Zobrazeno 1 - 10
of 2 280
pro vyhledávání: '"Chaotic maps"'
Autor:
Mohammed Tadj, Lakhdar Chaib, Abdelghani Choucha, Mohannad Alhazmi, Abdullah Alwabli, Mohit Bajaj, Shir Ahmad Dost Mohammadi
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-26 (2024)
Abstract Power systems exhibit nonlinearity. causing dynamic instability and complex power oscillations. This research proposes an innovative strategy using the Novel Bat Algorithm (NBA) to achieve ideal Power System Stabilizers (PSSs) in a multimach
Externí odkaz:
https://doaj.org/article/ed3145db58164be2a0ca57efc041d6df
Publikováno v:
Journal of Engineering and Sustainable Development, Vol 28, Iss 6 (2024)
Video steganography is a method for concealing information within a video without substantially changing its visual content. The utilization of high-definition videos has garnered considerable interest from industries. H.265/HEVC, the recent video co
Externí odkaz:
https://doaj.org/article/f744b0040038467f9a341b0a9dbf5e36
Autor:
Priteesha Sarangi, Prabhujit Mohapatra
Publikováno v:
International Journal of Computational Intelligence Systems, Vol 17, Iss 1, Pp 1-26 (2024)
Abstract The Mountain Gazelle Optimizer (MGO) algorithm has become one of the most prominent swarm-inspired meta-heuristic algorithms because of its outstanding rapid convergence and excellent accuracy. However, the MGO still faces premature converge
Externí odkaz:
https://doaj.org/article/1d8e88e87ae64e8698d64bc365baeced
Autor:
Baydaa-Jaffer Al-khafaji
Publikováno v:
Wasit Journal for Pure Sciences, Vol 3, Iss 2 (2024)
Encrypting image transmission has been one of the most complex challenges with communication technology ever. Millions of people utilize and share photographs via the internet for personal and professional purposes. One approach to secure picture tra
Externí odkaz:
https://doaj.org/article/d0346784c96043dea2f19067dc1e3409
Publikováno v:
IEEE Access, Vol 12, Pp 103921-103940 (2024)
The need for high-speed and secure image encryption has become increasingly critical in the digital age, driven by the rapid growth of digital data, the rapid advancement of internet technologies, and the limitations of traditional encryption algorit
Externí odkaz:
https://doaj.org/article/42f09d3a2fda4751acc9e8123ba90665
Autor:
Fernando Lepe-Silva, Broderick Crawford, Felipe Cisternas-Caneo, José Barrera-Garcia, Ricardo Soto
Publikováno v:
Mathematics, Vol 12, Iss 20, p 3171 (2024)
This research presents a novel hybrid approach, which combines the White Shark Optimizer (WSO) metaheuristic algorithm with chaotic maps integrated into the binarization process. Inspired by the predatory behavior of white sharks, WSO has shown great
Externí odkaz:
https://doaj.org/article/d1a265e81b204419b8bdbf82ab92c654
Publikováno v:
Baghdad Science Journal, Vol 21, Iss 5(SI) (2024)
Within this document, a novel system for image cryptography design utilizing fixed-point stream cipher chaotic maps is proposed. The system consists of fixed chaotic maps combined with generated 32-bit Pseudo Number (PN) all implemented using Field P
Externí odkaz:
https://doaj.org/article/7d194b4f5b994732b14daf06faeffa8a
Autor:
Vanisree Chandran, Prabhujit Mohapatra
Publikováno v:
Heliyon, Vol 10, Iss 10, Pp e30757- (2024)
Over the last few decades, a number of prominent meta-heuristic algorithms have been put forth to address complex optimization problems. However, there is a critical need to enhance these existing meta-heuristics by employing a variety of evolutionar
Externí odkaz:
https://doaj.org/article/3e6d7fcaeab74fffbf5df2e7184a7f04
Publikováno v:
Ain Shams Engineering Journal, Vol 15, Iss 3, Pp 102507- (2024)
Nowadays, various image encryption schemes based on chaotic systems have been developed, each of them has its own limitations and strength in terms of security and computational speed. The proposed image encryption scheme utilizes 2-D maps without di
Externí odkaz:
https://doaj.org/article/0769bf1c8d1a4599a4633b2fc10c3d64
Autor:
Mohammed Es-sabry, Nabil El Akkad, Lahbib Khrissi, Khalid Satori, Walid El-Shafai, Torki Altameem, Rajkumar Singh Rathore
Publikováno v:
Egyptian Informatics Journal, Vol 25, Iss , Pp 100449- (2024)
In this study, we introduce a refined approach to encrypting 32-bit color images, leveraging the potential of four 1D chaotic maps – the Logistic map, Tent map, Chebyshev map, and Sine map. These chaotic maps intricately populate the four matrices
Externí odkaz:
https://doaj.org/article/850a2dd31d0f45c9bd8ddbceb05ca642