منابع مشابه
Rossler Nonlinear Dynamical Machine for Cryptography Applications
In many of the cryptography applications like password or IP address encryption schemes, symmetric cryptography is useful. In these relatively simpler applications of cryptography, asymmetric cryptography is difficult to justify on account of the computational and implementation complexities associated with asymmetric cryptography. Symmetric schemes make use of a single shared key known only be...
متن کاملSymmetric key image encryption using chaotic Rossler system
In this article, an algorithm for encryption of digital image based on chaos theory is proposed. This encryption algorithm includes two main operations of image element shuffling and pixel replacement. The analysis of cryptographic strength (resistance attack) has been performed to confirm the fact. The results of several experimental tests, such as key space analysis, key sensitivity analysis,...
متن کاملAttractor networks.
An attractor network is a network of neurons with excitatory interconnections that can settle into a stable pattern of firing. This article shows how attractor networks in the cerebral cortex are important for long-term memory, short-term memory, attention, and decision making. The article then shows how the random firing of neurons can influence the stability of these networks by introducing s...
متن کاملAttractor Networks
Artificial neural networks (ANNs), sometimes referred to as connectionist networks, are computational models based loosely on the neural architecture of the brain. Over the past twenty years, ANNs have proven to be a fruitful framework for modeling many aspects of cognition, including perception, attention, learning and memory, language, and executive control. A particular type of ANN, called a...
متن کاملLocalist Attractor Networks
Attractor networks, which map an input space to a discrete output space, are useful for pattern completion--cleaning up noisy or missing input features. However, designing a net to have a given set of attractors is notoriously tricky; training procedures are CPU intensive and often produce spurious attractors and ill-conditioned attractor basins. These difficulties occur because each connection...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scholarpedia
سال: 2006
ISSN: 1941-6016
DOI: 10.4249/scholarpedia.1721