Processing math: 100%
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    A Novel Method for Chaos Detection in Heavy Noisy Environments Based on Distribution of Energy

    Detecting chaos in heavy-noise environments is an important issue in many fields of science and engineering. In this paper, first, a new criterion is proposed to recognize chaos from noise based on the distribution of energy. Then, a new method based on stationary wavelet transform (SWT) is presented for chaos detection that is recommended for data that contain more than 60% noise. This method is dependent on the distribution of signal’s energy in different frequency bands based on SWT for chaos detection which is robust to noisy environments. In this method, the effect of white noise and colored noise on the chaotic system is considered. As a case study, the proposed method is applied to detect chaos in two different oscillators based on memristor and memcapacitor. The simulation results are used to display the main points of the paper.

  • articleNo Access

    Quantum multi-secret sharing scheme with access structures and cheat identification

    This work proposes a d-dimensional quantum multi-secret sharing scheme with a cheat-detection mechanism. The dealer creates multiple secrets and distributes the shares of these secrets using multi-access structures and a monotone span program. The dealer detects the cheating of each participant using the black box’s cheat-detection mechanism. To detect the participants’ deceit, the dealer distributes secret shares’ shadows derived from a randomly invertible matrix X to the participants, stored in the black box. The black box identifies the participant’s deceitful behavior during the secret recovery phase. Only honest participants authenticated by the black box acquire their secret shares to recover the multiple secrets. After the black box cheating verification, the participants reconstruct the secrets by utilizing the unitary operations and quantum Fourier transform. The proposed protocol is reliable in preventing attacks from eavesdroppers and participants. The scheme’s efficiency is demonstrated in different noise environments: dit-flip noise, d-phase-flip noise and amplitude-damping noise, indicating its robustness in practical scenarios. The proposed protocol provides greater versatility, security and practicality.