22 research outputs found
Design and Implementation of Secure Chaotic Communication Systems
Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mismatches, mixing property, deterministic dynamics, structure complexity, to mention a few, that map nicely with cryptographic requirements such as confusion, diffusion, deterministic pseudorandomness, algorithm complexity. Furthermore, the possibility of chaotic synchronization, where the master system (transmitter) is driving the slave system (receiver) by its output signal, made it probable for the possible utilization of chaotic systems to implement security in the communication systems. Many methods like chaotic masking, chaotic modulation, inclusion, chaotic shift keying (CSK) had been proposed however, many attack methods later showed them to be insecure. Different modifications of these methods also exist in the literature to improve the security, but almost all suffer from the same drawback. Therefore, the implementation of chaotic systems in security still remains a challenge. In this work, different possibilities on how it might be possible to improve the security of the existing methods are explored. The main problem with the existing methods is that the message imprint could be found in the dynamics of the transmitted signal, therefore by some signal processing or pattern classification techniques, etc, allow the exposition of the hidden message. Therefore, the challenge is to remove any pattern or change in dynamics that the message might bring in the transmitted signal
Design and implementation of secure chaotic communication systems
Chaotic systems have properties such as ergodicity, sensitivity to initial conditions/parameter mismatches, mixing property, deterministic dynamics, structure complexity, to mention a few, that map nicely with cryptographic requirements such as confusion, diffusion, deterministic pseudorandomness, algorithm complexity. Furthermore, the possibility of chaotic synchronization, where the master system (transmitter) is driving the slave system (receiver) by its output signal, made it probable for the possible utilization of chaotic systems to implement security in the communication systems. Many methods like chaotic masking, chaotic modulation, inclusion, chaotic shift keying (CSK) had been proposed however, many attack methods later showed them to be insecure. Different modifications of these methods also exist in the literature to improve the security, but almost all suffer from the same drawback. Therefore, the implementation of chaotic systems in security still remains a challenge. In this work, different possibilities on how it might be possible to improve the security of the existing methods are explored. The main problem with the existing methods is that the message imprint could be found in the dynamics of the transmitted signal, therefore by some signal processing or pattern classification techniques, etc, allow the exposition of the hidden message. Therefore, the challenge is to remove any pattern or change in dynamics that the message might bring in the transmitted signal.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
14th Conference on Dynamical Systems Theory and Applications DSTA 2017 ABSTRACTS
From Preface:
This is the fourteen time when the conference “Dynamical Systems – Theory and
Applications” gathers a numerous group of outstanding scientists and engineers, who deal with
widely understood problems of theoretical and applied dynamics.
Organization of the conference would not have been possible without a great effort of the
staff of the Department of Automation, Biomechanics and Mechatronics. The patronage over
the conference has been taken by the Committee of Mechanics of the Polish Academy of
Sciences and the Ministry of Science and Higher Education.
It is a great pleasure that our invitation has been accepted by so many people, including good
colleagues and friends as well as a large group of researchers and scientists, who decided to
participate in the conference for the first time. With proud and satisfaction we welcome nearly
250 persons from 38 countries all over the world. They decided to share the results of their
research and many years experiences in the discipline of dynamical systems by submitting many
very interesting papers.
This booklet contains a collection of 375 abstracts, which have gained the acceptance of
referees and have been qualified for publication in the conference proceedings [...]
Cardiac Arrhythmias
This book is useful for physicians taking care of patients with cardiac arrhythmias and includes six chapters written by experts in their field. Chapter 1 discusses basic mechanisms of cardiac arrhythmias. Chapter 2 discusses the chronobiological aspects of the impact of apnoic episodes on ventricular arrhythmias. Chapter 3 discusses navigation, detection, and tracking during cardiac ablation interventions. Chapter 4 discusses epidemiology and pathophysiology of ventricular arrhythmias in several noncardiac diseases, methods used to assess arrhythmia risk, and their association with long-term outcomes. Chapter 5 discusses the treatment of ventricular arrhythmias including indications for implantation of an AICD for primary and for secondary prevention in patients with and without congestive heart failure. Chapter 6 discusses surgical management of atrial fibrillation
Fractal Analysis and Chaos in Geosciences
The fractal analysis is becoming a very useful tool to process obtained data from chaotic systems in geosciences. It can be used to resolve many ambiguities in this domain. This book contains eight chapters showing the recent applications of the fractal/mutifractal analysis in geosciences. Two chapters are devoted to applications of the fractal analysis in climatology, two of them to data of cosmic and solar geomagnetic data from observatories. Four chapters of the book contain some applications of the (multi-) fractal analysis in exploration geophysics. I believe that the current book is an important source for researchers and students from universities
A COLLISION AVOIDANCE SYSTEM FOR AUTONOMOUS UNDERWATER VEHICLES
The work in this thesis is concerned with the development of a novel and practical collision
avoidance system for autonomous underwater vehicles (AUVs). Synergistically,
advanced stochastic motion planning methods, dynamics quantisation approaches,
multivariable tracking controller designs, sonar data processing and workspace representation,
are combined to enhance significantly the survivability of modern AUVs.
The recent proliferation of autonomous AUV deployments for various missions such
as seafloor surveying, scientific data gathering and mine hunting has demanded a substantial
increase in vehicle autonomy. One matching requirement of such missions is
to allow all the AUV to navigate safely in a dynamic and unstructured environment.
Therefore, it is vital that a robust and effective collision avoidance system should be
forthcoming in order to preserve the structural integrity of the vehicle whilst simultaneously
increasing its autonomy.
This thesis not only provides a holistic framework but also an arsenal of computational
techniques in the design of a collision avoidance system for AUVs. The
design of an obstacle avoidance system is first addressed. The core paradigm is the
application of the Rapidly-exploring Random Tree (RRT) algorithm and the newly
developed version for use as a motion planning tool. Later, this technique is merged
with the Manoeuvre Automaton (MA) representation to address the inherent disadvantages
of the RRT. A novel multi-node version which can also address time varying
final state is suggested. Clearly, the reference trajectory generated by the aforementioned
embedded planner must be tracked. Hence, the feasibility of employing the
linear quadratic regulator (LQG) and the nonlinear kinematic based state-dependent
Ricatti equation (SDRE) controller as trajectory trackers are explored.
The obstacle detection module, which comprises of sonar processing and workspace
representation submodules, is developed and tested on actual sonar data acquired
in a sea-trial via a prototype forward looking sonar (AT500). The sonar processing
techniques applied are fundamentally derived from the image processing perspective.
Likewise, a novel occupancy grid using nonlinear function is proposed for the
workspace representation of the AUV. Results are presented that demonstrate the
ability of an AUV to navigate a complex environment.
To the author's knowledge, it is the first time the above newly developed methodologies
have been applied to an A UV collision avoidance system, and, therefore, it is
considered that the work constitutes a contribution of knowledge in this area of work.J&S MARINE LT