Filters








36 Hits in 9.8 sec

Cryptography Chaos Theory

Bulai Rodica, Victor Fanari
2018 Central and Eastern European eDem and eGov Days  
In this article there are presented 3 encryption algorithms based on chaos theory: RC4, Fractal Encryption and Cellular Automata, implemented in a system of encryption and operation mode analysis for each  ...  The attempts to develop new encryption ?lgorithms based on chaos theory have evolved gradually from simple solutions, which suppose the iteration of a din?  ...  Wolfram first proposed CA one-dimensional as a pseudo-random number generation (PRNG).  ... 
doi:10.24989/ocg.v331.37 fatcat:iglsmmhtwzapzojdocuobg7olm

Designing a Pseudo-Random Bit Generator Using Generalized Cascade Fractal Function

Shafali AGARWAL
2021 Chaos Theory and Applications  
Due to the chaotic behavior, the proposed function is utilized to generate a pseudo-random number sequence in both integer and binary format.  ...  A sequence generator is designed by performing the linear function operation to the real and imaginary part of a cascade-PLMS, cascade-PLJS separately, and the iteration number at which the cascade-PLJS  ...  Recently, Barnsley's chaos game rules were utilized to generate a pseudo-random sequence .  ... 
doi:10.51537/chaos.835222 fatcat:4alpkdirlnfopezlot355gdbt4

LOJİSTİK HARİTA İLE ÜRETİLEN DİZİNİN RASGELELİĞİNİN ARAŞTIRILMASI

Arzu EREN ŞENARAS, Şahin İNANÇ, Hayrettin Kemal SEZEN
2014 INTERNATIONAL REFEREED JOURNAL OF RESEARCH ON ECONOMICS MANAGEMENT  
Lojistik harita x Abstract: Random number generator on computers are deterministic function producing a sequence of numbers that appear to be uniform U (0, 1) random value even though they are not.  ...  Usually random numbers are generated by a digital computer as part of simulation. Random numbers facilitates to analyst for the simulation studies.  ...  From these results it can be concluded that, the new scheme can generate a high percentage of usable pseudo-random numbers for simulation and other applications in scientific computing. Behnia et al.  ... 
doi:10.17373/uheyat.2015018710 fatcat:svnqed77wrhx7nwx2jpamxaefm

A Novel 3D Chaotic System With Line Equilibrium: Multistability, Integral Sliding Mode Control, Electronic Circuit, FPGA Implementation and Its Image Encryption

Aceng Sambas, Sundarapandian Vaidyanathan, Xuncai Zhang, Ismail Koyuncu, Talal Bonny, Murat Tuna, Murat Alcin, Sen Zhang, Ibrahim Mohammed Sulaiman, Aliyu Muhammed Awwal, Poom Kumam
2022 IEEE Access  
We also display the implementation of the Field-Programmable Gate Array (FPGA) based Pseudo-Random Number Generator (PRNG) by using the new chaotic system.  ...  Randomness analysis of the generated numbers has been performed with respect to the NIST-800-22 tests and they have successfully passed all of the tests.  ...  We implement the new chaotic system by using a field-programmable gate array (FPGA) and detail an application for Pseudo-Random Number Generators (PRNGs) based on the new chaotic system.  ... 
doi:10.1109/access.2022.3181424 fatcat:i73hu6bcdvagnbgi7ty2ypiii4

One Time Pad and the Short Key Dream [article]

Umberto Cerruti
2021 arXiv   pre-print
This work presents a vast bibliography that includes fundamental classical works and current papers on randomness, pseudorandom number generators, compressibility, unpredictability and more.  ...  This is a survey on the One Time Pad (OTP) and its derivatives, from its origins to modern times.  ...  the fractals produced by Chaos Games ( [89] ).  ... 
arXiv:2108.06981v1 fatcat:ka6gnqbrkzeexieq7bkpexz77m

A Review of the Fractal Market Hypothesis for Trading and Market Price Prediction

Jonathan Blackledge, Marc Lamphiere
2021 Mathematics  
In order to put the FMH into a broader perspective, the Random Walk and Efficient Market Hypotheses are considered together with the basic principles of fractal geometry.  ...  This paper provides a review of the Fractal Market Hypothesis (FMH) focusing on financial times series analysis.  ...  Acknowledgments: The authors acknowledge the support of the Technological University Dublin, Ireland, and, in particular, Derek Kearney for his help and guidance.  ... 
doi:10.3390/math10010117 fatcat:6yarcwqrkjayddhghcwlmcdauy

Cellular Automata: Reversibility, Semi-reversibility and Randomness [article]

Kamalika Bhattacharjee
2019 arXiv   pre-print
This dissertation also explores CAs as source of randomness and build pseudo-random number generators (PRNGs) based on CAs.  ...  Two schemes tare developed o use these CAs as window-based PRNGs - (1) as decimal number generators and as (2) binary number generators.  ...  There are many interesting results regarding reversibility of 1-dimensional CAs, over a given local map R, for the first three cases: Theorem 4.1 : The following statements hold for 1-dimensional infinite  ... 
arXiv:1911.03609v1 fatcat:522xu4usonfdbguuckurl4eeqi

Monte Carlo methods for massively parallel computers [article]

Martin Weigel
2017 arXiv   pre-print
We discuss important algorithmic requirements for such highly parallel simulations, such as the challenges of random-number generation for such cases, and outline a number of general design principles  ...  Embracing the opportunities of parallel computing and especially the possibilities provided by a new generation of massively parallel accelerator devices such as GPUs, Intel's Xeon Phi or even FPGAs enables  ...  While the output of a deterministic algorithm can never pass as a truly random sequence since the algorithm itself allows to predict the next number with certainty, a number of general statistical tests  ... 
arXiv:1709.04394v1 fatcat:l25zmj2rcfej3ew4xh6mv5ul3u

On Fitting Finite Dirichlet Mixture Using ECM and MML [chapter]

Nizar Bouguila, Djemel Ziou
2005 Lecture Notes in Computer Science  
We study a fluid system with single on/off source in which the active (on) and silent periods (off) follow General and Exponential distributions respectively.  ...  The steady-state distribution of the buffer content and related performance measures are obtained. Special cases such as Erlang, exponential and deterministic service times are discussed.  ...  In this talk, we construct a general stochastic process based on a Poisson random measure N , prove weak convergence results and then interpret its application as a market model in finance.  ... 
doi:10.1007/11551188_19 fatcat:gtzi5u6emvfyxea3zbklobnvom

Cryptography and Steganography: New Algorithms and Applications

Jonathan Blackledge
2011
28 undertaken using a XOR operation (denoted by ⊕) so that c = p ⊕ n Decryption is then undertaken using the operation Repeating the example above and using Table 1 but with 8-bits rather than 7-bits 6  ...  Acknowledgments The author is supported by the Science Foundation Ireland Stokes Professorship Programme and by the Centre for Advanced Studies, Warsaw University of Technology.  ...  Matthews Map Matthews [176] generalizes the logistic map with cryptographic constraints and de- velops a new map to generate a sequence of pseudo-random numbers based on the iteration x n+1 = (r + 1  ... 
doi:10.21427/d7zs63 fatcat:6fejmptldrdztocxpmudsrra54

Design of large polyphase filters in the Quadratic Residue Number System

Gian Carlo Cardarilli, Alberto Nannarelli, Yann Oster, Massimo Petricca, Marco Re
2010 2010 Conference Record of the Forty Fourth Asilomar Conference on Signals, Systems and Computers  
We propose new deterministic low-storage constructions of compressive sampling matrices based on finite-geometry generalized polygons.  ...  This problem is modeled as a game which is assumed to be played a large number of times. It is shown how learning algorithms can be used to obtain equilibria in this game.  ... 
doi:10.1109/acssc.2010.5757589 fatcat:ccxnu5owr5fyrcjcqukumerueq

Some Fundamental Theorems in Mathematics [article]

Oliver Knill
2022 arXiv   pre-print
It was Poincaré who saw that even for such low dimensional and completely deterministic systems, random motion can emerge.  ...  This formula has become famous because it relates "entropy", "fractals" and "chaos", which are all "rock star" notions also outside of mathematics.  ...  It has positive distance at least 10 −i from the i'th number (and any representation of the number by a decimal expansion which is equivalent). This is a contradiction.  ... 
arXiv:1807.08416v4 fatcat:lw7lbsxyznfrnaozilxapihmdy

Privacy Management of Multi User Environment in Online Social Networks (OSNs)

P. Amrutha
2013 IOSR Journal of Computer Engineering  
These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised.  ...  We formulate an access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism.  ...  Leena Ragha, Head of the Department of Computer Engineering, Ramrao Adik Institute of Technology and Prof.  ... 
doi:10.9790/0661-1320107 fatcat:rdpsdcqelbbzvkg5rm4og4tzba

Applied Complexity: Finance and Economics in a New Light [chapter]

James B. Glattfelder
2019 Information—Consciousness—Reality  
It takes a heavy toll on the individual human psyche and the global ecosystem. Short-term personal selfrealization is pitted against evolutionary cooperation and collective intelligence.  ...  This allows the systemic defects and structural shortcomings to be better understood, thus possibly setting a new course for the future.  ...  This game-theoretic problem has a famous representation as an agent-based model, called the Minority Game (Challet and Zhang 1997) .  ... 
doi:10.1007/978-3-030-03633-1_7 fatcat:nffe5y66t5ai7oqb4jty66u3ha

Analysis of Aperture Shape Changing Trend Base on the Shaped Charge Jet Penetration through the Steel Target [chapter]

Junqing Huang, Yalong Ma, Kelei Huang, Jianxun Zhao
2012 Communications in Computer and Information Science  
ACPS is a new generation intelligent system based on the embedded systems, sensing technology and networked connectivity.  ...  As a typical application of CPS, it has many special features different from the traditional systems.  ...  This paper proposes a new method of localization of target nodes based on the Firefly Algorithm(FA).We introduce the Firefly Algorithm and improve it .  ... 
doi:10.1007/978-3-642-34384-1_2 fatcat:xvp3o6agk5hxpmbjptnthxiz5m
« Previous Showing results 1 — 15 out of 36 results