Improving Chaotic Cryptographic Primitives Based On Map’s Complexity And Period Length Of The Chaotic Maps
Peta camuk berkentuan menghasilkan ciri-ciri seperti determinisme, ergodisiti, perlakuan seperti rawak, ketidaklineran, aperiodisiti, entropi yang tinggi, imbangan, ketak kemerostan, korelasi maklumat yang amat rendah, dan kepekaan/kesensitifan yang amat tinggi terhadap perubahan yang amat kecil...
| Main Author: | Masoumi, Amir Akhavan |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/31377/ |
| Abstract | Abstract here |
Similar Items
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
Analysable Chaos-based Design Paradigms For Cryptographic Applications
by: Abba, Abubakar
Published: (2024)
by: Abba, Abubakar
Published: (2024)
A Denoising Generative Adversarial Network Based On Enhanced Feature Mapping Of Data Augmentation For Image Synthesis
by: Chen, Li
Published: (2024)
by: Chen, Li
Published: (2024)
A comparative study on image encryption based on 2D Chaotic Map
by: Nik Nur Syahirah Nik Rahim
Published: (2025)
by: Nik Nur Syahirah Nik Rahim
Published: (2025)
Training, Motivation And Leadership In Human Resource
Development Practices: The Case Of Construction Firms
Of Iran.
by: Tabassi, Amin Akhavan
Published: (2010)
by: Tabassi, Amin Akhavan
Published: (2010)
A Systematic Design Method For Modeling
Complex Processes And Interactions
In Web Hypermedia Applications
by: Jantan, Azrul Hazri
Published: (2009)
by: Jantan, Azrul Hazri
Published: (2009)
Action-Based Help Technique To Improve Learnability And Understandability Of Web Applications
by: Shamsuddin, Nurul Afiqah
Published: (2014)
by: Shamsuddin, Nurul Afiqah
Published: (2014)
Improved Multi-Verse Optimizer In Text Document Clustering For Topic Extraction
by: Abasi, Ammar Kamal Mousa
Published: (2021)
by: Abasi, Ammar Kamal Mousa
Published: (2021)
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table
by: Jaber, Aws Naser
Published: (2013)
by: Jaber, Aws Naser
Published: (2013)
Improvement Of Facial Recognition Accuracy Using Eye-Lids Movement And Tensorflow Model
by: Sukri, Syazwan Syafiqah
Published: (2021)
by: Sukri, Syazwan Syafiqah
Published: (2021)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
Heuristic Based Planning Approach For
Improving Wireless Network Coverage Of Multi-Storey Building
by: Yeong, Shoa Yei
Published: (2011)
by: Yeong, Shoa Yei
Published: (2011)
Rewind: Cbt-Based Serious Game To Improve Cognitive Emotion Regulations And Anxiety Disorders
by: Heng, Yew Ken
Published: (2023)
by: Heng, Yew Ken
Published: (2023)
Modulation Transfer Function Compensation Through A Modified Wiener Filter For Spatial Image Quality Improvement.
by: Wong, Soo Mee
Published: (2010)
by: Wong, Soo Mee
Published: (2010)
Modulation Transfer Function Compensation
Through A Modified Wiener Filter
For Spatial Image Quality Improvement
by: Wong , Soo Mee
Published: (2010)
by: Wong , Soo Mee
Published: (2010)
An Improved K-Nearest Neighbors Approach Using Modified Term Weighting And Similarity Coefficient For Text Classification
by: Kadhim, Ammar Ismael
Published: (2016)
by: Kadhim, Ammar Ismael
Published: (2016)
Improving IPv6 Packets Transmission Over High Speed Networks By Introducing CRC Extension Header
by: Supriyanto, .
Published: (2010)
by: Supriyanto, .
Published: (2010)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Enhanced Micro Genetic
Algorithm-Based Models For
Multi-Objective Optimization
by: Tan, Choo Jun
Published: (2014)
by: Tan, Choo Jun
Published: (2014)
Ad Hoc Wireless Routing With Density Based Probabilistic Algorithm For Mobile Wireless Networks With Non-Uniform Node Distribution
by: Ong , Hean Loong
Published: (2010)
by: Ong , Hean Loong
Published: (2010)
An E-Book Building Methodology Using An Extensible Personalization Structure For Operationalizing E-Book Interface Metaphors
by: Hameed, M. Noorul
Published: (2010)
by: Hameed, M. Noorul
Published: (2010)
Bipartite Graph Algorithm With Reference Frame Representation For Protein Tertiary Structure Matching
by: Othman, Fazilah
Published: (2010)
by: Othman, Fazilah
Published: (2010)
Intelligent Air Conditioner System : User Acceptance Level Of Icons And Cost Saving Analysis
by: Lim, Seng Chee
Published: (2009)
by: Lim, Seng Chee
Published: (2009)
Cancer Patient Portal : Investigating Users' Willingness To Publish From The Privacy Perspective
by: Chan, Hoon Hong
Published: (2009)
by: Chan, Hoon Hong
Published: (2009)
Crowd And Acoustical Modelling In
Digital Cultural Heritage
by: Lim, Chen Kim
Published: (2014)
by: Lim, Chen Kim
Published: (2014)
G-Group E-Shopping With Drive-Through (eWay) : Effective Drive-Through Operation For eWay
by: Guan, Huoi Ying
Published: (2010)
by: Guan, Huoi Ying
Published: (2010)
Innovator Intelligent Air Conditioner System: Marketing Plan And Pricing Strategy
by: Ching, Yee Khim
Published: (2009)
by: Ching, Yee Khim
Published: (2009)
Initial File-Placement In Data Grid Environment Using Game Theory And Fictitious Play
by: Indrayanto, Aloysius
Published: (2008)
by: Indrayanto, Aloysius
Published: (2008)
Automated Federation Of Virtual Organization In Grid Using Select, Match, Negotiate And Expand (SMNE) Protocol [QA76.9.C58 C518 2008 f rb].
by: Cheng, Wai Khuen
Published: (2007)
by: Cheng, Wai Khuen
Published: (2007)
Intelligent Air Conditioner System: Marketing Plan And Pricing Strategy.
by: Ching, Yee Khim
Published: (2009)
by: Ching, Yee Khim
Published: (2009)
Intelligent Air Conditioner System: User Acceptance Level of ICONS and Cost Saving Analysis.
by: Lim, Seng Chee
Published: (2009)
by: Lim, Seng Chee
Published: (2009)
Management Report System For Electricity Companies:
A Proposed Model For Management Report System
(Mrs) In Zanjan Regional Electric Company.
by: Farrokhi, Vahid
Published: (2010)
by: Farrokhi, Vahid
Published: (2010)
Medical Image Modality Classification using Feature Weighted Clustering Approach.
by: Chandra, Bhavik Anil
Published: (2010)
by: Chandra, Bhavik Anil
Published: (2010)
Modeling Of Static And Kinetic Friction In Rubber-Pad Forming
Process.
by: Ramezani, Maziar
Published: (2009)
by: Ramezani, Maziar
Published: (2009)
Parallel Quick-Skip Search Hybrid Algorithm For The Exact String Matching Problem.
by: Naser, Mustafa Abdulsahib
Published: (2010)
by: Naser, Mustafa Abdulsahib
Published: (2010)
Penggunaan Kaedah Pengimejan Resistiviti 2-D Dan Seismik Biasan Dalam Kajian Subpermukaan Untuk Kejuruteraan Awam.
by: Jusoh, Zuriati
Published: (2010)
by: Jusoh, Zuriati
Published: (2010)
S-Cart, Intelligent self check-out trolley in hypermarket.
Creation of value proposition for intelligent self-checkout trolley.
by: Koh, Peik See
Published: (2010)
by: Koh, Peik See
Published: (2010)
Sensorml-Nt: Innovative Cloud Service Sensor Description For Mobile Devices Handling Environmental Issues.
by: Yazdi, Nazi Tabatabaei
Published: (2011)
by: Yazdi, Nazi Tabatabaei
Published: (2011)
Similar Items
-
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020) -
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022) -
Analysable Chaos-based Design Paradigms For Cryptographic Applications
by: Abba, Abubakar
Published: (2024) -
A Denoising Generative Adversarial Network Based On Enhanced Feature Mapping Of Data Augmentation For Image Synthesis
by: Chen, Li
Published: (2024) -
A comparative study on image encryption based on 2D Chaotic Map
by: Nik Nur Syahirah Nik Rahim
Published: (2025)