Computers & Security, Journal Year: 2024, Volume and Issue: unknown, P. 104275 - 104275
Published: Dec. 1, 2024
Language: Английский
Computers & Security, Journal Year: 2024, Volume and Issue: unknown, P. 104275 - 104275
Published: Dec. 1, 2024
Language: Английский
Integration, Journal Year: 2024, Volume and Issue: 97, P. 102196 - 102196
Published: April 15, 2024
Language: Английский
Citations
1Chaos and fractals., Journal Year: 2024, Volume and Issue: unknown
Published: July 31, 2024
Chaotic systems possess unique properties that can be leveraged for cybersecurity due to their complex and unpredictable nature, making it challenging interpret them. When combined with CUDA, chaotic benefit from high-efficiency parallel processing capabilities, allowing the rapid secure handling of large data sets. In this study, a CUDA-supported chaos-based encryption mechanism mobile control centers is developed. The powerful GPU center enables fast decryption image multiple connected devices. Logistic Map used random number generation, XOR operations are applied encrypt R, G, B, Gray Scale channels images. Initially, an analysis numbers generated conducted, followed by detailed explanation technique. technique then data, analyses performed. Finally, performance compared other studies, speeds examined. Results indicate new provides significantly security levels comparable studies. key discovery well-suited processing, using proposed method. For encrypting IoT files, generation performed first, statistical tests, developed algorithm. Security demonstrate effectively high applications.
Language: Английский
Citations
1Chaos Solitons & Fractals, Journal Year: 2024, Volume and Issue: 187, P. 115433 - 115433
Published: Sept. 1, 2024
Language: Английский
Citations
1Journal of King Saud University - Computer and Information Sciences, Journal Year: 2024, Volume and Issue: 36(10), P. 102265 - 102265
Published: Dec. 1, 2024
Language: Английский
Citations
1OPSearch American Journal of Open Research, Journal Year: 2024, Volume and Issue: 3(3), P. 921 - 927
Published: March 5, 2024
The project aims to explore various types of steganography techniques, with a focus on image steganography, where information is concealed within images. This involves decrypting the hidden data retrieve message image, process that can be achieved through different methods. study delves into which hiding such as text, images, or audio files other video files. Specifically, concentrates utilizing embed an another using spatial domain techniques. By examining this particular method, seeks deepen understanding how operates and its potential applications. research contributes field by providing insights implementation effectiveness offering valuable knowledge for security protection purposes. Through practical demonstrations analysis, showcase capabilities limitations facilitating further development in domain. Ultimately, endeavors enhance comprehension methods their significance safeguarding digital
Language: Английский
Citations
0Published: May 6, 2024
This study presents the complexity and sensitivity of chaotic system dynamics in case double pendulum. It applied detailed numerical analyses pendulum multiple computing platforms order to demonstrate behavior pendulums. The equations motion were derived from Euler-Lagrange formalism, capture system's dynamics, which is coupled nonlinearly. These solved numerically using efficient Runge-Kutta-Fehlberg method, implemented Python, R, GNU Octave, Julia, while runtimes memory usage extensively benchmarked across these environments. Time series analyses, including calculation Shannon entropy Kolmogorov-Smirnov test, quantified unpredictability infinitesimal perturbations initial conditions. Phase space diagrams illustrated intricate trajectories strange attractors, as further confirmation nature All findings have a clear indication importance accurate measurements condition system, contributing an increased understanding nonlinear dynamics. Future research directions are faster simulations Numba GPU computing, stochastic effects, synchronization, applications climate modeling. work will be useful for chaos theory computational approaches complex systems dynamical nature.
Language: Английский
Citations
0Computers & Security, Journal Year: 2024, Volume and Issue: unknown, P. 104275 - 104275
Published: Dec. 1, 2024
Language: Английский
Citations
0