Results 41 to 50 of about 120 (109)

FPGA Realization of a Novel Hyperchaos Augmented Image Encryption Algorithm

open access: yesIET Computers &Digital Techniques, Volume 2026, Issue 1, 2026.
With the rapid growth of multimedia communication, protecting image data has become increasingly critical. This article proposes a novel 3‐stage hyperchaos‐based augmented image encryption technique (3SHAIET) that utilizes a three‐stage process with chaotic systems of increasing dimensionality (e.g., six‐dimensional [6D], 8D, and 9D) to enhance ...
Wassim Alexan   +6 more
wiley   +1 more source

On a generalization for fibonacci quaternions

open access: yesChaos, Solitons & Fractals, 2017
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Halıcı, Serpil, Karataş, Adnan
openaire   +7 more sources

Device‐Independent Quantum Key Distribution: Protocols, Quantum Games and Security

open access: yesIET Quantum Communication, Volume 7, Issue 1, January/December 2026.
Device‐independent quantum key distribution (DIQKD) removes the need to trust internal device behaviour by certifying security through Bell‐inequality violations, thereby closing practical loopholes in conventional QKD. This paper systematically reviews DIQKD foundations (Bell tests and security definitions), protocol frameworks (CHSH‐based and ...
Syed M. Arslan   +3 more
wiley   +1 more source

Dual Proximal Groups Concisely Representing Complex Hosoya Triangles

open access: yesAdvances in Mathematical Physics, Volume 2026, Issue 1, 2026.
This paper introduces dual proximal groups (DPGs) that provide concise representation of complex Hosoya triangles (CHTs). An application is given in terms of the DPG representation of collections of Hosoya‐Hilbert circular triangles on modulated motion waveforms in sequences of video frames. MSC2020 Classification: 11B39,54E05,57S25.
Kübra Gül   +3 more
wiley   +1 more source

Multiloitering Munition Cooperative Surrounding and Attack Method Based on Wolf Pack Algorithm

open access: yesInternational Journal of Aerospace Engineering, Volume 2026, Issue 1, 2026.
Aiming at the optimization problem of multiloitering munitions cooperatively surrounding moving targets, this paper proposes a cooperative surrounding and attack method based on the wolf pack algorithm (WPA). Firstly, the relative kinematics model between the munitions and the target is established, and the cooperative surrounding task flow is analyzed
Zetian Zhang   +4 more
wiley   +1 more source

Copper ratio obtained by generalizing the Fibonacci sequence

open access: yesAIP Advances
In this study, we define a new generalization of the Fibonacci sequence that gives the copper ratio, and we will call it the copper Fibonacci sequence. In addition, inspired by the copper Fibonacci definition, we also define copper Lucas sequences, and ...
Engin Özkan, Hakan Akkuş
doaj   +1 more source

Nature‐Inspired Design Strategies for Efficient Atmospheric Water Harvesting

open access: yesAdvanced Materials, Volume 37, Issue 51, December 23, 2025.
This review presents advances in bioinspired atmospheric water harvesting systems, emphasizing how structural motifs such as wettability gradients, directional transport, and hierarchical porosity have been translated into engineered fog‐collection and vapor‐sorption strategies for enhanced water uptake, accelerated transport, and energy‐efficient ...
Yunchan Lee, Shouhong Fan, Shu Yang
wiley   +1 more source

Bicomplex k-Fibonacci quaternions

open access: yes, 2018
In this paper, bicomplex k-Fibonacci quaternions are defined. Also, some algebraic properties of bicomplex k-Fibonacci quaternions which are connected with bicomplex numbers and k-Fibonacci numbers are investigated. Furthermore, the Honsberger identity, the d'Ocagne's identity, Binet's formula, Cassini's identity, Catalan's identity for these ...
openaire   +2 more sources

(Random) Trees of Intermediate Volume Growth

open access: yesRandom Structures &Algorithms, Volume 67, Issue 4, December 2025.
ABSTRACT For every function g:ℝ≥0→ℝ≥0$$ g:{\mathbb{R}}_{\ge 0}\to {\mathbb{R}}_{\ge 0} $$ that grows at least linearly and at most exponentially, if it is sufficiently well‐behaved, we can construct a tree T$$ T $$ of uniform volume growth g$$ g $$, or more precisely, C1·g(r/4)≤|BG(v,r)|≤C2·g(4r),for allr≥0andv∈V(T),$$ {C}_1\cdotp g\left(r/4\right)\le \
George Kontogeorgiou, Martin Winter
wiley   +1 more source

Computational Homogenization in Three‐Dimensional Magnetostatics Using Empirically Corrected Cluster Cubature (E3C) Hyper‐Reduction

open access: yesInternational Journal for Numerical Methods in Engineering, Volume 126, Issue 22, 30 November 2025.
ABSTRACT The recently published hyper‐reduction method “Empirically Corrected Cluster Cubature” (E3C) is applied for the first time in three dimensions (here magnetostatics). The method is verified to give accurate results even for a small number of integration points, such as 15 for 3D microstructure simulations.
Hauke Goldbeck, Stephan Wulfinghoff
wiley   +1 more source

Home - About - Disclaimer - Privacy