Let_(φ)and_(ψ)be linear fractional self-maps of the unit diskDandX_(a)separable Hilbert space.In this paper we completely characterize the weak compactness of the product operators of a composition operationC_(φ)wi...Let_(φ)and_(ψ)be linear fractional self-maps of the unit diskDandX_(a)separable Hilbert space.In this paper we completely characterize the weak compactness of the product operators of a composition operationC_(φ)with another one's adjointC_(ψ)^(*)on the vector-valued Bergman spaceB_(1)(X)for formsC_(φ)C_(ψ)^(*)andC_(ψ)C_(φ)^(*).展开更多
We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bif...We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms.展开更多
Linear fractional map type (LFMT) nonlinear QCA (NLQCA), one of the simplest reversible NLQCA is studied analytically as well as numerically. Linear advection equation or Time Dependent Schrödinger Equation (...Linear fractional map type (LFMT) nonlinear QCA (NLQCA), one of the simplest reversible NLQCA is studied analytically as well as numerically. Linear advection equation or Time Dependent Schrödinger Equation (TDSE) is obtained from the continuum limit of linear QCA. Similarly it is found that some nonlinear advection-diffusion equations including inviscid Burgers equation and porous-medium equation are obtained from LFMT NLQCA.展开更多
Despite many studies on land degradation in the Highlands of Northern Ethiopia, quantitative information regarding long-term changes in land use/cover(LUC) is rare. Hence, this study aims to investigate the LUC change...Despite many studies on land degradation in the Highlands of Northern Ethiopia, quantitative information regarding long-term changes in land use/cover(LUC) is rare. Hence, this study aims to investigate the LUC changes in the Geba catchment(5142 km2), Northern Ethiopia, over 80 years(1935–2014). Aerial photographs(APs) of the 1930 s and Google Earth(GE) images(2014) were used. The point-count technique was utilized by overlaying a grid on APs and GE images. The occurrence of cropland, forest, grassland, shrubland, bare land, built-up areas and water body was counted to compute their fractions. A multivariate adaptive regression spline was applied to identify the explanatory factors of LUC and to create fractional maps of LUC. The results indicate significant changes of most types, except for forest and cropland. In the 1930 s, shrubland(48%) was dominant, followed by cropland(39%). The fraction of cropland in 2014(42%) remained approximately the same as in the 1930 s, while shrubland significantly dropped to 37%. Forests shrank further from a meagre 6.3% in the 1930 s to 2.3% in 2014. High overall accuracies(93% and 83%) and strong Kappa coefficients(89% and 72%) for point counts and fractional maps respectively indicate the validity of the techniques used for LUC mapping.展开更多
Nonlinear dynamics is a fascinating area that is intensely affecting a wide range of different disciplines of science and technology globally.The combination of different innovative topics of information security and ...Nonlinear dynamics is a fascinating area that is intensely affecting a wide range of different disciplines of science and technology globally.The combination of different innovative topics of information security and high-speed computing has added new visions into the behavior of complex nonlinear dynamical systems which uncovered amazing results even in the least difficult nonlinearmodels.The generation of complex actions froma very simple dynamical method has a strong relation with information security.The protection of digital content is one of the inescapable concerns of the digitally advanced world.Today,information plays an important role in everyday life and affects the surroundings rapidly.These digital contents consist of text,images,audio,and videos,respectively.Due to the vast usage of digital images in the number of social and web applications,its security is one of the biggest issues.In this work,we have offered an innovative image encryption technique based on present criteria of confusion and diffusion.The designed scheme comprises two major nonlinear dynamical systems.We have employed discrete fractional chaotic iterative maps to add confusion capability in our suggested algorithm and continuous chaotic Lorenz system.We have verified our offered scheme by using statistical analysis.The investigations under the statistical tests suggested that our proposed technique is quite reasonable for the security of digital data.展开更多
The Human-Centered Internet of Things(HC-IoT)is fast becoming a hotbed of security and privacy concerns.Two users can establish a common session key through a trusted server over an open communication channel using a ...The Human-Centered Internet of Things(HC-IoT)is fast becoming a hotbed of security and privacy concerns.Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement.Most of the early authenticated key agreement systems relied on pairing,hashing,or modular exponentiation processes that are computationally intensive and cost-prohibitive.In order to address this problem,this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps.The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table.The projected security scheme utilized a hash function,which works well for the resource-limited HC-IoT architectures.Test results show that our new technique is resistant to password guessing attacks since it does not use a password.Furthermore,our approach provides users with comprehensive privacy protection,ensuring that a user forgery attack causes no harm.Finally,our new technique offers better security features than the techniques currently available in the literature.展开更多
This paper proposes three fractional discrete chaotic systems based on the Rulkov,Chang,and Zeraoulia–Sprott rational maps.The dynamics of the proposed maps are investigated by means of phase plots and bifurcations d...This paper proposes three fractional discrete chaotic systems based on the Rulkov,Chang,and Zeraoulia–Sprott rational maps.The dynamics of the proposed maps are investigated by means of phase plots and bifurcations diagrams.Adaptive stabilization schemes are proposed for each of the three maps and the convergence of the states is established by using the Lyapunov method.Furthermore,a combination synchronization scheme is proposed whereby a combination of the fractional Rulkov and Chang maps is synchronized to the fractional Zeraoulia-Sprott map.Numerical results are used to confirm the findings of the paper.展开更多
We discuss a variant of the multi-task n-vehicle exploration problem. Instead of requiring an optimal permutation of vehicles in every group, the new problem requires all vehicles in a group to arrive at the same dest...We discuss a variant of the multi-task n-vehicle exploration problem. Instead of requiring an optimal permutation of vehicles in every group, the new problem requires all vehicles in a group to arrive at the same destination. Given n tasks with assigned consume-time and profit, it may also be viewed as a maximization of every processor's average profit. Further, we propose a new kind of partition problem in fractional form and analyze its computational complexity. By regarding fractional partition as a special case, we prove that the average profit maximization problem is NP-hard when the number of processors is fixed and it is strongly NP- hard in general. At last, a pseudo-polynomial time algorithm for the average profit maximization problem and the fractional partition problem is presented, using the idea of the pseudo-polynomial time algorithm for the classical partition problem.展开更多
基金Supported by the National Natural Science Foundation of China(19771063)
文摘Let_(φ)and_(ψ)be linear fractional self-maps of the unit diskDandX_(a)separable Hilbert space.In this paper we completely characterize the weak compactness of the product operators of a composition operationC_(φ)with another one's adjointC_(ψ)^(*)on the vector-valued Bergman spaceB_(1)(X)for formsC_(φ)C_(ψ)^(*)andC_(ψ)C_(φ)^(*).
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61072147 and 11271008)
文摘We propose a new fractional two-dimensional triangle function combination discrete chaotic map(2D-TFCDM)with the discrete fractional difference.Moreover,the chaos behaviors of the proposed map are observed and the bifurcation diagrams,the largest Lyapunov exponent plot,and the phase portraits are derived,respectively.Finally,with the secret keys generated by Menezes-Vanstone elliptic curve cryptosystem,we apply the discrete fractional map into color image encryption.After that,the image encryption algorithm is analyzed in four aspects and the result indicates that the proposed algorithm is more superior than the other algorithms.
文摘Linear fractional map type (LFMT) nonlinear QCA (NLQCA), one of the simplest reversible NLQCA is studied analytically as well as numerically. Linear advection equation or Time Dependent Schrödinger Equation (TDSE) is obtained from the continuum limit of linear QCA. Similarly it is found that some nonlinear advection-diffusion equations including inviscid Burgers equation and porous-medium equation are obtained from LFMT NLQCA.
基金a scholarship of the Special Research Fund (BOF) obtained from Ghent University, Belgiumpartially covered by the RIP-MU (VLIR, Belgium) project
文摘Despite many studies on land degradation in the Highlands of Northern Ethiopia, quantitative information regarding long-term changes in land use/cover(LUC) is rare. Hence, this study aims to investigate the LUC changes in the Geba catchment(5142 km2), Northern Ethiopia, over 80 years(1935–2014). Aerial photographs(APs) of the 1930 s and Google Earth(GE) images(2014) were used. The point-count technique was utilized by overlaying a grid on APs and GE images. The occurrence of cropland, forest, grassland, shrubland, bare land, built-up areas and water body was counted to compute their fractions. A multivariate adaptive regression spline was applied to identify the explanatory factors of LUC and to create fractional maps of LUC. The results indicate significant changes of most types, except for forest and cropland. In the 1930 s, shrubland(48%) was dominant, followed by cropland(39%). The fraction of cropland in 2014(42%) remained approximately the same as in the 1930 s, while shrubland significantly dropped to 37%. Forests shrank further from a meagre 6.3% in the 1930 s to 2.3% in 2014. High overall accuracies(93% and 83%) and strong Kappa coefficients(89% and 72%) for point counts and fractional maps respectively indicate the validity of the techniques used for LUC mapping.
基金The author Mohammad Mazyad Hazzazi extend his appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through research groups program under Grant no.R.G.P.2/150/42.
文摘Nonlinear dynamics is a fascinating area that is intensely affecting a wide range of different disciplines of science and technology globally.The combination of different innovative topics of information security and high-speed computing has added new visions into the behavior of complex nonlinear dynamical systems which uncovered amazing results even in the least difficult nonlinearmodels.The generation of complex actions froma very simple dynamical method has a strong relation with information security.The protection of digital content is one of the inescapable concerns of the digitally advanced world.Today,information plays an important role in everyday life and affects the surroundings rapidly.These digital contents consist of text,images,audio,and videos,respectively.Due to the vast usage of digital images in the number of social and web applications,its security is one of the biggest issues.In this work,we have offered an innovative image encryption technique based on present criteria of confusion and diffusion.The designed scheme comprises two major nonlinear dynamical systems.We have employed discrete fractional chaotic iterative maps to add confusion capability in our suggested algorithm and continuous chaotic Lorenz system.We have verified our offered scheme by using statistical analysis.The investigations under the statistical tests suggested that our proposed technique is quite reasonable for the security of digital data.
基金The authors extend their gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through the research group program under grant number R.G.P.1/72/42The work of Agbotiname Lucky Imoize is supported by the Nigerian Petroleum Technology Development Fund(PTDF)and the German Academic Exchange Service(DAAD)through the Nigerian-German Postgraduate Program under grant 57473408.
文摘The Human-Centered Internet of Things(HC-IoT)is fast becoming a hotbed of security and privacy concerns.Two users can establish a common session key through a trusted server over an open communication channel using a three-party authenticated key agreement.Most of the early authenticated key agreement systems relied on pairing,hashing,or modular exponentiation processes that are computationally intensive and cost-prohibitive.In order to address this problem,this paper offers a new three-party authenticated key agreement technique based on fractional chaotic maps.The new scheme uses fractional chaotic maps and supports the dynamic sensing of HC-IoT devices in the network architecture without a password table.The projected security scheme utilized a hash function,which works well for the resource-limited HC-IoT architectures.Test results show that our new technique is resistant to password guessing attacks since it does not use a password.Furthermore,our approach provides users with comprehensive privacy protection,ensuring that a user forgery attack causes no harm.Finally,our new technique offers better security features than the techniques currently available in the literature.
基金supported by the Natural Science Foundation of China under Grant Nos.11726624,11726623,61473237the Natural Science Basic Research Plan in Shaxanxi Province of China under Grant No.2018GY-091the Natural Science Basic Research Plan in Shandong Province of China under Grant No.ZR2017PA008。
文摘This paper proposes three fractional discrete chaotic systems based on the Rulkov,Chang,and Zeraoulia–Sprott rational maps.The dynamics of the proposed maps are investigated by means of phase plots and bifurcations diagrams.Adaptive stabilization schemes are proposed for each of the three maps and the convergence of the states is established by using the Lyapunov method.Furthermore,a combination synchronization scheme is proposed whereby a combination of the fractional Rulkov and Chang maps is synchronized to the fractional Zeraoulia-Sprott map.Numerical results are used to confirm the findings of the paper.
基金Supported by Daqing oilfield company Project of PetroCHINA under Grant (dqc-2010-xdgl-ky-002)Key Laboratory of Management, Decision and Information Systems, Chinese Academy of SciencesBeijing Research Center of Urban System Engineering
文摘We discuss a variant of the multi-task n-vehicle exploration problem. Instead of requiring an optimal permutation of vehicles in every group, the new problem requires all vehicles in a group to arrive at the same destination. Given n tasks with assigned consume-time and profit, it may also be viewed as a maximization of every processor's average profit. Further, we propose a new kind of partition problem in fractional form and analyze its computational complexity. By regarding fractional partition as a special case, we prove that the average profit maximization problem is NP-hard when the number of processors is fixed and it is strongly NP- hard in general. At last, a pseudo-polynomial time algorithm for the average profit maximization problem and the fractional partition problem is presented, using the idea of the pseudo-polynomial time algorithm for the classical partition problem.