نتایج جستجو برای: logistic chaotic system

تعداد نتایج: 2335757  

Journal: :Multiple-Valued Logic and Soft Computing 2009
Shangce Gao Jianchen Zhang Zheng Tang Qi Ping Cao

As a novel optimization technique, chaos has gained much attention and some applications during the past decade. For a given energy or cost function, by following chaotic ergodic orbits, a chaotic dynamic system may eventually reach the global optimum or its good approximation with high probability. To enhance the performance of the local search method (LS), which is based on the generalized re...

Synchronization of chaotic and Lu system has been done using the active sliding mode control strategy. Regarding the synchronization task as a control problem, fractional order mathematics is used to express the system and active sliding mode for synchronization. It has been shown that, not only the performance of the proposed method is satisfying with an acceptable level of control signal, but...

2016
Jiadong Liang

Abstract—This paper presented a video watermarking algorithm based on wavelet chaotic neural network. First, to enhance binary image’s security, the algorithm encrypted it with double chaotic based on Arnold and Logistic map, Then, the host video was divided into some equal frames and distilled the key frame through chaotic sequence which generated by Logistic. Meanwhile, we distilled the low f...

2015
Adélaïde Nicole Kengnou Telem Daniel Tchiotsop Thomas Kanaa Hilaire B. Fotsin Didier Wolf

In this work, a new scheme of image encryption based on chaos and Fast Walsh Transform (FWT) has been proposed. We used two chaotic logistic maps and combined chaotic encryption methods to the two-dimensional FWT of images. The encryption process involves two steps: firstly, chaotic sequences generated by the chaotic logistic maps are used to permute and mask the intermediate results or array o...

2004
P. Mullowney K. Julien J. D. Meiss

We study a simple, nonautonomous, three-dimensional, incompressible flow corresponding to sequentially active two-dimensional rolls with distinct axes. A feature of the model is that an analytical map is obtained. We show that when the roll axes are orthogonal, motion is confined to two-dimensional topological spheres. The dynamics on each surface ranges from nearly regular to largely chaotic. ...

2013
Ahmed G. Radwan

Recently, conventional logistic maps have been used in different vital applications like modeling and security. However, unfortunately the conventional logistic maps can tolerate only one changeable parameter. In this paper, three different generalized logistic maps are introduced with arbitrary powers which can be reduced to the conventional logistic map. The added parameter (arbitrary power) ...

2005
Aidan Mooney John G. Keating

A digital watermark is a visible, or preferably invisible, identification code that is permanently embedded in digital media, to prove owner authentication thereby providing a level of document protection. In this paper, we review several approaches for the generation of watermarks using chaotic functions, and in particular, the logistic chaotic function. Using this function, in conjunction wit...

2006
Shuichi Aono Masahiro Wada Yoshifumi Nishio

A chaotic map has various features. A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term forecast becomes impossible by the iterations of a chaotic map. These features looks similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. The chaotic cryptosystem is researched as an application of cha...

Journal: :I. J. Bifurcation and Chaos 2008
Shih-Liang Chen Shu-Ming Chang Wen-Wei Lin TingTing Hwang

In this paper, we propose a robust hyperchaotic system that is practically serviceable in digital securecommunication. The system consists of many coupled robust logistic maps that form a hyper-chaotic system. The system has a very large parameter space which grows along with the system precision. Moreover, it has higher degree of complexity than traditional discrete-time secure-communication s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید