4 research outputs found

    An Improved Computational Model for Adaptive Communication Channel Estimation

    Get PDF
    Channel estimation is an important and necessary function performed by modern wireless receivers. The goal of channel estimation is to measure the effects of the channel on known or partially known transmission. The usual practice in acquiring knowledge about a channel is to model the channel and then acquire the parameters involved in the model. This paper proposes a variable partial update model for adaptive communication channel estimation with a view to improving signal error at the receiver station. The proposed model is composed of finite impulse response transversal adaptive filter and least mean square adaptation algorithm. The performance of the proposed model was compared with the full update model. The evaluation results indicated that the proposed model performed better than the full update model in terms of computational complexity, memory load, and convergence rate

    Privacy enforcement on subscribers data in cloud computing

    Get PDF
    Data stored in the cloud are susceptible to an array of threats from hackers. This is because threats, hackers and unauthorized access are not supported by the cloud service providers as implied. This study improves user privacy in the cloud system, using privacy with non-trusted provider (PNTP) on software and platform as a service model. The subscribers encrypt the data using user’s personal Advanced Encryption Standard (AES) symmetric key algorithm and send the encrypted data to the storage pool of the Cloud Service Provider (CSP) via a secure socket layer. The AES performs a second encryption on the data sent to the cloud and generates for the subscriber a key that will be used for decryption of previously stored data. The encryption and decryption keys are managed by the key server and have been hardcoded into the PNTP system. The model was simulated using the Stanford University multimedia dataset and benchmarked with a Privacy with Trusted cloud Provider (PTP) model using encryption time, decryption time and efficiency (brute force hacking) as parameters. Results showed that it took a longer time to access the user files in PNTP than in the PTP system. The brute force hacking took a longer time (almost double) to access data stored on the PNTP system. This will give subscribers a high level of control over their data and increase the adoption of cloud computing by businesses and organizations with highly sensitive information
    corecore