نتایج جستجو برای: chaotic factor
تعداد نتایج: 868435 فیلتر نتایج به سال:
fuzzy observer design with n-shift multiple key for cryptography based on 3d hyperchaotic oscillator
a fuzzy observer based scheme for synchronizing two hyperchaoticoscillators via a scalar transmitted signal for cryptographic application isproposed. the takagi-sugeno fuzzy model exactly represents chaotic systems.based on the general fuzzy model, the fuzzy observer of a chaotic system isdesigned on the basis of the n-shift multiple state based key encryption algorithm.the scalar transmitted s...
We present results from Lattice QCD calculations of the low-lying charmed-strange meson spectrum using two types of Clover-Wilson lattices. In addition to quark-antiquark interpolating fields we also consider meson-meson interpolators corresponding to D-meson kaon scattering states. To calculate the all-to-all propagation necessary for the backtracking loops we use the (stochastic) distillation...
This paper studies the security of a recently proposed chaos-based cryptosystem. It is shown that the encryption architecture of this cryptosystem possesses some important problems related to its implementation and its robustness against noise. Some security problems are also highlighted.
In this short note we discuss totally transitive maps. We show that all chaotic maps are not necessarily totally transitive, but there are chaotic maps with this property. Our discussion relates to symbol space Σ2 and real line.
This article introduces a new chaotic system of three-dimensional quadratic autonomous ordinary differential equations, which can display (i) two 1-scroll chaotic attractors simultaneously, with only three equilibria, and (ii) two 2-scroll chaotic attractors simultaneously, with five equilibria. Several issues such as some basic dynamical behaviors, routes to chaos, bifurcations, periodic windo...
Since 1989, many contributions have been devoted to the methods of using chaos to construct digital ciphers. Although some chaotic ciphers have been known insecure and several defects have been found, a large number of chaotic ciphers still remain secure till now. Furthermore, in the past few years, some novel chaotic ciphers have been proposed, which avoid some weaknesses in previous chaotic c...
This paper presents a secure digital communication system based on chaotic modulation, cryptography, and chaotic synchronization techniques. The proposed system consists of a Chaotic Modulator (CM), a Chaotic Secure Transmitter (CST), a Chaotic Secure Receiver (CSR) and a Chaotic Demodulator (CDM). The CM module incorporates a chaotic system and a novel Chaotic Differential Peaks Keying (CDPK) ...
in this paper, we investigate the chaotic behaviors of the fractional-order permanent magnet synchronous motor (pmsm) system. the necessary condition for the existence of chaos in the fractional-order pmsm system is deduced and an active controller is developed based on the stability theory for fractional systems. the presented control scheme is simple and flexible, and it is suitable both fo...
assigning a set of objects to groups such that objects in one group or cluster are more similar to each other than the other clusters’ objects is the main task of clustering analysis. sspco optimization algorithm is anew optimization algorithm that is inspired by the behavior of a type of bird called see-see partridge. one of the things that smart algorithms are applied to solve is the problem ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید