Chaotic behavior analysis based on corner bifurcations

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chaotic behavior analysis based on sliding bifurcations

In this paper, a mathematical analysis of a possible way to chaos for bounded piecewise smooth systems of dimension 3 submitted to one of it’s specific bifurcations, namely the sliding ones, is proposed. This study is based on period doubling method applied to the relied Poincaré maps.

متن کامل

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

Bifurcations of Wavefronts on an r-corner

We introduce the notion of reticular Legendrian unfoldings in order to investigate stabilities of bifurcations of wavefronts generated by a hypersurface germ with a boundary, a corner, or an r-corner in a smooth n dimensional manifold. We define several stabilities of reticular Legendrian unfoldings and prove that they and the stabilities of corresponding generating families are all equivalent ...

متن کامل

Corner validation based on extracted corner properties

We developed a method to validate and filter a large set of previously obtained corner points. We derived the necessary relationships between image derivatives and estimates of corner angle, orientation and contrast. Commonly used cornerness measures of the autocorrelation matrix estimates of image derivatives are expressed in terms of these estimated corner properties. A candidate corner is va...

متن کامل

A Stream Cipher Based on Chaotic Permutations

In this paper we introduce a word-based stream cipher consisting of a chaotic part operating as a chaotic permutation and a linear part, both of which designed on a finite field. We will show that this system can operate in both synchronized and self-synchronized modes. More specifically, we show that in the self-synchronized mode the stream cipher has a receiver operating as an unknown input o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Nonlinear Analysis: Hybrid Systems

سال: 2009

ISSN: 1751-570X

DOI: 10.1016/j.nahs.2009.04.005