Results 11 to 20 of about 3,112,769 (259)

Intermittency Reinjection in the Logistic Map [PDF]

open access: yesSymmetry, 2022
Just below a Period-3 window, the logistic map exhibits intermittency. Then, the third iterate of this map has been widely used to explain the chaotic intermittency concept. Much attention has been paid to describing the behavior around the vanished fixed points, the tangent bifurcation, and the formation of the characteristic channel between the map ...
Sergio Elaskar   +2 more
openaire   +3 more sources

Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home [PDF]

open access: goldIACR Cryptology ePrint Archive, 2022
The Internet of Things (IoT) has brought new ways for humans and machines to communicate with each other over the internet. Though sensor-driven devices have largely eased our everyday lives, most IoT infrastructures have been suffering from security ...
Ziaur Rahman   +4 more
openalex   +3 more sources

The Prediction of Compressive Strength and Compressive Stress-Strain of Basalt Fiber Reinforced High-Performance Concrete Using Classical Programming and Logistic Map Algorithm. [PDF]

open access: yesMaterials (Basel), 2022
In this research, the authors have developed an algorithm for predicting the compressive strength and compressive stress–strain curve of Basalt Fiber High-Performance Concrete (BFHPC), which is enhanced by a classical programming algorithm and Logistic ...
Hematibahar M   +4 more
europepmc   +2 more sources

An Image Encryption Algorithm Using Logistic Map with Plaintext-Related Parameter Values. [PDF]

open access: yesEntropy (Basel), 2021
This paper deals with a plaintext-related image encryption algorithm that modifies the parameter values used by the logistic map according to plain image pixel intensities. The parameter values are altered in a row-wise manner, which enables the usage of
Oravec J, Ovsenik L, Papaj J.
europepmc   +2 more sources

Periodicity Analysis of the Logistic Map over Ring ℤ3n [PDF]

open access: yesInternational Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2023
Periodicity analysis of sequences generated by a deterministic system is a long-standing challenge in both theoretical research and engineering applications.
Xiaoxiong Lu   +2 more
semanticscholar   +1 more source

An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations

open access: yesDe Computis, 2023
Confusion, diffusion, and encryption keys affect the quality of image encryption. This research proposes combining bit- and pixel-level permutation and substitution methods based on three advanced chaotic logistic map methods.
D. Setiadi, Nova Rijati
semanticscholar   +1 more source

Enhancing Image Encryption with the Kronecker xor Product, the Hill Cipher, and the Sigmoid Logistic Map

open access: yesApplied Sciences, 2023
In today’s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage.
Dani Elias Mfungo   +3 more
semanticscholar   +1 more source

Image encryption based on 2DNA encoding and chaotic 2D logistic map

open access: yesJournal of engineering and applied sciences, 2023
DNA has recently been investigated as a possible medium concerning ultra-compact information storage and ultra-scale computation. The development of secure image encryption systems has recently received a certain effective and new direction from chaos ...
Asmaa Hasan Alrubaie   +2 more
semanticscholar   +1 more source

Image encryption algorithm based on the density and 6D logistic map

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE), 2023
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons.
Abdullah A. Rashid, Khalid F. A. Hussein
semanticscholar   +1 more source

Application of DNA Coding, the Lorenz Differential Equations and a Variation of the Logistic Map in a Multi-Stage Cryptosystem

open access: yesSymmetry, 2022
The need for information security has become urgent due to the constantly changing nature of the Internet and wireless communications, as well as the daily generation of enormous volumes of multimedia.
Mohamed Gabr   +7 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy