نتایج جستجو برای: multiple chaotic maps
تعداد نتایج: 879192 فیلتر نتایج به سال:
Recently, Pareek et al. proposed a symmetric key block cipher using multiple onedimensional chaotic maps. This paper reports some new findings on the security problems of this kind of chaotic cipher: 1) a number of weak keys exists; 2) some important intermediate data of the cipher are not sufficiently random; 3) the whole secret key can be broken by a known-plaintext attack with only 120 conse...
A simply supported Timoshenko beam with an intermediate backlash is considered. The beam equations of motion are obtained based on the Timoshenko beam theory by including the dynamic effect of a moving mass travelling along the vibrating path. The equations of motion are discretized by using the assumed modes technique and solved using the Runge–Kutta method. The analysis methods employed in...
In recent years, there has been growing interesting in image encryption based on chaotic maps and wavelet transform. In this paper, a novel scheme for image encryption based on chaotic maps and reversible integer wavelet transform is proposed. Firstly, the cipher key which is related to plain-image is used to generate different parameters and initial values of chaotic maps. Then the plain-image...
Synchronization between chaotic systems has recently been a topic of great interest among physicists and engineers. In addition to theoretical results, a number of applications in communications and control have also been proposed. We have previously shown that identical chaotic maps can, under certain conditions, be synchronized by a common noise-like input. This raises the question whether th...
Comparative Study on Single and Multiple Chaotic Maps Incorporated Grey Wolf Optimization Algorithms
In the recent world, security is a prime important issue, and encryption is one of the best alternative way to ensure security. More over, there are many image encryption schemes have been proposed, each one of them has its own strength and weakness. This paper presents a new algorithm for the image encryption/decryption scheme. This paper is devoted to provide a secured image encryption techni...
In this work, we only use data on the unstable manifold to locate partition boundaries by checking folding points at different levels, which practically coincide with homoclinic tangencies. The method is then applied classic two-dimensional Hénon map and a well-known three-dimensional map. Comparison previous results made in case, Lyapunov exponents are computed through metric entropy based sho...
GENERAL COMMENTARY article Front. Phys., 06 December 2022Sec. Interdisciplinary Physics Volume 10 - 2022 | https://doi.org/10.3389/fphy.2022.1094240
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید