نتایج جستجو برای: chaotic tent map

تعداد نتایج: 218506  

Journal: :I. J. Bifurcation and Chaos 2003
C. K. Michael Tse Francis Chung-Ming Lau

Chaos-based communications can be applied advantageously if the property of chaotic systems is suitably exploited. In this Letter a simple noncoherent detection method for chaos-shift-keying (CSK) modulation is proposed, exploiting some distinguishable property of chaotic maps for recovering the digital message. Specifically, the proposed method exploits the difference in the return maps of the...

Journal: :I. J. Bifurcation and Chaos 2004
Roy Tenny Lev S. Tsimring

We analyze the security of encryption schemes based on chaos synchronization and active/passive decomposition. The security is quantified by the number of transmitted samples that has to be acquired in order to reconstruct the transmitted message with an accuracy that may compromise the transmitted information. The dynamics is estimated as the average of dynamics of the observed data within a s...

2008
H. Bruin

Let (I, T ) be the inverse limit space of a post-critically finite tent map. Conditions are given under which these inverse limit spaces are pairwise nonhomeomorphic. This extends results of Barge & Diamond [2].

2006
Ajeesh P. KURIAN Sadasivan PUTHUSSERYPADY

One of the major hurdles in implementing chaotic communication schemes is the synchronization of chaotic systems. For the last two decades, numerous contributions of varying successes have been made by researchers from different disciplines for the synchronization of chaotic systems. Symbolic dynamics based synchronization method is shown to be capable of providing high quality synchronization ...

Journal: :international journal of communications and information technology 2011
j. ayubi f. mohanna s. mohanna m. rezaei

a watermarking scheme for grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. jacobian elliptic mapis employed to encrypt ofwatermarked logo. piecewise nonlinear chaotic map is also usedto determine the location of dct coefficients for the watermarkembedding. the purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...

Journal: :Physical review 2021

In this Letter, we study two-dimensional Floquet conformal field theory, where the external periodic driving is described by iterated logistic or tent maps. These maps are known to be typical examples of dynamical systems exhibiting order-chaos transition, and show that, as a result such driving, entanglement entropy scaling develops fractal features when corresponding system approaches chaotic...

Journal: :The Journal of the Korea Contents Association 2008

Journal: :International Journal of Advanced Computer Science and Applications 2021

Encryption methods such as AES (Advanced Standard), DES (Data etc. cannot be used for image encryption images contain a huge amount of redundant data, high correlation between neighboring pixels and size the is very large. Chaos- based techniques have suitable properties that are required encryption. The include sensitivity to initial conditions, pseudorandom number, ergodicity, density periodi...

2010
KUO-CHANG CHEN XUN DONG

It is well known that the average position or barycenter of generic orbits for the standard tent map is 0.5. Periodic orbits are exceptional orbits in the sense that most of them have barycenters different from 0.5. In this paper we prove that for any positive integer n, there exist n distinct periodic orbits for the standard tent map with the same barycenter. We also provide some patterns of p...

Journal: :I. J. Bifurcation and Chaos 2000
Marcelo Vieira Corrêa Luis Antonio Aguirre Eduardo Mazoni Andrade Marçal Mendes

This paper investigates the application of discrete nonlinear rational models, a natural extension of the well-known polynomial models. Rational models are discussed in the context of two different problems: reconstruction of chaotic attractors from a time series and the estimation of static nonlinearities from dynamical data. Rational models are obtained via black box identification techniques...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید