Abstract This paper is devoted to the design of **new** chaotic Pseudo Random Num- ber Generator (**CPRNG**). Exploring several topologies of network of 1-D coupled chaotic mapping, we focus first on two dimensional networks. Two coupled **maps** are studied: T T L RC non-alternative, and T T L SC alternative. The primary idea of the novel **maps** has been **based** on an original coupling of the **tent** and **logistic** **maps** to achieve excellent random properties and homogeneous /uniform/ density in the phase plane, thus guaranteeing maximum security when used for chaos base cryp- tography. In this aim a **new** **nonlinear** **CPRNG**: MT T L SC 2 is proposed. In addition, we explore higher dimension and the proposed ring coupling with injection mecha- nism enables us to achieve the strongest security requirements.

Show more
36 Read more

On the basis of the improved chaotic cryptosystem with external key by Nisha Kushwah, we have improved the security of the cryptosystem in this scheme by using the advantages of both **maps** i.e., **Logistic** map and Skew **tent** map. A generalized description of Nisha Kushwah’s cryptosystems is given here and their weaknesses and also their solution to provide more security. We have notice that both proposed and Nisha Kushwah’s cryptosystem have same size of plaintext and ciphertext and size of ciphertext generated by both systems are similar and their encryption time are also same. **Based** on the above analyses, more secure cryptosystem is proposed. For this secure scheme, one **logistic** and one skew **tent** map are used instead of two **logistic** **maps** in order to obtain chaotic sequences with improved cryptographic feature. All these advantages make this more secure cryptosystem for the use of information transmission over insecure channel and secure application.

Show more
The tremendous development of **new** IT technologies, e-banking, e-purchasing, Internet of Things, etc. nowadays increases incessantly the needs for **new** and more secure cryptosystems. They are used for information encryption, pushing forward the demand for more efficient and secure pseudo-random number generators [1] in the scope of chaos **based** cryptography. Indeed, chaotic **maps** show up as perfect candidates, able to generate independent and secure pseudo-random sequences (used as information carriers or directly involved in the process of encryption/decryption). However, the majority of well-known chaotic **maps** are not naturally suitable for encryption [2] and most of them do not exhibit even satisfactory properties for encryption. To deal with this open problem, we propose the **new** idea to couple **tent** and **logistic** map, and to add a specific injection mechanism to capture the escaping orbits. Good results are demonstrated with two different kinds of coupling, simple and ring-coupling in dimension 2, thus increasing the complexity of the system. However as those results are not completely satisfactory, by exploring further topologies of coupled **nonlinear** **maps**, we propose an improved geometry of coupling which allows us to describe a **new** 2-D Chaotic Pseudo Random Number Generator (**CPRNG**).

Show more
15 Read more

DOI: 10.4236/jcc.2018.66003 32 Journal of Computer and Communications In 1998, Fridrich proposed an image encryption algorithm **based** on permuta- tion and confusion structure in [1]. [2] [3] discussed the use of Arnold mapping for pixel replacement, in which [3] also incorporates discrete Chen mapping of pixel values for permutation confusion; [4] [5] [6] [7] used the randomness of one-dimensional chaotic sequence to scramble the pixel position of the image to realize encryption; [8] proposed an image bit encryption algorithm **based** on Jo- seph’s ergodic and generalized Henon mapping. The security image to be en- crypted Hash Algorithm 1 (SHA-1) summary and user-selected encryption pa- rameters are combined as the key to drive Generalized Henon Mapping to ran- domly disturb the starting position, the reported number of intervals and the reported direction of the improved Josephus traversal map, so that different en- crypted images and encryption parameters correspond substantially to different site replacement processes and added a site obfuscation process to improve the security of site replacement. [9] proposed an image pixels scrambling by **Tent** chaotic mapping and then using S-box permutation of color image encryption algorithm at the bit; [8]-[14] introduced a bit-**based** encryption algorithm; [15] proposed improved the **Logistic** map by using scale transformation, constructing robust system and composite mapping respectively. [16] proposed an image en- cryption with chaotically coupled chaotic **maps**. [17] proposed an image encryp- tion algorithm **based** on Brownian motion and image, and introduced a **new** one-dimensional chaotic system. [18] analyzed the security of image encryption algorithm **based** on the incorrect fractional-order chaotic system. In [19], a data invariant encryption algorithm **based** on improved **Logistic** mapping is proposed. The image encryption performance is analyzed and studied and some indexes of encryption performance evaluation are also given in the [3] [20].

Show more
14 Read more

In this paper, **new** algorithm for text encryption **based** on block cipher and chaotic **maps** is proposed. The proposed algorithm is encrypted and decrypted a block size of (8×8) byte. The **nonlinear** substitution S-box component that previously designed **based** on the method in [16]. Each block is first permuted by using 2D Standard map and then substituted by the bytes in S-box. The resulted block is then Xored with the key. A random key generator **based** on **Tent** map is proposed to generate the key sequences that used in the encryption and decryption process. The outcomes from key space test, differential assault examination, information entropy test, correlation test of the plaintext and ciphertext characters have demonstrated that the proposed algorithm can oppose cryptanalytic, statistical and brute force assaults, and accomplish more elevated amount of security.

Show more
The greater-than-additive **maps**, in contrast, were more surprising: why would mutations have a larger effect when introduced into a more favorable background? For the b-lactamase genotype-phenotype map (III, Figure 4), this may be an artifact of the original analysis used to generate the data set (Weinreich et al. 2006). This data set describes the ﬁtness of bacteria expressing variants of an enzyme with activity against b-lactam antibiotics. The original authors measured the minimum-inhibitory concentration (MIC) of the antibiotic against bacteria expressing each enzyme vari- ant. They then converted their MIC values into apparent ﬁt- ness by sampling from an exponential distribution of ﬁtness values and assigning these ﬁtness values to rank-ordered MIC values (Weinreich et al. 2006). Our epistasis model extracts this original exponential distribution (Figure S6). This result demonstrates the effectiveness of our approach in extracting nonlinearity in the genotype-phenotype map.

Show more
10 Read more

basis of **logistic** regression (Bishop, 2006). In contrary to pre- vious research on transfer learning **based** on generative models (Bruzzone and Prieto, 2001), a discriminative probabilistic clas- sifier models the posterior probability directly and is expected to require fewer training samples than a generative approach. We choose a method **based** on instance transfer that is inspired by (Bruzzone and Marconcini, 2010), but uses a base classifier of lower computational complexity, in particular in training. In ad- dition, unlike SVM **logistic** regression can be expanded to the multiclass case in a straight-forward way. As (Bruzzone and Marconcini, 2010), we follow the strategy of gradually replacing source training samples by target samples classified by the most current state of the classifier, but due to the different nature of our basic classifier (**logistic** regression vs. SVM) and due to a differ- ent training paradigm (Bayesian estimation vs. maximum mar- gin training), we have to use strategies different to those applied in (Bruzzone and Marconcini, 2010) for deciding which training samples from the source domain are to be eliminated from the training data and which samples from the target domain are to be added in each iteration. This approach is also different to (Zhang et al., 2010), because we do not weigh source domain samples to adapt the final classifier, but we substitute source samples by target samples, so that the classifier is trained only on the basis of target domain samples that received class labels in the adap- tation process. Furthermore, unlike (Zhang et al., 2010), we are not dealing with binary classification, but we consider multiclass problems.

Show more
15. When the **tent** is set up, please call the Development Services Team at (630) 420-6100 option 1 to schedule an inspection. The City requires at least 72-hours notice for inspections. Hours to call for inspections are 8:00 a.m. to 4:00 p.m., (closed daily from 1-2 p.m.) Monday through Friday.

Zheng, J., Wang, Y.: Boundedness and decay behavior in a higher-dimensional quasilinear chemotaxis system with nonlinear logistic source.[r]

13 Read more

being chosen. That is, the probability either brand’s product is selected by some consumer is 0.5, so both brands have equal chances of being selected by some consumer. According to Holland and Wessells (1998) [4], predicting preference can be **based** on some specific attributes of the goods or product. But for this study, we do not intend to go into details as to other factors that could influence the consumer’s preference except for the given rank.

42 Read more

We provide new assertions on factorization of tent spaces and based on them provide new embedding theorems for some analytic spaces in the unit disk}. Introduction.[r]

In this paper, we have proposed **new** a **nonlinear** CG- algorithms **based** on the Scaled Matrix defined by (17) under some assumptions. The **new** algorithm has been shown to be globally convergent and satisfies the descent property. The computational experiments show that the **new** kinds given in this paper are successful. Table 6 and Table 7 give comparisons between the **new**-algorithm and FR algorithms whose results be given by [7] for convex optimization. Table 8 saves the **new** algorithm of ( 42 )% NOI and ( 41 )% IRS

Show more
Multilinear **maps**. The cryptographic multilinear map has many applications, includ- ing non-interactive key exchange, general program obfuscation, and eﬃcient broadcast encryption. After the first candidate construction of Garg, Gentry, and Halevi(GGH13, for short) [GGH13], it received a considerable amount of attention. Shortly afterwards, Coron, Lepoint, and Tibouchi proposed another candidate of multilinear **maps** (CLT13, for short) [CLT13]. It is constructed over the integers and gives the first implemen- tation of multilinear **maps** [CLT13]. The most recent candidate, called GGH15, was suggested by Gentry, Gorbunov, and Halevi using a directed acyclic graph [GGH15]. Attack and revisions of CLT13. In [CLT13], it was claimed that CLT13 is ro- bust against a zeroizing attack. Hence, CLT13 supports the Graded Decisional Diﬃe- Helman assumption (GDDH), subgroup membership (SubM), and decisional linear (DLIN) problems are hard in it, while GGH13 supports only the GDDH. However, Cheon, Han, Lee, Ryu, and Stehl´ e proposed an attack, called CHLRS, on the scheme [CHL + 15], which runs in polynomial time and recovers all secrets. As in the zeroizing attack of GGH13, the attack utilizes public low level encodings of zero, which allows an encoding to be generated without the secret values being known. The core of the attack is to compute several zero-testing values related to one another. Then, one can construct a matrix, the eigenvalues of which consist of the CRT component of x, which is x (mod p i ) for some encoding x, where p 1 , · · · , p n are secret values of the

Show more
15 Read more

be the case in this specific example during development. A layer of durable, Teflon-coated woven fibreglass netting between the entry funnels and the bait host allows the human participant to sleep while protected from mosquito bites. Bisecting the protective netting panel, a zip enables the participant to aspirate mosqui- toes from inside the trap. The trap floor is made of thick polyvinylchloride sheeting, which protects against rough substrates and surface water. The two traps differ only in the design of the entry points. Ifakara A used square shaped entrances that were partially covered by an over- hanging flap of canvas, while Ifakara B used completely exposed circular entrances (Figure 1B and 1C). These two designs, **based** on a prototype used previously to assess mosquito behaviour in the Kilombero valley [39], were developed iteratively in Lupiro village where very high densities of An. gambiae s.l. allowed rapid assessment through a series of stepwise modifications.

Show more
12 Read more

In Tables 1 and 2, it is shown that in some cases, algorithms 1 and 2 are better than the Newton’s method for solving **nonlinear** equations. It is observe that in some cases the **new** methods require less iteration and function evaluation than that of Newton’s. Moreover, as you see in Table 2, the **new** methods require less number of operations than Newton’s method.

This paper is organized as follows. The model of the bilevel programming problem and some conceptions are presented in Section 2, and a solution method of the fol- lower’s problem is given **based** on a decomposition scheme in Section 3. Section 4 presents an evolutionary algorithm in which **new** evolutionary operators are de- signed. Experimental results and comparison are pre- sented in Section 5. We finally conclude our paper in Section 6.

The purpose of this paper is to analyze the Newell- Whitham-type car-following model which considers not only the headway of arbitrary number of vehicles ahead but also the relative velocity. We analyze the effect of the headway of vehicles ahead and the relative velocity upon the stability of traffic flow by using the linear theory. The result shows that the stability of traffic flow is improved by taking into account the headway of vehicles ahead and the relative velocity. Moreover, we apply the **nonlinear** analysis to derive the mKdV equation near the critical point and obtain its kink-antikink soliton solution to describe traffic jams. Finally we carry out the computer simulation for the extended model with periodic boundary condition. The numerical simulation is good agreement with the analytic results.

Show more
This work defines a **new** **nonlinear** adaptive filter **based** on a feed-forward neural network with the capacity of significantly reducing the additive noise of an image. Even though measurements have been carried out using x-ray images with additive white Gaussian noise, it is possible to extend the results to other type of images. Comparisons have been carried out with the Weiner filter because it is the most effective option for reducing Gaus- sian noise. In most of the cases, image reconstruction using the proposed method has produced satisfactory results. Finally, some conclusions and future work lines are presented.

Show more
He argues, as well, that there is more overlap than difference in men's and women's sexual practices, while nevertheless hoping to elaborate the distinct biological and evolutionary unde[r]

22 Read more

Harmonic **maps** are smooth **maps** between Riemannian manifolds which extremize the ‘Dirich- let’ energy integral (see, for example, [14]). Harmonic **maps** from surfaces into symmetric spaces are of particular interest to both geometers, as they include minimal surfaces, and to theoretical physicists, as they constitute the non-linear σ-model of particle physics. Twistor methods for finding such harmonic **maps** have been around for a long time; a general theory was given by F. E. Burstall and J. H. Rawnsley [7], see also [11]. The idea is to find a twistor fibration (for harmonic **maps**) — this is a fibration Z → N from an almost complex manifold Z , called a twistor space, to a Riemannian manifold N with the property that holomorphic **maps** from (Riemann) surfaces to Z project to harmonic **maps** into N. For a symmetric space N , twistor spaces exist if N is inner [7]; then they are generalized flag manifolds equipped with a certain non-integrable complex structure J 2 . All harmonic **maps** from the 2-sphere arise this way, i.e., have a twistor lift to a

Show more
33 Read more