Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Polymers (Basel) ; 15(16)2023 Aug 08.
Artigo em Inglês | MEDLINE | ID: mdl-37631392

RESUMO

Electropolymerized thionine was used as a redox-active polymer to create a two-mediated microbial biosensor for determining biochemical oxygen demand (BOD). The electrochemical characteristics of the conducting system were studied by cyclic voltammetry and electrochemical impedance spectroscopy. It has been shown that the most promising in terms of the rate of interaction with the yeast B. adeninivorans is the system based on poly(thionine), single-walled carbon nanotubes (SWCNT), and neutral red (kint = 0.071 dm3/(g·s)). The biosensor based on this system is characterized by high sensitivity (the lower limit of determined BOD concentrations is 0.4 mgO2/dm3). Sample analysis by means of the developed analytical system showed that the results of the standard dilution method and those using the biosensor differed insignificantly. Thus, for the first time, the fundamental possibility of effectively using nanocomposite materials based on SWCNT and the redox-active polymer poly(thionine) as one of the components of two-mediator systems for electron transfer from yeast microorganisms to the electrode has been shown. It opens up prospects for creating stable and highly sensitive electrochemical systems based on eukaryotes.

2.
Chaos ; 31(9): 091101, 2021 Sep.
Artigo em Inglês | MEDLINE | ID: mdl-34598465

RESUMO

Chaos-based image encryption schemes have been extensively employed over the past few years. Many issues such as the dynamical degradation of digital chaotic systems and information security have been explored, and plenty of successful solutions have also been proposed. However, the impact of finite precision in different hardware and software setups has received little attention. In this work, we have shown that the finite precision error may produce distinct cipher-images on different devices. In order to overcome this problem, we introduce an efficient cryptosystem, in which the chaotic logistic map and the Galois field theory are applied. Our approach passes in the ENT test suite and in several cyberattacks. It also presents an astonishing key space of up to 24096. Benchmark images have been effectively encrypted and decrypted using dissimilar digital devices.

3.
Entropy (Basel) ; 22(3)2020 Mar 23.
Artigo em Inglês | MEDLINE | ID: mdl-33286139

RESUMO

The finite numerical resolution of digital number representation has an impact on the properties of filters. Much effort has been done to develop efficient digital filters investigating the effects in the frequency response. However, it seems that there is less attention to the influence in the entropy by digital filtered signals due to the finite precision. To contribute in such a direction, this manuscript presents some remarks about the entropy of filtered signals. Three types of filters are investigated: Butterworth, Chebyshev, and elliptic. Using a boundary technique, the parameters of the filters are evaluated according to the word length of 16 or 32 bits. It has been shown that filtered signals have their entropy increased even if the filters are linear. A significant positive correlation (p < 0.05) was observed between order and Shannon entropy of the filtered signal using the elliptic filter. Comparing to signal-to-noise ratio, entropy seems more efficient at detecting the increasing of noise in a filtered signal. Such knowledge can be used as an additional condition for designing digital filters.

4.
Entropy (Basel) ; 22(9)2020 Aug 29.
Artigo em Inglês | MEDLINE | ID: mdl-33286722

RESUMO

An evergreen scientific feature is the ability for scientific works to be reproduced. Since chaotic systems are so hard to understand analytically, numerical simulations assume a key role in their investigation. Such simulations have been considered as reproducible in many works. However, few studies have focused on the effects of the finite precision of computers on the simulation reproducibility of chaotic systems; moreover, code sharing and details on how to reproduce simulation results are not present in many investigations. In this work, a case study of reproducibility is presented in the simulation of a chaotic jerk circuit, using the software LTspice. We also employ the OSF platform to share the project associated with this paper. Tests performed with LTspice XVII on four different computers show the difficulties of simulation reproducibility by this software. We compare these results with experimental data using a normalised root mean square error in order to identify the computer with the highest prediction horizon. We also calculate the entropy of the signals to check differences among computer simulations and the practical experiment. The methodology developed is efficient in identifying the computer with better performance, which allows applying it to other cases in the literature. This investigation is fully described and available on the OSF platform.

5.
Chaos ; 29(6): 061101, 2019 Jun.
Artigo em Inglês | MEDLINE | ID: mdl-31266342

RESUMO

Chaotic systems have been extensively applied in image encryption as a source of randomness. However, dynamical degradation has been pointed out as an important limitation of this procedure. To overcome this limitation, this paper presents a novel image encryption scheme based on the pseudo-orbits of 1D chaotic maps. We use the difference of two pseudo-orbits to generate a random sequence. The generated sequence has been successful in all NIST tests, which implies it has adequate randomness to be employed in encryption process. Confusion and diffusion requirements are also effectively implemented. The usual low key space of 1D maps has been improved by a novelty procedure based on multiple perturbations in the transient time. A factor using the plain image is one of the perturbation conditions, which ensures a new and distinct secret key for each image to be encrypted. The proposed encryption scheme has been efficaciously verified using the Lena, Baboon, and Barbara test images.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...