|
|
|
Jafar Jafari-Asl, Seyed Arman Hashemi Monfared and Soroush Abolfathi
This study investigates the optimal and safe operation of pumping stations in water distribution systems (WDSs) with the aim of reducing the environmental footprint of water conveyance processes. We introduced the nonlinear chaotic honey badger algorithm...
ver más
|
|
|
|
|
|
|
Alkmini Michaloglou and Nikolaos L. Tsitsas
Brain storm optimization (BSO) and particle swarm optimization (PSO) are two popular nature-inspired optimization algorithms, with BSO being the more recently developed one. It has been observed that BSO has an advantage over PSO regarding exploration wi...
ver más
|
|
|
|
|
|
|
Partha Sarathi Paul, Anurag Dhungel, Maisha Sadia, Md Razuan Hossain and Md Sakib Hasan
This paper presents a general method, called ?self-parameterization?, for designing one-dimensional (1-D) chaotic maps that provide wider chaotic regions compared to existing 1-D maps. A wide chaotic region is a desirable property, as it helps to provide...
ver más
|
|
|
|
|
|
|
Ali Akbar Kekha Javan, Assef Zare, Roohallah Alizadehsani and Saeed Balochian
This paper investigates the robust adaptive synchronization of multi-mode fractional-order chaotic systems (MMFOCS). To that end, synchronization was performed with unknown parameters, unknown time delays, the presence of disturbance, and uncertainty wit...
ver más
|
|
|
|
|
|
|
Constantinos Chalatsis, Constantin Papaodysseus, Dimitris Arabadjis, Athanasios Rafail Mamatsis and Nikolaos V. Karadimas
A first aim of the present work is the determination of the actual sources of the ?finite precision error? generation and accumulation in two important algorithms: Bernoulli?s map and the folded Baker?s map. These two computational schemes attract the at...
ver más
|
|
|
|
|
|
|
Yu Li, Liming Zhang, Xiaolong Wang, Xingang Zhang and Qihang Zhang
Commutative encryption and watermarking (CEW) is an emerging method that combines encryption technology with digital watermarking technology. It has the dual capability of secure transmission and copyright protection. However, the existing CEW methods fo...
ver más
|
|
|
|
|
|
|
Ali Takieldeen, Said H. Abd Elkhalik, Ahmed S. Samra, Mohamed A. Mohamed and Fahmi Khalifa
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending...
ver más
|
|
|
|
|
|
|
Yuqiang Dou and Ming Li
Security of image communication is more and more important in many applications such as the transmission of military and medical images. To meet the requirement, a new color image encryption algorithm using a new one-dimension (1D) chaotic map was propos...
ver más
|
|
|
|
|
|
|
Saptarshi Sengupta, Sanchita Basak and Richard Alan Peters II
-
|
|
|
|
|
|
|
Zhao, L. Macau, E. E. N.
Pág. 1375 - 1385
|
|
|
|