Chaotic behavior analysis based on corner bifurcations
نویسندگان
چکیده
منابع مشابه
Chaotic behavior analysis based on sliding bifurcations
In this paper, a mathematical analysis of a possible way to chaos for bounded piecewise smooth systems of dimension 3 submitted to one of it’s specific bifurcations, namely the sliding ones, is proposed. This study is based on period doubling method applied to the relied Poincaré maps.
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
Bifurcations of Wavefronts on an r-corner
We introduce the notion of reticular Legendrian unfoldings in order to investigate stabilities of bifurcations of wavefronts generated by a hypersurface germ with a boundary, a corner, or an r-corner in a smooth n dimensional manifold. We define several stabilities of reticular Legendrian unfoldings and prove that they and the stabilities of corresponding generating families are all equivalent ...
متن کاملCorner validation based on extracted corner properties
We developed a method to validate and filter a large set of previously obtained corner points. We derived the necessary relationships between image derivatives and estimates of corner angle, orientation and contrast. Commonly used cornerness measures of the autocorrelation matrix estimates of image derivatives are expressed in terms of these estimated corner properties. A candidate corner is va...
متن کاملA Stream Cipher Based on Chaotic Permutations
In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nonlinear Analysis: Hybrid Systems
سال: 2009
ISSN: 1751-570X
DOI: 10.1016/j.nahs.2009.04.005