Results 11 to 20 of about 128,875 (269)

Dynamic properties of the dynamical system SFnm(X), SFnm(f))

open access: yesApplied General Topology, 2020
Let X be a continuum and let n be a positive integer. We consider the hyperspaces Fn(X) and SFn(X). If m is an integer such that n > m ≥ 1, we consider the quotient space SFnm(X). For a given map f : X → X, we consider the induced maps Fn(f) : Fn(X) → Fn(
Franco Barragán   +2 more
doaj   +1 more source

Secure medical image transmission using deep neural network in e‐health applications

open access: yesHealthcare Technology Letters, 2023
Recently, medical technologies have developed, and the diagnosis of diseases through medical images has become very important. Medical images often pass through the branches of the network from one end to the other. Hence, high‐level security is required.
Ala Abdulsalam Alarood   +4 more
doaj   +1 more source

A Study on the Application of Henon with a Case Study of Ecology [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2004
This paper deals with the well known Henon map. Its main properties are studied as well as a non deterministic form. Least squares estimates of parameters of the non deterministic model are driven and a case study from animal ecology is studied, where ...
Basil Al-Khayat, Inaam Abd
doaj   +1 more source

A chaotic circuit based on Knowm memristor: modeling, analysis, and experimental verification

open access: yesShenzhen Daxue xuebao. Ligong ban, 2023
Previous research on memristors and their chaotic applications has mainly focused on the use of memristor emulators, with little research on constructing the chaotic circuit using real memristors.
WANG Faqiang
doaj   +1 more source

ON EQUIVALENCE OF LINEAR CONTROL SYSTEMS AND ITS USAGE TO VERIFICATION OF THE ADEQUACY OF DIFFERENT MODELS FOR A REAL DYNAMIC PROCESS

open access: yesJournal of Optimization, Differential Equations and Their Applications, 2020
A problem of description of algebraic invariants for a linear control system that determine its structure is considered. With the help of these invariants, the equivalence problem of two linear time-invariant control systems with respect to actions of ...
Vasiliy Ye. Belozyorov   +2 more
doaj   +1 more source

Encryption and Hiding Watermarking Using A Chaotic Modified Wavelet Transform [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics, 2011
In this letter, a new digital watermarking algorithm is proposed to hide binary image watermark inside gray image to increase authentication and robustness, DWT are used in embedding because it has many features in image processing.
Shaimaa Mohammad
doaj   +1 more source

IBGJO: Improved Binary Golden Jackal Optimization with Chaotic Tent Map and Cosine Similarity for Feature Selection

open access: yesEntropy, 2023
Feature selection is a crucial process in machine learning and data mining that identifies the most pertinent and valuable features in a dataset. It enhances the efficacy and precision of predictive models by efficiently reducing the number of features ...
Kunpeng Zhang   +4 more
doaj   +1 more source

Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map

open access: yesJournal of Sensor and Actuator Networks, 2023
In recent years, there has been an increasing interest in employing chaotic-based random number generators for cryptographic purposes. However, many of these generators produce sequences that lack the necessary strength for cryptographic systems, such as
Ahmad Al-Daraiseh   +5 more
doaj   +1 more source

Random Matrix Theory Analysis of a Temperature-Related Transformation in Statistics of Fano–Feshbach Resonances in Thulium Atoms

open access: yesEntropy, 2020
Recently, the transformation from random to chaotic behavior in the statistics of Fano–Feshbach resonances was observed in thulium atoms with rising ensemble temperature.
Emil T. Davletov   +4 more
doaj   +1 more source

A Clustering Approach by SSPCO Optimization Algorithm Based on Chaotic Initial Population [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2016
Assigning a set of objects to groups such that objects in one group or cluster are more similar to each other than the other clusters’ objects is the main task of clustering analysis.
R. Omidvar, H. Parvin, A. Eskandari
doaj   +1 more source

Home - About - Disclaimer - Privacy