نتایج جستجو برای: chaotic maps
تعداد نتایج: 129928 فیلتر نتایج به سال:
We investigate the application of deterministic chaotic maps to model traffic sources in packet based networks, motivated in part by recent measurement studies which indicate the presence of significant statistical features in packet traffic more characteristic of fractal processes than conventional stochastic processes. We outline one approach whereby traffic sources can be modeled by chaotic ...
the problem discussed in this paper is the effect of latency time on the ogy chaos control methodology in multi chaotic systems. the smith predictor, rhythmic and memory strategies are embedded in the ogy chaos control method to encounter loop latency. a comparison study is provided and the advantages of the smith predictor approach are clearly evident from the closed loop responses. the comple...
Number of cryptosystems based on chaos has been proposed, in recent years. Tao Xiang , Kwok-wo Wong, Xiaofeng Liao in 2008 proposed an improved scheme by using a symmetric key block cipher algorithm in which one-dimensional chaotic maps are used, in order to obtain chaotic sequences with better cryptographic feature. In this system, an encryption /decryption scheme was proposed, a cryptographic...
In recent times, research on image encryption using chaotic systems has emerged. However, some of the proposed schemes still hinder the system performance and security. In this study, we introduce an efficient image encryption scheme based on pixel bit and combination of polynomial chaotic maps with variable initial parameters. The algorithm takes advantage of the best features of chaotic maps ...
A chaotic attractor may consist of some number of bands (disjoint connected subsets). In continuous maps multi-band chaotic attractors are cyclic, that means every generic trajectory visits the bands in the same order. We demonstrate that in discontinuous maps multi-band chaotic attractors may be acyclic. Additionally, a simple criterion is proposed which allows to distinguish easily between cy...
In this paper Li–Yorke chaotic sets generated by shift and weighted shift maps are studied. The characterization of Li–Yorke chaotic sets by p-scrambled sets, maximal scrambled sets and orbit invariants are proved for the general shift maps. For weighted shift maps on infinite-dimensional spaces, the necessary and sufficient conditions for Li–Yorke chaotic are proved both in the abstract sequen...
This paper proposes a new control method for telecommunications networks based on chaotic dynamics. Self-similar behaviour has been observed in a variety of services and networks. ATM is a unifying vehicle for transporting a wide range of traffic streams, and hence is a focus for assessing the impact of self similarity on networks. Chaotic maps have been used to model self-similar traffic. Usin...
In this paper, four chaotic maps are compared and noise effects are observed on image. Firstly, we use the image encryption algorithm to convert original image to encrypted image. Now we apply noise on the encrypted image and then decrypt cipher image with noise back to original image. The Simulation experimental results shows that Cross Chaotic map has got best results. Also, noise has a littl...
In view of characteristics of digital image,such as bulk data capacity,high redundancy and poor security, a new image encryption algorithm was put forward by combining chaotic maps with wavelet transform. Mallat algorithm in wavelet transform firstly was used to decompose the original image, leaving only the lowfrequency information, and then oversampled Chebyshev chaotic maps were used to achi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید