Atomistic insight into the structure and diffusion properties of pollucite glass-ceramics

Author(s):  
Hualong Yang ◽  
Siqi Ma ◽  
Wenjiu Duan ◽  
Shengjian Zhao ◽  
Qikun Wang ◽  
...  
2021 ◽  
Vol 11 (5) ◽  
pp. 2253
Author(s):  
Katarina Kostelić ◽  
Marko Turk

The applications of social network analysis to the world tourism network are scarce, and a research update is long overdue. The goal of this research is to examine the topology of the world tourism network and to discuss the meaning of its characteristics in light of the current situation. The data used for the analysis comprise 193 target countries, 242 source countries, and 17,022 links, which is an overall 1,448,285,894 travels in 2018. Social network analysis is applied to the data to determine network topological and diffusion properties, as well as the network structure and its regularities (does it behave more as a social or a technological/biological network?). While results presented in this paper give a thorough insight into the world tourism network in the year 2018, they are only a glimpse in comparison to the possibilities for further research.


Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


2013 ◽  
Vol 10 (4) ◽  
pp. 654-657 ◽  
Author(s):  
Simonpietro Agnello ◽  
Marco Cannas ◽  
Giuseppe Iovino ◽  
Lavinia Vaccaro ◽  
Franco Mario Gelardi

2021 ◽  
pp. 117097
Author(s):  
Gang Wang ◽  
Ganggang Li ◽  
Xin Xing ◽  
Zhongshen Zhang ◽  
Zhengping Hao

2021 ◽  
Vol 199 ◽  
pp. 110706
Author(s):  
Shuohua Zhang ◽  
Xiaoguang Guo ◽  
Song Yuan ◽  
Ming Li ◽  
Zhuji Jin ◽  
...  

2013 ◽  
Vol 62 (2) ◽  
pp. 388-391 ◽  
Author(s):  
D. V. Golubenko ◽  
Yu. A. Karavanova ◽  
A. B. Yaroslavtsev

2011 ◽  
Vol 32 (10) ◽  
pp. 1681-1687 ◽  
Author(s):  
A. Saritha ◽  
K. Joseph ◽  
A. Boudenne ◽  
S. Thomas

2016 ◽  
Vol 6 (1) ◽  
Author(s):  
Mengting Jin ◽  
L. C. Yu ◽  
W. M. Shi ◽  
J. G. Deng ◽  
Y. N. Zhang

Sign in / Sign up

Export Citation Format

Share Document