This paper proposes a chaotic fingerprint images encryption approach. An image of a fingerprint is encrypted via a twodimensional (2D) chaotic sequence obtained from multi-scrol...
Data-based control design methods most often consist of iterative adjustment of the controller's parameters towards the parameter values which minimize an H2 performance crit...
Alexandre S. Bazanella, Michel Gevers, Ljubisa Mis...
The unique value of cultural heritage has long been recognized together with the need for accurate and detailed information in order to preserve and manage cultural heritage materi...
Alexia Dini Kounoudes, Petros Artemi, Marios Zerva...
Through analysis of present pseudo-parallel genetic algorithm, propose a new dynamic sub-population pseudo-parallel genetic algorithm. It changes the condition that the magnitude o...
Dynamic systems that are subject to fast disturbances, parametrised by a disturbance vector d, undergo bifurcations for some values of the disturbance d. In this work we specific...
Benedikt Wirth, Johannes Gerhard, Wolfgang Marquar...