An Iterative quantum chaotic security method design for big data deployments using a multi-model framework for key generation, threat modelling, and anomaly-resilient validation. [PDF]
Kotangale A, Kumar MS.
europepmc +1 more source
Statistical properties of chaotic dynamical systems which exhibit strange attractors
Roderick V. Jensen, C. Oberman
openalex +2 more sources
Chaotic Vibrations of Nonlinearly Supported Tubes in Crossflow [PDF]
Y. Cai, S. S. Chen
openalex +1 more source
Towards a Memristor‐Based Circuit Implementation of the Hindmarsh–Rose Model
A variability‐aware simulation of the memristively approximated Hindmarsh–Rose neuron model demonstrates robust circuit behavior using realistic RRAM device characteristics, offering practical design guidance for neuromorphic hardware. ABSTRACT The transition from idealized memristor models to physical implementations, such as resistive random access ...
Sebastian Jenderny +3 more
wiley +1 more source
Lie symmetry approach to the dynamical behavior and conservation laws of actin filament electrical models. [PDF]
Beenish, Samreen M, Alshammari FS.
europepmc +1 more source
Separatrix-map analysis of chaotic transport in planar periodic vortical flows [PDF]
Taehoon Ahn, Seunghwan Kim
openalex +1 more source
This study integrates sedimentological and ichnological data to reveal the depositional processes and environmental conditions of deep‐water muddy gravity flows in the Mobarak Formation. It highlights distinct ichnocoenoses and bioturbation patterns, offering insights into basin‐floor versus slope mudstones and their implications for hydrocarbon ...
Aram Bayet‐Goll +2 more
wiley +1 more source
Hybrid Cuckoo Search-Bees Algorithm with Memristive Chaotic Initialization for Cryptographically Strong S-Box Generation. [PDF]
Akyol S.
europepmc +1 more source
STRANGE ATTRACTOR AND CHAOTIC PHENOMENA IN NON-IDEAL MHD FLOW
Xiaogang Wang, Yue Liu, Qiu Xiaoming
openalex +1 more source

