A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cryptography Chaos Theory
2018
Central and Eastern European eDem and eGov Days
In this article there are presented 3 encryption algorithms based on chaos theory: RC4, Fractal Encryption and Cellular Automata, implemented in a system of encryption and operation mode analysis for each ...
The attempts to develop new encryption ?lgorithms based on chaos theory have evolved gradually from simple solutions, which suppose the iteration of a din? ...
Wolfram first proposed CA one-dimensional as a pseudo-random number generation (PRNG). ...
doi:10.24989/ocg.v331.37
fatcat:iglsmmhtwzapzojdocuobg7olm
Designing a Pseudo-Random Bit Generator Using Generalized Cascade Fractal Function
2021
Chaos Theory and Applications
Due to the chaotic behavior, the proposed function is utilized to generate a pseudo-random number sequence in both integer and binary format. ...
A sequence generator is designed by performing the linear function operation to the real and imaginary part of a cascade-PLMS, cascade-PLJS separately, and the iteration number at which the cascade-PLJS ...
Recently, Barnsley's chaos game rules were utilized to generate a pseudo-random sequence . ...
doi:10.51537/chaos.835222
fatcat:4alpkdirlnfopezlot355gdbt4
LOJİSTİK HARİTA İLE ÜRETİLEN DİZİNİN RASGELELİĞİNİN ARAŞTIRILMASI
2014
INTERNATIONAL REFEREED JOURNAL OF RESEARCH ON ECONOMICS MANAGEMENT
Lojistik harita x Abstract: Random number generator on computers are deterministic function producing a sequence of numbers that appear to be uniform U (0, 1) random value even though they are not. ...
Usually random numbers are generated by a digital computer as part of simulation. Random numbers facilitates to analyst for the simulation studies. ...
From these results it can be concluded that, the new scheme can generate a high percentage of usable pseudo-random numbers for simulation and other applications in scientific computing. Behnia et al. ...
doi:10.17373/uheyat.2015018710
fatcat:svnqed77wrhx7nwx2jpamxaefm
A Novel 3D Chaotic System With Line Equilibrium: Multistability, Integral Sliding Mode Control, Electronic Circuit, FPGA Implementation and Its Image Encryption
2022
IEEE Access
We also display the implementation of the Field-Programmable Gate Array (FPGA) based Pseudo-Random Number Generator (PRNG) by using the new chaotic system. ...
Randomness analysis of the generated numbers has been performed with respect to the NIST-800-22 tests and they have successfully passed all of the tests. ...
We implement the new chaotic system by using a field-programmable gate array (FPGA) and detail an application for Pseudo-Random Number Generators (PRNGs) based on the new chaotic system. ...
doi:10.1109/access.2022.3181424
fatcat:i73hu6bcdvagnbgi7ty2ypiii4
One Time Pad and the Short Key Dream
[article]
2021
arXiv
pre-print
This work presents a vast bibliography that includes fundamental classical works and current papers on randomness, pseudorandom number generators, compressibility, unpredictability and more. ...
This is a survey on the One Time Pad (OTP) and its derivatives, from its origins to modern times. ...
the fractals produced by Chaos Games ( [89] ). ...
arXiv:2108.06981v1
fatcat:ka6gnqbrkzeexieq7bkpexz77m
A Review of the Fractal Market Hypothesis for Trading and Market Price Prediction
2021
Mathematics
In order to put the FMH into a broader perspective, the Random Walk and Efficient Market Hypotheses are considered together with the basic principles of fractal geometry. ...
This paper provides a review of the Fractal Market Hypothesis (FMH) focusing on financial times series analysis. ...
Acknowledgments: The authors acknowledge the support of the Technological University Dublin, Ireland, and, in particular, Derek Kearney for his help and guidance. ...
doi:10.3390/math10010117
fatcat:6yarcwqrkjayddhghcwlmcdauy
Cellular Automata: Reversibility, Semi-reversibility and Randomness
[article]
2019
arXiv
pre-print
This dissertation also explores CAs as source of randomness and build pseudo-random number generators (PRNGs) based on CAs. ...
Two schemes tare developed o use these CAs as window-based PRNGs - (1) as decimal number generators and as (2) binary number generators. ...
There are many interesting results regarding reversibility of 1-dimensional CAs, over a given local map R, for the first three cases: Theorem 4.1 : The following statements hold for 1-dimensional infinite ...
arXiv:1911.03609v1
fatcat:522xu4usonfdbguuckurl4eeqi
Monte Carlo methods for massively parallel computers
[article]
2017
arXiv
pre-print
We discuss important algorithmic requirements for such highly parallel simulations, such as the challenges of random-number generation for such cases, and outline a number of general design principles ...
Embracing the opportunities of parallel computing and especially the possibilities provided by a new generation of massively parallel accelerator devices such as GPUs, Intel's Xeon Phi or even FPGAs enables ...
While the output of a deterministic algorithm can never pass as a truly random sequence since the algorithm itself allows to predict the next number with certainty, a number of general statistical tests ...
arXiv:1709.04394v1
fatcat:l25zmj2rcfej3ew4xh6mv5ul3u
On Fitting Finite Dirichlet Mixture Using ECM and MML
[chapter]
2005
Lecture Notes in Computer Science
We study a fluid system with single on/off source in which the active (on) and silent periods (off) follow General and Exponential distributions respectively. ...
The steady-state distribution of the buffer content and related performance measures are obtained. Special cases such as Erlang, exponential and deterministic service times are discussed. ...
In this talk, we construct a general stochastic process based on a Poisson random measure N , prove weak convergence results and then interpret its application as a market model in finance. ...
doi:10.1007/11551188_19
fatcat:gtzi5u6emvfyxea3zbklobnvom
Cryptography and Steganography: New Algorithms and Applications
2011
28 undertaken using a XOR operation (denoted by ⊕) so that c = p ⊕ n Decryption is then undertaken using the operation Repeating the example above and using Table 1 but with 8-bits rather than 7-bits 6 ...
Acknowledgments The author is supported by the Science Foundation Ireland Stokes Professorship Programme and by the Centre for Advanced Studies, Warsaw University of Technology. ...
Matthews Map Matthews [176] generalizes the logistic map with cryptographic constraints and de- velops a new map to generate a sequence of pseudo-random numbers based on the iteration x n+1 = (r + 1 ...
doi:10.21427/d7zs63
fatcat:6fejmptldrdztocxpmudsrra54
Design of large polyphase filters in the Quadratic Residue Number System
2010
2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers
We propose new deterministic low-storage constructions of compressive sampling matrices based on finite-geometry generalized polygons. ...
This problem is modeled as a game which is assumed to be played a large number of times. It is shown how learning algorithms can be used to obtain equilibria in this game. ...
doi:10.1109/acssc.2010.5757589
fatcat:ccxnu5owr5fyrcjcqukumerueq
Some Fundamental Theorems in Mathematics
[article]
2022
arXiv
pre-print
It was Poincaré who saw that even for such low dimensional and completely deterministic systems, random motion can emerge. ...
This formula has become famous because it relates "entropy", "fractals" and "chaos", which are all "rock star" notions also outside of mathematics. ...
It has positive distance at least 10 −i from the i'th number (and any representation of the number by a decimal expansion which is equivalent). This is a contradiction. ...
arXiv:1807.08416v4
fatcat:lw7lbsxyznfrnaozilxapihmdy
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
2013
IOSR Journal of Computer Engineering
These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised. ...
We formulate an access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism. ...
Leena Ragha, Head of the Department of Computer Engineering, Ramrao Adik Institute of Technology and Prof. ...
doi:10.9790/0661-1320107
fatcat:rdpsdcqelbbzvkg5rm4og4tzba
Applied Complexity: Finance and Economics in a New Light
[chapter]
2019
Information—Consciousness—Reality
It takes a heavy toll on the individual human psyche and the global ecosystem. Short-term personal selfrealization is pitted against evolutionary cooperation and collective intelligence. ...
This allows the systemic defects and structural shortcomings to be better understood, thus possibly setting a new course for the future. ...
This game-theoretic problem has a famous representation as an agent-based model, called the Minority Game (Challet and Zhang 1997) . ...
doi:10.1007/978-3-030-03633-1_7
fatcat:nffe5y66t5ai7oqb4jty66u3ha
Analysis of Aperture Shape Changing Trend Base on the Shaped Charge Jet Penetration through the Steel Target
[chapter]
2012
Communications in Computer and Information Science
ACPS is a new generation intelligent system based on the embedded systems, sensing technology and networked connectivity. ...
As a typical application of CPS, it has many special features different from the traditional systems. ...
This paper proposes a new method of localization of target nodes based on the Firefly Algorithm(FA).We introduce the Firefly Algorithm and improve it . ...
doi:10.1007/978-3-642-34384-1_2
fatcat:xvp3o6agk5hxpmbjptnthxiz5m
« Previous
Showing results 1 — 15 out of 36 results