期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Layer-2 transferable belief model:Manage uncertainty on random permutation sets
1
作者 Qian-Li Zhou Yong Deng 《Journal of Electronic Science and Technology》 2025年第2期52-64,共13页
In this paper,the transferable belief model established on power sets is extended to the permutation event space(PES)and is referred to as the layer-2 transferable belief model.Our goal is to provide a comprehensive a... In this paper,the transferable belief model established on power sets is extended to the permutation event space(PES)and is referred to as the layer-2 transferable belief model.Our goal is to provide a comprehensive approach for handling and modeling uncertainty,capable of representing both quantitative and qualitative information.First,the motivation for proposing the layer-2 transferable belief model and its information processing principles are explored from the perspective of weak propensity.Then,based on these principles,the corresponding information processing methods for the credal and pignistic levels are developed.Finally,the advantages of this model are validated through a classifier that leverages attribute fusion to enhance performance and decision-making accuracy. 展开更多
关键词 Evidence theory Information processing Information fusion Layer-2 belief structure random permutation set
在线阅读 下载PDF
A Secure Audio Encryption Method Using Tent-Controlled Permutation and Logistic Map-Based Key Generation
2
作者 Ibtisam A.Taqi Sarab M.Hameed 《Computers, Materials & Continua》 2025年第10期1653-1674,共22页
The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information.Due to high processing requirements,tr... The exponential growth of audio data shared over the internet and communication channels has raised significant concerns about the security and privacy of transmitted information.Due to high processing requirements,traditional encryption algorithms demand considerable computational effort for real-time audio encryption.To address these challenges,this paper presents a permutation for secure audio encryption using a combination of Tent and 1D logistic maps.The audio data is first shuffled using Tent map for the random permutation.The high random secret key with a length equal to the size of the audio data is then generated using a 1D logistic map.Finally,the Exclusive OR(XOR)operation is applied between the generated key and the shuffled audio to yield the cipher audio.The experimental results prove that the proposed method surpassed the other techniques by encrypting two types of audio files,as mono and stereo audio files with large sizes up to 122 MB,different sample rates 22,050,44,100,48,000,and 96,000 for WAV and 44,100 sample rates for MP3 of size 11 MB.The results show high Mean Square Error(MSE),low Signal-to-Noise Ratio(SNR),spectral distortion,100%Number of Sample Change Rate(NSCR),high Percent Residual Deviation(PRD),low Correlation Coefficient(CC),large key space 2^(616),high sensitivity to a slight change in the secret key and that it can counter several attacks,namely brute force attack,statistical attack,differential attack,and noise attack. 展开更多
关键词 Wave protection 1D logistic map Tent map random permutation key generation
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部