Fractal encoding in a chaotic neural network
نویسندگان
چکیده
منابع مشابه
Fractal encoding in a chaotic neural network.
We analyze a model of a chaotic neural network consisting of three neurons, namely a chaotically forcing neuron and two neurons comprizing a stable response system with a contraction mapping property, for digital encoding with chaotic dynamics. We show that dynamics of the chaotically forcing neuron is embedded in the form of a code sequence on a fractal attractor of the two-neuron response sys...
متن کاملFace recognition by using fractal encoding and backpropagation neural network
This paper presents a frontal view face recognition method by using fractal codes which are determined by a fractal encoding method from the edge pattern of the face region which covers eyebrows, eyes and a nose. In recognition process, these fractal codes are fed ass inputs to a Backpropagation neural network for learning and identifying a person. The experiments were performed with one in-roo...
متن کاملAN IMPROVED CONTROLLED CHAOTIC NEURAL NETWORK FOR PATTERN RECOGNITION
A sigmoid function is necessary for creation a chaotic neural network (CNN). In this paper, a new function for CNN is proposed that it can increase the speed of convergence. In the proposed method, we use a novel signal for controlling chaos. Both the theory analysis and computer simulation results show that the performance of CNN can be improved remarkably by using our method. By means of this...
متن کاملControlling chaos in a chaotic neural network
The chaotic neural network constructed with chaotic neuron shows the associative memory function, but its memory searching process cannot be stabilized in a stored state because of the chaotic motion of the network. In this paper, a pinning control method focused on the chaotic neural network is proposed. The computer simulation proves that the chaos in the chaotic neural network can be control...
متن کاملCryptanalysis of a Chaotic Neural Network based Chaotic Cipher
Recently a Triple key encryption method based on logistic map was proposed. The present paper analysis the security of the proposed encryption method and points out that it can be easily broken by one pair of known/chosen plain-text attack which is supported by mathematical proof and experimental result. In addition, some other security defects are also reported.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review E
سال: 2001
ISSN: 1063-651X,1095-3787
DOI: 10.1103/physreve.64.046202