Results 21 to 30 of about 315,081 (269)

Visualizing the logistic map with a microcontroller [PDF]

open access: yes, 2011
The logistic map is one of the simplest nonlinear dynamical systems that clearly exhibit the route to chaos. In this paper, we explored the evolution of the logistic map using an open-source microcontroller connected to an array of light emitting diodes (
  +8 more
core   +1 more source

An Efficient Chaos-Based Image Encryption Technique Using Bitplane Decay and Genetic Operators

open access: yesSensors, 2022
Social networks have greatly expanded in the last ten years the need for sharing multimedia data. However, on open networks such as the Internet, where security is frequently compromised, it is simple for eavesdroppers to approach the actual contents ...
Ramesh Premkumar   +2 more
doaj   +1 more source

Chaos From Switched-Capacitor Circuits: Discrete Maps [PDF]

open access: yes, 1987
A special-purpose analog computer made of switched-capacitor circuits is presented for analyzing chaos and bifurcation phenomena in nonlinear discrete dynamical systems modeled by discrete maps *n + t = fan)-Experimental results are given for four ...
Huertas Díaz, José Luis   +3 more
core   +1 more source

Complex dynamics of a family Cubic-Logistic map [PDF]

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics
In [1] , we introduce a new family of the Logistic map, namely the cubic logistic maps L= {L_λ (x)=λx^2 (1-x):λ>0,x∈R}. In this work we study the complex dynamics of this family i.e.
baraa ahmed, Salma Muslih Farris
doaj   +1 more source

Energy and the Macrodynamics of Agrarian Societies

open access: yesLand, 2023
For the present work, we utilized Leslie White’s anthropological theory of cultural evolutionism as a theoretical benchmark for econometrically assessing the macrodynamics of energy use in agrarian societies that constituted the human civilization’s ...
Georgios Karakatsanis, Nikos Mamassis
doaj   +1 more source

A Maximum Entropy-Based Chaotic Time-Variant Fragile Watermarking Scheme for Image Tampering Detection

open access: yesEntropy, 2013
The fragile watermarking technique is used to protect intellectual property rights while also providing security and rigorous protection. In order to protect the copyright of the creators, it can be implanted in some representative text or totem. Because
Guo-Jheng Yang   +2 more
doaj   +1 more source

Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]

open access: yes, 2009
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo   +3 more
core   +2 more sources

Secure Image Encryption Using Chaotic, Hybrid Chaotic and Block Cipher Approach

open access: yesJournal of Imaging, 2022
Secure image transmission is one of the most challenging problems in the age of communication technology. Millions of people use and transfer images for either personal or commercial purposes over the internet.
Nirmal Chaudhary   +2 more
doaj   +1 more source

Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]

open access: yesEngineering and Technology Journal, 2019
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj   +1 more source

Logistic Map Potentials

open access: yes, 2010
We develop and illustrate methods to compute all single particle potentials that underlie the logistic map, x --> sx(1-x) for ...
Andrzej Veitia   +11 more
core   +1 more source

Home - About - Disclaimer - Privacy