2,639 research outputs found
Electronically--implemented coupled logistic maps
The logistic map is a paradigmatic dynamical system originally conceived to
model the discrete-time demographic growth of a population, which shockingly,
shows that discrete chaos can emerge from trivial low-dimensional non-linear
dynamics. In this work, we design and characterize a simple, low-cost,
easy-to-handle, electronic implementation of the logistic map. In particular,
our implementation allows for straightforward circuit-modifications to behave
as different one-dimensional discrete-time systems. Also, we design a coupling
block in order to address the behavior of two coupled maps, although, our
design is unrestricted to the discrete-time system implementation and it can be
generalized to handle coupling between many dynamical systems, as in a complex
system. Our findings show that the isolated and coupled maps' behavior has a
remarkable agreement between the experiments and the simulations, even when
fine-tuning the parameters with a resolution of . We support
these conclusions by comparing the Lyapunov exponents, periodicity of the
orbits, and phase portraits of the numerical and experimental data for a wide
range of coupling strengths and map's parameters.Comment: 8 pages, 10 figure
Hyperchaos and bifurcations in a driven Van der Pol–Duffing oscillator circuit
We investigate the dynamics of a driven Van der Pol–Duffing oscillator circuit and show the existence of higher-dimensional chaotic orbits (or hyperchaos), transient chaos, strange-nonchaotic attractors, as well as quasiperiodic orbits born from Hopf bifurcating orbits. By computing all the Lyapunov exponent spectra, scanning a wide range of the driving frequency and driving amplitude parameter space, we explore in two-parameter space the regimes of different dynamical behaviours
Recent Advances in Signal Processing
The signal processing task is a very critical issue in the majority of new technological inventions and challenges in a variety of applications in both science and engineering fields. Classical signal processing techniques have largely worked with mathematical models that are linear, local, stationary, and Gaussian. They have always favored closed-form tractability over real-world accuracy. These constraints were imposed by the lack of powerful computing tools. During the last few decades, signal processing theories, developments, and applications have matured rapidly and now include tools from many areas of mathematics, computer science, physics, and engineering. This book is targeted primarily toward both students and researchers who want to be exposed to a wide variety of signal processing techniques and algorithms. It includes 27 chapters that can be categorized into five different areas depending on the application at hand. These five categories are ordered to address image processing, speech processing, communication systems, time-series analysis, and educational packages respectively. The book has the advantage of providing a collection of applications that are completely independent and self-contained; thus, the interested reader can choose any chapter and skip to another without losing continuity
Topics in chaotic secure communication
Results in nonlinear dynamics and chaos during this decade have been applied to problems in secure communications with limited success. Most of these applications have been based on the chaotic synchronization property discovered by Pecora and Carroll in 1989 [37]. Short [44, 45, 48] demonstrated the effectiveness of nonlinear dynamic (NLD) forecasting methods in breaking this class of communication schemes. In response, investigators have proposed enhancements to the basic synchronization technique in an attempt to improve the security properties. In this work two of these newer communication systems will be analyzed using NLD forecasting and other techniques to determine the level of security they provide. It will be shown that the transmitted waveform alone allows an eavesdropper to extract the message.
During the course of this research, a new impulsively initialized, binary chaotic communication scheme has been developed, which eliminates the most significant weaknesses of its predecessors. This new approach is based on symbolic dynamics and chaotic control, and may be implemented using one-dimensional maps, which gives the designer more control over the statistics of the transmitted binary stream. Recent results in a certain class of one-dimensional chaotic maps will be discussed in this context.
The potential for using NLD techniques in problems from standard digital communications will also be explored. The two problems which will be addressed are bit errors due to channel effects and co-channel interference. It will be shown that NLD reconstruction methods provide a way to exploit the short-term determinism that is present in these types of communication signals
Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges
Satellite-based Communication systems are gaining renewed momentum in
Industry and Academia, thanks to innovative services introduced by leading tech
companies and the promising impact they can deliver towards the global
connectivity objective tackled by early 6G initiatives. On the one hand, the
emergence of new manufacturing processes and radio technologies promises to
reduce service costs while guaranteeing outstanding communication latency,
available bandwidth, flexibility, and coverage range. On the other hand,
cybersecurity techniques and solutions applied in SATCOM links should be
updated to reflect the substantial advancements in attacker capabilities
characterizing the last two decades. However, business urgency and
opportunities are leading operators towards challenging system trade-offs,
resulting in an increased attack surface and a general relaxation of the
available security services. In this paper, we tackle the cited problems and
present a comprehensive survey on the link-layer security threats, solutions,
and challenges faced when deploying and operating SATCOM systems.Specifically,
we classify the literature on security for SATCOM systems into two main
branches, i.e., physical-layer security and cryptography schemes.Then, we
further identify specific research domains for each of the identified branches,
focusing on dedicated security issues, including, e.g., physical-layer
confidentiality, anti-jamming schemes, anti-spoofing strategies, and
quantum-based key distribution schemes. For each of the above domains, we
highlight the most essential techniques, peculiarities, advantages,
disadvantages, lessons learned, and future directions.Finally, we also identify
emerging research topics whose additional investigation by Academia and
Industry could further attract researchers and investors, ultimately unleashing
the full potential behind ubiquitous satellite communications.Comment: 72 page
Quantum entropy expansion using n-qubit permutation matrices in Galois field
Random numbers are critical for any cryptographic application. However, the
data that is flowing through the internet is not secure because of entropy
deprived pseudo random number generators and unencrypted IoTs. In this work, we
address the issue of lesser entropy of several data formats. Specifically, we
use the large information space associated with the n-qubit permutation
matrices to expand the entropy of any data without increasing the size of the
data. We take English text with the entropy in the range 4 - 5 bits per byte.
We manipulate the data using a set of n-qubit (n 10) permutation
matrices and observe the expansion of the entropy in the manipulated data (to
more than 7.9 bits per byte). We also observe similar behaviour with other data
formats like image, audio etc. (n 15)
Authenticated public key elliptic curve based on deep convolutional neural network for cybersecurity image encryption application
The demand for cybersecurity is growing to safeguard information flow and enhance data privacy. This essay suggests a novel authenticated public key elliptic curve based on a deep convolutional neural network (APK-EC-DCNN) for cybersecurity image encryption application. The public key elliptic curve discrete logarithmic problem (EC-DLP) is used for elliptic curve Diffie–Hellman key exchange (EC-DHKE) in order to generate a shared session key, which is used as the chaotic system’s beginning conditions and control parameters. In addition, the authenticity and confidentiality can be archived based on ECC to share the (Formula presented.) parameters between two parties by using the EC-DHKE algorithm. Moreover, the 3D Quantum Chaotic Logistic Map (3D QCLM) has an extremely chaotic behavior of the bifurcation diagram and high Lyapunov exponent, which can be used in high-level security. In addition, in order to achieve the authentication property, the secure hash function uses the output sequence of the DCNN and the output sequence of the 3D QCLM in the proposed authenticated expansion diffusion matrix (AEDM). Finally, partial frequency domain encryption (PFDE) technique is achieved by using the discrete wavelet transform in order to satisfy the robustness and fast encryption process. Simulation results and security analysis demonstrate that the proposed encryption algorithm achieved the performance of the state-of-the-art techniques in terms of quality, security, and robustness against noise- and signal-processing attacks
Research on digital image watermark encryption based on hyperchaos
The digital watermarking technique embeds meaningful information into one or more watermark images hidden in one image, in which it is known as a secret carrier. It is difficult for a hacker to extract or remove any hidden watermark from an image, and especially to crack so called digital watermark. The combination of digital watermarking technique and traditional image encryption technique is able to greatly improve anti-hacking capability, which suggests it is a good method for keeping the integrity of the original image. The research works contained in this thesis include: (1)A literature review the hyperchaotic watermarking technique is relatively more advantageous, and becomes the main subject in this programme. (2)The theoretical foundation of watermarking technologies, including the human visual system (HVS), the colour space transform, discrete wavelet transform (DWT), the main watermark embedding algorithms, and the mainstream methods for improving watermark robustness and for evaluating watermark embedding performance. (3) The devised hyperchaotic scrambling technique it has been applied to colour image watermark that helps to improve the image encryption and anti-cracking capabilities. The experiments in this research prove the robustness and some other advantages of the invented technique. This thesis focuses on combining the chaotic scrambling and wavelet watermark embedding to achieve a hyperchaotic digital watermark to encrypt digital products, with the human visual system (HVS) and other factors taken into account. This research is of significant importance and has industrial application value
Human performance prediction in man-machine systems. Volume 1 - A technical review
Tests and test techniques for human performance prediction in man-machine systems task
- …