Search Results

Results (7)

Search Parameters:

Keyword: Chaos
Order results
Results per page
Open AccessArticle
12 Pages, 3,003 KB Download PDF

Encompassing Chaos in Brain-inspired Neural Network Models for Substance Identification and Breast Cancer Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 3, Page # 32–43, 2022; DOI: 10.25046/aj070304
Abstract:

The main purpose in this work is to explore the fact that chaos, as a biological characteristic in the brain, should be used in an Artificial Neural Network (ANN) system. In fact, as long as chaos is present in brain functionalities, its properties need empirical investigations to show their potential to enhance accuracies in artificial…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Artificial Intelligence in Computer Science (CAI))
Open AccessArticle
11 Pages, 1,549 KB Download PDF

Chaos-Based Image Encryption Using Arnold’s Cat Map Confusion and Henon Map Diffusion

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 1, Page # 316–326, 2021; DOI: 10.25046/aj060136
Abstract:

This research designed an image encryption system that focused on securing teledermatology data in the form of skin disease images. The encryption and decryption process of this system is done on the client side using chaos-based encryption with confusion and diffusion techniques. Arnold’s cat map is the chaotic map model used for confusion, while the…

Read More
(This article belongs to Section Software Engineering in Computer Science (CSE))
Open AccessArticle
6 Pages, 451 KB Download PDF

Fast Stream Cipher based Chaos Neural Network for Data Security in CAN Bus

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 63–68, 2020; DOI: 10.25046/aj050509
Abstract:

Vehicle systems are controlled by embedded electronic devices called electronic control units (ECUs). These ECUs are connected together with network protocols. The Controller Area Network (CAN) protocol is widely implemented due to its high fault tolerance. However, the CAN is a serial broadcast bus, and it has no protection against security threats. In this paper,…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
6 Pages, 1,002 KB Download PDF

A new color image encryption algorithm based on iterative mixing of color channels and chaos

Advances in Science, Technology and Engineering Systems Journal, Volume 2, Issue 5, Page # 94–99, 2017; DOI: 10.25046/aj020515
Abstract:

In this paper, we present a novel secure cryptosystem for direct encryption of color images, based on an iterative mixing spread over three rounds of the R, G and B color channels and three enhanced chaotic maps. Each round includes an affine transformation that uses three invertible matrices of order 2 _ 2; whose parameters…

Read More
(This article belongs to Section Applied Mathematics (MAP))
Open AccessArticle
11 Pages, 2,600 KB Download PDF

Hardware and Secure Implementation of Enhanced ZUC Steam Cipher Based on Chaotic Dynamic S-Box

Advances in Science, Technology and Engineering Systems Journal, Volume 10, Issue 1, Page # 37–47, 2025; DOI: 10.25046/aj100105
Abstract:

Despite the development of the Internet and wired networks such as fiber optics, mobile networks remain the most used thanks to the mobility they offer to the user. However, data protection in these networks is more complex because of the radio channels they use for transmission. Hence,there is a need to find more sophisticated data…

Read More
(This article belongs to the SP17 (Special Issue on Innovation in Computing, Engineering Science & Technology 2024-25) & Section Hardware & Architecture in Computer Science (CHA))
Open AccessArticle
7 Pages, 7,186 KB Download PDF

Estimating a Minimum Embedding Dimension by False Nearest Neighbors Method without an Arbitrary Threshold

Advances in Science, Technology and Engineering Systems Journal, Volume 7, Issue 4, Page # 114–120, 2022; DOI: 10.25046/aj070415
Abstract:

The false nearest neighbors (FNN) method estimates the variables of a system by sequentially embedding a time series into a higher-dimensional delay coordinate system and finding an embedding dimension in which the neighborhood of the delay coordinate vector in the lower dimension does not extend into the higher, that is, a dimension in which no…

Read More
(This article belongs to the SP13 (Special Issue on Innovation in Computing, Engineering Science & Technology 2022) & Section Mathematics (MAT))
Open AccessArticle
18 Pages, 2,339 KB Download PDF

Nature Inspired and Transform Based Image Encryption Techniques: A Comparative Study

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 1075–1092, 2020; DOI: 10.25046/aj0505132
Abstract:

In this paper, performances of two variations of chaos based algorithms are compared. First algorithm is a self-adaptive color image encryption algorithm is proposed based on Radial Hilbert Transform and chaos. This technique uses chaotic random phase masks operated on the transformed pixels to increase the randomness in confusion and diffusion operations. Also, a random…

Read More
(This article belongs to the SP9 (Special Issue on Multidisciplinary Innovation in Engineering Science & Technology 2020) & Section Information Systems in Computer Science (CIS))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026