A New Trend of Pseudorandom Number Generator using Multiple Chaotic Systems
The information transmission domain had well been extended by the recent and fast developments in the telecommunication technologies specifically, the mobile networks and internet services. These new developments in turn, had come up with cutting-edge resolutions to secure information from being wir...
| Main Authors: | Saba, M. Ismail, Mohammed, Muamer N., M. A., Ameedeen, Ahmed, Hussam Alddin S. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publisher
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/19613/ http://umpir.ump.edu.my/id/eprint/19613/1/21.%20A%20New%20Trend%20of%20Pseudorandom%20Number%20Generator%20using%20Multiple%20Chaotic%20Systems1.pdf |
Similar Items
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
Chaotic pseudorandom sequences and the security of cryptosystems
by: Hina, Aliyu Danladi, et al.
Published: (2015)
by: Hina, Aliyu Danladi, et al.
Published: (2015)
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
by: Kamal Z., Zamli, et al.
Published: (2021)
by: Kamal Z., Zamli, et al.
Published: (2021)
Pseudo Random Bits' Generator Based on Tent Chaotic Map and Linear Feedback Shift Register
by: Ahmed, Hussam Alddin S., et al.
Published: (2018)
by: Ahmed, Hussam Alddin S., et al.
Published: (2018)
Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map
by: Alzaidi, Amer Awad, et al.
Published: (2018)
by: Alzaidi, Amer Awad, et al.
Published: (2018)
Generation and statistical analysis of chaos-based pseudorandom sequences
by: Hina, Aliyu Danladi
Published: (2019)
by: Hina, Aliyu Danladi
Published: (2019)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
A bat-inspired testing strategy for generating constraints pairwise test suite
by: Alsariera, Yazan A., et al.
Published: (2018)
by: Alsariera, Yazan A., et al.
Published: (2018)
Application of multistage homotopy perturbation method to the chaotic Genesio System
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018)
by: A. Ahmed, Hussam, et al.
Published: (2018)
The modified Adomian decomposition method for solving
Chaotic Lü system
by: Razali, Nur Iznida, et al.
Published: (2012)
by: Razali, Nur Iznida, et al.
Published: (2012)
Hybrid numeric-analytic method for solving chaotic system
by: Razali, NurIsnida, et al.
Published: (2013)
by: Razali, NurIsnida, et al.
Published: (2013)
Auto–transition in RADG based on chaotic system
by: Kadhum, Laith M., et al.
Published: (2023)
by: Kadhum, Laith M., et al.
Published: (2023)
The use of pseudorandom sweeps for vibroseis surveys
by: Dean, Timothy
Published: (2014)
by: Dean, Timothy
Published: (2014)
Surface and downhole recording of pseudorandom vibroseis sweeps
by: Dean, Timothy, et al.
Published: (2015)
by: Dean, Timothy, et al.
Published: (2015)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
The multistage Adomian Decomposition Method for solving chaotic Lü System
by: Razali, Nur Isnida, et al.
Published: (2013)
by: Razali, Nur Isnida, et al.
Published: (2013)
New formula to calculate the number of designs in RADG cryptosystem
by: Kadhum, Laith M., et al.
Published: (2021)
by: Kadhum, Laith M., et al.
Published: (2021)
The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks
by: Mostafa, Saifuldun, et al.
Published: (2016)
by: Mostafa, Saifuldun, et al.
Published: (2016)
Sequence diagram synthesis theory for stitching together multiple sequence diagrams through formal semantics modelling
by: Ameedeen, Mohamed Ariff
Published: (2010)
by: Ameedeen, Mohamed Ariff
Published: (2010)
Chaotic map initializations with Tiki-Taka algorithm for software remodularization problem
by: Kamal Z., Zamli, et al.
Published: (2021)
by: Kamal Z., Zamli, et al.
Published: (2021)
Fuzzy number in determining the optimal solution of multiple input multiple output (MIMO) system
by: Maan, Normah, et al.
Published: (2008)
by: Maan, Normah, et al.
Published: (2008)
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011)
by: Muamer N., Mohammed
Published: (2011)
The multistage homotopy-perturbation method: A powerful scheme for handling the Chaotic Lorenz system
by: Chowdhury, Md. Sazzad Hossien
Published: (2010)
by: Chowdhury, Md. Sazzad Hossien
Published: (2010)
Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization
by: Kamal Zuhairi, Zamli, et al.
Published: (2023)
by: Kamal Zuhairi, Zamli, et al.
Published: (2023)
A conceptual IR Chatbot framework with automated keywords-based vector representation generation
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
A conceptual IR chatbot framework with Automated Keywords-based vector representation generation
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
by: Abbas Saliimi, Lokman, et al.
Published: (2020)
Pseudorandom maximum length signal design with bias compensation least squares estimation for system identification
by: Foo, Mathias Fui Lin, et al.
Published: (2007)
by: Foo, Mathias Fui Lin, et al.
Published: (2007)
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019)
by: Khalid, Abdulrahman, et al.
Published: (2019)
Enhancement the video quality forwarding Using Receiver-Based Approach(URBA) in Vehicular Ad-Hoc Network
by: Hammood, Omar A., et al.
Published: (2017)
by: Hammood, Omar A., et al.
Published: (2017)
Ternary pseudorandom signal design for uniform excitation and reduced effect of nonlinear distortion
by: Tan, A.H., et al.
Published: (2006)
by: Tan, A.H., et al.
Published: (2006)
A lower complexity k best algorithm for multiple input and multiple output detection
by: Jabir, Amjad N., et al.
Published: (2011)
by: Jabir, Amjad N., et al.
Published: (2011)
Sequence diagram synthesis theory for stitching together multiple sequence diagrams through formal semantics modelling
by: Ameedeen, Mohamed Ariff, et al.
by: Ameedeen, Mohamed Ariff, et al.
Peak-to-average power ratio reduction based on optimized phase shift technique
by: Mohammed, Muamer N., et al.
Published: (2017)
by: Mohammed, Muamer N., et al.
Published: (2017)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)
by: Khalaf, Emad Taha, et al.
Published: (2016)
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Application of Intuitionistic Z-Numbers in Supplier Selection
by: Nik Muhammad Farhan Hakim, Nik Badrul Alam, et al.
Published: (2023)
by: Nik Muhammad Farhan Hakim, Nik Badrul Alam, et al.
Published: (2023)
Similar Items
-
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019) -
Chaotic pseudorandom sequences and the security of cryptosystems
by: Hina, Aliyu Danladi, et al.
Published: (2015) -
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
by: Kamal Z., Zamli, et al.
Published: (2021) -
Pseudo Random Bits' Generator Based on Tent Chaotic Map and Linear Feedback Shift Register
by: Ahmed, Hussam Alddin S., et al.
Published: (2018) -
Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map
by: Alzaidi, Amer Awad, et al.
Published: (2018)