41 Hits in 14.0 sec

A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform

Srinivas Koppu, V. Madhu Viswanatham
2017 Modelling and Simulation in Engineering  
An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. We have achieved fast encryption and decryption along with privacy of images.  ...  Using hybrid CMT image, pixels are shuffled to accomplish excellent randomness.  ...  Chaotic research for an image encryption has a vital significance due to sensitive dependencies on initial conditions, system parameters, random behavior, nonperiodic and topological transitivity, and  ... 
doi:10.1155/2017/7470204 fatcat:zgxvpjf7tngbbaautw7p22iqjq

Introduction to Complex Systems, Sustainability and Innovation [chapter]

Ciza Thomas, Rendhir R. Prasad, Minu Mathew
2016 Complex Systems, Sustainability and Innovation  
Due to its unpredictable behavior, any creative change in a complex system poses a threat of systemic risks.  ...  This is because an innovation is always introducing something new, introducing a change, possibly to solve an existing problem, the effect of which is nonlinear.  ...  There emerges an order in the chaotic system as shown in Figure 3 . Hence, simply put, a chaotic system is a deterministic and unpredictable system.  ... 
doi:10.5772/66453 fatcat:tjrqnzp5xjex7fepnreoatfqfm

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
2012 Journal of Networks  
The third paper, "A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism" by Qian Mao and Chuan Qin, proposes a novel encryption method based on Turbo code.  ...  In most communication systems, information encryption and error correction are always independent. While joint encryption and error correction codes combine these two processes into one.  ...  El-Iskandarani et al. proposed an encryption method based on a two-dimensional chaotic map, but this scheme is used only for image transmission [15] .  ... 
doi:10.4304/jnw.7.2.275-281 fatcat:3ejjimllcvewjeifopbvhl3zmi

Amplitude-dependent properties of a hydrodynamic soliton

Junru Wu, Isadore Rudnick
1985 Physical Review Letters  
The calculations were done on a network of SUN-workstations with number-crunching enhancements (transputers, array processor) at the ACKNOWLEDGMENTS The authors thank the members of the Nonlinear Dynamics  ...  Most of the fundamental research on thermoacoustics in the US  ...  In the two-beam imaging scheme the theories of King or Yosioka and Kawasima predict radiation pressures on the order of 4 (dyne/cm 2 )/(watt/cm 2 ).  ... 
doi:10.1103/physrevlett.55.204 pmid:10032028 fatcat:kwodftbphjbd7ctg6rkenijptq

Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases [chapter]

Rajesh Singh, Anita Gehlot, Dharam Buddhi
2022 Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases  
Precise diagnosis of these diseases on time is very significant for maintaining a healthy life.  ...  A comparative study of different machine learning classifiers for chronic disease prediction viz Heart Disease & Diabetes Disease is done in this paper.  ...  Over the time, researchers have devised various image processing algorithms.It is required to convert an image clicked by an image capturing tool into a suitable format prior to carry out any sort of image  ... 
doi:10.13052/rp-9788770227667 fatcat:da47mjbbyzfwnbpde7rgbrlppe

An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers

Fang Zuo, Wei Zhang
2014 Journal of Networks  
This paper explores an introduction to networks programmability, by distributing independent computing environment, which would be demonstrated through a structured system named DAIM model (Distributed  ...  The DAIM model can provide richness of nature-inspired adaptation algorithms on a complex distributed computing environment.  ...  In this paper, we proposed a novel pre-coding scheme based on the SLNR scheme, which will determine the pre-coding vectors via iteration.  ... 
doi:10.4304/jnw.9.01.10-17 fatcat:tbmafdamk5am7a6ba26gsxzydq

Robust Encryption Schemes for 3D Content Protection

Alireza Jolfaei, University, My, Xin-Wen Wu
One of the greatest challenges of 3D con tent encryption is that, in comparison with traditional data and 2D images, 3D content implies a higher level representation or semantics, and in many 3D applications  ...  Since the 1970s, a large number of encryption schemes have been proposed, among which some have been standardised and widely adopted all over the world, such as data encryption standard (DES) and advanced  ...  based on a chaotic bit-plane permutation and chaotic masking.  ... 
doi:10.25904/1912/3357 fatcat:xxvbzgsjlbb2lh4pzlajs5jmd4

W.G. Sebald: image, archive, modernity

2008 ChoiceReviews  
used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes provided that: • a  ...  full bibliographic reference is made to the original source • a link is made to the metadata record in DRO • the full-text is not changed in any way The full-text must not be sold in any format or medium  ...  The selfunderstanding of modernity itself is based not on a pervasive sense of epistemological chaos, but on an unbroken faith in the rationality of the archive.  ... 
doi:10.5860/choice.45-6648 fatcat:pjutd2mbvfabhf6pymyjpte6ry


2021 Zenodo  
Projects Group project based on sampling and study of an ECG signal via a single amplification circuit and software filtering and analysis systems.  ...  It requires that the person know enough about his or her own culture and a second culture to allow a mental shift into the value scheme of the other culture, and an evaluation of behavior based on its  ...  The system may either be computer software, an Internet-based program, or a simple file and folder system on the desktop of a computer.  ... 
doi:10.5281/zenodo.5515073 fatcat:bmqvhk7xinbffd4xo2hcmmpqwa

Special Issue: Communicative Socialism/Digital Socialism, edited by Christian Fuchs (DOWNLOAD FULL ISSUE)

Christian Fuchs
2020 tripleC: Communication, Capitalism & Critique  
His research is conducted in the field of internet and politics, focusing on elections, party system, polarization, public opinion and social media.  ...  Marcelo Alves dos Santos Jr Marcelo Alves dos Santos Jr has a major degree in Journalism from the Federal University of São João del-Rei and is currently a PhD candidate at the Post-Graduate Program in  ...  Based on his critique of Bellamy's novel, one year later Morris (1890/1993) published his own utopian communist novel News from Nowhere.  ... 
doi:10.31269/triplec.v18i1.1149 fatcat:u4rcec2bizgmtpt6e2r4k4xhee

Simulation and Performance Analysis of Distributed Internet Systems Using TCPNs

Anton Železnikar, Anna Derezińska, Slawomir Samolej, Tomasz Rak
2009 Proceedings of the International Multiconference on Computer Science and Information Technology   unpublished
This paper presents a Timed Coloured Petri Nets based programming tool that supports modeling and performance analysis of distributed World Wide Web environments.  ...  A distributed Internet system model, initially described in compliance with Queueing Theory (QT) rules, is mapped onto the Timed Coloured Petri Net (TCPN) structure by means of queueing system templates  ...  Image encryption using chaotic logistic map. Image and Vision Computing, vol. 24, pp. 926-934, 2006. [23] Fridrich, J. Symmetric ciphers based on twodimensional chaotic maps. Int. J. Bifurc.  ... 

A framework for interpreting the management of IS security [chapter]

Gurpreet Dhillon
1997 Managing Information System Security  
He occasioned an environment that facilitated the development of 'abstract thinking'. His unique style helped me to organise my ideas and develop a methodological consistency.  ...  However the basic need for developing secure information systems has remained unfulfilled.  ...  Thus there has been an over-reliance on the functionality of the system in order to reap information technology benefits.  ... 
doi:10.1007/978-1-349-14454-9_3 fatcat:76wttdjyfnfh5fwyzfaftgebsa

Corruption and Financial Crime

Sam Vaknin
2018 Figshare  
A cash-based system cannot engender a credible balance sheet.  ...  It is not surprising that the Internet -a chaotic network with an anarchic modus operandi -flourished at these times.  ...  By comparison, the novel -an avalanche of text -is a newfangled phenomenon. Twitter is telegraphic, but this need not impinge on the language skills of its users.  ... 
doi:10.6084/m9.figshare.7176539 fatcat:pjcdb2c32vh4fp2rlzx3p6qoke

The [R]evolution of Open Science

Jonathan Tennant
2020 Zenodo  
This book is an anthology all of the texts I have written or contributed to in a significant way over the last 9 years on the topic of Open Science.  ...  Open Science is a paradigm shift in how global research systems produce and communicate knowledge.  ...  system based on corporate brands.  ... 
doi:10.5281/zenodo.3700645 fatcat:kfoyv4cup5gc3oegmoajs77jxe

SECURWARE 2015 Committee SECURWARE Advisory Chairs

Rainer Falk, Hans-Joachim Hof, William Dougherty, Secern Consulting -Charlotte, Hans-Joachim Usa, Hof, Peter Müller, Syed Naqvi, Juha Rőning, Mariusz Jakubowski, Microsoft Research, William Dougherty (+163 others)
systems and technologies.  ...  a series of events covering related topics on theory and practice on security, cryptography, secure protocols, trust, privacy, confidentiality, vulnerability, intrusion detection and other areas related  ...  COMPARISON OF THE IMAGE DATA BASE Testing was performed using a BMP image file.  ... 
« Previous Showing results 1 — 15 out of 41 results