نتایج جستجو برای: chaotic tent map
تعداد نتایج: 218506 فیلتر نتایج به سال:
Chaos-based communications can be applied advantageously if the property of chaotic systems is suitably exploited. In this Letter a simple noncoherent detection method for chaos-shift-keying (CSK) modulation is proposed, exploiting some distinguishable property of chaotic maps for recovering the digital message. Specifically, the proposed method exploits the difference in the return maps of the...
We analyze the security of encryption schemes based on chaos synchronization and active/passive decomposition. The security is quantified by the number of transmitted samples that has to be acquired in order to reconstruct the transmitted message with an accuracy that may compromise the transmitted information. The dynamics is estimated as the average of dynamics of the observed data within a s...
Let (I, T ) be the inverse limit space of a post-critically finite tent map. Conditions are given under which these inverse limit spaces are pairwise nonhomeomorphic. This extends results of Barge & Diamond [2].
One of the major hurdles in implementing chaotic communication schemes is the synchronization of chaotic systems. For the last two decades, numerous contributions of varying successes have been made by researchers from different disciplines for the synchronization of chaotic systems. Symbolic dynamics based synchronization method is shown to be capable of providing high quality synchronization ...
a watermarking scheme for grayscale image isproposed based on a family of the chaotic maps and discretecosine transform. jacobian elliptic mapis employed to encrypt ofwatermarked logo. piecewise nonlinear chaotic map is also usedto determine the location of dct coefficients for the watermarkembedding. the purpose of this algorithm is to improve theshortcoming of watermarking such as small key s...
In this Letter, we study two-dimensional Floquet conformal field theory, where the external periodic driving is described by iterated logistic or tent maps. These maps are known to be typical examples of dynamical systems exhibiting order-chaos transition, and show that, as a result such driving, entanglement entropy scaling develops fractal features when corresponding system approaches chaotic...
Encryption methods such as AES (Advanced Standard), DES (Data etc. cannot be used for image encryption images contain a huge amount of redundant data, high correlation between neighboring pixels and size the is very large. Chaos- based techniques have suitable properties that are required encryption. The include sensitivity to initial conditions, pseudorandom number, ergodicity, density periodi...
It is well known that the average position or barycenter of generic orbits for the standard tent map is 0.5. Periodic orbits are exceptional orbits in the sense that most of them have barycenters different from 0.5. In this paper we prove that for any positive integer n, there exist n distinct periodic orbits for the standard tent map with the same barycenter. We also provide some patterns of p...
This paper investigates the application of discrete nonlinear rational models, a natural extension of the well-known polynomial models. Rational models are discussed in the context of two different problems: reconstruction of chaotic attractors from a time series and the estimation of static nonlinearities from dynamical data. Rational models are obtained via black box identification techniques...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید