A combination chaotic system and application in color image encryption

R Parvaz, M Zarebnia - Optics & Laser Technology, 2018 - Elsevier
In this paper, by using Logistic, Sine and Tent systems we define a combination chaotic
system. Some properties of the chaotic system are studied by using figures and numerical …

2D Hybrid chaos map for image security transform based on framelet and cellular automata

Y Khedmati, R Parvaz, Y Behroo - Information Sciences, 2020 - Elsevier
One of the most important data in the social networks is image, so improving the existing
methods can be essential to obtain a safe environment for transforming. In this paper, we …

Video Scene Detection Using Transformer Encoding Linker Network (TELNet)

SM Tseng, ZT Yeh, CY Wu, JB Chang, M Norouzi - Sensors, 2023 - mdpi.com
This paper introduces a transformer encoding linker network (TELNet) for automatically
identifying scene boundaries in videos without prior knowledge of their structure. Videos …

An elephant detection system to prevent human-elephant conflict and tracking of elephant using deep learning

KSP Premarathna, R Rathnayaka… - 2020 5th International …, 2020 - ieeexplore.ieee.org
Human settlement is spreading to forest boundary areas because of the population growth, it
triggers disputes between elephants and humans, leading to the loss of property and life …

Automatic cyberbullying detection: A Mexican case in high school and Higher Education Students

KI Arce-Ruelas, O Alvarez-Xochihua… - IEEE Latin America …, 2022 - ieeexplore.ieee.org
The social interaction among young students has been partially or totally transformed to
mobile-based communication, specifically through the use of social networks. This new …

Design of optimal PID controller for varied system using teaching–learning-based optimization

A Mishra, N Singh, S Yadav - Advances in Computing and Intelligent …, 2020 - Springer
This paper deals with the implementation of teaching–learning-based optimization (TLBO)
for tuning controller parameters. The optimized parameters of a PID controller are then used …

Review of Soft Computing Techniques in Monitoring Cardiovascular Disease in the Context of South Asian Countries

GS Thakur, SK Sahu, NK Swamy, M Gupta, T Jan… - Applied Sciences, 2023 - mdpi.com
The term “soft computing” refers to a system that can work with varying degrees of
uncertainty and approximations in real-life complex problems using various techniques such …

The influence of risks on the outturn cost of ICT infrastructure network projects

K Almarri, H Boussabaine, H Al Nauimi - Construction Innovation, 2023 - emerald.com
Purpose The internet of things (IoT) is becoming an increasingly inescapable part of society.
IoT paradigm cannot function without the networking infrastructure. High-speed data …

Dynamical 2D and 3D image encryption method by hybrid system based on cat map and wavelet transform

M Zarebnia, R Parvaz - Optik, 2020 - Elsevier
In this paper, a novel random sequence generator based on cat map and hybrid chaos
system is introduced. The features of the new system are investigated by various tests as …

Optimal location using genetic algorithms for chaotic image steganography technique based on discrete framelet transform

AY Darani, YK Yengejeh, G Navarro… - Digital Signal …, 2024 - Elsevier
The development of network technology and its use have led society into the internet world
and communication through digital data. The ease of access to digital resources and the …