Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 2

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
An attribute np control chart has been designed using resampling systems for monitoring non- -conforming items under exponentiated half-logistic distribution. We suppose that lifetime follows exponentiated half-logistic distribution. For the proposed control charts, the optimal parameters and control limits have been obtained. The operational formulas for in-control and out of control average run lengths (ARLs) have been derived. Control constants are established by considering the target in-control ARL at a normal process. The extensive ARL tables are reported for various parameters and shifted values of process parameters. The performance of the proposed control chart is evaluated with several existing charts with regard to ARLs, which empower the presented chart and prove far better for timely detection of assignable causes. A wide range of tables, a real-life example, and simulation study for RGS and MDS are given for a better understanding of the problem.
EN
The encryption of image data is artful as compare to others due to some special characteristics such as entropy, contrast, the correlation between the pixels, intensity, and homogeneity. During encryption process, it is conventionally not easy to manage these characteristics with non-chaotic cryptosystems. Therefore for the sake of strong encryption algorithms, in last decades many cryptographers have presented invulnerable schemes for image encryption based on the chaotic maps. This manuscript aims to propose a strong encryption scheme based on a symmetric group of permutation advanced encryption standard (AES) substitution boxes and modified Chebyshev map. Principally, the secret key depends upon the parameters of Chebyshev map to create confusion in the main image and is encrypted by the scheme made from the S8 AES S-boxes and chaotic map. By this procedure, one can obtain an encrypted image that is entirely twisted. The results of analyses showed that the presented image encryption is strong and invulnerable.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.