Design of intelligent computing networks for nonlinear chaotic fractional Rossler system
In a recent development, the legacy of fractional-order multi-dimensional chaotic systems
has attracted numerous researchers owing to their valuable applications in cryptology …
has attracted numerous researchers owing to their valuable applications in cryptology …
Nonvolatile Memristive Materials and Physical Modeling for In‐Memory and In‐Sensor Computing
SX Go, KG Lim, TH Lee, DK Loke - Small Science, 2024 - Wiley Online Library
Separate memory and processing units are utilized in conventional von Neumann
computational architectures. However, regarding the energy and the time, it is costly to …
computational architectures. However, regarding the energy and the time, it is costly to …
Deep learning based sentiment analysis from Bangla text using glove word embedding along with convolutional neural network
Language is the primary means by which humans interact with each other and express their
emotions. Despite the fact that teaching robots to understand textual meaning is challenging …
emotions. Despite the fact that teaching robots to understand textual meaning is challenging …
Exploiting online services to enable anonymous and confidential messaging
Messaging services are usually provided within social network platforms and allow these
platforms to collect additional information about users, such as what time, for how long, with …
platforms to collect additional information about users, such as what time, for how long, with …
Verifying the Reliability of Quantum Random Number Generator: A Comprehensive Testing Approach
R Biswas, D Roy Talukdar, U Roy - SN Computer Science, 2024 - Springer
Computers typically use pseudo-random numbers generated by algorithms that produce a
deterministic sequence of numbers that appear random but are predictable if the entropy of …
deterministic sequence of numbers that appear random but are predictable if the entropy of …
A novel pseudo-random number generator: combining hyperchaotic system and DES algorithm for secure applications
A Hadj Brahim, H Ali Pacha, M Naim… - The Journal of …, 2025 - Springer
Generating random values become increasingly desirable due to its advantages. In this
paper, a novel pseudo-random number generator is proposed based on a hyperchaotic …
paper, a novel pseudo-random number generator is proposed based on a hyperchaotic …
Algorithmic Strategies for Solving Complex Problems in Financial Cryptography
V Rajasekar, K Venu, V Sharma… - … Encryption for Financial …, 2023 - Springer
Cryptography is used in applications where subversion of the communication system could
lead to financial loss, which is known as financial cryptography. In contrast to classical …
lead to financial loss, which is known as financial cryptography. In contrast to classical …
Secure IoT Seed-based Matrix Key Generator
NELA Youssef, C LEGHRIS - International Journal of …, 2024 - search.proquest.com
The rapid evolution of the Internet of Things (IoT) has significantly transformed various
aspects of both personal and professional spheres, offering innovative solutions in fields …
aspects of both personal and professional spheres, offering innovative solutions in fields …
Chaos-based image encryption based on bit level cubic shuffling
This work studies the problem of chaos-based image encryption. First, a generalization of
the 1D chaotic map proposed by (Talhaoui et al. in The Visual Computer, pp 1–11, 2020) is …
the 1D chaotic map proposed by (Talhaoui et al. in The Visual Computer, pp 1–11, 2020) is …
Metodología para la construcción de generadores de números pseudo-aleatorios utilizando programación genética
I Rojas-Montes, A Cavazos-Amador… - … Ciencias Básicas E …, 2023 - repository.uaeh.edu.mx
Los generadores de números pseudoaleatorios (PRNG, por sus siglas en inglés), se utilizan
comúnmente en la informática para simular eventos aleatorios en aplicaciones como …
comúnmente en la informática para simular eventos aleatorios en aplicaciones como …