scholarly journals Sensitivity Analysis of Mixed Cayley Inclusion Problem with XOR-Operation

Symmetry ◽  
2020 ◽  
Vol 12 (2) ◽  
pp. 220
Author(s):  
Imran Ali ◽  
Mohd. Ishtyak ◽  
Rais Ahmad ◽  
Ching-Feng Wen

In this paper, we consider the parametric mixed Cayley inclusion problem with Exclusive or (XOR)-operation and show its equivalence with the parametric resolvent equation problem with XOR-operation. Since the sensitivity analysis, Cayley operator, inclusion problems, and XOR-operation are all applicable for solving many problems occurring in basic and applied sciences, such as financial modeling, climate models in geography, analyzing “Black Box processes”, computer programming, economics, and engineering, etc., we study the sensitivity analysis of the parametric mixed Cayley inclusion problem with XOR-operation. For this purpose, we use the equivalence of the parametric mixed Cayley inclusion problem with XOR-operation and the parametric resolvent equation problem with XOR-operation, which is an alternative approach to study the sensitivity analysis. In support of some of the concepts used in this paper, an example is provided.

2021 ◽  
Vol 26 (1) ◽  
pp. 135-142
Author(s):  
Kanusu Srinivasa Rao ◽  
Mandapati Sridhar

The current era is mainly focused on secured data transmission and every organization takes preventive measures to protect network’s private data. Among different techniques visual cryptography is a prominent one that that encrypts the visual information and decrypts secret using mechanical operations without any computation, but each share need pixel expansion. In the current work, we propose an Image encryption technique using (n, n) Visual cryptography based on simple operations without pixel expansion. The proposed novel technique gives an image encryption using visual cryptography based on Least significant bit (LSB) technique in spatial domain and parity mechanism using Exclusive-OR(XOR) operation. developed for encrypting grey scale image. Image encryption and decryption uses simple Boolean operations. The technique provides better quality of shares and recovers without any loss.


Atmosphere ◽  
2020 ◽  
Vol 11 (1) ◽  
pp. 95
Author(s):  
Jiewei Chen ◽  
Huijuan Cui ◽  
Yangyang Xu ◽  
Quansheng Ge

Climate change, induced by human greenhouse gas emission, has already influenced the environment and society. To quantify the impact of human activity on climate change, scientists have developed numerical climate models to simulate the evolution of the climate system, which often contains many parameters. The choice of parameters is of great importance to the reliability of the simulation. Therefore, parameter sensitivity analysis is needed to optimize the parameters for the model so that the physical process of nature can be reasonably simulated. In this study, we analyzed the parameter sensitivity of a simple carbon-cycle energy balance climate model, called the Minimum Complexity Earth Simulator (MiCES), in different periods using a multi-parameter sensitivity analysis method and output measurement method. The results show that the seven parameters related to heat and carbon transferred are most sensitive among all 37 parameters. Then uncertainties of the above key parameters are further analyzed by changing the input emission and temperature, providing reference bounds of parameters with 95% confidence intervals. Furthermore, we found that ocean heat capacity will be more sensitive if the simulation time becomes longer, indicating that ocean influence on climate is stronger in the future.


Mathematics ◽  
2019 ◽  
Vol 7 (3) ◽  
pp. 302 ◽  
Author(s):  
Imran Ali ◽  
Rais Ahmad ◽  
Ching-Feng Wen

In this paper, we study an absolutely new problem, namely, the Cayley inclusion problem which involves the Cayley operator and a multi-valued mapping with XOR-operation. We have shown that the Cayley operator is a single-valued comparison and it is Lipschitz-type-continuous. A fixed point formulation of the Cayley inclusion problem is shown by using the concept of a resolvent operator as well as the Yosida approximation operator. Finally, an existence and convergence result is proved. An example is constructed for some of the concepts used in this work.


2019 ◽  
Vol 2019 ◽  
pp. 1-13
Author(s):  
Haidar Raad Shakir

This paper proposes a method of encrypting images with password protection for secure sharing based on deoxyribonucleic acid (DNA) sequence operations and the tangent-delay ellipse reflecting the cavity-map system (TD-ERCS). The initial values of the TD-ERCS system are generated from a user’s password, and the TD-ERCS system is used to scramble the pixel locations of the R, G, and B matrices of the original image. Next, three DNA-sequence matrices are generated by encoding the permuted color image such that it can be transformed into three matrices. Then, the TD-ERCS system is employed to generate three chaotic sequences before encoding the DNA into the three matrices. Thereafter, a DNA exclusive OR (XOR) operation is executed between the DNA sequences of the permuted image and the DNA sequences generated by the TD-ERCS system to produce three encrypted scrambled matrices. Finally, the matrices of the DNA sequences are decoded, and the R, G, and B channels are recombined to form an encrypted color image. The results of simulation and security tests reveal that the proposed algorithm offers robust encryption and demonstrates the ability to resist exhaustive, statistical, and differential attacks.


Sign in / Sign up

Export Citation Format

Share Document