Design and management of assembly systems 4.0: systematic literature review and research agenda

A Dolgui, F Sgarbossa, M Simonetto - International Journal of …, 2022 - Taylor & Francis
Assembly systems (ASs) have moved into the era of mass customisation and Industry 4.0 (I4.
0). Mass customisation involves a shift from the production of high quantities of the same …

Chaos in the real world: Recent applications to communications, computing, distributed sensing, robotic motion, bio-impedance modelling and encryption systems

G Grassi - Symmetry, 2021 - mdpi.com
Most of the papers published so far in literature have focused on the theoretical phenomena
underlying the formation of chaos, rather than on the investigation of potential applications of …

Image encryption approach using improved chaotic system incorporated with differential evolution and genetic algorithm

S Bhowmik, S Acharyya - Journal of Information Security and Applications, 2023 - Elsevier
Meta-heuristic techniques are widely used to solve different complex real-life problems in
recent scenarios. In this work, traditional key-generation mechanisms have been combined …

UAV-UGV-UMV multi-swarms for cooperative surveillance

DH Stolfi, MR Brust, G Danoy, P Bouvry - Frontiers in Robotics and AI, 2021 - frontiersin.org
In this paper we present a surveillance system for early detection of escapers from a
restricted area based on a new swarming mobility model called CROMM-MS (Chaotic …

Echo state network with logistic mapping and bias dropout for time series prediction

H Wang, Y Liu, P Lu, Y Luo, D Wang, X Xu - Neurocomputing, 2022 - Elsevier
An echo state network (ESN) is a special structure of a recurrent neural network in which the
recurrent neurons are randomly connected. ESN models that have achieved high accuracy …

Construction of one-way hash functions with increased key space using adaptive chaotic maps

AV Tutueva, AI Karimov, L Moysis, C Volos… - Chaos, Solitons & …, 2020 - Elsevier
Chaotic hash functions are a prospective branch of modern cryptography. Being compared
with traditional hashing algorithms, an approach based on deterministic chaos allows …

Tracking control and stabilization of a fractional financial risk system using novel active finite-time fault-tolerant controls

B Wang, H Jahanshahi, S Bekiros, YM Chu… - Fractals, 2021 - World Scientific
This paper introduces a fractional-order financial risk system for the first time. Employing well-
known tools and analyses such as bifurcations diagrams and spectral entropy, the …

Analysis of a new chaotic system, electronic realization and use in navigation of differential drive mobile robot

C Nwachioma, JH Pérez-Cruz - Chaos, Solitons & Fractals, 2021 - Elsevier
This paper presents a new chaotic system that has four attractors including two fixed point
attractors and two symmetrical chaotic strange attractors. Dynamical properties of the …

A novel time series prediction method based on pooling compressed sensing echo state network and its application in stock market

Z Wang, H Zhao, M Zheng, S Niu, X Gao, L Li - Neural Networks, 2023 - Elsevier
In the prediction of time series, the echo state network (ESN) exhibits exclusive strengths
and a unique training structure. Based on ESN model, a pooling activation algorithm …

Color image quantum steganography scheme and circuit design based on DWT+ DCT+ SVD

J Sun, W Wang, H Zhang, J Zhang - Physica A: Statistical Mechanics and its …, 2023 - Elsevier
This paper presents a new steganographic algorithm for quantum color images, which
utilizes DWT+ DCT+ SVD embedding technology. Firstly, in order to improve the security of …