hyperchaos,” Chaos, Solitons & Fractals, vol.4,pp.1-8,
2019.
[10] Yeong-Jeu Sun, “A Novel Design of Secure
Communication System with LinearReceiver,”Journal
of Multidisciplinary Engineering Science and
Technology, vol. 4, pp. 8541-8543, 2017.
channelchannel
( )tz
( )ty( )tx
( )thφ
( )th
+
+
( )th1
+
−
TC
RC
Figure 1: Secure-communication scheme ( ( )th is the
information vector and ( )th1 is the recovered vector).
0 2 4 6 8 10 12 14 16 18 20
-8
-6
-4
-2
0
2
4
6
8
10
t (sec.)
h(t)
Figure 2: Real message of ( )th described in the
transmitter of (1).
0 2 4 6 8 10 12 14 16 18 20
-8
-6
-4
-2
0
2
4
6
8
10
t (sec.)
h1(t)
Figure 3: Recoverd message of ( )th1 described in the
receiver of (2).
0 2 4 6 8 10 12 14 16 18 20
-1
-0.8
-0.6
-0.4
-0.2
0
0.2
0.4
t (sec.)
h1(t)-h(t)
Figure 4: Error signal of ( ) ( )thth −1 .

More Related Content

What's hot

IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET Journal
 
Reliability Improvement in Logic Circuit Stochastic Computation
Reliability Improvement in Logic Circuit Stochastic ComputationReliability Improvement in Logic Circuit Stochastic Computation
Reliability Improvement in Logic Circuit Stochastic ComputationWaqas Tariq
 
Hybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image SteganographyHybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image SteganographyIRJET Journal
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementIRJET Journal
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET Journal
 
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...IJNSA Journal
 
7 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-857 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-85Alexander Decker
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34Alexander Decker
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET Journal
 
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmImplementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmIOSR Journals
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...CSCJournals
 
Deep Convolutional Neural Network based Intrusion Detection System
Deep Convolutional Neural Network based Intrusion Detection SystemDeep Convolutional Neural Network based Intrusion Detection System
Deep Convolutional Neural Network based Intrusion Detection SystemSri Ram
 
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremRobust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremjournalBEEI
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...ijsc
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm witheSAT Publishing House
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...eSAT Journals
 

What's hot (20)

IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
Reliability Improvement in Logic Circuit Stochastic Computation
Reliability Improvement in Logic Circuit Stochastic ComputationReliability Improvement in Logic Circuit Stochastic Computation
Reliability Improvement in Logic Circuit Stochastic Computation
 
Hybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image SteganographyHybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image Steganography
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
 
7 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-857 rupali kasar_final paper--74-85
7 rupali kasar_final paper--74-85
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34
 
IRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data HidingIRJET- Encryption and Authentication of Image by using Data Hiding
IRJET- Encryption and Authentication of Image by using Data Hiding
 
5 1-10
5 1-105 1-10
5 1-10
 
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key AlgorithmImplementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
 
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...
 
Deep Convolutional Neural Network based Intrusion Detection System
Deep Convolutional Neural Network based Intrusion Detection SystemDeep Convolutional Neural Network based Intrusion Detection System
Deep Convolutional Neural Network based Intrusion Detection System
 
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder TheoremRobust Watermarking through Dual Band IWT and Chinese Remainder Theorem
Robust Watermarking through Dual Band IWT and Chinese Remainder Theorem
 
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...
 
An improved color image encryption algorithm with
An improved color image encryption algorithm withAn improved color image encryption algorithm with
An improved color image encryption algorithm with
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
 
An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...An improved color image encryption algorithm with pixel permutation and bit s...
An improved color image encryption algorithm with pixel permutation and bit s...
 
B280916
B280916B280916
B280916
 

Similar to New Design Architecture of Chaotic Secure Communication System Combined with Linear Receiver

A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...ijtsrd
 
Project 2: Baseband Data Communication
Project 2: Baseband Data CommunicationProject 2: Baseband Data Communication
Project 2: Baseband Data CommunicationDanish Bangash
 
Using petri net with inherent fuzzy in the recognition of ecg signals
Using petri net with inherent fuzzy in the recognition of ecg signalsUsing petri net with inherent fuzzy in the recognition of ecg signals
Using petri net with inherent fuzzy in the recognition of ecg signalsIAEME Publication
 
IRJET- Performance Estimation of FIR Filter using Null Convention Logic
IRJET-  	  Performance Estimation of FIR Filter using Null Convention LogicIRJET-  	  Performance Estimation of FIR Filter using Null Convention Logic
IRJET- Performance Estimation of FIR Filter using Null Convention LogicIRJET Journal
 
IRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary LogicIRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary LogicIRJET Journal
 
Event triggered control design of linear networked systems with quantizations
Event triggered control design of linear networked systems with quantizationsEvent triggered control design of linear networked systems with quantizations
Event triggered control design of linear networked systems with quantizationsISA Interchange
 
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...IJECEIAES
 
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...IRJET Journal
 
Exponential State Observer Design for a Class of Uncertain Chaotic and Non-Ch...
Exponential State Observer Design for a Class of Uncertain Chaotic and Non-Ch...Exponential State Observer Design for a Class of Uncertain Chaotic and Non-Ch...
Exponential State Observer Design for a Class of Uncertain Chaotic and Non-Ch...ijtsrd
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...nooriasukmaningtyas
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm foreSAT Publishing House
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioIJECEIAES
 
An approach to Measure Transition Density of Binary Sequences for X-filling b...
An approach to Measure Transition Density of Binary Sequences for X-filling b...An approach to Measure Transition Density of Binary Sequences for X-filling b...
An approach to Measure Transition Density of Binary Sequences for X-filling b...IJECEIAES
 
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...ijwmn
 
DCE: A NOVEL DELAY CORRELATION MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE REAL...
DCE: A NOVEL DELAY CORRELATION  MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE  REAL...DCE: A NOVEL DELAY CORRELATION  MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE  REAL...
DCE: A NOVEL DELAY CORRELATION MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE REAL...ijdpsjournal
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
 
Foundation and Synchronization of the Dynamic Output Dual Systems
Foundation and Synchronization of the Dynamic Output Dual SystemsFoundation and Synchronization of the Dynamic Output Dual Systems
Foundation and Synchronization of the Dynamic Output Dual Systemsijtsrd
 
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI ImplementationBelief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementationinventionjournals
 
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...ijtsrd
 

Similar to New Design Architecture of Chaotic Secure Communication System Combined with Linear Receiver (20)

A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...
 
Project 2: Baseband Data Communication
Project 2: Baseband Data CommunicationProject 2: Baseband Data Communication
Project 2: Baseband Data Communication
 
Using petri net with inherent fuzzy in the recognition of ecg signals
Using petri net with inherent fuzzy in the recognition of ecg signalsUsing petri net with inherent fuzzy in the recognition of ecg signals
Using petri net with inherent fuzzy in the recognition of ecg signals
 
IRJET- Performance Estimation of FIR Filter using Null Convention Logic
IRJET-  	  Performance Estimation of FIR Filter using Null Convention LogicIRJET-  	  Performance Estimation of FIR Filter using Null Convention Logic
IRJET- Performance Estimation of FIR Filter using Null Convention Logic
 
IRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary LogicIRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary Logic
 
Event triggered control design of linear networked systems with quantizations
Event triggered control design of linear networked systems with quantizationsEvent triggered control design of linear networked systems with quantizations
Event triggered control design of linear networked systems with quantizations
 
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
 
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
IRJET- Artificial Neural Network Algorithm for Acoustic Echo Cancellation App...
 
Exponential State Observer Design for a Class of Uncertain Chaotic and Non-Ch...
Exponential State Observer Design for a Class of Uncertain Chaotic and Non-Ch...Exponential State Observer Design for a Class of Uncertain Chaotic and Non-Ch...
Exponential State Observer Design for a Class of Uncertain Chaotic and Non-Ch...
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm for
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
 
An approach to Measure Transition Density of Binary Sequences for X-filling b...
An approach to Measure Transition Density of Binary Sequences for X-filling b...An approach to Measure Transition Density of Binary Sequences for X-filling b...
An approach to Measure Transition Density of Binary Sequences for X-filling b...
 
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
 
Journal_IJABME
Journal_IJABMEJournal_IJABME
Journal_IJABME
 
DCE: A NOVEL DELAY CORRELATION MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE REAL...
DCE: A NOVEL DELAY CORRELATION  MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE  REAL...DCE: A NOVEL DELAY CORRELATION  MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE  REAL...
DCE: A NOVEL DELAY CORRELATION MEASUREMENT FOR TOMOGRAPHY WITH PASSIVE REAL...
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
Foundation and Synchronization of the Dynamic Output Dual Systems
Foundation and Synchronization of the Dynamic Output Dual SystemsFoundation and Synchronization of the Dynamic Output Dual Systems
Foundation and Synchronization of the Dynamic Output Dual Systems
 
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI ImplementationBelief Propagation Decoder for LDPC Codes Based on VLSI Implementation
Belief Propagation Decoder for LDPC Codes Based on VLSI Implementation
 
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...
An Exponential Observer Design for a Class of Chaotic Systems with Exponentia...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

New Design Architecture of Chaotic Secure Communication System Combined with Linear Receiver

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 1, November-December 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD38214 | Volume – 5 | Issue – 1 | November-December 2020 Page 1394 New Design Architecture of Chaotic Secure Communication System Combined with Linear Receiver Yeong-Jeu Sun Professor, Department of Electrical Engineering, I-Shou University, Kaohsiung, Taiwan ABSTRACT In this paper, the exponential synchronization of secure communication system is introducedanda novel securecommunication designcombinedwith linear receiver is constructed to ensure the global exponential stability of the resulting error signals. Besides, the guaranteed exponential convergence rate of the proposed secure communication system can be correctly calculated. Finally, some numerical simulations are offered to demonstrate the correctness and feasibility of the obtained results. KEYWORDS: Linear receiver, novel secure communication system, exponential synchronization, Zhao’s hyperchaotic system How to cite this paper: Yeong-Jeu Sun "New Design Architecture of Chaotic Secure Communication SystemCombined with Linear Receiver" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1, December 2020, pp.1394-1396, URL: www.ijtsrd.com/papers/ijtsrd38214.pdf Copyright © 2020 by author (s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) 1. INTRODUCTION Since the chaotic system has high sensitivity to initial conditions and its output behavior is similar to random signals, several kinds of chaotic systems have been widely applied in various applications such as secure communication, system identification, image encryption, biological systems, chemical reactions, ecological systems, and master-slave chaotic systems; see, for example, [1]-[9] and the references therein. Over the past decade, numerous secure communications have been extensively explored; see, for instance,[8]andthe references therein. Generally speaking, a secure communication is composed of transmitter and receiver. In particular, linear receiver has the advantages of low price and easy implementation. Therefore, searching a lower- dimensional linear receiver for the secure chaotic communication system constitutes an important area for practical control design. In this paper, we will firstly proposenewdesignarchitecture of secure communication system with linear receiver will be constructed to ensure that the resulting error signals can converge to zero in some exponential convergence rate. In addition, the guaranteed exponential convergencerateofthe proposed chaotic secure communication system can be accurately estimated. Finally, some numerical simulations are given to exhibit the capability and correctness of the main results. This paper is organized as follows. The problemformulation and main results are presented in Section 2. Several numerical simulations are given in Section 3 to illustrate the main result. Finally, conclusions are made in Section 4. Throughout this paper, n ℜ denotes the n-dimensional Euclideanspace, xxx T ⋅=: denotesthe Euclideannormof the column vector x, and a denotes the absolute value of a real number a. 2. PROBLEM FORMULATION AND MAIN RESULTS In this paper, we constructed a new chaotic secure communication system with a linear receiver and its block diagram shown in Figure 1. Transmitter: ( ) ( ) ( ),22111 txatxatx +=& (1a) ( ) ( ) ( ) ( ) ( ) ( ),316 4524132 txtxa txatxatxatx + ++=& (1b) ( ) ( ) ( ),2 18373 txatxatx +=& (1c) ( ) ( ) ( ) ( ),3210494 txtxatxatx +=& (1d) ( ) ( ) ( ),2211 txtxty αα += (1e) ( ) ( ) ( ) .0, ≥∀+= tthtxCt Thφ (1f) Receiver: ( ) ( ) , 2 2 12 2 1 11 y a tzaatz αα α +        −=& (2a) IJTSRD38214
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD38214 | Volume – 5 | Issue – 1 | November-December 2020 Page 1395 ( ) ( ) ( ), 1 2 1 2 1 2 tytztz αα α + − = (2b) ( ) ( ) ( ) ,0,1 ≥∀−= ttzCtth Rhφ (2c) where ( ) ( ) ( ) ( ) ( )[ ] 14 4321: × ℜ∈= T txtxtxtxtx is the state vector of transmitter, ( ) ℜ∈ty is the output of transmitter, ( ) ( ) ( )[ ] 12 21: × ℜ∈= T tztztz is the state vector of receiver, [ ] 41 43 00 × ℜ∈= ααTC , [ ] 21 43 × ℜ∈= ααRC , { }10,,2,1, L∈iai are system’s parameters with 02 ≠a , { }4,3,2,1, ∈iiα are custom parameters of communication system with 12 2 1 aa > α α , ( )th is the information vector, and ( )th1 is the signal recovered from ( )th . It is worth mentioning that the Zhao’s chaotic system is the special case of the system (1) with ,9.11,14,20 4321 −==−=−= aaaa (3a) 1,5.2,1,1 8765 =−=−== aaaa . (3b) 1.0,19.0,1 1098 −=== aaa . (3b) Besides, it has been verified in [9] that the Lyapunov exponent of Zhao’s hyperchaotic system is higher than that of other well-known chaotic systems. Undoubtedly, a good secure communication system means that we can recover the message ( )th in the receiver system; i.e., the errorvector ( ) ( ) ( )ththte −= 1: can converge to zero in some sense. Before presenting the main result, let us introduce a definition which will be used in the main theorem. Definition 1: The system (1) with (2) is called secure communication system with exponential convergencetypeif there are positive numbers k and α such that ( ) ( ) ( ) ( ) 0,exp: 1 ≥∀−≤−= ttkththte α . In this case, the positive number α is called the exponential convergence rate. Now we present the main results for secure communication system of (1) with (2). Theorem 1: The system (1) with (2) is a secure communication system with exponential convergence type. Besides, the guaranted exponential convergence rateisgiven by 12 2 1 aa −= α α α . Proof. Define ( ) ( ) ( )[ ] ( ) ( ) ( ) ( )[ ] .2 2211 21 ℜ∈−−= = T T tztxtztx ttt ψψψ (4) Thus, from (1), (2), and (4), one has ( ) 1112 2 1 1111 αψ α α ψ −=−        −−=−= zxaazx &&& and ( ) .1 2 1 11 2 1 222 ψ α α α α ψ − =− − =−= zxzx It yields that ( ) ( ) ( ) ( )     ≥∀ − = = − − .0,0 ,0 1 2 1 2 11 tet et t t ψ α α ψ ψψ α α (5) It can be readily obtained that ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ,0,00 1 2 41 13 2413 2413 2413 2413 1 ≥∀         +≤ +≤ += ++ −−−= −= − te tt tt txtx ttztzt ththte t hh α ψ α αα ψα ψαψα ψαψα αα φααφ in view of (1), (2), and (5). This completes the proof. Remark 1: It should be pointed out that the proposed receiver of (2) is linear and has dual advantages of low price and easy implementation by electronic circuit. Remark 2: It has been verified in [9] that the Lyapunov exponent of Zhao’s chaotic system is higher than that of other well-known hyperchaotic systems. The higher the Lyapunov exponent, the greater the sensitivity of the trajectory of the time-domain signal to the initial value; in other words, the higher theLyapunovexponentofa dynamic system, the more difficult it is to predict its trajectory. 3. NUMERICAL SIMULATIONS Consider the novel secure communication system of (1)-(3) with 4,3,1 4321 ==== αααα . By Theorem 1, the synchronization of signals ( )th and ( )th1 for the proposed secure communication (1)-(3) can be achieved with guaranteed exponential converence rate 40=α . The real message ( )th , the recoverd message ( )th1 , and the error signal are depicted in Figure 2-Figure 4, respectively, which clearly indicateds that the real message ( )th is recoved after 0.5 seconds. 4. CONCLUSION In this paper, the exponential synchronization of secure communication system has been introduced and a new secure communication design combined with linear receiver has been developed to guarantee the global exponential stability of the resulting error signals. Meanwhile, the guaranteed exponential convergence rate of the proposed secure communication system can be correctly estimated. Finally, some numerical simulations have been proposed to show the effectiveness and feasibility of the obtained results. ACKNOWLEDGEMENT The author thanks the Ministry of Science and Technology of Republic of China forsupportingthisworkundergrantMOST 109-2221-E-214-014. Besides, the authorisgrateful toChair Professor Jer-Guang Hsieh for the useful comments.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD38214 | Volume – 5 | Issue – 1 | November-December 2020 Page 1396 REFERENCES [1] Raymond S. T. Lee, “Chaotic type-2 transient-fuzzy deep neuro-oscillatory network (CT2TFDNN) for worldwide financial prediction,” IEEE Transactionson Fuzzy Systems, vol. 28, pp. 731-745, 2020. [2] W. Luo, H. Jin, H. Li, X. Fang, and R. Zhou, “Optimal performance and application for firework algorithm using a novel chaotic approach,” IEEE Access, vol. 8, pp. 120798-120817, 2020. [3] L. Zhou, F. Tan, and F. Yu, “A robust synchronization- based chaotic secure communication scheme with double-layered and multiple hybrid networks,” IEEE Systems Journal, vol. 14, pp. 2508-2519, 2020. [4] Y. Wang, Z. Li, and J. Sun, “Three-variable chaotic oscillatory system based on DNA strand displacement and its coupling combination synchronization,” IEEE Transactions on NanoBioscience, vol. 19,pp.434-445, 2020. [5] Z. Hua, Y. Zhang, and Y. Zhou, “Two-dimensional modular chaotification system for improving chaos complexity,” IEEE Transactions on Signal Processing, vol. 68, pp. 1937-1949, 2020. [6] Y. Huang, L. Huang, Y. Wang, Y. Peng, and F. Yu, “Shape synchronization in driver-response of 4-D chaotic system and its application in image encryption,” IEEE Access, vol. 8, pp. 135308-135319, 2020. [7] L. Zhang, Z. Chen, W. Rao, and Z. Wu, “Efficient and secure non-coherent OFDM-basedoverlappedchaotic chip position shift keying system: design and performance analysis,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 67, pp. 309-321, 2020. [8] S. Liu, N. Jiang, A. Zhao, Y. Zhang, and K. Qiu, “Secure optical communication based on cluster chaos synchronization in semiconductor lasers network,” IEEE Access, vol. 8, pp. 11872-11879, 2020. [9] Y. Zhao, C. Gao, J. Liu, and S. Dong, “A self-perturbed pseudo-random sequence generator based on hyperchaos,” Chaos, Solitons & Fractals, vol.4,pp.1-8, 2019. [10] Yeong-Jeu Sun, “A Novel Design of Secure Communication System with LinearReceiver,”Journal of Multidisciplinary Engineering Science and Technology, vol. 4, pp. 8541-8543, 2017. channelchannel ( )tz ( )ty( )tx ( )thφ ( )th + + ( )th1 + − TC RC Figure 1: Secure-communication scheme ( ( )th is the information vector and ( )th1 is the recovered vector). 0 2 4 6 8 10 12 14 16 18 20 -8 -6 -4 -2 0 2 4 6 8 10 t (sec.) h(t) Figure 2: Real message of ( )th described in the transmitter of (1). 0 2 4 6 8 10 12 14 16 18 20 -8 -6 -4 -2 0 2 4 6 8 10 t (sec.) h1(t) Figure 3: Recoverd message of ( )th1 described in the receiver of (2). 0 2 4 6 8 10 12 14 16 18 20 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 t (sec.) h1(t)-h(t) Figure 4: Error signal of ( ) ( )thth −1 .