Search

Your search keyword '"logistic map"' showing total 3,443 results

Search Constraints

Start Over You searched for: Descriptor "logistic map" Remove constraint Descriptor: "logistic map"
3,443 results on '"logistic map"'

Search Results

7. Dynamical Properties for a Unified Class of One-Dimensional Discrete Maps.

8. Innovative Quantum Encryption Method for RGB Images Based on Bit-Planes and Logistic Maps.

9. Dynamical phases and phase transition in simplicially coupled logistic maps.

10. Input Aware Lightweight Cryptosystem for IoT Infrastructure – Design, Implementation and Validation on Reconfigurable Hardware.

11. Kaynak Kısıtlı Yazılım Proje Çizelgeleme Probleminin Hibrit Bir Yaklaşım ile Çözümü.

12. A New Data Coding Algorithm for Secure Communication of Image

13. AN IMAGE ENCRYPTION METHOD BASED ON LOGISTICAL CHAOTIC MAPS TO ENCRYPT COMMUNICATION DATA

14. Color Image Encryption Model Based on 3-D Chaotic Logistic Map and JAYA Algorithm.

15. Computational Insights into the Unstable Fixed Point of the Fractional Difference Logistic Map.

16. CGARP: Chaos genetic algorithm-based relay node placement for multifaceted heterogeneous wireless sensor networks: CGARP: Chaos genetic algorithm-based relay node placement for multifaceted heterogeneous...: P. S. Banerjee et al.

17. Image Tamper Detection and Correction Using Modified Hamming Code with Eight Data Bits and Four Redundant Bits.

18. Text encryption using secure and expeditious multiprocessing SerpentCTR using logistic map.

19. Investigating the dynamics of generalized discrete logistic map.

20. A New Data Coding Algorithm for Secure Communication of Image.

21. New S-Box Generation Based on Hybrid Two-Dimensional Chaotic Map for Color Image Encryption.

22. A novel S-box generator using Frobenius automorphism and its applications in image encryption.

23. Quasi-periodically Forced Logistic Map with Weak Liouvillean Frequency.

24. Fast encryption of color medical videos for Internet of Medical Things.

25. AN IMAGE ENCRYPTION METHOD BASED ON LOGISTICAL CHAOTIC MAPS TO ENCRYPT COMMUNICATION DATA.

26. Revisiting Lorenz’s Error Growth Models: Insights and Applications

27. A secure and robust images encryption scheme using chaos game representation, logistic map and convolutional auto-encoder.

28. Border-collision bifurcation in the Logistic map with state-dependent impulsive forces.

29. Revisiting Lorenz's Error Growth Models: Insights and Applications.

30. Developing Theoretical Models for Atherosclerotic Lesions: A Methodological Approach Using Interdisciplinary Insights.

31. An Image Encryption Technique Utilizing Lightweight PRESENT and AES Algorithms in Conjunction with Chaotic Systems.

32. Analysis of the Impact of Logistic Map with Gaussian Membership Function for Cryptography.

33. GLDS: high dimensional Gauss-Logistic DNA System with Triad Hybrid Chaos for image encryption.

35. Synchronization of Chains of Logistic Maps

36. A Modified Honey Badger Algorithm with Logistic Map and Enhanced Exploitation

37. AES Improvement Algorithm Based on the Chaotic System in IIOT

38. Sensing Performance Analysis Using Choatic Signal-Based SCMA Codebook for Secure Cognitive Communication System in 5G

41. Confusion and Diffusion Techniques for Image Encryption Process Based on Chaos System

42. Innovative Quantum Encryption Method for RGB Images Based on Bit-Planes and Logistic Maps

43. A Closer Look at the Statistical Behavior of a Chaotic System with Message Inclusion for Cryptographic Applications.

44. Quantum image encryption algorithm based on Fisher–Yates algorithm and Logistic mapping.

45. Fractal Tent Map with Application to Surrogate Testing.

46. Securing chaos-based bit-level color image using bit plane permutation and dynamic DNA technology.

47. Pixel Permutation Using Chaotic Perfect Shuffle Technique for Image Encryption.

48. Efficient image encryption using the Tinkerbell map in conjunction with linear feedback shift registers.

49. Discrete one-dimensional piecewise chaotic systems without fixed points.

50. Epoch event based speech watermarking for tamper detection.

Catalog

Books, media, physical & digital resources