A review on applications of chaotic maps in pseudo-random number generators and encryption
Because of the COVID-19 pandemic, most of the tasks have shifted to an online platform.
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …
Sectors such as e-commerce, sensitive multi-media transfer, online banking have …
[PDF][PDF] Optimize machine learning programming algorithms for sentiment analysis in social media
MS Alharbi, ESM El-Kenawy - International Journal of Computer …, 2021 - researchgate.net
Sentiment analysis (SA) is used to evaluate the polarity of reviews. In SA, the feature
selection phase is essential, as the best way to solve all optimization problems not happen …
selection phase is essential, as the best way to solve all optimization problems not happen …
Enhancing logistic chaotic map for improved cryptographic security in random number generation
M Alawida - Journal of Information Security and Applications, 2024 - Elsevier
The use of chaotic maps for cryptography is advantageous due to their desirable
characteristics, including complexity, unpredictability, sensitivity to initial values and control …
characteristics, including complexity, unpredictability, sensitivity to initial values and control …
An innovative approach based on optimization for the determination of initial conditions of continuous-time chaotic system as a random number generator
G Yildirim, E Tanyildizi - Chaos, Solitons & Fractals, 2023 - Elsevier
Security has been one of the important problems in the processing, storage and
transmission of information. The transfer of information to virtual environments with …
transmission of information. The transfer of information to virtual environments with …
A new chaos-based PRNG hardware architecture using the HUB fixed-point format
SS Da Silva, M Cardoso, L Nardo… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Chaotic systems have been applied in many applications involving instrumentation and
measurements, such as in sensors and control systems, due to their pseudorandom …
measurements, such as in sensors and control systems, due to their pseudorandom …
A resource efficient pseudo random number generator based on sawtooth maps for Internet of Things
The strength of cryptographic keys rely on the random number generators (RNGs) to
produce random seed values. Unfortunately there are not many RNGs options suitable for …
produce random seed values. Unfortunately there are not many RNGs options suitable for …
Enhancing Decision-Making in Highway Overtaking Scenarios with Graph Convolution Reinforcement Learning
MK Sam, W Gee, S Arkhstan, H Khan… - Journal of Computer …, 2024 - jcsis.org
Autonomous vehicles have a number of open challenges, one of which is decision-making
regarding motion, particularly while operating in an environment that is both complex and …
regarding motion, particularly while operating in an environment that is both complex and …
Deep Learning and Enhanced Emissions Modeling and Deposition Prediction
Deep Learning and Enhanced Emissions Modeling and Deposition Prediction JCSIS
019928311823 info@jcsis.org JCSIS About Volumes Instructions Contact Editorials Login …
019928311823 info@jcsis.org JCSIS About Volumes Instructions Contact Editorials Login …
Crop Yield Estimation Using Spiking Neural Networks Through Spatiotemporal Analysis of Image Time Series
N OubeBlika, S Arkhstan, L Hongou… - Journal of Computer …, 2024 - jcsis.org
Crop Yield Estimation Using Spiking Neural Networks Through Spatiotemporal Analysis of
Image Time Series JCSIS 019928311823 info@jcsis.org JCSIS About Volumes Instructions …
Image Time Series JCSIS 019928311823 info@jcsis.org JCSIS About Volumes Instructions …
CNN-Based Algorithm for Anomaly Detection in Electrocardiogram Signals (BiLSTM)
CNN-Based Algorithm for Anomaly Detection in Electrocardiogram Signals (BiLSTM) JCSIS
019928311823 info@jcsis.org JCSIS About Volumes Instructions Contact Editorials Login …
019928311823 info@jcsis.org JCSIS About Volumes Instructions Contact Editorials Login …