719 research outputs found
On the Application of PSpice for Localised Cloud Security
The work reported in this thesis commenced with a review of methods for creating random binary sequences for encoding data locally by the client before storing in the Cloud. The first method reviewed investigated evolutionary computing software which generated noise-producing functions from natural noise, a highly-speculative novel idea since noise is stochastic. Nevertheless, a function was created which generated noise to seed chaos oscillators which produced random binary sequences and this research led to a circuit-based one-time pad key chaos encoder for encrypting data. Circuit-based delay chaos oscillators, initialised with sampled electronic noise, were simulated in a linear circuit simulator called PSpice. Many simulation problems were encountered because of the nonlinear nature of chaos but were solved by creating new simulation parts, tools and simulation paradigms. Simulation data from a range of chaos sources was exported and analysed using Lyapunov analysis and identified two sources which produced one-time pad sequences with maximum entropy. This led to an encoding system which generated unlimited, infinitely-long period, unique random one-time pad encryption keys for plaintext data length matching. The keys were studied for maximum entropy and passed a suite of stringent internationally-accepted statistical tests for randomness. A prototype containing two delay chaos sources initialised by electronic noise was produced on a double-sided printed circuit board and produced more than 200 Mbits of OTPs. According to Vladimir Kotelnikov in 1941 and Claude Shannon in 1945, one-time pad sequences are theoretically-perfect and unbreakable, provided specific rules are adhered to. Two other techniques for generating random binary sequences were researched; a new circuit element, memristance was incorporated in a Chua chaos oscillator, and a fractional-order Lorenz chaos system with order less than three. Quantum computing will present many problems to cryptographic system security when existing systems are upgraded in the near future. The only existing encoding system that will resist cryptanalysis by this system is the unconditionally-secure one-time pad encryption
Post-critical set and non existence of preserved meromorphic two-forms
We present a family of birational transformations in depending on
two, or three, parameters which does not, generically, preserve meromorphic
two-forms. With the introduction of the orbit of the critical set (vanishing
condition of the Jacobian), also called ``post-critical set'', we get some new
structures, some "non-analytic" two-form which reduce to meromorphic two-forms
for particular subvarieties in the parameter space. On these subvarieties, the
iterates of the critical set have a polynomial growth in the \emph{degrees of
the parameters}, while one has an exponential growth out of these subspaces.
The analysis of our birational transformation in is first carried out
using Diller-Favre criterion in order to find the complexity reduction of the
mapping. The integrable cases are found. The identification between the
complexity growth and the topological entropy is, one more time, verified. We
perform plots of the post-critical set, as well as calculations of Lyapunov
exponents for many orbits, confirming that generically no meromorphic two-form
can be preserved for this mapping. These birational transformations in ,
which, generically, do not preserve any meromorphic two-form, are extremely
similar to other birational transformations we previously studied, which do
preserve meromorphic two-forms. We note that these two sets of birational
transformations exhibit totally similar results as far as topological
complexity is concerned, but drastically different results as far as a more
``probabilistic'' approach of dynamical systems is concerned (Lyapunov
exponents). With these examples we see that the existence of a preserved
meromorphic two-form explains most of the (numerical) discrepancy between the
topological and probabilistic approach of dynamical systems.Comment: 34 pages, 7 figure
Machine Learning with Chaotic Strange Attractors
Machine learning studies need colossal power to process massive datasets and
train neural networks to reach high accuracies, which have become gradually
unsustainable. Limited by the von Neumann bottleneck, current computing
architectures and methods fuel this high power consumption. Here, we present an
analog computing method that harnesses chaotic nonlinear attractors to perform
machine learning tasks with low power consumption. Inspired by neuromorphic
computing, our model is a programmable, versatile, and generalized platform for
machine learning tasks. Our mode provides exceptional performance in clustering
by utilizing chaotic attractors' nonlinear mapping and sensitivity to initial
conditions. When deployed as a simple analog device, it only requires
milliwatt-scale power levels while being on par with current machine learning
techniques. We demonstrate low errors and high accuracies with our model for
regression and classification-based learning tasks.Comment: Manuscript is 13 pages, 4 figures. Supplementary Material is 6 pages,
3 figure
A review of enhanced image techniques using chaos encryption
Secured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security
Computational Intelligence and Complexity Measures for Chaotic Information Processing
This dissertation investigates the application of computational intelligence methods in the analysis of nonlinear chaotic systems in the framework of many known and newly designed complex systems. Parallel comparisons are made between these methods. This provides insight into the difficult challenges facing nonlinear systems characterization and aids in developing a generalized algorithm in computing algorithmic complexity measures, Lyapunov exponents, information dimension and topological entropy. These metrics are implemented to characterize the dynamic patterns of discrete and continuous systems. These metrics make it possible to distinguish order from disorder in these systems. Steps required for computing Lyapunov exponents with a reorthonormalization method and a group theory approach are formalized. Procedures for implementing computational algorithms are designed and numerical results for each system are presented. The advance-time sampling technique is designed to overcome the scarcity of phase space samples and the buffer overflow problem in algorithmic complexity measure estimation in slow dynamics feedback-controlled systems. It is proved analytically and tested numerically that for a quasiperiodic system like a Fibonacci map, complexity grows logarithmically with the evolutionary length of the data block. It is concluded that a normalized algorithmic complexity measure can be used as a system classifier. This quantity turns out to be one for random sequences and a non-zero value less than one for chaotic sequences. For periodic and quasi-periodic responses, as data strings grow their normalized complexity approaches zero, while a faster deceasing rate is observed for periodic responses. Algorithmic complexity analysis is performed on a class of certain rate convolutional encoders. The degree of diffusion in random-like patterns is measured. Simulation evidence indicates that algorithmic complexity associated with a particular class of 1/n-rate code increases with the increase of the encoder constraint length. This occurs in parallel with the increase of error correcting capacity of the decoder. Comparing groups of rate-1/n convolutional encoders, it is observed that as the encoder rate decreases from 1/2 to 1/7, the encoded data sequence manifests smaller algorithmic complexity with a larger free distance value
Persistent Homology of Attractors For Action Recognition
In this paper, we propose a novel framework for dynamical analysis of human
actions from 3D motion capture data using topological data analysis. We model
human actions using the topological features of the attractor of the dynamical
system. We reconstruct the phase-space of time series corresponding to actions
using time-delay embedding, and compute the persistent homology of the
phase-space reconstruction. In order to better represent the topological
properties of the phase-space, we incorporate the temporal adjacency
information when computing the homology groups. The persistence of these
homology groups encoded using persistence diagrams are used as features for the
actions. Our experiments with action recognition using these features
demonstrate that the proposed approach outperforms other baseline methods.Comment: 5 pages, Under review in International Conference on Image Processin
- …