Privacy and Security of Wearable Internet of Things: A Scoping Review and Conceptual Framework Development for Safety and Health Management in Construction DOI
Chinedu Okonkwo, Ibukun Awolusi, Chukwuma Nnaji

et al.

Computers & Security, Journal Year: 2024, Volume and Issue: unknown, P. 104275 - 104275

Published: Dec. 1, 2024

Language: Английский

A memristive neural network with features of asymmetric coexisting attractors and large-scale amplitude control DOI
Yu Xie, Qiang Lai

Integration, Journal Year: 2024, Volume and Issue: 97, P. 102196 - 102196

Published: April 15, 2024

Language: Английский

Citations

1

A Novel Chaos-Based Encryption Technique with Parallel Processing Using CUDA for Mobile Powerful GPU Control Center DOI Creative Commons
Harun Emre Kıran

Chaos and fractals., Journal Year: 2024, Volume and Issue: unknown

Published: July 31, 2024

Chaotic systems possess unique properties that can be leveraged for cybersecurity due to their complex and unpredictable nature, making it challenging interpret them. When combined with CUDA, chaotic benefit from high-efficiency parallel processing capabilities, allowing the rapid secure handling of large data sets. In this study, a CUDA-supported chaos-based encryption mechanism mobile control centers is developed. The powerful GPU center enables fast decryption image multiple connected devices. Logistic Map used random number generation, XOR operations are applied encrypt R, G, B, Gray Scale channels images. Initially, an analysis numbers generated conducted, followed by detailed explanation technique. technique then data, analyses performed. Finally, performance compared other studies, speeds examined. Results indicate new provides significantly security levels comparable studies. key discovery well-suited processing, using proposed method. For encrypting IoT files, generation performed first, statistical tests, developed algorithm. Security demonstrate effectively high applications.

Language: Английский

Citations

1

On a method of constructing a biaxial multitype conservative chaotic system and an image encryption scheme DOI Creative Commons
Wenjing Zhang, Jianing Li, Bing Zhao

et al.

Chaos Solitons & Fractals, Journal Year: 2024, Volume and Issue: 187, P. 115433 - 115433

Published: Sept. 1, 2024

Language: Английский

Citations

1

Enhancing Internet of Things communications: Development of a new S-box and multi-layer encryption framework DOI Creative Commons
Adel R. Alharbi, Amer Aljaedi,

Abdullah Aljuhni

et al.

Journal of King Saud University - Computer and Information Sciences, Journal Year: 2024, Volume and Issue: 36(10), P. 102265 - 102265

Published: Dec. 1, 2024

Language: Английский

Citations

1

Enhancing Security through Advanced Image Steganography Techniques DOI Creative Commons
Pooja Bhatt,

BHAVIK PARGI,

R. Uday Kumar

et al.

OPSearch American Journal of Open Research, Journal Year: 2024, Volume and Issue: 3(3), P. 921 - 927

Published: March 5, 2024

The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting the hidden data retrieve message image, process that can be achieved through different methods. study delves into which hiding such as text, images, or audio files other video files. Specifically, concentrates utilizing embed an another using spatial domain techniques. By examining this particular method, seeks deepen understanding how operates and its potential applications. research contributes field by providing insights implementation effectiveness offering valuable knowledge for security protection purposes. Through practical demonstrations analysis, showcase capabilities limitations facilitating further development in domain. Ultimately, endeavors enhance comprehension methods their significance safeguarding digital

Language: Английский

Citations

0

Reappraising Double Pendulum Dynamics across Multiple Computational Platforms DOI Open Access
Sandy Herho, Faiz Rohman Fajary,

Katarina Herho

et al.

Published: May 6, 2024

This study presents the complexity and sensitivity of chaotic system dynamics in case double pendulum. It applied detailed numerical analyses pendulum multiple computing platforms order to demonstrate behavior pendulums. The equations motion were derived from Euler-Lagrange formalism, capture system's dynamics, which is coupled nonlinearly. These solved numerically using efficient Runge-Kutta-Fehlberg method, implemented Python, R, GNU Octave, Julia, while runtimes memory usage extensively benchmarked across these environments. Time series analyses, including calculation Shannon entropy Kolmogorov-Smirnov test, quantified unpredictability infinitesimal perturbations initial conditions. Phase space diagrams illustrated intricate trajectories strange attractors, as further confirmation nature All findings have a clear indication importance accurate measurements condition system, contributing an increased understanding nonlinear dynamics. Future research directions are faster simulations Numba GPU computing, stochastic effects, synchronization, applications climate modeling. work will be useful for chaos theory computational approaches complex systems dynamical nature.

Language: Английский

Citations

0

Privacy and Security of Wearable Internet of Things: A Scoping Review and Conceptual Framework Development for Safety and Health Management in Construction DOI
Chinedu Okonkwo, Ibukun Awolusi, Chukwuma Nnaji

et al.

Computers & Security, Journal Year: 2024, Volume and Issue: unknown, P. 104275 - 104275

Published: Dec. 1, 2024

Language: Английский

Citations

0