Learn More
Support vector machines (SVM) are an emerging data classification technique with many diverse applications. The feature subset selection, along with the parameter setting in the SVM training procedure significantly influences the classification accuracy. In this paper, the asymptotic behaviors of support vector machines are fused with genetic algorithm (GA)(More)
Chaos-based image cipher has been widely investigated over the last decade or so to meet the increasing demand for real-time secure image transmission over public networks. In this paper, an improved diffusion strategy is proposed to promote the efficiency of the most widely investigated permutation-diffusion type image cipher. By using the novel(More)
Photoluminescence and cathodoluminescence ~CL! spectra of stoichiometric and oxygen-deficient ZnO films grown on sapphire were examined. It was found that the intensities of the green and yellow emissions depend on the width of the free-carrier depletion region at the particle surface; the thinner the width, the larger the intensity. Experimental results(More)
Enterovirus 71 (EV71) is a neurotropic virus that causes various clinical manifestations in young children, ranging from asymptomatic to fatal. Different pathotypes of EV71 notably differ in virulence. Several virulence determinants of EV71 have been predicted. However, these reported virulence determinants could not be used to identify the EV71 strains of(More)
Very recently, several chaos-based image ciphers using a bit-level permutation have been suggested and shown promising results. Due to the diffusion effect introduced in the permutation stage, the workload of the time-consuming diffusion stage is reduced, and hence the performance of the cryptosystem is improved. In this paper, a symmetric chaosbased image(More)
Recently, the increasing demand for telemedicine services has raised interest in the use of medical image protection technology. Conventional block ciphers are poorly suited to image protection due to the size of image data and increasing demand for real-time teleradiology and other online telehealth applications. To meet this challenge, this paper presents(More)
Confidentiality is an important issue when digital images are transmitted over public networks, and encryption is the most useful technique employed for this purpose. Image encryption is somehow different from text encryption due to some inherent features of image such as bulk data capacity and high correlation among adjacent pixels, which are generally(More)
Chaos theory provides a new approach to image encryption technology. The key stream generator is the key design issue of an image encryption system, it directly determines the security and efficiency of the system. This paper proposes an improved chaos-based key stream generator to enlarge the key space, extend the period and improve the linear complexity(More)
First-principles studies identify a vacancy mechanism underlying the unusually high O solubility and nucleation of stable O-enriched nanoclusters in defect-containing Fe. Oxygen, confined as an interstitial, shows an exceptionally high affinity for vacancies, an effect enhanced by spin polarization. If vacancies preexist, the O-vacancy pair formation energy(More)
This paper proposes a Rossler chaos system based image encryption scheme, which improves the security and performance over the conventional simple chaos system based ones. The balance and correlation properties of the time sequences generated by Rossler system are analyzed and a pre-process scheme is proposed, which makes the key stream have good(More)