咨询与建议

限定检索结果

文献类型

  • 18 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 10 篇 计算机科学与技术...
    • 8 篇 电气工程
    • 7 篇 材料科学与工程(可...
    • 6 篇 电子科学与技术(可...
    • 3 篇 力学(可授工学、理...
    • 3 篇 信息与通信工程
    • 3 篇 生物医学工程(可授...
    • 3 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 1 篇 机械工程
  • 13 篇 理学
    • 7 篇 数学
    • 7 篇 物理学
    • 1 篇 天文学
    • 1 篇 地理学
    • 1 篇 系统科学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 19 篇 chaotic map
  • 1 篇 cipher
  • 1 篇 metasystem
  • 1 篇 image encryption
  • 1 篇 random numbers
  • 1 篇 global optimizat...
  • 1 篇 post-processing
  • 1 篇 authentication a...
  • 1 篇 fractional-order
  • 1 篇 secure communica...
  • 1 篇 gabor filtering
  • 1 篇 s-box
  • 1 篇 dynamical analys...
  • 1 篇 audio
  • 1 篇 block-wise indep...
  • 1 篇 security attacks
  • 1 篇 skew tent map
  • 1 篇 localization err...
  • 1 篇 scrambling
  • 1 篇 sinusoidal map

机构

  • 2 篇 school of electr...
  • 1 篇 shanghai institu...
  • 1 篇 health technolog...
  • 1 篇 school of inform...
  • 1 篇 department of co...
  • 1 篇 ocean college zh...
  • 1 篇 department of el...
  • 1 篇 college of autom...
  • 1 篇 department of el...
  • 1 篇 security enginee...
  • 1 篇 school of comput...
  • 1 篇 school of electr...
  • 1 篇 department of el...
  • 1 篇 college of natio...
  • 1 篇 department of el...
  • 1 篇 school of comput...
  • 1 篇 shaanxi key labo...
  • 1 篇 department of el...
  • 1 篇 department of co...
  • 1 篇 department of ma...

作者

  • 1 篇 subrata banerjee
  • 1 篇 amjad hussain za...
  • 1 篇 bai jingbo
  • 1 篇 朱中梁
  • 1 篇 zhenjun tang
  • 1 篇 karthikeyan raja...
  • 1 篇 li hongwei
  • 1 篇 zhuo chen
  • 1 篇 宋玉蓉
  • 1 篇 suma sira jacob
  • 1 篇 jiageng chen
  • 1 篇 sun yangyang
  • 1 篇 jixin ma
  • 1 篇 蒋国平
  • 1 篇 man ling
  • 1 篇 nadeem iqbal
  • 1 篇 liu jianyong
  • 1 篇 qiao hui
  • 1 篇 walid el-shafai
  • 1 篇 ahmed m ali ali

语言

  • 19 篇 英文
检索条件"主题词=chaotic map"
19 条 记 录,以下是1-10 订阅
排序:
chaotic map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 4471-4488页
作者: Guojun Wang Qi Liu School of Electronics&Information Engineering Nanjing University of Information Science&TechnologyNanjing210044China Yancheng Polytechnic College Yancheng224000China Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services School of SoftwareNanjing University of Information Science and TechnologyNanjingChina
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A novel multi-stable sinusoidal chaotic map with spectacular behaviors
收藏 引用
Communications in Theoretical Physics 2023年 第11期75卷 3-14页
作者: Ahmed M Ali Ali Sridevi Sriram Hayder Natiq Atefeh Ahmadi Karthikeyan Rajagopal Sajad Jafari Department of Electronics Techniques Babylon Technical InstituteAl-Furat Al-Awsat Technical UniversityBabylon51001Iraq Al-Mustaqbal University College Babylon51001Iraq Centre for Computational Biology Chennai Institute of TechnologyChennai600069Tamil NaduIndia Department of Computer Technology Engineering College of Information TechnologyImam Ja’afar Al-Sadiq UniversityBaghdad10001Iraq Department of Biomedical Engineering Amirkabir University of Technology(Tehran Polytechnic)TehranIran Centre for Nonlinear Systems Chennai Institute of TechnologyChennai600069Tamil NaduIndia Department of Electronics and Communications Engineering and University Centre of Research and Development Chandigarh UniversityMohali140413PunjabIndia Health Technology Research Institute Amirkabir University of Technology(Tehran Polytechnic)TehranIran
chaotic behavior can be observed in continuous and discrete-time systems.This behavior can appear in one-dimensional nonlinear maps;however,having at least three state variables in flows is necessary.Due to the lower ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Dynamic S-Box Generation Using Novel chaotic map with Nonlinearity Tweaking
收藏 引用
Computers, Materials & Continua 2023年 第5期75卷 3011-3026页
作者: Amjad Hussain Zahid Muhammad Junaid Arshad Musheer Ahmad Naglaa F.Soliman Walid El-Shafai School of Systems and Technology University of Management and TechnologyLahore54700Pakistan Department of Computer Science University of Engineering and TechnologyLahore54700Pakistan Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block ciphers.At the moment,chaotic maps are being created and extensively used to generate these SBoxes as... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Prediction Model of Wax Deposition Rate in Waxy Crude Oil Pipelines by Elman Neural Network Based on Improved Reptile Search Algorithm
收藏 引用
Energy Engineering 2024年 第4期121卷 1007-1026页
作者: Zhuo Chen Ningning Wang Wenbo Jin Dui Li The Second Oil Production Plant Sinopec Northwest Oilfield CompanyUrumqi830011China Yingmaili Oil and Gas Production Management Area PetroChina Tarim Oilfield CompanyKorla841001China College of Petroleum Engineering Xi’an Shiyou UniversityXi’an710065China
A hard problem that hinders the movement of waxy crude oil is wax deposition in oil pipelines.To ensure the safe operation of crude oil pipelines,an accurate model must be developed to predict the rate of wax depositi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Novel Robust Watermarking Algorithm for Encrypted Medical Image Based on DTCWT-DCT and chaotic map
收藏 引用
Computers, Materials & Continua 2019年 第8期61卷 889-910页
作者: Jing Liu Jingbing Li Jieren Cheng Jixin Ma Naveed Sadiq Baoru Han Qiang Geng Yang Ai College of Information Science and Technology Hainan UniversityHaikou570228China School of Computing and Mathematical Sciences Faculty of Liberal Arts and SciencesUniversity of GreenwichGreenwichLondonSE109LSUK Ocean College Zhejiang UniversityHangzhou310058China College of Medical Informatics Chongqing Medical UniversityChongqing400016China Faculty of Network Science Haikou University of EconomicsHaikou571127China
In order to solve the problem of patient information security protection in medical images,whilst also taking into consideration the unchangeable particularity of medical images to the lesion area and the need for med... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
AModified Search and Rescue Optimization Based Node Localization Technique inWSN
收藏 引用
Computers, Materials & Continua 2022年 第1期70卷 1229-1245页
作者: Suma Sira Jacob K.Muthumayil M.Kavitha Lijo Jacob Varghese M.Ilayaraja Irina V.Pustokhina Denis A.Pustokhin Department of Computer Science and Engineering Christian College of Engineering and TechnologyOddanchatram624619India Department of Information Technology PSNA College of Engineering and TechnologyDindigul624622India Department of Electronics and Communication Engineering K.Ramakrishnan College of TechnologyTiruchirappalli621112India Department of Electrical and Electronics Engineering Christian College of Engineering and TechnologyOddanchatram624619India School of Computing Kalasalingam Academy of Research and EducationKrishnankoil626128India Department of Entrepreneurship and Logistics Plekhanov Russian University of EconomicsMoscow117997Russia Department of Logistics State University of ManagementMoscow109542Russia
Wireless sensor network(WSN)is an emerging technology which find useful in several application areas such as healthcare,environmentalmonitoring,border surveillance,etc.Several issues that exist in the designing of WSN... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Calculation of Available Transfer Capability Using Hybrid chaotic Selfish Herd Optimizer and 24 Hours RES-thermal Scheduling
收藏 引用
Chinese Journal of Electrical Engineering 2023年 第4期9卷 54-72页
作者: Kingsuk Majumdar Provas Kumar Roy Subrata Banerjee Department of Electrical Engineering Dr.B C Roy Engineering CollegeDurgapur 713206India Department of Electrical Engineering Kalyani Government Engineering CollegeKalyani 741235India Department of Electrical Engineering NIT DurgapurDurgapur 713209India
As fossil fuel stocks are being depleted,alternative sources of energy must be explored.Consequently,traditional thermal power plants must coexist with renewable resources,such as wind,solar,and hydro units,and all-da... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators
收藏 引用
Frontiers of Computer Science 2020年 第6期14卷 85-95页
作者: Je Sen TEH Weijian TENG Azman SAMSUDIN Jiageng CHEN School of Computer Sciences Universiti Sains MalaysiaPenang 11800Malaysia School of Engineering and Technology INTI International College PenangPenang 11900Malaysia School of Computer Central China Normal UniversityWuhan 430079China
True random number generators(TRNG)are important counterparts to pseudorandom number generators(PRNG).especially for high security applications such as cryptography.They produce unpredictable,non-repeatablerandom sequ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Hash function construction using weighted complex dynamical networks
收藏 引用
Chinese Physics B 2013年 第4期22卷 172-177页
作者: 宋玉蓉 蒋国平 College of Automation Nanjing University of Posts and Telecommunications
A novel scheme to construct a hash function based on a weighted complex dynamical network (WCDN) generated from an original message is proposed in this paper. First, the original message is divided into blocks. Then... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
TAKAP: A Lightweight Three-Party Authenticated Key Agreement Protocol with User Anonymity
收藏 引用
Chinese Journal of Electronics 2021年 第4期30卷 686-696页
作者: QIAO Hui DONG Xuewen SHEN Yulong LIU Haozhe YANG Lingxiao School of Computer Science and Technology Xidian University Shaanxi Key Laboratory of Network and System Security Xidian University
The three-party authenticated key agreement protocol is a significant cryptographic mechanism for secure communication, which encourages two entities to authenticate each other and generate a shared session key with t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论