نتایج جستجو برای: multiple chaotic maps

تعداد نتایج: 879192  

2008
Nithin Nagaraj Mahesh C. Shastry Prabhakar G. Vaidya

Grebogi, Ott and Yorke (Phys. Rev. A 38(7), 1988) have investigated the effect of finite precision on average period length of chaotic maps. They showed that the average length of periodic orbits (T ) of a dynamical system scales as a function of computer precision (ε) and the correlation dimension (d) of the chaotic attractor: T ∼ ε. In this work, we are concerned with increasing the average p...

Journal: :Scientific reports 2016
Sheng-Jun Wang Ru-Hai Du Tao Jin Xing-Sen Wu Shi-Xian Qu

The speed and paths of synchronization play a key role in the function of a system, which has not received enough attention up to now. In this work, we study the synchronization process of coupled logistic maps that reveals the common features of low-dimensional dissipative systems. A slowing down of synchronization process is observed, which is a novel phenomenon. The result shows that there a...

2003
Fabio Cecconi Diego del-Castillo-Negrete Massimo Falcioni Angelo Vulpiani

We investigate the origin of diffusion in non-chaotic systems. As an example, we consider 1D map models whose slope is everywhere 1 (therefore the Lyapunov exponent is zero) but with random quenched discontinuities and quasi-periodic forcing. The models are constructed as non-chaotic approximations of chaotic maps showing deterministic diffusion, and represent one-dimensional versions of a Lore...

2006
Marcio Eisencraft Luiz Antonio Baccalá

We derive the Cramér-Rao lower bound associated with the estimation of the initial condition of noise-embedded chaotic signals produced by general onedimensional maps. We relate its asymptotic behaviour to the chaotic attractor’s Lyapunov number. These results can be used to choose the chaotic generator more suitable for applications on chaotic digital communication systems.

Journal: :I. J. Bifurcation and Chaos 2003
C. K. Michael Tse Francis Chung-Ming Lau

Chaos-based communications can be applied advantageously if the property of chaotic systems is suitably exploited. In this Letter a simple noncoherent detection method for chaos-shift-keying (CSK) modulation is proposed, exploiting some distinguishable property of chaotic maps for recovering the digital message. Specifically, the proposed method exploits the difference in the return maps of the...

2001
C. K. Tse K. Y. Cheong F. C. M. Lau S. F. Hau

Chaos-based communication can be applied advantageously only if the property of chaotic systems is suitably exploited. In this paper a simple non-coherent detection method for chaos-shiftkeying (CSK) modulation is proposed. Unlike the bit-energy-based detection which makes no specific use of any chaotic system property, the method proposed here exploits some distinguishable property of the two ...

Journal: :CoRR 2012
Sodeif Ahadpour Mahdiyeh Majidpour Yaser Sadra

By cross-coupling two logistic maps a novel method is proposed for the public key steganography in JPEG image. Chaotic maps entail high complexity in the used algorithm for embedding secret data in a medium. In this paper, discrete crosscoupled chaotic maps are used to specifying the location of the different parts of the secret data in the image. Modifying JPEG format during compressing and de...

Journal: :I. J. Bifurcation and Chaos 2005
Christian Mira Andrey Shilnikov

The present paper focuses on the two time scale dynamics generated by 2D polynomial noninvertible maps T of (Z0−Z2) and (Z1−Z3−Z1) types. This symbolism, specific to noninvertible maps, means that the phase plane is partitioned into zones Zk, where each point possesses the k real rank-one preimages. Of special interest here is the structure of slow and fast motion sets of such maps. The formati...

2014
Hongfeng Zhu Man Jiang Xin Hao Yan Zhang

In a traditional single server authentication scheme, if a user wishes to access network services from different servers, the user has to register with these servers separately. To handle this issue, multi-server authentication scheme has been proposed. Multi-server authenticated key agreement (MSAKA) protocols allow the user to register at the registration center (RC) once and can access all t...

The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید