A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block *** the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chao...
详细信息
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block *** the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chaotic map assists in providing disorder and resistance to combat cryptanalytical *** this paper,the construction of a dynamic S-Box using a cipher key is proposed using a novel chaotic map and an innovative tweaking *** projected chaotic map and the proposed tweak approach are presented for the first time and the use of parameters in their workingmakes both of these dynamic in *** tweak approach employs cubic polynomials while permuting the values of an initial S-Box to enhance its cryptographic *** of the parameters are provided using the cipher key and a small variation in values of these parameters results in a completely different unique *** analysis and exploration confirmed that the projected chaoticmap exhibits a significant amount of chaotic *** security assessment in terms of bijectivity,nonlinearity,bits independence,strict avalanche,linear approximation probability,and differential probability criteria are utilized to critically investigate the effectiveness of the proposed S-Box against several *** proposed S-Box’s cryptographic performance is comparable to those of recently projected S-Boxes for its adaption in real-world security *** comparative scrutiny pacifies the genuine potential of the proposed S-Box in terms of its applicability for data security.
Rapid increase in the large quantity of industrial data,Industry 4.0/5.0 poses several challenging issues such as heterogeneous data generation,data sensing and collection,real-time data processing,and high request ar...
详细信息
Rapid increase in the large quantity of industrial data,Industry 4.0/5.0 poses several challenging issues such as heterogeneous data generation,data sensing and collection,real-time data processing,and high request arrival *** classical intrusion detection system(IDS)is not a practical solution to the Industry 4.0 environment owing to the resource limitations and *** resolve these issues,this paper designs a new Chaotic Cuckoo Search Optimiza-tion Algorithm(CCSOA)with optimal wavelet kernel extreme learning machine(OWKELM)named CCSOA-OWKELM technique for IDS on the Industry 4.0 *** CCSOA-OWKELM technique focuses on the design of feature selection with classification approach to achieve minimum computation complex-ity and maximum detection *** CCSOA-OWKELM technique involves the design of CCSOA based feature selection technique,which incorpo-rates the concepts of chaotic maps with ***,the OWKELM technique is applied for the intrusion detection and classification *** addition,the OWKELM technique is derived by the hyperparameter tuning of the WKELM technique by the use of sunflower optimization(SFO)*** utilization of CCSOA for feature subset selection and SFO algorithm based hyperparameter tuning leads to better *** order to guarantee the supreme performance of the CCSOA-OWKELM technique,a wide range of experiments take place on two benchmark datasets and the experimental outcomes demonstrate the promis-ing performance of the CCSOA-OWKELM technique over the recent state of art techniques.
This study addresses the deficiencies in the assumptions of the results in Chen and Yang, 2017 [1] due to the lack of uniformity. We first show the missing hypothesis by presenting a counterexample. Then we prove why ...
详细信息
The Grover mixer operator is a variational version of Grover's diffusion operator, introduced as a mixing operator for the quantum alternating operator ansatz (QAOA) and used in a variant known as Grover mixer QAO...
详细信息
The Grover mixer operator is a variational version of Grover's diffusion operator, introduced as a mixing operator for the quantum alternating operator ansatz (QAOA) and used in a variant known as Grover mixer QAOA (GM-QAOA). An important property of the QAOA with Grover mixer is that its expectation value is invariant over any permutation of states. As a consequence, the algorithm is independent of the structure of the problem. If, on the one hand, this characteristic raises serious doubts about the capacity of the algorithm to overcome the bound of the unstructured search problem, on the other hand, it can pave the way to its analytical study. In this sense, a prior work introduced a statistical approach to analyze GM-QAOA that results in an analytical expression for the expectation value depending on the probability distribution associated with the problem Hamiltonian spectrum. Although the method provides surprising simplifications in calculations, the expression depends exponentially on the number of layers, which makes direct analytical treatment unfeasible. In this work, we extend the analysis to the more simple context of Grover mixer threshold QAOA, a variant that replaces the phase separation operator of GM-QAOA to encode a threshold function. As a result, we obtain an expression for the expectation value independent of the number of layers and, with it, we provide bounds for different performance metrics. Furthermore, we extend the analysis to a more general context of QAOA with Grover mixer, which we called Grover-based QAOA. In that framework, which allows the phase separation operator to encode any compilation of the cost function, we generalize all the bounds by using an argument by contradiction with the optimality of Grover's algorithm on the unstructured search problem. As a result, we get the main contribution of this work, an asymptotic lower bound on the quantile achieved by the expectation value that formalizes the notion that the Grover mixer,
Long-term desk work with lousy posture causes physical disabilities. To solve this problem, we have developed a smart chair with a controllable seat angle in our previous research. In order to control the seat angle a...
详细信息
Integrating cloud computing into organizational data management demands paramount protection of sensitive information. This paper presents a framework to enhance data security through distributed fragmentation and adv...
详细信息
Generative Adversarial Networks (GANs) are an active area of research in deep learning and computer vision. They are concerned with generating and manipulating photorealistic synthetic images as well as manipulating r...
详细信息
Arrhythmia has been classified using a variety of *** of the dynamic nature of electrocardiogram(ECG)data,traditional handcrafted approaches are difficult to execute,making the machine learning(ML)solutions more *** w...
详细信息
Arrhythmia has been classified using a variety of *** of the dynamic nature of electrocardiogram(ECG)data,traditional handcrafted approaches are difficult to execute,making the machine learning(ML)solutions more *** with cardiac arrhythmias can benefit from competent monitoring to save their *** arrhythmia classification and prediction have greatly improved in recent *** are a category of conditions in which the heart's electrical activity is abnormally rapid or *** year,it is one of the main reasons of mortality for both men and women,*** the classification of arrhythmias,this work proposes a novel technique based on optimized feature selection and optimized K-nearest neighbors(KNN)*** proposed method makes advantage of the UCI repository,which has a 279-attribute high-dimensional cardiac arrhythmia *** proposed approach is based on dividing cardiac arrhythmia patients into 16 groups based on the electrocardiography dataset’s *** purpose is to design an efficient intelligent system employing the dipper throated optimization method to categorize cardiac arrhythmia *** method of comprehensive arrhythmia classification outperforms earlier methods presented in the *** achieved classification accuracy using the proposed approach is 99.8%.
Human biometric analysis has gotten much attention due to itswidespread use in different research areas, such as security, surveillance,health, human identification, and classification. Human gait is one of the keyhum...
详细信息
Human biometric analysis has gotten much attention due to itswidespread use in different research areas, such as security, surveillance,health, human identification, and classification. Human gait is one of the keyhuman traits that can identify and classify humans based on their age, gender,and ethnicity. Different approaches have been proposed for the estimation ofhuman age based on gait so far. However, challenges are there, for which anefficient, low-cost technique or algorithm is needed. In this paper, we proposea three-dimensional real-time gait-based age detection system using a machinelearning approach. The proposed system consists of training and testingphases. The proposed training phase consists of gait features extraction usingthe Microsoft Kinect (MS Kinect) controller, dataset generation based onjoints’ position, pre-processing of gait features, feature selection by calculatingthe Standard error and Standard deviation of the arithmetic mean and bestmodel selection using R2 and adjusted R2 techniques. T-test and ANOVAtechniques show that nine joints (right shoulder, right elbow, right hand, leftknee, right knee, right ankle, left ankle, left, and right foot) are statisticallysignificant at a 5% level of significance for age estimation. The proposedtesting phase correctly predicts the age of a walking person using the resultsobtained from the training phase. The proposed approach is evaluated on thedata that is experimentally recorded from the user in a real-time *** (50) volunteers of different ages participated in the experimental *** the limited features, the proposed method estimates the age with 98.0%accuracy on experimental images acquired in real-time via a classical generallinear regression model.
Dear Editor,This letter is concerned with prescribed-time Nash equilibrium(PTNE)seeking problem in a pursuit-evasion game(PEG)involving agents with second-order *** order to achieve the prior-given and user-defined co...
详细信息
Dear Editor,This letter is concerned with prescribed-time Nash equilibrium(PTNE)seeking problem in a pursuit-evasion game(PEG)involving agents with second-order *** order to achieve the prior-given and user-defined convergence time for the PEG,a PTNE seeking algorithm has been developed to facilitate collaboration among multiple pursuers for capturing the evader without the need for any global ***,it is theoretically proved that the prescribedtime convergence of the designed algorithm for achieving Nash equilibrium of ***,the effectiveness of the PTNE method was validated by numerical simulation results.A PEG consists of two groups of agents:evaders and *** pursuers aim to capture the evaders through cooperative efforts,while the evaders strive to evade *** is a classic noncooperative *** has attracted plenty of attention due to its wide application scenarios,such as smart grids[1],formation control[2],[3],and spacecraft rendezvous[4].It is noteworthy that most previous research on seeking the Nash equilibrium of the game,where no agent has an incentive to change its actions,has focused on asymptotic and exponential convergence[5]-[7].
暂无评论