This paper presents the generalization of a delayed version of the logistic map
Banana ripening and corresponding variations in bio-impedance and glucose levels
Bio-impedance measurement has been used as an indicator for specific physical and chemical changes in food products, fruits and vegetables, cancer detection and other applications
Aging effect on apples bio-impedance using AD5933
In this paper, the effect of the fruits aging on bio-impedance is experimentally studied
Generalized synchronization involving a linear combination of fractional-order chaotic systems
In this paper, a generalized scheme for synchronizing a fractional order chaotic system with another one or with a linear combination of two other fractional order chaotic systems is presented
Switched active control synchronization of three fractional order chaotic systems
This paper discusses the continuous effect of fractional order parameter on two chaotic systems
Analysis and Design of Fractional-order Low-pass Filter with Three Elements of Independent Orders
This paper studies a new fractional-order form for the active low-pass filter
Analysis of bus width and delay on a fully digital signum nonlinearity chaotic oscillator
This paper introduces the first fully digital implementation of a 3rd order ODE-based chaotic oscillator with signum nonlinearity
Message from the technical program chairs
Presents the introductory welcome message from the conference proceedings.
A Secured Lossless Visual Secret Sharing for Color Images Using Arnold Transform
Nowadays, with the rapid growth in information, a fast and secure method is eagerly needed to share images. (n, n)-Visual Secret Sharing (VSS) is used to share a secret image into n shares, where the secret can only be recovered using all the n shares and the recovery must be fast with low computational complexity. This paper proposes a secured lossless (n, n)-VSS system based on Arnold transform and pixel vectorization suitable to be used with binary, grayscale and color images. Multiple security tests were performed such as entropy, correlation, Mean Squared Error (MSE), National Institute of Standards and Technology (NIST) SP-800-22 statistical suite, and differential attacks, which demonstrate the good security of the proposed system. In addition, the time complexity and runtime of the recovery system indicate good efficiency. © 2022 IEEE.
High performance 2D and 3D approaches for adjoint variable method suitable for inverse problems
This paper discusses the sensitivity analysis and the inverse problem solution using the Adjoint Variable Method (AVM) integrated with Transmission Line Modeling (TLM) for many examples having different distributions

