Synchronization between fractional chaotic maps with different dimensions

2022 ◽  
pp. 89-121
Author(s):  
Adel Ouannas ◽  
Amina-Aicha Khennaoui ◽  
Iqbal M. Batiha ◽  
Viet-Thanh Pham
2018 ◽  
Vol 14 (2) ◽  
pp. 139-154
Author(s):  
Dunia Tahir ◽  
Ramzy Ali

Chaotic Sine-Cosine Algorithms (CSCAs) are new metaheuristic optimization algorithms. However, Chaotic Sine-Cosine Algorithm (CSCAs) are able to manipulate the problems in the standard Sine-Cosine Algorithm (SCA) like, slow convergence rate and falling into local solutions. This manipulation is done by changing the random parameters in the standard Sine-Cosine Algorithm (SCA) with the chaotic sequences. To verify the ability of the Chaotic Sine-Cosine Algorithms (CSCAs) for solving problems with large scale problems. The behaviors of the Chaotic Sine-Cosine Algorithms (CSCAs) were studied under different dimensions 10, 30, 100, and 200. The results show the high quality solutions and the superiority of all Chaotic Sine-Cosine Algorithms (CSCAs) on the standard SCA algorithm for all selecting dimensions. Additionally, different initial values of the chaotic maps are used to study the sensitivity of Chaotic Sine-Cosine Algorithms (CSCAs). The sensitivity test reveals that the initial value 0.7 is the best option for all Chaotic Sine-Cosine Algorithms (CSCAs).


2018 ◽  
Vol 7 (S1) ◽  
pp. 73-77
Author(s):  
J. Udayakumar ◽  
G. Prabakaran ◽  
R. Madhan Mohan

Nowadays, there is an explosive growth in the digital multimedia creation, capturing, processing and distribution. Protecting the multimedia contents from copyright in fingerprint has become a major concern. Encryption and watermarking are two complementary techniques that are used for protecting the multimedia data. In this paper, a proposed hybrid encryption-watermarking algorithm for copyright protection is proposed. The watermarking phase of this proposed algorithm is based on, the discrete cosine transform (DCT), while the encryption phase is based on using four chaotic maps with different dimensions. The proposed watermarking scheme uses a new PN-codes embedding strategy of the watermark into the cover image. This strategy allows decreasing the embedding strength factor of the scheme to a value that maximizes imperceptibility performance while maintaining acceptable robustness of the watermarking scheme. On the other hand, the proposed chaos-based encryption algorithm used four chaotic maps of different dimensions and it has two diffusion stages rather than one to improve the algorithm efficiency. The proposed encryption algorithm is tested using different experiments. The experimental results demonstrate that the proposed encryption algorithm shows advantages of large key space, high resistance against differential attacks and high security analysis such as statistical analysis, and sensitivity analysis.


Author(s):  
Dwight K. Romanovicz ◽  
Jacob S. Hanker

The presence of catalase-positive rods (Fig. 1) of different dimensions, which frequently have a crystalline appearance by light microscopy, has been reported. They seem to be related to peroxisomes which were characterized morphologically and cytochemically in parotid and other exocrine glands of the rat by Hand in 1973. Our light microscopic studies of these spherical microbodies and rods of different sizes, stained by virtue of the peroxidatic activity of their catalase, indicate that they are almost entirely confined to the cells of the striated and execretory ducts of the submandibular gland in the mouse. The rods were usually noted only in the proximity of the ductal microbodies. The latter frequently showed a tendency to appear in linear close array, or even to be contiguous (Fig. 2). This suggested that the rods could be formed by the fusion of microbodies.


2016 ◽  
Vol 37 (4) ◽  
pp. 213-222 ◽  
Author(s):  
Hansjörg Znoj ◽  
Sandra Abegglen ◽  
Ulrike Buchkremer ◽  
Michael Linden

Abstract. There is a growing interest in embitterment as psychological concept. However, little systematic research has been conducted to characterize this emotional reaction. Still, there is an ongoing debate about the distinctiveness of embitterment and its dimensions. Additionally, a categorical and a dimensional perspective on embitterment have been developed independently over the last decade. The present study investigates the dimensions of embitterment by bringing these two different approaches together, for the first time. The Bern Embitterment Inventory (BEI) was given to 49 patients diagnosed with “Posttraumatic Embitterment Disorder (PTED)” and a matched control group of 49 patients with psychological disorders with other dominant emotional dysregulations. The ability to discriminate between the two groups was assessed by t-tests and Receiver Operating Characteristic Curves (ROC curve analysis). PTED patients scored significantly higher on the BEI than the patients of the control group. ROC analyses indicated diagnostic accuracy of the inventory. Further, we conducted Confirmatory Factor Analyses (CFA) to examine the different dimensions of embitterment and their relations. As a result, we found four characteristic dimensions of embitterment, namely disappointment, lack of acknowledge, pessimism, and misanthropy. In general, our findings showed a common understanding of embitterment as a unique but multidimensional emotional reaction to distressful life-events.


2011 ◽  
Vol 23 (3) ◽  
pp. 141-148 ◽  
Author(s):  
Hyunyi Cho ◽  
Kari Wilson ◽  
Jounghwa Choi

This study investigated whether and how dimensions of perceived realism of television medical dramas are linked to perceptions of physicians. The three dimensions of perceived realism were considered: plausibility, typicality, and narrative consistency. Data from a survey of college students were examined with confirmatory factor analyses and hierarchical regression analyses. Across the three dramas (ER, Grey’s Anatomy, and House), narrative consistency predicted positive perceptions about physicians. Perceived plausibility and typicality of the medical dramas showed no significant association with perceptions about physicians. These results illustrate the importance of distinguishing different dimensions of perceived realism and the importance of narrative consistency in influencing social beliefs.


This research article focuses on the theme of violence and its representation by the characters of the novel “This Savage Song” by Victoria Schwab. How violence is transmitted through genes to next generations and to what extent socio- psycho factors are involved in it, has also been discussed. Similarly, in what manner violent events and deeds by the parents affect the psychology of children and how it inculcates aggressive behaviour in their minds has been studied. What role is played by the parents in grooming the personality of children and ultimately their decisions to choose the right or wrong way has been argued. In the light of the theory of Judith Harris, this research paper highlights all the phenomena involved: How the social hierarchy controls the behaviour. In addition, the aggressive approach of the people in their lives has been analyzed in the light of the study of second theorist Thomas W Blume. As the novel is a unique representation of supernatural characters, the monsters, which are the products of some cruel deeds, this research paper brings out different dimensions of human sufferings with respect to these supernatural beings. Moreover, the researcher also discusses that, in what manner the curse of violence creates an inevitable vicious cycle of cruel monsters that makes the life of the characters turbulent and miserable.


2020 ◽  
Vol 26 (1) ◽  
pp. 151-156
Author(s):  
Andrei Șandor

AbstractSince the emergence of Internet and social media, new Intelligence branches have flourished, like CYBERINT (Cyber Intelligence), OSINT (Open Source Intelligence) or SOCMINT (Social Media Intelligence), with the aim to exploit different dimensions of the virtual world. These Intelligence-related disciplines may inquire personal information, statements and conversations posted voluntarily on websites or social platforms in order to profile people, identify social networks and organizational structures, and uncover vulnerabilities and threats/risks that can jeopardize the security of individuals or organizations. In this respect, the Internet - as environment - can provide valuable information from both technical and social side. This is why the World Wide Web is and will remain an important place to search for data and information that can be processed into Intelligence, and represents the reason why people working in sensitive domains (e.g. Intelligence) should be aware of their vulnerabilities and the risks and threats posed by this environment.DISCLAIMER: This paper expresses the views, interpretations, and independent position of the authors. It should not be regarded as an official document, nor expressing formal opinions or policies, of NATO or the HUMINT Centre of Excellence.


Sign in / Sign up

Export Citation Format

Share Document