Synthesis and diffusion properties of AMEX membranes modified by ceria

2013 ◽  
Vol 62 (2) ◽  
pp. 388-391 ◽  
Author(s):  
D. V. Golubenko ◽  
Yu. A. Karavanova ◽  
A. B. Yaroslavtsev

Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


2013 ◽  
Vol 10 (4) ◽  
pp. 654-657 ◽  
Author(s):  
Simonpietro Agnello ◽  
Marco Cannas ◽  
Giuseppe Iovino ◽  
Lavinia Vaccaro ◽  
Franco Mario Gelardi

2021 ◽  
pp. 117097
Author(s):  
Gang Wang ◽  
Ganggang Li ◽  
Xin Xing ◽  
Zhongshen Zhang ◽  
Zhengping Hao

2011 ◽  
Vol 32 (10) ◽  
pp. 1681-1687 ◽  
Author(s):  
A. Saritha ◽  
K. Joseph ◽  
A. Boudenne ◽  
S. Thomas

2016 ◽  
Vol 6 (1) ◽  
Author(s):  
Mengting Jin ◽  
L. C. Yu ◽  
W. M. Shi ◽  
J. G. Deng ◽  
Y. N. Zhang

2021 ◽  
Vol 6 (9) ◽  
pp. 123
Author(s):  
Mehdi Shishehbor ◽  
Hadi S. Esmaeeli ◽  
M. Reza Pouranian

The interfacial adhesion between asphalt binder and carbon nanotubes (CNTs) depends on many nanoscopic properties such as diffusion of SARA molecules on CNTs surface. Functionalization of CNTs with Oxygens (O=CNTs), hydroxyl groups (HO–CNTs), and hydrogens (H–CNTs) has been an effective way to modify the surface properties of CNTs and ultimately the macroscopic properties of the CNT-composites. This paper presents the effect of different dosages of oxygenated and hydrogenated CNTs on the adhesion and diffusion of SARA molecules on CNTs’ surfaces. First, reactive molecular dynamics simulation is used to oxygenate and hydrogenate CNTs up to a certain dosage. Next, it is employed to model the interaction and diffusion of SARA molecules with the functionalized CNTs. We employ the steer molecular dynamic (SMD) and Einstein formula to calculate the adhesion and diffusion properties. The results demonstrate that hydrogenation has little effect on the adhesion energy, while oxygenation can increase adhesion energy up to 100% for 25% dosage. The diffusion coefficient dramatically drops for both oxygenated and hydrogenated CNTs, with lower values for the latter. We observe that for hydrogenated and oxygenated CNTs at different dosages, asphaltene, resin, aromatic, and saturate molecules have the highest to lowest values, respectively.


2021 ◽  
Author(s):  
Maryam Arvandi

Cryptography can be considered one of the most important aspects of communication security with existence of many threats and attacks to the systems. Unbreakableness is the main feature of a cryptographic cipher. In this thesis, feasibility of using neural networks, due to their computational capabilities is investigated for designing new cryptography methods. A newly proposed block cipher based on recurrent neural networks has also been analysed It is shown that: the new scheme is not a block cipher, and it should be referred to as a symmetric cipher; the simple architecture of the network is compatible with the requirement for confusion, and diffusion properties of a cryptosystem; the back propagation with variable step size without momentum, has the best result among other back propagation algorithms; the output of the network, the ciphertext, is not random, proved by using three statistical tests; the cipher is resistant to some fundamental cryptanalysis attacks, and finally a possible chosen-plaintext attack is presented.


Sign in / Sign up

Export Citation Format

Share Document