Publications by authors named "Miguel Angel Murillo-Escobar"

In this work, the problem of master-slave outer synchronization in different inner-outer network topologies is presented. Specifically, the studied inner-outer network topologies are coupled in master-slave configuration, where some particular scenarios concerning inner-outer topologies are addressed in order to disclose a suitable coupling strength to achieve outer synchronization. The novel MACM chaotic system is used as a node in the coupled networks, which presents robustness in its bifurcation parameters.

View Article and Find Full Text PDF

In recent years, chaotic synchronization has received a lot of interest in applications in different fields, including in the design of private and secure communication systems. The purpose of this paper was to achieve the synchronization of the Méndez-Arellano-Cruz-Martínez (MACM) 3D chaotic system coupled in star topology. The MACM electronic circuit is used as chaotic nodes in the communication channels to achieve synchronization in the proposed star network; the corresponding electrical hardware in the slave stages receives the coupling signal from the master node.

View Article and Find Full Text PDF

Recently, chaotic maps have been considered to design pseudorandom number generator (PRNG). However, some chaotic maps present security disadvantages, such as low uniformity and low randomness properties. Nowadays, chaos-based PRNGs are used as the main source for the development of cryptographic algorithms.

View Article and Find Full Text PDF

Childhood obesity causes not only medical and psychosocial problems, it also reduces the life expectancy of the adults that they will become. On a large scale, obese adults adversely affect labor markets and the gross domestic product of countries. Monitoring the growth charts of children helps to maintain their body weight within healthy parameters according to the World Health Organization.

View Article and Find Full Text PDF

Currently, chaos-based cryptosystems are being proposed in the literature to provide confidentiality for digital images, since the diffusion effect in the Advance Encryption Standard (AES) algorithm is weak. Security is the most important challenge to assess in cryptosystems according to the National Institute of Standard and Technology (NIST), then cost and performance, and finally algorithm and implementation. Recent chaos-based image encryption algorithms present basic security analysis, which could make them insecure for some applications.

View Article and Find Full Text PDF