Two-dimensional parametric polynomial chaotic system
When used in engineering applications, most existing chaotic systems may have many
disadvantages, including discontinuous chaotic parameter ranges, lack of robust chaos, and …
disadvantages, including discontinuous chaotic parameter ranges, lack of robust chaos, and …
Optical cryptosystem for visually meaningful encrypted images based on gyrator transform and Hénon map
A novel image encryption scheme generating visually meaningful encrypted images (VMEIs)
is presented based on the gyrator transform (GT) and the Hénon chaotic map. The optical …
is presented based on the gyrator transform (GT) and the Hénon chaotic map. The optical …
Compact optical asymmetric cryptosystem based on unequal modulus decomposition of multiple color images
In this paper, a silhouette-free and crosstalk-free multiple-color-image cryptosystem is
presented based on unequal modulus decomposition (UMD) in the gyrator transform (GT) …
presented based on unequal modulus decomposition (UMD) in the gyrator transform (GT) …
Highly efficient modified dual D-shaped PCF polarization filter
In this work, a highly efficient transverse-electric (TE) pass polarizer based on dual D-
shaped photonic crystal fiber (PCF) is designed and analyzed. The PCF birefringence …
shaped photonic crystal fiber (PCF) is designed and analyzed. The PCF birefringence …
Efficient secure NOMA schemes based on chaotic physical layer security for wireless networks
Non-orthogonal multiple access (NOMA) is considered by the 3GPP as a potential
technology for beyond 5G wireless networks to support massive connectivity with robust …
technology for beyond 5G wireless networks to support massive connectivity with robust …
Efficient and secure bit-level chaos security algorithm for orbital angular momentum modulation in free-space optical communications
Currently, secure multimedia applications are becoming a very hot research topic,
specifically over the Internet and wireless communication networks due to their rapid …
specifically over the Internet and wireless communication networks due to their rapid …
Chaos-based physical layer security in NOMA networks over Rician fading channels
Owing to its striking features, non-orthogonal multiple access (NOMA) is considered as a key
technique to realize the main goals of 5G and beyond like high reliability and user …
technique to realize the main goals of 5G and beyond like high reliability and user …
A universal method of chaos cascade and its applications
F Yuan, Y Li, G Wang - Chaos: An Interdisciplinary Journal of Nonlinear …, 2021 - pubs.aip.org
This paper proposes a universal method for a cascade chaotic system (CCS). CCSs may
own better performances, including larger maximum Lyapunov exponents, extended full …
own better performances, including larger maximum Lyapunov exponents, extended full …
Chaos-based secure power-domain NOMA for wireless applications
Non-orthogonal multiple access (NOMA) is considered as one of the key technologies to
achieve the main targets of 5G wireless networks such as high connectivity and reliability …
achieve the main targets of 5G wireless networks such as high connectivity and reliability …
Programmable Broadband Polarization-Preserving Optical Delay Line with Faraday Mirrors
We report a broadband optical delay line programmable for delays up to 1 with nanosecond
resolution, while preserving an arbitrary and unknown polarization state of the original light …
resolution, while preserving an arbitrary and unknown polarization state of the original light …