2009 WRI Global Congress on Intelligent Systems 2009
DOI: 10.1109/gcis.2009.82
|View full text |Cite
|
Sign up to set email alerts
|

An Asynchronous Encryption Arithmetic Based on Laguerre Chaotic Neural Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 3 publications
0
14
0
Order By: Relevance
“…β is the selffeedback gain of the hidden layer which is selected between 0 and 1. Laguerre orthogonal polynomials [20][21][22][23][24] are selected for activation function in the hidden layer. Laguerre orthogonal polynomials are indicated by L h ðxÞ, where h is the order of expansion and À1 o x o 1. m is the number of nodes.…”
Section: Configuration Of the Composite Recurrent Laguerre Orthogonalmentioning
confidence: 99%
See 2 more Smart Citations
“…β is the selffeedback gain of the hidden layer which is selected between 0 and 1. Laguerre orthogonal polynomials [20][21][22][23][24] are selected for activation function in the hidden layer. Laguerre orthogonal polynomials are indicated by L h ðxÞ, where h is the order of expansion and À1 o x o 1. m is the number of nodes.…”
Section: Configuration Of the Composite Recurrent Laguerre Orthogonalmentioning
confidence: 99%
“…Functional-link NNs [17][18][19], which show less computational complexity and faster convergence, have been implemented for performing the tasks of system identification and control in many nonlinear systems. Recently, combinations of Laguerre functional expansions and NNs, which have been used for highly nonlinear approximation, identification, compensation, and control of systems, have been proposed [20][21][22][23][24]. Aadaleesan et al [20] proposed a combination of a Laguerre filter and a wavelet network to approximate a memoryless nonlinearity.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper uses a new hermite neural network [14]. The hermite neural network model is shown in Figure 1.…”
Section: Hermite Chaotic Neural Networkmentioning
confidence: 99%
“…Also any malicious access to server database cannot capture client's original passwords. Up to now, there have been lots of studies to advance robust machine learning based hash-functions and use them in communications (Zou & Xiao 2009;Lian et al 2007;YAYIK & KUTLU n.d.;Yayık & Kutlu 2013;Huang 2011). Near past and recently there is relatively much interest in using neural networks for cryptography (Lian et al 2006) .…”
Section: Introductionmentioning
confidence: 99%