Results 11 to 20 of about 3,112,769 (259)
Intermittency Reinjection in the Logistic Map [PDF]
Just below a Period-3 window, the logistic map exhibits intermittency. Then, the third iterate of this map has been widely used to explain the chaotic intermittency concept. Much attention has been paid to describing the behavior around the vanished fixed points, the tangent bifurcation, and the formation of the characteristic channel between the map ...
Sergio Elaskar +2 more
openaire +3 more sources
Enhancing AES Using Chaos and Logistic Map-Based Key Generation Technique for Securing IoT-Based Smart Home [PDF]
The Internet of Things (IoT) has brought new ways for humans and machines to communicate with each other over the internet. Though sensor-driven devices have largely eased our everyday lives, most IoT infrastructures have been suffering from security ...
Ziaur Rahman +4 more
openalex +3 more sources
The Prediction of Compressive Strength and Compressive Stress-Strain of Basalt Fiber Reinforced High-Performance Concrete Using Classical Programming and Logistic Map Algorithm. [PDF]
In this research, the authors have developed an algorithm for predicting the compressive strength and compressive stress–strain curve of Basalt Fiber High-Performance Concrete (BFHPC), which is enhanced by a classical programming algorithm and Logistic ...
Hematibahar M +4 more
europepmc +2 more sources
An Image Encryption Algorithm Using Logistic Map with Plaintext-Related Parameter Values. [PDF]
This paper deals with a plaintext-related image encryption algorithm that modifies the parameter values used by the logistic map according to plain image pixel intensities. The parameter values are altered in a row-wise manner, which enables the usage of
Oravec J, Ovsenik L, Papaj J.
europepmc +2 more sources
Periodicity Analysis of the Logistic Map over Ring ℤ3n [PDF]
Periodicity analysis of sequences generated by a deterministic system is a long-standing challenge in both theoretical research and engineering applications.
Xiaoxiong Lu +2 more
semanticscholar +1 more source
Confusion, diffusion, and encryption keys affect the quality of image encryption. This research proposes combining bit- and pixel-level permutation and substitution methods based on three advanced chaotic logistic map methods.
D. Setiadi, Nova Rijati
semanticscholar +1 more source
In today’s digital age, it is crucial to secure the flow of information to protect data and information from being hacked during transmission or storage.
Dani Elias Mfungo +3 more
semanticscholar +1 more source
Image encryption based on 2DNA encoding and chaotic 2D logistic map
DNA has recently been investigated as a possible medium concerning ultra-compact information storage and ultra-scale computation. The development of secure image encryption systems has recently received a certain effective and new direction from chaos ...
Asmaa Hasan Alrubaie +2 more
semanticscholar +1 more source
Image encryption algorithm based on the density and 6D logistic map
One of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons.
Abdullah A. Rashid, Khalid F. A. Hussein
semanticscholar +1 more source
The need for information security has become urgent due to the constantly changing nature of the Internet and wireless communications, as well as the daily generation of enormous volumes of multimedia.
Mohamed Gabr +7 more
semanticscholar +1 more source

