22 research outputs found

    Design and Implementation of Secure Chaotic Communication Systems

    Get PDF
    Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mismatches, mixing property, deterministic dynamics, structure complexity, to mention a few, that map nicely with cryptographic requirements such as confusion, diffusion, deterministic pseudorandomness, algorithm complexity. Furthermore, the possibility of chaotic synchronization, where the master system (transmitter) is driving the slave system (receiver) by its output signal, made it probable for the possible utilization of chaotic systems to implement security in the communication systems. Many methods like chaotic masking, chaotic modulation, inclusion, chaotic shift keying (CSK) had been proposed however, many attack methods later showed them to be insecure. Different modifications of these methods also exist in the literature to improve the security, but almost all suffer from the same drawback. Therefore, the implementation of chaotic systems in security still remains a challenge. In this work, different possibilities on how it might be possible to improve the security of the existing methods are explored. The main problem with the existing methods is that the message imprint could be found in the dynamics of the transmitted signal, therefore by some signal processing or pattern classification techniques, etc, allow the exposition of the hidden message. Therefore, the challenge is to remove any pattern or change in dynamics that the message might bring in the transmitted signal

    Design and implementation of secure chaotic communication systems

    Get PDF
    Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mismatches, mixing property, deterministic dynamics, structure complexity, to mention a few, that map nicely with cryptographic requirements such as confusion, diffusion, deterministic pseudorandomness, algorithm complexity. Furthermore, the possibility of chaotic synchronization, where the master system (transmitter) is driving the slave system (receiver) by its output signal, made it probable for the possible utilization of chaotic systems to implement security in the communication systems. Many methods like chaotic masking, chaotic modulation, inclusion, chaotic shift keying (CSK) had been proposed however, many attack methods later showed them to be insecure. Different modifications of these methods also exist in the literature to improve the security, but almost all suffer from the same drawback. Therefore, the implementation of chaotic systems in security still remains a challenge. In this work, different possibilities on how it might be possible to improve the security of the existing methods are explored. The main problem with the existing methods is that the message imprint could be found in the dynamics of the transmitted signal, therefore by some signal processing or pattern classification techniques, etc, allow the exposition of the hidden message. Therefore, the challenge is to remove any pattern or change in dynamics that the message might bring in the transmitted signal.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    14th Conference on Dynamical Systems Theory and Applications DSTA 2017 ABSTRACTS

    Get PDF
    From Preface: This is the fourteen time when the conference “Dynamical Systems – Theory and Applications” gathers a numerous group of outstanding scientists and engineers, who deal with widely understood problems of theoretical and applied dynamics. Organization of the conference would not have been possible without a great effort of the staff of the Department of Automation, Biomechanics and Mechatronics. The patronage over the conference has been taken by the Committee of Mechanics of the Polish Academy of Sciences and the Ministry of Science and Higher Education. It is a great pleasure that our invitation has been accepted by so many people, including good colleagues and friends as well as a large group of researchers and scientists, who decided to participate in the conference for the first time. With proud and satisfaction we welcome nearly 250 persons from 38 countries all over the world. They decided to share the results of their research and many years experiences in the discipline of dynamical systems by submitting many very interesting papers. This booklet contains a collection of 375 abstracts, which have gained the acceptance of referees and have been qualified for publication in the conference proceedings [...]

    Cardiac Arrhythmias

    Get PDF
    This book is useful for physicians taking care of patients with cardiac arrhythmias and includes six chapters written by experts in their field. Chapter 1 discusses basic mechanisms of cardiac arrhythmias. Chapter 2 discusses the chronobiological aspects of the impact of apnoic episodes on ventricular arrhythmias. Chapter 3 discusses navigation, detection, and tracking during cardiac ablation interventions. Chapter 4 discusses epidemiology and pathophysiology of ventricular arrhythmias in several noncardiac diseases, methods used to assess arrhythmia risk, and their association with long-term outcomes. Chapter 5 discusses the treatment of ventricular arrhythmias including indications for implantation of an AICD for primary and for secondary prevention in patients with and without congestive heart failure. Chapter 6 discusses surgical management of atrial fibrillation

    Fractal Analysis and Chaos in Geosciences

    Get PDF
    The fractal analysis is becoming a very useful tool to process obtained data from chaotic systems in geosciences. It can be used to resolve many ambiguities in this domain. This book contains eight chapters showing the recent applications of the fractal/mutifractal analysis in geosciences. Two chapters are devoted to applications of the fractal analysis in climatology, two of them to data of cosmic and solar geomagnetic data from observatories. Four chapters of the book contain some applications of the (multi-) fractal analysis in exploration geophysics. I believe that the current book is an important source for researchers and students from universities

    A COLLISION AVOIDANCE SYSTEM FOR AUTONOMOUS UNDERWATER VEHICLES

    Get PDF
    The work in this thesis is concerned with the development of a novel and practical collision avoidance system for autonomous underwater vehicles (AUVs). Synergistically, advanced stochastic motion planning methods, dynamics quantisation approaches, multivariable tracking controller designs, sonar data processing and workspace representation, are combined to enhance significantly the survivability of modern AUVs. The recent proliferation of autonomous AUV deployments for various missions such as seafloor surveying, scientific data gathering and mine hunting has demanded a substantial increase in vehicle autonomy. One matching requirement of such missions is to allow all the AUV to navigate safely in a dynamic and unstructured environment. Therefore, it is vital that a robust and effective collision avoidance system should be forthcoming in order to preserve the structural integrity of the vehicle whilst simultaneously increasing its autonomy. This thesis not only provides a holistic framework but also an arsenal of computational techniques in the design of a collision avoidance system for AUVs. The design of an obstacle avoidance system is first addressed. The core paradigm is the application of the Rapidly-exploring Random Tree (RRT) algorithm and the newly developed version for use as a motion planning tool. Later, this technique is merged with the Manoeuvre Automaton (MA) representation to address the inherent disadvantages of the RRT. A novel multi-node version which can also address time varying final state is suggested. Clearly, the reference trajectory generated by the aforementioned embedded planner must be tracked. Hence, the feasibility of employing the linear quadratic regulator (LQG) and the nonlinear kinematic based state-dependent Ricatti equation (SDRE) controller as trajectory trackers are explored. The obstacle detection module, which comprises of sonar processing and workspace representation submodules, is developed and tested on actual sonar data acquired in a sea-trial via a prototype forward looking sonar (AT500). The sonar processing techniques applied are fundamentally derived from the image processing perspective. Likewise, a novel occupancy grid using nonlinear function is proposed for the workspace representation of the AUV. Results are presented that demonstrate the ability of an AUV to navigate a complex environment. To the author's knowledge, it is the first time the above newly developed methodologies have been applied to an A UV collision avoidance system, and, therefore, it is considered that the work constitutes a contribution of knowledge in this area of work.J&S MARINE LT
    corecore