Fig. 5
From: Research on neural network chaotic encryption algorithm in wireless network security communication

Application flow chart on the wireless communication server side. The figure shows the application flow chart on the wireless communication server side