Results 21 to 30 of about 196,667 (285)

Compact Analog Chaotic Map Designs Using SOI Four-Gate Transistors

open access: yesIEEE Access, 2023
This work introduces three novel chaotic map circuits. Two of the map circuits use two $p$ -channel and one $n$ -channel silicon-on-insulator (SOI) four-gate transistor (G 4FET) while the third design uses two $n$ -channel and one $p$ -channel G 4FET.
Maisha Sadia   +2 more
doaj   +1 more source

A-coupled-expanding and distributional chaos [PDF]

open access: yes, 2014
The concept of A-coupled-expanding map, which is one of the more natural and useful ideas generalized the horseshoe map, is well known as a criterion of chaos. It is well known that distributional chaos is one of the concepts which reflect strong chaotic
Ju, Hyonhui, Kim, Cholsan, Raith, Peter
core   +1 more source

A novel image encryption scheme based on 3D bit matrix and chaotic map with Markov properties

open access: yesEgyptian Informatics Journal, 2019
Based on 3D cat map, reverse 3D cat map and an improved class of chaotic maps with Markov properties, an effective bit-level image encryption scheme is proposed.
Meng Ge, Ruisong Ye
doaj   +1 more source

Periodic orbit quantization of chaotic maps by harmonic inversion [PDF]

open access: yes, 2001
A method for the semiclassical quantization of chaotic maps is proposed, which is based on harmonic inversion. The power of the technique is demonstrated for the baker's map as a prototype example of a chaotic map.Comment: 7 pages, 1 figure, accepted for
Eckhardt   +16 more
core   +2 more sources

Chaotic mixing in a torus map [PDF]

open access: yesChaos: An Interdisciplinary Journal of Nonlinear Science, 2003
The advection and diffusion of a passive scalar is investigated for a map of the 2-torus. The map is chaotic, and the limit of almost-uniform stretching is considered. This allows an analytic understanding of the transition from a phase of constant scalar variance (for short times) to exponential decay (for long times). This transition is embodied in a
Thiffeault, JL, Childress, S
openaire   +6 more sources

Multidimensional Discrete Chaotic Maps

open access: yesFrontiers in Physics, 2022
In this paper, the general concept of multidimensional discrete maps is presented. Moreover, new and fundamental results show the invariance of the bifurcation points from periodic to chaotic behavior. Numerical examples regarding the multidimensional cases of the logistic map, the complex-valued Ikeda map, and the multivariable Henon map are reported.
Maide Bucolo   +6 more
openaire   +2 more sources

A Novel Chaotic Map and an Improved Chaos-Based Image Encryption Scheme

open access: yesThe Scientific World Journal, 2014
In this paper, we present a novel approach to create the new chaotic map and propose an improved image encryption scheme based on it. Compared with traditional classic one-dimensional chaotic maps like Logistic Map and Tent Map, this newly created ...
Xianhan Zhang, Yang Cao
doaj   +1 more source

Image Encryption Using a Spectrally Efficient Halton Logistics Tent (HaLT) Map and DNA Encoding for Secured Image Communication

open access: yesEntropy, 2022
With the advancement of technology worldwide, security is essential for online information and data. This research work proposes a novel image encryption method based on combined chaotic maps, Halton sequence, five-dimension (5D) Hyper-Chaotic System and
Sakshi Patel, Thanikaiselvan Veeramalai
doaj   +1 more source

A 2D Chaotic Oscillator for Analog IC

open access: yesIEEE Open Journal of Circuits and Systems, 2022
In this paper, we have proposed the design of an analog two-dimensional (2D) discrete-time chaotic oscillator. 2D chaotic systems are studied because of their more complex chaotic behavior compared to one-dimensional (1D) chaotic systems.
Partha Sarathi Paul   +3 more
doaj   +1 more source

Speech encryption using chaotic shift keying for secured speech communication

open access: yesEURASIP Journal on Audio, Speech, and Music Processing, 2017
This paper throws light on chaotic shift keying-based speech encryption and decryption method. In this method, the input speech signals are sampled and its values are segmented into four levels, namely L 0, L 1, L 2, and L 3. Each level of sampled values
P. Sathiyamurthi, S. Ramakrishnan
doaj   +1 more source

Home - About - Disclaimer - Privacy