The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Steganography is an additional method leading to better securing messages up which goes hand by hand with the cryptography. This is the reason why revealing of such a message is difficult because a final steganogram uses multimedia or other transportation media along with genuine functionality. This paper deals with a blind steganalysis based on a universal neural network classification and compares...
This work deals with the comparison of performance of two selected evolutionary algorithms (EA) in the task of optimization of the control of chaos. The main aim of this work is to show that evolutionary algorithms are capable of optimization of chaos control, leading to satisfactory results and to show extreme sensitivity of quality of results on the selection of EA, setting-up of EA, construction...
The paper deals with detection of steganography content. Steganography is an additional method in cryptography which helps to hide coded messages inside pictures or videos. To hide a message is very important but also revealing such content is important to avoid of usage by jailbirds. The revealing of steganography is not easy. This paper shows how neural networks are able to detect steganography...
This work deals with optimization of the control of chaos by means of the evolutionary algorithms. The main aim of this work is to show that evolutionary algorithms are capable of optimization of chaos control leading to satisfactory results and mainly to compare their performance in this task. As a model of deterministic chaotic system, the one dimensional logistic equation was used. The evolutionary...
Cryptography is one of very much spoken word nowadays. Security of messages transfer is very important and specialists have a work to think a new cryptography up. Cryptography, on the other hand, can be and is very often used by jailbirds, so cryptanalysts have also very important job to detect and reveal and then decode the coded messages. Steganography is additional method leading to better secure...
This contribution deals with a new idea of how to create evolutionary algorithms by means of symbolic regression and Analytic Programming. The motivation was not only to tune some existing algorithms to their better performance, but also to find a new robust evolutionary algorithm. In this study operators of Differential Evolution (DE), SelfOrganizing Migrating Algortithm (SOMA), Hill Climbing (HC)...
The paper deals with a novelty tool for symbolic regression - Analytic Programming (AP) which is able to solve various problems from the symbolic regression domain. One of tasks for it can be setting an optimal trajectory for artificial ant on Santa Fe trail which is the main application of Analytic Programming in this paper. In this contribution main principles of AP are described and explained....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.