Filtering Design-Based Markov Jump Proprieties for Networked Control Systems
H Qobbi, T Zoulagh, KA Barbosa… - 2023 IEEE CHILEAN …, 2023 - ieeexplore.ieee.org
A novel and improved approach is provided for designing a filter in networked control systems
(NCS) with Markovian jump processes, incorporating temporal delays and packet losses. …
(NCS) with Markovian jump processes, incorporating temporal delays and packet losses. …
H∞ Filtering of 2D Linear FM II Model Delayed Systems
The aim of this study is to address the challenge of H ∞ filtering for 2-D systems with time
delays. We will employ the well-known Fornasini-Marchesini state model with delay to …
delays. We will employ the well-known Fornasini-Marchesini state model with delay to …
Robust observer-controller for 2-D FMII systems with the protocol of Round-Robin and randomly occurring uncertainties
H Qobbi, T Zoulagh, KA Barbosa… - … on Systems and …, 2022 - ieeexplore.ieee.org
An $H_{\infty}$ state observer-controller for the two-dimensional system Marchesini-Fornasini
second model (FMII) is addressed by considering the Round-Robin (RR) protocol based …
second model (FMII) is addressed by considering the Round-Robin (RR) protocol based …
Combination of an Improved Feistel Scheme and Genetic Operators for Chaotic Image Encryption
Y Qobbi, A Jarjar, A Benazzi - Computing, Internet of Things and …, 2024 - books.google.com
In this work, we will propose a new color image encryption technique using chaotic maps and
based on an improved Feistel scheme. This scheme is reinforced by two genetic operators …
based on an improved Feistel scheme. This scheme is reinforced by two genetic operators …
New image encryption approach using a dynamic-chaotic variant of Hill cipher in Z/4096Z.
Currently, digital communication generates a considerable amount of data from digital
images. Preserving the confidentiality of these images during transmission through network …
images. Preserving the confidentiality of these images during transmission through network …
Robust Image Encryption Algorithm Using a New Variant of Hill Cipher
In this work, a new approach to image encryption is proposed. This crypto system is composed
of two stages of the Hill cipher. First, a passage in vector of the original image is carried …
of two stages of the Hill cipher. First, a passage in vector of the original image is carried …
Combination of an Improved Feistel Scheme and Genetic Operators for Chaotic Image Encryption
In this work, we will propose a new color image encryption technique using chaotic maps and
based on an improved Feistel scheme. This scheme is reinforced by two genetic operators …
based on an improved Feistel scheme. This scheme is reinforced by two genetic operators …
[PDF][PDF] DNA-level enhanced Vigenere encryption for securing color images
…, H Tabti, H El Bourakkadi, R Hicham… - … Trans. Mach. Learn, 2024 - library.acadlore.com
This study presents the development of a novel method for color image encryption, leveraging
an enhanced Vigenere algorithm. The conventional Vigenere cipher is augmented with …
an enhanced Vigenere algorithm. The conventional Vigenere cipher is augmented with …
Image Encryption Using Hill Cipher Under a Chaotic Vector's Control
The innovative approach in this study for image encryption focuses on advancing Hill's
technique by incorporating a pseudo-random binary vector. The process includes transforming …
technique by incorporating a pseudo-random binary vector. The process includes transforming …
[PDF][PDF] Enhanced Vigenere encryption technique for color images acting at the pixel level.
A Chemlal, H Tabti, H El Bourakkadi… - … Journal of Electrical …, 2024 - researchgate.net
The pixel unit is an essential component of many encryption schemes. In the beginning two
substitution tables, separately constructed from chaotic maps namely, the logistic map, …
substitution tables, separately constructed from chaotic maps namely, the logistic map, …