elementary cellular automata
Recently Published Documents


TOTAL DOCUMENTS

153
(FIVE YEARS 30)

H-INDEX

14
(FIVE YEARS 2)

2021 ◽  
Vol 573 ◽  
pp. 125942
Author(s):  
Emilio N.M. Cirillo ◽  
Francesca R. Nardi ◽  
Cristian Spitoni

Author(s):  
Jorge Laval

This paper shows that the percolation clusters from elementary cellular automata {30, 45, 60, 86, 99, 105, 129, 150, 153, 169, 182, 183, 184, 195 and 225 exhibit strong power law behavior, either under random initial conditions, a single occupied cell, or both. Most of the tail exponents are less than unity, implying diverging means and variances of cluster sizes. The analysis presented here is admittedly coarse in an effort to expedite its dissemination.


2021 ◽  
Vol 30 (2) ◽  
pp. 187-203
Author(s):  
Sukanta Das ◽  
◽  
Mihir K. Chakraborty ◽  

This paper develops a formal logic, named L CA , targeting modeling of one-dimensional binary cellular automata. We first develop the syntax of L CA , then give semantics to L CA in the domain of all binary strings. Then the elementary cellular automata and four-neighborhood binary cellular automata are shown as models of the logic. These instances point out that there are other models of L CA . Finally it is proved that any one-dimensional binary cellular automaton is a model of the proposed logic.


TEM Journal ◽  
2021 ◽  
pp. 546-553
Author(s):  
Dana S. ALdosarry ◽  
Nouf F. ALotaibi ◽  
Tahani H. AL ghobari ◽  
Ruba M. ALbqumi ◽  
Tahani S. ALharthi ◽  
...  

This paper proposes an image encryption technique for smart phones devices to encrypt images and then upload on the cloud. The process of retrieving and decrypting images will be under full control by the user. Also, if the user wants to retrieve an image, he can retrieve it completely, but not as he needed. Our research can solve two main issues in current mobile applications which will protect photo that will be decrypt by the user only, and will help the user to recover the photo needed. An encryption mechanism based on hybrid between elementary cellular automata (ECA) and RC4 algorithms are used to encrypt images on the smart android mobiles. Experimental results on the application showed that our proposed encryption technique used for image encryption has a good quality en cryption with secure requirements.


Sign in / Sign up

Export Citation Format

Share Document