Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (65)
  • Open Access

    ARTICLE

    Predictive and Global Effect of Active Smoker in Asthma Dynamics with Caputo Fractional Derivative

    Muhammad Farman1,2,3,*, Noreen Asghar4, Muhammad Umer Saleem4, Kottakkaran Sooppy Nisar5,6, Kamyar Hosseini1,2,7, Mohamed Hafez8,9

    CMES-Computer Modeling in Engineering & Sciences, Vol.145, No.1, pp. 721-751, 2025, DOI:10.32604/cmes.2025.069541 - 30 October 2025

    Abstract Smoking is harmful to the lungs and has numerous effects on our bodies. This leads to decreased lung function, which increases the lungs’ susceptibility to asthma triggers. In this paper, we develop a new fractional-order model and investigate the impact of smoking on the progression of asthma by using the Caputo operator to analyze different factors. Using the Banach contraction principle, the existence and uniqueness of solutions are established, and the positivity and boundedness of the model are proved. The model further incorporates different stages of smoking to account for incubation periods and other latent… More >

  • Open Access

    ARTICLE

    Secure and Invisible Dual Watermarking for Digital Content Based on Optimized Octonion Moments and Chaotic Metaheuristics

    Ahmed El Maloufy, Mohamed Amine Tahiri, Ahmed Bencherqui, Hicham Karmouni, Mhamed Sayyouri*

    CMC-Computers, Materials & Continua, Vol.85, No.3, pp. 5789-5822, 2025, DOI:10.32604/cmc.2025.068885 - 23 October 2025

    Abstract In the current digital context, safeguarding copyright is a major issue, particularly for architectural drawings produced by students. These works are frequently the result of innovative academic thinking combining creativity and technical precision. They are particularly vulnerable to the risk of illegal reproduction when disseminated in digital format. This research suggests, for the first time, an innovative approach to copyright protection by embedding a double digital watermark to address this challenge. The solution relies on a synergistic fusion of several sophisticated methods: Krawtchouk Optimized Octonion Moments (OKOM), Quaternion Singular Value Decomposition (QSVD), and Discrete Waveform… More >

  • Open Access

    ARTICLE

    Sine-Polynomial Chaotic Map (SPCM): A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks

    David S. Bhatti1,*, Annas W. Malik2, Haeung Choi1, Ki-Il Kim3,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 2157-2177, 2025, DOI:10.32604/cmc.2025.068360 - 29 August 2025

    Abstract Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies, limiting their use for lightweight, secure image encryption in resource-constrained Wireless Sensor Networks (WSNs). We propose the SPCM, a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions, leveraging a piecewise function to achieve a broad chaotic range () and a high Lyapunov exponent (5.04). Validated through nine benchmarks, including standard randomness tests, Diehard tests, and Shannon entropy (3.883), SPCM demonstrates superior randomness and high sensitivity to initial conditions. Applied to image encryption, SPCM achieves 0.152582 s (39% faster than some techniques) and 433.42 More >

  • Open Access

    ARTICLE

    Hyper-Chaos and CNN-Based Image Encryption Scheme for Wireless Communication Transmission

    Gang Liu1, Guosheng Xu1,*, Chenyu Wang1, Guoai Xu2

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4851-4868, 2025, DOI:10.32604/cmc.2025.066331 - 30 July 2025

    Abstract In wireless communication transmission, image encryption plays a key role in protecting data privacy against unauthorized access. However, conventional encryption methods often face challenges in key space security, particularly when relying on chaotic sequences, which may exhibit vulnerabilities to brute-force and predictability-based attacks. To address the limitations, this paper presents a robust and efficient encryption scheme that combines iterative hyper-chaotic systems and Convolutional Neural Networks (CNNs). Firstly, a novel two-dimensional iterative hyper-chaotic system is proposed because of its complex dynamic behavior and expanded parameter space, which can enhance the key space complexity and randomness, ensuring… More >

  • Open Access

    REVIEW

    An Overview and Comparative Study of Traditional, Chaos-Based and Machine Learning Approaches in Pseudorandom Number Generation

    Issah Zabsonre Alhassan1,2,*, Gaddafi Abdul-Salaam1, Michael Asante1, Yaw Marfo Missah1, Alimatu Sadia Shirazu1

    Journal of Cyber Security, Vol.7, pp. 165-196, 2025, DOI:10.32604/jcs.2025.063529 - 07 July 2025

    Abstract Pseudorandom number generators (PRNGs) are foundational to modern cryptography, yet existing approaches face critical trade-offs between cryptographic security, computational efficiency, and adaptability to emerging threats. Traditional PRNGs (e.g., Mersenne Twister, LCG) remain widely used in low-security applications despite vulnerabilities to predictability attacks, while machine learning (ML)-driven and chaos-based alternatives struggle to balance statistical robustness with practical deployability. This study systematically evaluates traditional, chaos-based, and ML-driven PRNGs to identify design principles for next-generation systems capable of meeting the demands of high-security environment like blockchain and IoT. Using a framework that quantifies cryptographic robustness (via NIST SP… More >

  • Open Access

    ARTICLE

    Image Watermarking Algorithm Base on the Second Order Derivative and Discrete Wavelet Transform

    Maazen Alsabaan1, Zaid Bin Faheem2, Yuanyuan Zhu2, Jehad Ali3,*

    CMC-Computers, Materials & Continua, Vol.84, No.1, pp. 491-512, 2025, DOI:10.32604/cmc.2025.064971 - 09 June 2025

    Abstract Image watermarking is a powerful tool for media protection and can provide promising results when combined with other defense mechanisms. Image watermarking can be used to protect the copyright of digital media by embedding a unique identifier that identifies the owner of the content. Image watermarking can also be used to verify the authenticity of digital media, such as images or videos, by ascertaining the watermark information. In this paper, a mathematical chaos-based image watermarking technique is proposed using discrete wavelet transform (DWT), chaotic map, and Laplacian operator. The DWT can be used to decompose… More >

  • Open Access

    ARTICLE

    Design of Chaos Induced Aquila Optimizer for Parameter Estimation of Electro-Hydraulic Control System

    Khizer Mehmood1, Naveed Ishtiaq Chaudhary2,*, Zeshan Aslam Khan3, Khalid Mehmood Cheema4, Muhammad Asif Zahoor Raja2, Sultan S. Alshamrani5, Kaled M. Alshmrany6

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.2, pp. 1809-1841, 2025, DOI:10.32604/cmes.2025.064900 - 30 May 2025

    Abstract Aquila Optimizer (AO) is a recently proposed population-based optimization technique inspired by Aquila’s behavior in catching prey. AO is applied in various applications and its numerous variants were proposed in the literature. However, chaos theory has not been extensively investigated in AO. Moreover, it is still not applied in the parameter estimation of electro-hydraulic systems. In this work, ten well-defined chaotic maps were integrated into a narrowed exploitation of AO for the development of a robust chaotic optimization technique. An extensive investigation of twenty-three mathematical benchmarks and ten IEEE Congress on Evolutionary Computation (CEC) functions… More >

  • Open Access

    ARTICLE

    Hardware-Enabled Key Generation in Industry 4.0 Cryptosystems through Analog Hyperchaotic Signals

    Borja Bordel Sánchez1,*, Fernando Rodríguez-Sela1, Ramón Alcarria2, Tomás Robles1

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 1821-1853, 2025, DOI:10.32604/cmc.2025.059012 - 16 April 2025

    Abstract The Industry 4.0 revolution is characterized by distributed infrastructures where data must be continuously communicated between hardware nodes and cloud servers. Specific lightweight cryptosystems are needed to protect those links, as the hardware node tends to be resource-constrained. Then Pseudo Random Number Generators are employed to produce random keys, whose final behavior depends on the initial seed. To guarantee good mathematical behavior, most key generators need an unpredictable voltage signal as input. However, physical signals evolve slowly and have a significant autocorrelation, so they do not have enough entropy to support high-randomness seeds. Then, electronic… More >

  • Open Access

    ARTICLE

    Chaos-Based Novel Watermarked Satellite Image Encryption Scheme

    Mohamed Medani1, Yahia Said2, Nashwan Adnan Othman3,4, Farrukh Yuldashev5, Mohamed Kchaou6, Faisal Khaled Aldawood6, Bacha Rehman7,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 1049-1070, 2025, DOI:10.32604/cmes.2025.063405 - 11 April 2025

    Abstract Satellite images are widely used for remote sensing and defence applications, however, they are subject to a variety of threats. To ensure the security and privacy of these images, they must be watermarked and encrypted before communication. Therefore, this paper proposes a novel watermarked satellite image encryption scheme based on chaos, Deoxyribonucleic Acid (DNA) sequence, and hash algorithm. The watermark image, DNA sequence, and plaintext image are passed through the Secure Hash Algorithm (SHA-512) to compute the initial condition (keys) for the Tangent-Delay Ellipse Reflecting Cavity Map (TD-ERCS), Henon, and Duffing chaotic maps, respectively. Through More >

  • Open Access

    ARTICLE

    Efficient Bit-Plane Based Medical Image Cryptosystem Using Novel and Robust Sine-Cosine Chaotic Map

    Zeric Tabekoueng Njitacke1, Louai A. Maghrabi2, Musheer Ahmad3,*, Turki Althaqafi4

    CMC-Computers, Materials & Continua, Vol.83, No.1, pp. 917-933, 2025, DOI:10.32604/cmc.2025.059640 - 26 March 2025

    Abstract This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine map. The map demonstrates remarkable chaotic dynamics over a wide range of parameters. We employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map, which allows us to select optimal parameter configurations for the encryption process. Our findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors, an essential characteristic for effective encryption. The encryption technique is based on bit-plane decomposition, wherein a plain image is divided into distinct… More >

Displaying 1-10 on page 1 of 65. Per Page