DATA SECURITY USING 2D CELLULAR AUTOMATA RULES

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital Data Security and Copyright Protection Using Cellular Automata

The emergence of many challenges and the rapid development of the means of communications and computer networks and the Internet. Digital information revolution has affected a lot on human societies. Data today has become available in digital format (text, image, audio, and video), which led to the emergence of many opportunities for creativity for innovation as well as the emergence of a new k...

متن کامل

Forest Fire Simulation Using 2d Cellular Automata

Since many decades different parts of world's forest environment undergo depletion because of many factors but major depletion is due to random forest fires a state, process, or instance of combustion in which fuel or other material is ignited and combined with oxygen, giving off light, heat and flame. This causes destruction of a building, town, forest etc. In Andhra Pradesh the forest area to...

متن کامل

Encompression Using Two-dimensional Cellular Automata Rules

In this paper, we analyze the algebraic structure of some null boundary as well as some periodic boundary 2-D Cellular Automata (CA) rules by introducing a new matrix multiplication operation using only AND, OR instead of most commonly used AND, EX-OR. This class includes any CA whose rule, when written as an algebra, is a finite Abelean cyclic group in case of periodic boundary and a finite co...

متن کامل

Encryption using cellular automata chain-rules

Chain rules are maximally chaotic CA rules that can be constructed at random to provide a huge number of encryption keys — where the the CA is run backwards to encrypt, forwards to decrypt. The methods are based on the reverse algorithm and the Z-parameter [5]. 1 The CA reverse algorithm and basins of attraction In the simplest cellular automata [4], each cell in a ring of cells updates its val...

متن کامل

Identifying Cellular Automata Rules

This paper studies a method for identifying cellular automata rules (CA rules). Given a sequence of CA configurations, we first seek an appropriate neighborhood of a cell and collect cellular changes of states as evidences. The collected evidences are then classified using a decision tree, which is used for constructing CA transition rules. Conditions for classifying evidences in a decision tre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Students' Research in Technology & Management

سال: 2017

ISSN: 2321-2543

DOI: 10.18510/ijsrtm.2017.512