chaos system
Recently Published Documents


TOTAL DOCUMENTS

144
(FIVE YEARS 18)

H-INDEX

11
(FIVE YEARS 3)

2021 ◽  
Vol 46 (18) ◽  
pp. 4654
Author(s):  
Hanwen Luo ◽  
Mengfan Cheng ◽  
Chuanming Huang ◽  
Bolin Ye ◽  
Weidong Shao ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-6
Author(s):  
Shiguo Huang ◽  
Yujun Niu ◽  
Yajing Xu

In this paper, the exponential stability of a stochastic delay system with impulsive signal is considered, and stability theorem of this system is proposed based on the Lyapunov–Razumikhin method; the convergence rate is also given, which gives theoretical foundation to chaos control and synchronization using the impulsive method. Finally, the classic delay chaos system with white noise and impulsive signal is employed to verify the feasibility and effectiveness of our theorem.


2021 ◽  
Vol 1962 (1) ◽  
pp. 012061
Author(s):  
Ali Jawad Ibada ◽  
Phaklen Ehkan ◽  
Ruzelita Ngadiran ◽  
Dalal Abdulmohsin Hammood ◽  
Ahmed Alkhayyat

2021 ◽  
Vol 11 (5) ◽  
pp. 2402
Author(s):  
Xinghua Cheng ◽  
Zhilin Li

A digital elevation model (DEM) digitally records information about terrain variations and has found many applications in different fields of geosciences. To protect such digital information, encryption is one technique. Numerous encryption algorithms have been developed and can be used for DEM. A good encryption algorithm should change both the compositional and configurational information of a DEM in the encryption process. However, current methods do not fully take into full consideration pixel structures when measuring the complexity of an encrypted DEM (e.g., using Shannon entropy and correlation). Therefore, this study first proposes that configurational entropy capturing both compositional and configurational information can be used to optimize encryption from the perspective of the Second Law of Thermodynamics. Subsequently, an encryption algorithm based on the integration of the chaos system and linear prediction is designed, where the one with the maximum absolute configurational entropy difference compared to the original DEM is selected. Two experimental DEMs are encrypted for 10 times. The experimental results and security analysis show that the proposed algorithm is effective and that configurational entropy can help optimize the encryption and can provide guidelines for evaluating the encrypted DEM.


Sign in / Sign up

Export Citation Format

Share Document