Security analysis of encrypted audio based on elliptic curve and hybrid chaotic maps within GFDM modulator in 5G networks
MJM Ameen, SS Hreshee - Bulletin of Electrical Engineering and …, 2023 - beei.org
Wireless communications face significant security challenges, so there is an ongoing
necessity to develop an appropriate security strategy to protect data from eavesdroppers …
necessity to develop an appropriate security strategy to protect data from eavesdroppers …
Image scrambler based on novel 4-D hyperchaotic system and magic square with fast Walsh–Hadamard transform
A novel 4-D hyperchaotic system that have seven positive parameters in third order with
thirteen terms is proposed, in this paper, the proposed chaotic behavior is proved by …
thirteen terms is proposed, in this paper, the proposed chaotic behavior is proved by …
Security and Privacy in Internet of Things-Status, Challenges
SB Sadkhan, Z Salam - 2021 4th International Iraqi Conference …, 2021 - ieeexplore.ieee.org
The Internet of Things (IOT) Refers to the billions and millions of physical devices around the
world that are now connected to the Internet, a possible of intelligence attached to many …
world that are now connected to the Internet, a possible of intelligence attached to many …
Analysis and description S-box generation for the AES algorithm-a new 3D hyperchaotic system
In this paper, a description, and analysis of a novel 3-D dimension hyperchaotic system is
implemented. The proposed system oscillation is two-order autonomous and consisted of a …
implemented. The proposed system oscillation is two-order autonomous and consisted of a …
PILEA, an Advanced Hybrid Lightweight Algorithm utilizing Logical Mathematical Functions and Chaotic Systems
ZA Mohammed, KA Hussein - Engineering, Technology & Applied …, 2024 - etasr.com
In information security, data encryption plays a crucial role in preventing unauthorized
access. Traditional methods often fall short when faced with sophisticated cyber threats. This …
access. Traditional methods often fall short when faced with sophisticated cyber threats. This …
An enhanced binary cuckoo search algorithm using crossover operators for features selection
BK Aljorani, AH Hasan - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
One of the most important preprocessing steps is the determination of the most relevant
subset of features in any dataset. This step is called “Feature Selection”, which is considered …
subset of features in any dataset. This step is called “Feature Selection”, which is considered …
[PDF][PDF] Dynamics and Stability of Interconnected Systems: A Graph-Theoretic Neuromorphic Approach
RSA AL–Juboory, HK Zghair… - Full Length …, 2024 - researchgate.net
We investigate the stability of huge, linked subsystems in separate nonlinear dynamical
systems. These systems' properties depend on both their dynamics and their link structure …
systems. These systems' properties depend on both their dynamics and their link structure …
[PDF][PDF] Design and analysis of a novel self-excited 5-D hyperchaotic system with maximum (n-2) positive lyapunov exponents
HK Zghair - … .s3.ap-south-1.amazonaws.com
In this work, analytic and designed a new self-existed 5-D with thirteen terms nine of the term
exhibit linearity, while the remaining one demonstrates nonlinearity. It has the highest …
exhibit linearity, while the remaining one demonstrates nonlinearity. It has the highest …