Results 21 to 30 of about 315,081 (269)
Visualizing the logistic map with a microcontroller [PDF]
The logistic map is one of the simplest nonlinear dynamical systems that clearly exhibit the route to chaos. In this paper, we explored the evolution of the logistic map using an open-source microcontroller connected to an array of light emitting diodes (
+8 more
core +1 more source
An Efficient Chaos-Based Image Encryption Technique Using Bitplane Decay and Genetic Operators
Social networks have greatly expanded in the last ten years the need for sharing multimedia data. However, on open networks such as the Internet, where security is frequently compromised, it is simple for eavesdroppers to approach the actual contents ...
Ramesh Premkumar +2 more
doaj +1 more source
Chaos From Switched-Capacitor Circuits: Discrete Maps [PDF]
A special-purpose analog computer made of switched-capacitor circuits is presented for analyzing chaos and bifurcation phenomena in nonlinear discrete dynamical systems modeled by discrete maps *n + t = fan)-Experimental results are given for four ...
Huertas Díaz, José Luis +3 more
core +1 more source
Complex dynamics of a family Cubic-Logistic map [PDF]
In [1] , we introduce a new family of the Logistic map, namely the cubic logistic maps L= {L_λ (x)=λx^2 (1-x):λ>0,x∈R}. In this work we study the complex dynamics of this family i.e.
baraa ahmed, Salma Muslih Farris
doaj +1 more source
Energy and the Macrodynamics of Agrarian Societies
For the present work, we utilized Leslie White’s anthropological theory of cultural evolutionism as a theoretical benchmark for econometrically assessing the macrodynamics of energy use in agrarian societies that constituted the human civilization’s ...
Georgios Karakatsanis, Nikos Mamassis
doaj +1 more source
The fragile watermarking technique is used to protect intellectual property rights while also providing security and rigorous protection. In order to protect the copyright of the creators, it can be implanted in some representative text or totem. Because
Guo-Jheng Yang +2 more
doaj +1 more source
Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo +3 more
core +2 more sources
Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach
Secure image transmission is one of the most challenging problems in the age of communication technology. Millions of people use and transfer images for either personal or commercial purposes over the internet.
Nirmal Chaudhary +2 more
doaj +1 more source
Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj +1 more source
We develop and illustrate methods to compute all single particle potentials that underlie the logistic map, x --> sx(1-x) for ...
Andrzej Veitia +11 more
core +1 more source

