D. Arroyo, S. Li, J. M. Amigó, G. Alvarez, and R. Rhouma, Image encryption with chaotically coupled chaotic maps, Physica D, vol.239, p.1002, 2010.

S. Sam, P. Devaraj, and R. S. Bhuvaneswaran, An intertwining chaotic maps based image encryption scheme, Nonlinear Dynamics, vol.69, 1995.

I. Taralova, Chaotic orbits prediction and atypical bifurcations in a class of piece-wise linear noninvertible maps, European Physical Journal-Special Topics, vol.165, pp.45-59, 2008.

I. Taralova and D. Fournier-prunaret, Dynamical Study of a Second Order DPCM Transmission System Modeled by a Piece-Wise Linear Function, IEEE Transactions on Circuits and Systems, Part I -Fundamental Theory and Applications, issue.11, pp.1592-1609, 2002.
URL : https://hal.archives-ouvertes.fr/hal-00368527

N. Pisarchik and M. Zanin, Chaotic map cryptography and security, Int. J. of Computer Research, vol.19, issue.1, 2012.

R. Lozi and I. Taralova, From chaos to randomness via geometric undersampling, ESAIM: Proceedings and surveys, vol.46, pp.177-195, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00813087

O. Garasym, I. Taralova, and R. Lozi, New nonlinear CPRNG based on tent and logistic maps, Complex Systems and Networks -Dynamics, Controls and Applications, pp.131-161, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01170134

O. Garasym, I. Taralova, and R. Lozi, Robust PRNG based on homogeneously distributed chaotic dynamics, Journal of Physics: Conference Series, vol.692, p.12001, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01281815

S. E. Assad and M. Farajallah, A new chaos-based image encryption system, Signal Processing: Image Communication, vol.41, p.144, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01218346

S. Petrakieva, O. Garasym, and I. Taralova, G-interval Method for Secure Chaotic Synchronization and Information Transmission, Proceedings of 9 th International Conference for Internet Technology and Secured Transactions, pp.37-42, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01170035

D. Andreev, ;. Fdiba, and . Tu-sofia, Comparison of Clustering Algorithms through External Evaluation, pp.4-7, 2015.

D. Andreev, Design and development of a software application for pattern recognition in Time series, p.72, 2016.

K. Pavan, A. V. Allam-appa-rao, and . Rao, An Automatic Clustering Technique for Optimal Clusters, pp.2-5, 2011.

T. Lavergne, T. Urvoy, and F. Yvon, Detecting Fake Content with Relative Entropy Scoring, PAN '08, Proceedings of the 2008 International Conference on Uncovering Plagiarism, Authorship and Social Software Misuse, vol.377, pp.27-31, 2008.

P. Christen, A Comparison of Personal Name Matching: Techniques and Practical Issues, Joint Computer Science Technical Report Series

, Research School of Information Sciences and Engineering, pp.7-10, 2006.

D. J. Bora and D. A. Gupta, Effect of Different Distance Measures on the Performance of K-Means Algorithm: An Experimental Study in Matlab, pp.2501-2505, 2014.

Y. Jung, H. Park, D. Du, and B. L. Drake, A Decision Criterion for the Optimal Number of Clusters in Hierarchical Clustering, vol.21, pp.1-13, 2002.

T. Kanungo, D. M. Mount, N. S. Netanyahu, C. D. Piatko, R. Silverman et al., An efficient k-means clustering algorithm: analysis and implementation, IEEE Transactions on Pattern Analysis and Machine Intelligence, issue.7, pp.881-892, 2002.

F. Murtagh and P. Legendre, Ward's Hierarchical Clustering Method: Clustering Criterion and Agglomerative Algorithm, 2011.