With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and...With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and protect intellectual property rights,this study proposes an innovative color image encryption algorithm.Initially,the Mersenne Twister algorithm is utilized to generate high-quality pseudo-random numbers,establishing a robust basis for subsequent operations.Subsequently,two distinct chaotic systems,the autonomous non-Hamiltonian chaotic system and the tentlogistic-cosine chaotic mapping,are employed to produce chaotic random sequences.These chaotic sequences are used to control the encoding and decoding process of the DNA,effectively scrambling the image pixels.Furthermore,the complexity of the encryption process is enhanced through improved Joseph block scrambling.Thorough experimental verification,research,and analysis,the average value of the information entropy test data reaches as high as 7.999.Additionally,the average value of the number of pixels change rate(NPCR)test data is 99.6101%,which closely approaches the ideal value of 99.6094%.This algorithm not only guarantees image quality but also substantially raises the difficulty of decryption.展开更多
This paper presents a hybrid methodology of automatically constructing fuzzy cognitive map (FCM). The method uses immune genetic algorithm to learn the connection matrix of FCM. In the algorithm, the DNA coding method...This paper presents a hybrid methodology of automatically constructing fuzzy cognitive map (FCM). The method uses immune genetic algorithm to learn the connection matrix of FCM. In the algorithm, the DNA coding method is used and an immune operator based on immune mechanism is constructed. The characteristics of the system and the experts' knowledge are abstracted as vaccine for restraining the degenerative phenomena during evolution so as to improve the algorithmic efficiency. Finally, an illustrative example is provided, and its results suggest that the method is capable of automatically generating FCM model.展开更多
With the support from the National Natural Science Foundation of China,Prof.Huang Yanyi(黄岩谊)led a team at Peking University to demonstrate a novel approach,which combined fluorogenic sequencingby-synthesis(SBS)chem...With the support from the National Natural Science Foundation of China,Prof.Huang Yanyi(黄岩谊)led a team at Peking University to demonstrate a novel approach,which combined fluorogenic sequencingby-synthesis(SBS)chemistry with an information theory-based error-correction coding scheme to展开更多
In the present paper,we study the structure of cyclic DNA codes of even length over the ring F_(2)+uF_(2)+u^(2)F_(2)where u^(3)=0.We investigate two presentations of cyclic codes of even length over F_(2)+uF_(2)+u^(2)...In the present paper,we study the structure of cyclic DNA codes of even length over the ring F_(2)+uF_(2)+u^(2)F_(2)where u^(3)=0.We investigate two presentations of cyclic codes of even length over F_(2)+uF_(2)+u^(2)F_(2)satisfying the reverse constraint and the reverse-complement constraint.展开更多
In this paper, our main objective is to find out the necessary and sufficient conditions for a cyclic code of arbitrary length over the ring of four elements R1 = F2 + u2 (u^2 = 1) to be a reversible cyclic code. W...In this paper, our main objective is to find out the necessary and sufficient conditions for a cyclic code of arbitrary length over the ring of four elements R1 = F2 + u2 (u^2 = 1) to be a reversible cyclic code. We also obtain the structure of cyclic DNA codes of odd length over the ring R = F2 [u, v]/(u^2 -1, v^3 -v, uv- vu), which plays an important role in Computational Biology. Furthermore, we establish a direct link between the elements of ring /{ and 64 codons used in the amino acids of living organisms by introducing a Gray map from R to R1. Among others, binary images of cyclic codes over R are also investigated. As applications, some cyclic DNA codes over R using the Gray map are provided.展开更多
基金supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202208)the Natural Science Foundation of Chongqing(Grant No.CSTB2023NSCQLZX0139)the National Natural Science Foundation of China(Grant No.61772295).
文摘With the rapid development of digital information technology,images are increasingly used in various fields.To ensure the security of image data,prevent unauthorized tampering and leakage,maintain personal privacy,and protect intellectual property rights,this study proposes an innovative color image encryption algorithm.Initially,the Mersenne Twister algorithm is utilized to generate high-quality pseudo-random numbers,establishing a robust basis for subsequent operations.Subsequently,two distinct chaotic systems,the autonomous non-Hamiltonian chaotic system and the tentlogistic-cosine chaotic mapping,are employed to produce chaotic random sequences.These chaotic sequences are used to control the encoding and decoding process of the DNA,effectively scrambling the image pixels.Furthermore,the complexity of the encryption process is enhanced through improved Joseph block scrambling.Thorough experimental verification,research,and analysis,the average value of the information entropy test data reaches as high as 7.999.Additionally,the average value of the number of pixels change rate(NPCR)test data is 99.6101%,which closely approaches the ideal value of 99.6094%.This algorithm not only guarantees image quality but also substantially raises the difficulty of decryption.
文摘This paper presents a hybrid methodology of automatically constructing fuzzy cognitive map (FCM). The method uses immune genetic algorithm to learn the connection matrix of FCM. In the algorithm, the DNA coding method is used and an immune operator based on immune mechanism is constructed. The characteristics of the system and the experts' knowledge are abstracted as vaccine for restraining the degenerative phenomena during evolution so as to improve the algorithmic efficiency. Finally, an illustrative example is provided, and its results suggest that the method is capable of automatically generating FCM model.
文摘With the support from the National Natural Science Foundation of China,Prof.Huang Yanyi(黄岩谊)led a team at Peking University to demonstrate a novel approach,which combined fluorogenic sequencingby-synthesis(SBS)chemistry with an information theory-based error-correction coding scheme to
文摘In the present paper,we study the structure of cyclic DNA codes of even length over the ring F_(2)+uF_(2)+u^(2)F_(2)where u^(3)=0.We investigate two presentations of cyclic codes of even length over F_(2)+uF_(2)+u^(2)F_(2)satisfying the reverse constraint and the reverse-complement constraint.
文摘In this paper, our main objective is to find out the necessary and sufficient conditions for a cyclic code of arbitrary length over the ring of four elements R1 = F2 + u2 (u^2 = 1) to be a reversible cyclic code. We also obtain the structure of cyclic DNA codes of odd length over the ring R = F2 [u, v]/(u^2 -1, v^3 -v, uv- vu), which plays an important role in Computational Biology. Furthermore, we establish a direct link between the elements of ring /{ and 64 codons used in the amino acids of living organisms by introducing a Gray map from R to R1. Among others, binary images of cyclic codes over R are also investigated. As applications, some cyclic DNA codes over R using the Gray map are provided.