Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Chaos in the real world: Recent applications to communications, computing, distributed sensing, robotic motion, bio-impedance modelling and encryption …
G Grassi - Symmetry, 2021 - mdpi.com
Most of the papers published so far in literature have focused on the theoretical phenomena
underlying the formation of chaos, rather than on the investigation of potential applications of …
underlying the formation of chaos, rather than on the investigation of potential applications of …
Multi-scroll hidden attractor in memristive HR neuron model under electromagnetic radiation and its applications
This paper aims to propose a novel no-equilibrium Hindmarsh–Rose (HR) neuron model
with memristive electromagnetic radiation effect. Compared with other memristor-based HR …
with memristive electromagnetic radiation effect. Compared with other memristor-based HR …
Design of pseudo-random number generator from turbulence padded chaotic map
Transmission of the information in any form requires security. Security protocols used for
communication rely on the use of random numbers. Pseudo-random numbers are required …
communication rely on the use of random numbers. Pseudo-random numbers are required …
A simple chaotic model with complex chaotic behaviors and its hardware implementation
J Tang, Z Zhang, P Chen, Z Huang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recently, due to the initial sensitivity, ergodicity, boundedness, and unpredictability of
chaos, it has been widely used in the fields of secure communication, signal processing …
chaos, it has been widely used in the fields of secure communication, signal processing …
A novel image encryption scheme using chaotic maps and fuzzy numbers for secure transmission of information
DE Mfungo, X Fu, Y **an, X Wang - Applied Sciences, 2023 - mdpi.com
The complexity of chaotic systems, if used in information encryption, can determine the
status of security. The paper proposes a novel image encryption scheme that uses chaotic …
status of security. The paper proposes a novel image encryption scheme that uses chaotic …
An image encryption scheme proposed by modifying chaotic tent map using fuzzy numbers
Digital images play a crucial role in data communication through the internet or any mode,
but their security is a formidable task. Multiple image encryption approaches were …
but their security is a formidable task. Multiple image encryption approaches were …
Investigation of strength and security of pseudo random number generators
Security is a key factor in today's fast communicating world. Many cryptographic algorithms
are tested and put into use efficiently. Random numbers are used in diverse forms like …
are tested and put into use efficiently. Random numbers are used in diverse forms like …
A Chaos‐Based Image Encryption Scheme Is Proposed Using Multiple Chaotic Maps
Everybody wants to maintain solitariness to some extent or entirely in his dealings with other
people during different modes of communication. To retain privacy, researchers materialized …
people during different modes of communication. To retain privacy, researchers materialized …
[HTML][HTML] Hybrid chaotic-based PRNG for secure cryptography applications
This paper suggests a novel one-dimensional (1D) map to address the limitations of
traditional chaotic 1D maps. In contrast to traditional 1D maps, the proposed map has three …
traditional chaotic 1D maps. In contrast to traditional 1D maps, the proposed map has three …
A noise-tolerant cryptosystem based on the decomposition of bit-planes and the analysis of chaotic gauss iterated map
A Shafique - Neural Computing and Applications, 2022 - Springer
Secure communication has become a challenging task for researchers. In these
circumstances, several encryption techniques for digital images have been proposed. In this …
circumstances, several encryption techniques for digital images have been proposed. In this …