Combining hyperchaotic map, cross-plane operation and gene theory, a color image encryption scheme is devised. First, the hyperchaotic map used in the encryption scheme is analyzed and studied. On the basis of the dynamics of hyperchaotic map, a color image encryption scheme is designed. At the end of the encryption process, a DNA mutation operation is used to increase the encoding images’ randomness and improve the encryption algorithm’s security. Finally, simulation experiments, performance analysis, and attack tests are performed to prove its effectiveness and security of the designed algorithm. The research work in this paper offers the possibility of applying chaos theory and gene theory in image encryption.
Criticality is considered as a fundamental category of production planning, maintenance process planning and management. The criticality assessment of machines and devices can be a structured set of activities allowing to identify failures which have the greatest potential impact on the company’s business goals. It can be also used to define maintenance strategies, investment strategies and development plans, assisting the company in prioritizing their allocations of financial resources to those machines and devices that are critical in accordance with the predefined business criteria. In a criticality assessment process many different and interacting criteria have to be taken into consideration, despite the fact that there is a high level of uncertainty related to various parameters. In addition, not all assessment criteria are equally important. Therefore, it is necessary to determine the weight of each criterion taking into account different requirements of machine criticality process stakeholders. That is why a novel model of a machine criticality assessment is proposed in this paper. The model extends the existing methods of assessing machines criticality, taking into account not only the importance of machine criticality assessment criteria, but also possible interactions between them.
Abstract:We study information transfer routes among cross-industry and cross-region electricity consumption data based on transfer entropy and the MST (Minimum Spanning Tree) model. First, we characterize the information transfer routes with transfer entropy matrixes, and find that the total entropy transfer of the relatively developed Guangdong Province is lower than others, with significant industrial cluster within the province. Furthermore, using a reshuffling method, we find that driven industries contain much more information flows than driving industries, and are more influential on the degree of order of regional industries. Finally, based on the Chu-Liu-Edmonds MST algorithm, we extract the minimum spanning trees of provincial industries. Individual MSTs show that the MSTs follow a chain-like formation in developed provinces and star-like structures in developing provinces. Additionally, all MSTs with the root of minimal information outflow industrial sector are of chain-form.
In recent years, China has gradually cancelled agricultural tax which has been imposed for more than two thousand years. Reviewing and reflecting on the history, target, pattern, scope of the Chinese new agricultural subsidy system, this paper discusses the dilemma of subsidy target, irrational subsidy structure and environmental pollution. Finally the bottleneck of Chinese new agricultural subsidy system and its development direction are discussed.
Research on discrete memristor models applied to discrete maps deserves more in-depth discussion. In this paper, a continuous memristor is introduced and the discrete memristor model is obtained by the forward Eulerian difference algorithmic discretization. This model is coupled to a cosine map to further obtain a two-dimensional memristor cosine map. The dynamical characteristics of the memristor cosine map are investigated through numerical simulations and other analytical methods. For example, the phase diagram, the bifurcation diagram, the Lyapunov exponential spectrum and the Spectral Entropy complexity with parameters, etc., In addition, multi-stability phenomena of the system are identified. The results show that the cosine map coupled with a discrete memristor has more complex dynamical behaviors and is more suitable for applications in cryptography.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.