A PHP Error was encountered

Severity: Warning

Message: file_get_contents(https://...@gmail.com&api_key=61f08fa0b96a73de8c900d749fcb997acc09&a=1): Failed to open stream: HTTP request failed! HTTP/1.1 429 Too Many Requests

Filename: helpers/my_audit_helper.php

Line Number: 176

Backtrace:

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 176
Function: file_get_contents

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 250
Function: simplexml_load_file_from_url

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 1034
Function: getPubMedXML

File: /var/www/html/application/helpers/my_audit_helper.php
Line: 3152
Function: GetPubMedArticleOutput_2016

File: /var/www/html/application/controllers/Detail.php
Line: 575
Function: pubMedSearch_Global

File: /var/www/html/application/controllers/Detail.php
Line: 489
Function: pubMedGetRelatedKeyword

File: /var/www/html/index.php
Line: 316
Function: require_once

Adaptive Synchronization of Reaction-Diffusion Neural Networks and Its Application to Secure Communication. | LitMetric

This paper is mainly concerned with the synchronization problem of reaction-diffusion neural networks (RDNNs) with delays and its direct application in image secure communications. An adaptive control is designed without a sign function in which the controller gain matrix is a function of time. The synchronization criteria are established for an error model derived from master-slave models through solving the set of linear matrix inequalities derived by constructing the suitable novel Lyapunov-Krasovskii functional candidate, Green's formula, and Wirtinger's inequality. If the proposed sufficient conditions are satisfied, then the global asymptotic synchronization of the error model is guaranteed. The numerical illustrations are provided to demonstrate the validity of the derived synchronization criteria. In addition, the role of system parameters is picturized through the chaotic nature of RDNNs and those unprecedented solutions is utilized to promote better security of image transactions. As is evident, the enhancement of image encryption algorithm is designed with two levels, namely, image watermarking and diffusion process. The contributions of this paper are discussed as concluding remarks.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TCYB.2018.2877410DOI Listing

Publication Analysis

Top Keywords

reaction-diffusion neural
8
neural networks
8
synchronization criteria
8
error model
8
adaptive synchronization
4
synchronization reaction-diffusion
4
networks application
4
application secure
4
secure communication
4
communication paper
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!