In this paper, the generation of a chaotic carrier by Lorenz model
is theoretically studied. The encoding techniques has been used is
chaos masking of sinusoidal signal (massage), an optical chaotic
communications system for different receiver configurations is
evaluated. It is proved that chaotic carriers allow the successful
encoding and decoding of messages. Focusing on the effect of
changing the initial conditions of the states of our dynamical system
e.i changing the values (x, y, z, x1, y1, and z1).
In modern era, which requires the use of networks in the transmission of data across distances, the transport or storage of such data is required to be safe. The protection methods are developed to ensure data security. New schemes are proposed that merge crypto graphical principles with other systems to enhance information security. Chaos maps are one of interesting systems which are merged with cryptography for better encryption performance. Biometrics is considered an effective element in many access security systems. In this paper, two systems which are fingerprint biometrics and chaos logistic map are combined in the encryption of a text message to produce strong cipher that can withstand many types of attacks. The histogram analysis o
... Show MoreA dynamical system describes the consequence of the current state of an event or particle in future. The models expressed by functions in the dynamical systems are more often deterministic, but these functions might also be stochastic in some cases. The prediction of the system's behavior in future is studied with the analytical solution of the implicit relations (Differential, Difference equations) and simulations. A discrete-time first order system of equations with quadratic nonlinearity is considered for study in this work. Classical approach of stability analysis using Jury's condition is employed to analyze the system's stability. The chaotic nature of the dynamical system is illustrated by the bifurcation theory. The enhancement o
... Show MoreSingle-input Multiple-output Signals Third-order Active-R Filter for different Circuit Merit Factor Q Configuration is proposed. This paper discusses a new configuration to realize third-order low pass, band pass and high pass. The presented circuit uses Single-input Multiple-output signals, OP-AMP and passive components. This filter is useful for high frequency operation, monolithic IC implementation and it is easy to design .This circuit gives three filter functions low-pass, high-pass and band-pass. This filter circuit can be used for different merit factor (Q) with high pass band gain. This gives better stop-band attenuation and sharper cut-off at the edge of the pass-band. Thus the response shows wider pass-band. The Ideal value of thi
... Show MoreThe biometric-based keys generation represents the utilization of the extracted features from the human anatomical (physiological) traits like a fingerprint, retina, etc. or behavioral traits like a signature. The retina biometric has inherent robustness, therefore, it is capable of generating random keys with a higher security level compared to the other biometric traits. In this paper, an effective system to generate secure, robust and unique random keys based on retina features has been proposed for cryptographic applications. The retina features are extracted by using the algorithm of glowworm swarm optimization (GSO) that provides promising results through the experiments using the standard retina databases. Additionally, in order t
... Show MoreIn this paper, a discrete- time ratio-dependent prey- predator model is proposed and analyzed. All possible fixed points have been obtained. The local stability conditions for these fixed points have been established. The global stability of the proposed system is investigated numerically. Bifurcation diagrams as a function of growth rate of the prey species are drawn. It is observed that the proposed system has rich dynamics including chaos.
Data security is a significant requirement in our time. As a result of the rapid development of unsecured computer networks, the personal data should be protected from unauthorized persons and as a result of exposure AES algorithm is subjected to theoretical attacks such as linear attacks, differential attacks, and practical attacks such as brute force attack these types of attacks are mainly directed at the S-BOX and since the S-BOX table in the algorithm is static and no dynamic so this is a major weakness for the S-BOX table, the algorithm should be improved to be impervious to future dialects that attempt to analyse and break the algorithm in order to remove these weakness points, Will be generated dynamic substitution box (S-B
... Show MoreThis paper proposed to build an authentication system between business partners on e-commerce application to prevent the frauds operations based on visual cryptography shares encapsulated by chen’s hyperchaotic key sequence. The proposed system consist of three phases, the first phase based on the color visual cryptography without complex computations, the second phase included generate sequence of DNA rules numbers and finally encapsulation phase is implemented based on use the unique initial value that generate in second phase as initial condition with Piecewise Linear Chaotic Maps to generate sequences of DNA rules numbers. The experimental results demonstrate the proposed able to overcome on cheating a
... Show MoreIn this experimental study, which was carried out in photonics laboratory at Strathclyde University, UK, dynamics of a multi-Quantum well semiconductor active medium laser, was studied. This is in order to study its emission stability and pulse shape development under the influence of strong optical feedback level with different deriving currents, in the free space transmission medium. An external stable resonator was constructed by inserting high reflectivity dielectric mirror outside the laser output, 20 cm apart from it, which is an extralarge external cavity. Controlling the reflected back optical power was done by using a nonpolarized (50:50) beam splitter. The external resonator supported by focusing (plano-convex) lens in order to
... Show MoreStatistical fluctuations of nuclear energy spectra for the isobar A = 68 were examined by means of the random matrix theory together with the nuclear shell model. The isobar A = 68 nuclei are suggested to consist of an inert core of 56Ni with 12 nucleons in f5p-space (2p3/2, 1f5/2 and 2p1/2 orbitals). The nuclear excitation energies, required by this work, were obtained through performing f5p-shell model calculations using the isospin formalism f5pvh interaction with realistic single particle energies. All calculations of the present study were conducted using the OXBASH code. The calculated level densities were found to have a Gaussian shape. The distributions of level spacing P(s) an
... Show MoreToday the Genetic Algorithm (GA) tops all the standard algorithms in solving complex nonlinear equations based on the laws of nature. However, permute convergence is considered one of the most significant drawbacks of GA, which is known as increasing the number of iterations needed to achieve a global optimum. To address this shortcoming, this paper proposes a new GA based on chaotic systems. In GA processes, we use the logistic map and the Linear Feedback Shift Register (LFSR) to generate chaotic values to use instead of each step requiring random values. The Chaos Genetic Algorithm (CGA) avoids local convergence more frequently than the traditional GA due to its diversity. The concept is using chaotic sequences with LFSR to gene
... Show More