Attributes | Values |
---|
rdf:type
| |
Description
| - This chapter introduces the concept of decryption of chaotically en- crypted information. Five evolutionary algorithms have been used for chaos syn- chronization here: differential evolution, self-organizing migrating algorithm, genetic algorithm, simulated annealing and evolutionary strategies in a total of 15 versions. The main aim was to ascertain if evolutionary algorithms are able to iden- tify the ?key? (control parameter) of the chaotic system, which was used to encrypt information. The proposed scheme is based on the extended map of Clifford strange attractor, where each dimension has a specific role in the encryption process. In- vestigation consists of one case study. All the algorithms was 100 times repeated in order to show and check robustness of the proposed methods and experiment con- figurations. All data were processed in order to get summarized results and graphs.
- This chapter introduces the concept of decryption of chaotically en- crypted information. Five evolutionary algorithms have been used for chaos syn- chronization here: differential evolution, self-organizing migrating algorithm, genetic algorithm, simulated annealing and evolutionary strategies in a total of 15 versions. The main aim was to ascertain if evolutionary algorithms are able to iden- tify the ?key? (control parameter) of the chaotic system, which was used to encrypt information. The proposed scheme is based on the extended map of Clifford strange attractor, where each dimension has a specific role in the encryption process. In- vestigation consists of one case study. All the algorithms was 100 times repeated in order to show and check robustness of the proposed methods and experiment con- figurations. All data were processed in order to get summarized results and graphs. (en)
|
Title
| - Evolutionary Decryption of Chaotically Encrypted Information
- Evolutionary Decryption of Chaotically Encrypted Information (en)
|
skos:prefLabel
| - Evolutionary Decryption of Chaotically Encrypted Information
- Evolutionary Decryption of Chaotically Encrypted Information (en)
|
skos:notation
| - RIV/70883521:28140/10:63508872!RIV11-GA0-28140___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| - P(GA102/09/1680), Z(MSM7088352101)
|
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/70883521:28140/10:63508872
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - Evolutionary algorithms; chaos; control; information (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Evolutionary Algorithms and Chaotic Systems
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...v/pocetStranKnihy
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Jašek, Roman
- Zelinka, Ivan
|
http://linked.open...n/vavai/riv/zamer
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |