98%
921
2 minutes
20
Chaotic sequences are widely used in secure communication due to their high randomness. Chaotic resonance (CR) refers to the resonant response of a system to weak signals induced by chaotic activity, but its practical application remains limited. This study designs a simplified FitzHugh-Nagumo (FHN) auditory neuron model by simulating the physiological activities of auditory neurons and considering the combined stimulation of chaotic activity and sound signals. It is found that the neuron dynamics depend on both external sound stimuli and chaotic current intensity. Chaotic currents induce spikes in the neuron output sequence through CR, and the spikes become more frequent with increasing current intensity, eventually leading to a chaotic state regardless of the initial state. However, the sensitivity of the initial value of this chaotic sequence shifts to the chaotic current excitation system. The injection of chaotic currents can reduce the system's average Hamiltonian energy under certain conditions. By measuring the complexity of the generated sequences, we find that the addition of chaotic currents can enhance the complexity of the original sequences, and the enhancement ability increases with the intensity. This provides a new approach to enhance the complexity of original chaotic sequences. Moreover, different chaotic currents can induce different chaotic sequences with varying abilities to enhance the complexity of the original sequences. We hope our work can contribute to secure communication.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1016/j.biosystems.2024.105358 | DOI Listing |
PLoS One
September 2025
Department of Computer Science and Artificial Intelligence, College of Computing and Information Technology, University of Bisha, Bisha, Saudi Arabia.
The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. IoT faces significant challenges in balancing strict security with optimal performance metrics such as energy efficiency, throughput, and memory.
View Article and Find Full Text PDFSci Rep
August 2025
School of Electrical and Electronics Engineering, SASTRA Deemed University, Thanjavur, 613401, India.
In recent years, technological advancements have made the transmission of confidential information spooky. This research proposes a modified 5D chaotic map and a new image encryption algorithm based on an integrated chaotic system developed with SHA-512 hashing and a confusion-diffusion architecture. The modified 5D chaotic map provides randomness, and its performance is evaluated through a bifurcation diagram and Lyapunov exponent.
View Article and Find Full Text PDFWater Res
August 2025
College of Information, Shanghai Ocean University, Shanghai 201306, PR China. Electronic address:
Climate change has intensified the interdependence within the water-energy-food-land nexus (WEFLN), and the resulting risk mechanism presents significant challenges to traditional resource management approaches. Current research faces challenges in quantifying the dependence structure of multi-resource shortage risks and lacks the capacity to perform synergistic optimization in high-dimensional decision spaces. This study proposes a Trinity framework for the WEFLN nexus, integrating R-vine Copula, Copula-based chance-constrained fuzzy multi-objective programming (CCFMOP), deep reinforcement learning, multi-objective evolutionary algorithm, and a coupling coordinated-gravity model (CCGM) to achieve a systematic process of risk identification-optimization decision-coordinated evaluation.
View Article and Find Full Text PDFEntropy (Basel)
July 2025
School of Electronic Information, University of Electronic Science and Technology of China Zhongshan Institute, Zhongshan 528402, China.
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences.
View Article and Find Full Text PDFBiomimetics (Basel)
August 2025
Logistics Engineering College, Shanghai Maritime University, Shanghai 201306, China.
Aiming at the cooperative path-planning problem of multiple autonomous underwater vehicles in underwater three-dimensional terrain and dynamic ocean current environments, a hybrid algorithm based on the Improved Multi-Objective Particle Swarm Optimization (IMOPSO) and Dynamic Window (DWA) is proposed. The traditional particle swarm optimization algorithm is prone to falling into local optimization in high-dimensional and complex marine environments. It is difficult to meet multiple constraint conditions, the particle distribution is uneven, and the adaptability to dynamic environments is poor.
View Article and Find Full Text PDF