Multiple-Valued Logic (MVL) offers better data representation allowing higher information processing within the same amount of digits. With a trade-off in accuracy, approximate computation is a method to improve the power, size, and speed of digital circuits. This paper presents the design of CNTFET-based ternary half adder, full adder, 2-trit carry ripple adder, and 4trit carry ripple adder with different accuracies. The proposed designs are implemented using HSPICE tool and simulated for power consumption, delay, and error analysis. The trade-off between the transistor count and the computation accuracy of the propsoed designs is discussed. Simulation results show that the approximate and corrected approximate designs could significantly improve power-delay product and transistor count compared to their accurate designs. For some cases, approximate and corrected approximate designs have up to 19.8 × improvement in the transistors count and up to 295.3 × improvement in PDP compared to their accurate designs. The corrected designs outperform the approximate ones in terms of accuracy while achieving around 1.5 × improvement in AED. © 2023 IEEE.
Double Visual Cryptography Using Generalized Tent Map, Rotation, and Image Filtering
This paper introduces a Multi-Visual Cryptography (MVC) system for sharing two color images, where the secrets can be revealed with low computation power using all the shares. The system uses the generalized Tent map as a source of randomness to generate any number of random shares. More specifically, (n-1) random shares are generated, and then, the nth share is calculated from the random shares and the secrets using rotations of the shares. In recovery, rotation of the last share recovers the two images based on the angle of rotation. Half the number of pixels is recovered for each secret image, whereas a modified weighted average filter is used to improve the quality of the recovered images significantly. The system does not use halftone images and produces shares of the same size as the secrets without pixel expansion or auxiliary data. The proposed system is efficient, passed several security tests, and is compared to recent works. © 2023 IEEE.
A (k,n)-Secret Image Sharing With Steganography Using Generalized Tent Map
Secret Image Sharing (SIS) transfers an image to mutually suspicious receivers as n meaningless shares, where k or more shares must be present to recover the secret. This paper proposes a (k, n)-SIS system for any image type using polynomial interpolation based on Lagrange polynomials, where the generated shares are of size 1/k of the secret image size. A full encryption system, consisting of substitution and permutation stages, is employed by using the generalized Tent map as a source of randomness. In addition to using a long and sensitive system key, steganography using the Least Significant Bits (LSBs) embedding technique is utilized to improve security. Detailed experimental analysis of the security, robustness and performance of the proposed system is provided, which is more comprehensive than the analyses given in other related works. Security is demonstrated using statistical tests, and robustness against noise and crop attacks is validated. © 2024 IEEE.
Battery Modeling with Mittag-Leffler Function
In various areas of life, rechargeable lithium-ion batteries are the technology of choice. Equivalent circuit models are utilized extensively in characterizing and modeling energy storage systems. In real-time applications, several generic-based battery models are created to simulate the battery’s charging and discharging behavior more accurately. In this work, we present two generic battery models based on Mittag-Leffler function using a generic Standard battery model as a reference. These models are intended to fit the continuous discharging cycles of lithium-ion, Nickel-cadmium, and Nickel-metal hydride batteries, as well as one set from the NASA randomized battery usage dataset. We formulate the parameter identification as an optimization problem, solved with Marine Predator Algorithm. The optimized models show very good matching against the measured data. © 2024 IEEE.
Novel Fast Prediction Algorithm for Advanced and High Efficiency Video Coding
This paper introduces an efficient prediction algorithm tailored for advanced and high efficiency video coding, encompassing both H.264 and H.265. The proposed approach aims at replacing the standard intra prediction methodology by employing a streamlined prediction mode, which significantly reduces computational overhead and system complexity while eliminating the requirement for mode decision. By leveraging block comparison criteria, the designed method combines neighboring blocks in a linear fashion to accurately represent the target block. Extensive comparisons are conducted with the H.264 intra prediction using various video sequences and multiple evaluation criteria. The results demonstrate substantial time savings of up to 60% compared to the H.264 standard intra prediction algorithm, with a minor peak signal-to-noise ratio drop. The proposed algorithm holds promise for enhancing real-time video processing and compression in video coding systems, offering notable efficiency gains without sacrificing predictive accuracy. © 2024 IEEE.
Design, implementation and analysis of fully digital 1-D controllable multiscroll chaos
This paper introduces the fully digital implementation of a 1-D multiscroll chaos generator based on a staircase nonlinearity in the 3rd-order jerk system using the Euler approximation. For the first time, digital design is exploited to provide real-time controllability of (i) number of scrolls, (ii) position in 1-D space, (iii) Euler step size and (iv) system parameter. The effect of variations in these fields on the maximum Lyapunov exponent (MLE) is analyzed. The system is implemented using Verilog HDL and synthesized on an Xilinx Virtex 4 FPGA, exhibiting area utilization less than 3.5% and high performance with experimentally verified throughput up to 3.33 Gbits/s. This fully digital system enables applications in modulation schemes and chaos-based cryptosystems without analog to digital conversion. © 2011 IEEE.
The effect of numerical techniques on differential equation based chaotic generators
In this paper, we study the effect of the numerical solution accuracy on the digital implementation of differential chaos generators. Four systems are built on a Xilinx Virtex 4 FPGA using Euler, mid-point, and Runge-Kutta fourth order techniques. The twelve implementations are compared based on the FPGA used area, maximum throughput, maximum Lyapunov exponent, and autocorrelation confidence region. Based on circuit performance and the chaotic response of the different implementations, it was found that less complicated numerical solution has better chaotic response and higher throughput. © 2011 IEEE.
Review on Coral Reef Regeneration Methods through Renewable Powered Electrotherapy
The restoration of coral reef population in coastal regions is currently a growing concern. Many attempts have been made to apply new approaches to limit the deterioration of coral reefs, and to accelerate the growth of new reefs to protect coastal areas and ecosystems using available renewable energy sources. This paper highlights the new approaches and their various advantages and limitations in tidal and wave energy. The paper also suggests improvements to some of those systems using the recent developments in soft robotics, especially the use of biomimetic fish as a feasible support platform for the monitoring and maintenance of the power generation and potential restoration systems. © 2023 IEEE.
Pixel-based Visual Secret Sharing Using Lorenz System
(n, n)-Visual Secret Sharing (VSS) allows a user to send an image in the form of shares to different participants. Every share can not reveal the secret alone, and only all shares together can reveal the secret with fast recovery. This paper proposes a pixel-based (n, n)-VSS system, where to share a pixel from the secret image, (n – 1) random pixels are generated from the Lorenz chaotic system for a varying set of (n – 1) shares. Then, the nth pixel is calculated for a random share using the secret pixel and the generated (n – 1) random pixels. The system is efficient, lossless, implemented for grayscale and color images, and has a simple XOR-based recovery scheme. It passed several security analysis tests and is robust against noise attacks. Moreover, performance analysis and comparisons with other VSS systems are presented, showing good results. © 2023 ACM.
Fractional-Order Generalized Gene Regulation Model CCII-Based Practical Emulator
This paper presents a complete analysis of the mathematical model of the gene regulation process

