A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Fast Enhanced Secure Image Chaotic Cryptosystem Based on Hybrid Chaotic Magic Transform
2017
Modelling and Simulation in Engineering
An enhanced secure image chaotic cryptosystem has been proposed based on hybrid CMT-Lanczos algorithm. We have achieved fast encryption and decryption along with privacy of images. ...
Using hybrid CMT image, pixels are shuffled to accomplish excellent randomness. ...
Chaotic research for an image encryption has a vital significance due to sensitive dependencies on initial conditions, system parameters, random behavior, nonperiodic and topological transitivity, and ...
doi:10.1155/2017/7470204
fatcat:zgxvpjf7tngbbaautw7p22iqjq
Introduction to Complex Systems, Sustainability and Innovation
[chapter]
2016
Complex Systems, Sustainability and Innovation
Due to its unpredictable behavior, any creative change in a complex system poses a threat of systemic risks. ...
This is because an innovation is always introducing something new, introducing a change, possibly to solve an existing problem, the effect of which is nonlinear. ...
There emerges an order in the chaotic system as shown in Figure 3 . Hence, simply put, a chaotic system is a deterministic and unpredictable system. ...
doi:10.5772/66453
fatcat:tjrqnzp5xjex7fepnreoatfqfm
Fake BTS Attacks of GSM System on Software Radio Platform
2012
Journal of Networks
The third paper, "A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism" by Qian Mao and Chuan Qin, proposes a novel encryption method based on Turbo code. ...
In most communication systems, information encryption and error correction are always independent. While joint encryption and error correction codes combine these two processes into one. ...
El-Iskandarani et al. proposed an encryption method based on a two-dimensional chaotic map, but this scheme is used only for image transmission [15] . ...
doi:10.4304/jnw.7.2.275-281
fatcat:3ejjimllcvewjeifopbvhl3zmi
Amplitude-dependent properties of a hydrodynamic soliton
1985
Physical Review Letters
The calculations were done on a network of SUN-workstations with number-crunching enhancements (transputers, array processor) at the ACKNOWLEDGMENTS The authors thank the members of the Nonlinear Dynamics ...
Most of the fundamental research on thermoacoustics in the US ...
In the two-beam imaging scheme the theories of King or Yosioka and Kawasima predict radiation pressures on the order of 4 (dyne/cm 2 )/(watt/cm 2 ). ...
doi:10.1103/physrevlett.55.204
pmid:10032028
fatcat:kwodftbphjbd7ctg6rkenijptq
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
[chapter]
2022
Comparative Analysis of Different Machine Learning Classifiers for the Prediction of Chronic Diseases
Precise diagnosis of these diseases on time is very significant for maintaining a healthy life. ...
A comparative study of different machine learning classifiers for chronic disease prediction viz Heart Disease & Diabetes Disease is done in this paper. ...
Over the time, researchers have devised various image processing algorithms.It is required to convert an image clicked by an image capturing tool into a suitable format prior to carry out any sort of image ...
doi:10.13052/rp-9788770227667
fatcat:da47mjbbyzfwnbpde7rgbrlppe
An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers
2014
Journal of Networks
This paper explores an introduction to networks programmability, by distributing independent computing environment, which would be demonstrated through a structured system named DAIM model (Distributed ...
The DAIM model can provide richness of nature-inspired adaptation algorithms on a complex distributed computing environment. ...
In this paper, we proposed a novel pre-coding scheme based on the SLNR scheme, which will determine the pre-coding vectors via iteration. ...
doi:10.4304/jnw.9.01.10-17
fatcat:tbmafdamk5am7a6ba26gsxzydq
Robust Encryption Schemes for 3D Content Protection
2018
One of the greatest challenges of 3D con tent encryption is that, in comparison with traditional data and 2D images, 3D content implies a higher level representation or semantics, and in many 3D applications ...
Since the 1970s, a large number of encryption schemes have been proposed, among which some have been standardised and widely adopted all over the world, such as data encryption standard (DES) and advanced ...
based on a chaotic bit-plane permutation and chaotic masking. ...
doi:10.25904/1912/3357
fatcat:xxvbzgsjlbb2lh4pzlajs5jmd4
W.G. Sebald: image, archive, modernity
2008
ChoiceReviews
used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes provided that: • a ...
full bibliographic reference is made to the original source • a link is made to the metadata record in DRO • the full-text is not changed in any way The full-text must not be sold in any format or medium ...
The selfunderstanding of modernity itself is based not on a pervasive sense of epistemological chaos, but on an unbroken faith in the rationality of the archive. ...
doi:10.5860/choice.45-6648
fatcat:pjutd2mbvfabhf6pymyjpte6ry
asasa
2021
Zenodo
Projects Group project based on sampling and study of an ECG signal via a single amplification circuit and software filtering and analysis systems. ...
It requires that the person know enough about his or her own culture and a second culture to allow a mental shift into the value scheme of the other culture, and an evaluation of behavior based on its ...
The system may either be computer software, an Internet-based program, or a simple file and folder system on the desktop of a computer. ...
doi:10.5281/zenodo.5515073
fatcat:bmqvhk7xinbffd4xo2hcmmpqwa
Special Issue: Communicative Socialism/Digital Socialism, edited by Christian Fuchs (DOWNLOAD FULL ISSUE)
2020
tripleC: Communication, Capitalism & Critique
His research is conducted in the field of internet and politics, focusing on elections, party system, polarization, public opinion and social media. ...
Marcelo Alves dos Santos Jr Marcelo Alves dos Santos Jr has a major degree in Journalism from the Federal University of São João del-Rei and is currently a PhD candidate at the Post-Graduate Program in ...
Based on his critique of Bellamy's novel, one year later Morris (1890/1993) published his own utopian communist novel News from Nowhere. ...
doi:10.31269/triplec.v18i1.1149
fatcat:u4rcec2bizgmtpt6e2r4k4xhee
Simulation and Performance Analysis of Distributed Internet Systems Using TCPNs
2009
Proceedings of the International Multiconference on Computer Science and Information Technology
unpublished
This paper presents a Timed Coloured Petri Nets based programming tool that supports modeling and performance analysis of distributed World Wide Web environments. ...
A distributed Internet system model, initially described in compliance with Queueing Theory (QT) rules, is mapped onto the Timed Coloured Petri Net (TCPN) structure by means of queueing system templates ...
Image encryption using chaotic logistic map. Image and Vision Computing, vol. 24, pp. 926-934, 2006. [23] Fridrich, J. Symmetric ciphers based on twodimensional chaotic maps. Int. J. Bifurc. ...
fatcat:qhwqrldwpzgolinudqilgnticy
A framework for interpreting the management of IS security
[chapter]
1997
Managing Information System Security
He occasioned an environment that facilitated the development of 'abstract thinking'. His unique style helped me to organise my ideas and develop a methodological consistency. ...
However the basic need for developing secure information systems has remained unfulfilled. ...
Thus there has been an over-reliance on the functionality of the system in order to reap information technology benefits. ...
doi:10.1007/978-1-349-14454-9_3
fatcat:76wttdjyfnfh5fwyzfaftgebsa
Corruption and Financial Crime
2018
Figshare
A cash-based system cannot engender a credible balance sheet. ...
It is not surprising that the Internet -a chaotic network with an anarchic modus operandi -flourished at these times. ...
By comparison, the novel -an avalanche of text -is a newfangled phenomenon. Twitter is telegraphic, but this need not impinge on the language skills of its users. ...
doi:10.6084/m9.figshare.7176539
fatcat:pjcdb2c32vh4fp2rlzx3p6qoke
The [R]evolution of Open Science
2020
Zenodo
This book is an anthology all of the texts I have written or contributed to in a significant way over the last 9 years on the topic of Open Science. ...
Open Science is a paradigm shift in how global research systems produce and communicate knowledge. ...
system based on corporate brands. ...
doi:10.5281/zenodo.3700645
fatcat:kfoyv4cup5gc3oegmoajs77jxe
SECURWARE 2015 Committee SECURWARE Advisory Chairs
unpublished
systems and technologies. ...
a series of events covering related topics on theory and practice on security, cryptography, secure protocols, trust, privacy, confidentiality, vulnerability, intrusion detection and other areas related ...
COMPARISON OF THE IMAGE DATA BASE Testing was performed using a BMP image file. ...
fatcat:xebt7atkmzcy5mu3yabwgyczye
« Previous
Showing results 1 — 15 out of 41 results