Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
2D hybrid chaos map for image security transform based on framelet and cellular automata
Y Khedmati, R Parvaz, Y Behroo - Information Sciences, 2020 - Elsevier
One of the most important data in the social networks is image, so improving the existing
methods can be essential to obtain a safe environment for transforming. In this paper, we …
methods can be essential to obtain a safe environment for transforming. In this paper, we …
Image steganography based on a new hybrid chaos map and discrete transforms
J Sharafi, Y Khedmati, MM Shabani - Optik, 2021 - Elsevier
With the development of Internet networks, the importance of information security is
becoming more and more significant. Therefore, it is considered necessary to study the …
becoming more and more significant. Therefore, it is considered necessary to study the …
Hybrid image encryption algorithm based on 3D chaotic system and choquet fuzzy integral
In this paper, a novel image encryption algorithm based on 3D hybrid chaotic system and
choquet fuzzy integral is introduced. To construct an algorithm with high sensitivity and least …
choquet fuzzy integral is introduced. To construct an algorithm with high sensitivity and least …
[HTML][HTML] Full Lyapunov exponents spectrum with Deep Learning from single-variable time series
C Mayora-Cebollero, A Mayora-Cebollero… - Physica D: Nonlinear …, 2025 - Elsevier
In this article we study if a Deep Learning technique can be used to obtain an approximate
value of the Lyapunov exponents of a dynamical system. Moreover, we want to know if …
value of the Lyapunov exponents of a dynamical system. Moreover, we want to know if …
Image encryption algorithm by fractional based chaotic system and framelet transform
M Zarebnia, R Parvaz - Chaos, Solitons & Fractals, 2021 - Elsevier
One of the most important tools used to create a secure environment for transmitting
information is the use of chaotic systems. In the present work, chaotic systems have been …
information is the use of chaotic systems. In the present work, chaotic systems have been …
A new 4D chaos system with an encryption algorithm for color and grayscale images
R Parvaz, YK Yengejeh, Y Behroo - International Journal of …, 2022 - World Scientific
In this paper, a new 4D chaos system is introduced based on the mathematical structure
through composing and transferring. The behavior of the proposed chaotic system is studied …
through composing and transferring. The behavior of the proposed chaotic system is studied …
Optimal location using genetic algorithms for chaotic image steganography technique based on discrete framelet transform
The development of network technology and its use have led society into the internet world
and communication through digital data. The ease of access to digital resources and the …
and communication through digital data. The ease of access to digital resources and the …
Dynamical 2D and 3D image encryption method by hybrid system based on cat map and wavelet transform
M Zarebnia, R Parvaz - Optik, 2020 - Elsevier
In this paper, a novel random sequence generator based on cat map and hybrid chaos
system is introduced. The features of the new system are investigated by various tests as …
system is introduced. The features of the new system are investigated by various tests as …
Fast Simulation and Chaos Investigation of a DC‐DC Boost Inverter
R Dhifaou, H Brahmi - Complexity, 2021 - Wiley Online Library
Intensive and repetitive simulations are required to study static and dynamic behaviours of
systems. Particular phenomena such as bifurcation and chaos require long simulation times …
systems. Particular phenomena such as bifurcation and chaos require long simulation times …
Implementation of a chaotic true random number generator based on fuzzy modeling
The present work demonstrates a new approach to design a chaos-based random number
generator, for high-security communications and cryptographic applications. In our …
generator, for high-security communications and cryptographic applications. In our …