Essays about: "integritet oberoende"

Showing result 1 - 5 of 6 essays containing the words integritet oberoende.

  1. 1. Personalized Federated Learning for mmWave Beam Prediction Using Non-IID Sub-6 GHz Channels

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yuan Cheng; [2022]
    Keywords : Personalized Federated Learning; Millimeter wave; Beamforming; DeepMIMO; Non-IID; Personaliserad Federad Inlärning; Millimetervågor; Strålformning; DeepMIMO; Icke-IID;

    Abstract : While it is difficult for base stations to estimate the millimeter wave (mmWave) channels and find the optimal mmWave beam for user equipments (UEs) quickly, the sub-6 GHz channels which are usually easier to obtain and more robust to blockages could be used to reduce the time before initial access and enhance the reliability of mmWave communication. Considering that the channel information is collected by a massive number of radio base stations and would be sensitive to privacy and security, Federated Learning (FL) is a match for this use case. READ MORE

  2. 2. An Open and Nonproprietary Decentralized Messaging Protocol : Operating Entirely on the Internet Computer Blockchain

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gabriel Ellebrink; [2022]
    Keywords : Messaging protocol; Decentralized; Blockchain; Smart contract; Internet computer; Dfinity; Meddelandeprotokoll; Decentraliserad; Blockkedja; Smarta kontrakt; Internet computer; Dfinity;

    Abstract : Even when end-to-end encryption is used in centralized messaging services, problems related to security, privacy, availability, and transparency remain. These problems can be avoided or reduced by using a decentralized architecture. READ MORE

  3. 3. Privacy leaks from deep linear networks : Information leak via shared gradients in federated learning systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Guangze Shi; [2022]
    Keywords : Federated learning; Gradient share; Deep neural network; Information leak; Privacy and security; Maskininlärning med flera noder; Gradientdelning; Djupt neuralt nätverk; Informationsläcka; Integritetssäkerhet;

    Abstract : The field of Artificial Intelligence (AI) has always faced two major challenges. The first is that data is kept scattered and cannot be collected for more efficiently use. The second is that data privacy and security need to be continuously strengthened. READ MORE

  4. 4. Puncturable Symmetric KEMs for Forward-Secret 0-RTT Key Exchange

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Matilda Backendal; [2019]
    Keywords : cryptography; cryptographic protocols; session resumption; forward secrecy; 0-RTT; TLS 1.3; puncturable PRFs; key encapsulation mechanisms; Technology and Engineering;

    Abstract : The latest version of the Transport Layer Security protocol (TLS 1.3) introduces a pre-shared key zero round-trip time (0-RTT) mode. This enables session resumption with no latency before the first application data can be sent, at the cost of losing forward secrecy and replay protection. READ MORE

  5. 5. Design of a fluid rotaryjoint prototype

    University essay from KTH/Maskinkonstruktion (Inst.)

    Author : Joakim Tänndal; [2014]
    Keywords : Rotary union; Rotary coupling; Flow loss; FRJ; RJ; Vätskeroterskarv; Vätskeroterstycke; Svivel; Roterstycke; Tryckförlust;

    Abstract : This thesis, which has been carried out at the department of research and development at Cobham Antenna Systems, comprises the development of a fluid rotary joint (FRJ) prototype and shall provide a thorough insight in relevant design aspects. Based on input parameters and objectives derived from an actual Cobham project, the possibility of manufacturing a fluid rotary joint in-house has been investigated. READ MORE