2023
DOI: 10.1016/j.tsep.2022.101606
|View full text |Cite
|
Sign up to set email alerts
|

Experimental study and computational approach prediction on thermal performance of eutectic salt inside a latent heat storage prototype

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 55 publications
0
3
0
Order By: Relevance
“…Two kinds of chaotic maps are used to generate the secret keys [57]. The first and the third keys are generated by running two chaotic logistic map models (CLMM) and the second key is generated by running chaotic tent map model (CTMM), the parameters of these chaotic models are included in the PK [50][51][52][53][54][55][56][57]. The PK will have a complicated structure shown in table 3, this structure will provide a huge key space making the method secure and making the hacking process impossible [45][46][47][48][49].…”
Section: The Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Two kinds of chaotic maps are used to generate the secret keys [57]. The first and the third keys are generated by running two chaotic logistic map models (CLMM) and the second key is generated by running chaotic tent map model (CTMM), the parameters of these chaotic models are included in the PK [50][51][52][53][54][55][56][57]. The PK will have a complicated structure shown in table 3, this structure will provide a huge key space making the method secure and making the hacking process impossible [45][46][47][48][49].…”
Section: The Proposed Methodsmentioning
confidence: 99%
“…Crypto system as shown in figure 3 contains encryption function (EF) and decryption function (DF), EF uses the private key (PK) to treat the source image to produce the encrypted image, while the DF uses the same PK to treat the encrypted image to produce the decrypted image [21][22][23][24]. A good crypto system must satisfy the quality requirements by producing an encrypted image with low quality and by producing a decrypted image with excellent quality, the quality parameters measured between the source DCI and between each of the encrypted and decrypted images must satisfy the quality requirements listed in table 1 [52][53][54][55][56][57]: Many methods were proposed for data cryptography, a lot of these methods were based on the standard methods of data cryptography such as DES, 3DES, AES and blowfish (BF) methods. These methods share some features such as [24][25][26][27][28][29][30][31][32][33][34]: -They provide good quality requirements.…”
Section: Introductionmentioning
confidence: 99%
“…-The ease of digital image processing, the gray image is represented by a 2D matrix (see figure 1), while the color image is represented by a 3D matrix (see figure 2), so image processing is transformed into a matrix processing process [26][27][28][29][30][31][32][33][34][35]. -The large size of the digital image, which makes it a large data store that can be used for a variety of purposes.…”
Section: Introductionmentioning
confidence: 99%