Results 21 to 30 of about 320,346 (241)
Energy and the Macrodynamics of Agrarian Societies
For the present work, we utilized Leslie White’s anthropological theory of cultural evolutionism as a theoretical benchmark for econometrically assessing the macrodynamics of energy use in agrarian societies that constituted the human civilization’s ...
Georgios Karakatsanis, Nikos Mamassis
doaj +1 more source
The fragile watermarking technique is used to protect intellectual property rights while also providing security and rigorous protection. In order to protect the copyright of the creators, it can be implanted in some representative text or totem. Because
Guo-Jheng Yang +2 more
doaj +1 more source
Bifurcations and transitions in the quasiperiodically driven logistic map [PDF]
We discuss several bifurcation phenomena that occur in the quasiperiodically driven logistic map. This system can have strange nonchaotic attractors (SNAs) in addition to chaotic and regular attractors; on SNAs the dynamics is aperiodic, but the largest ...
Negi, Surendra Singh +2 more
core +3 more sources
Stability and Fractal Patterns of Complex Logistic Map
The intent of this paper is to study the fractal patterns of one dimensional complex logistic map by finding the optimum values of the control parameter using Ishikawa iterative scheme.
Prasad Bhagwati, Katiyar Kuldip
doaj +1 more source
We develop and illustrate methods to compute all single particle potentials that underlie the logistic map, x --> sx(1-x) for ...
Andrzej Veitia +11 more
core +1 more source
Weak noise approach to the logistic map
Using a nonperturbative weak noise approach we investigate the interference of noise and chaos in simple 1D maps. We replace the noise-driven 1D map by an area-preserving 2D map modelling the Poincare sections of a conserved dynamical system with ...
B. Shraiman +44 more
core +1 more source
Cryptanalysis of a family of self-synchronizing chaotic stream ciphers [PDF]
Unimodal maps have been broadly used as a base of new encryption strategies. Recently, a stream cipher has been proposed in the literature, whose keystream is basically a symbolic sequence of the (one-parameter) logistic map or of the tent map.
Alvarez, Gonzalo +3 more
core +2 more sources
Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN [PDF]
ZigBee is consuming low energy and providing the protection in Wireless Sensor Networks. ZigBee pro is supporting most applications. In spite of improved the security, ZigBee pro weak in key administration. In this paper, we depend on Logistic Map Diffie
Nabaa Hasan, Alaa Farhan
doaj +1 more source
A note on Verhulst's logistic equation and related logistic maps [PDF]
We consider the Verhulst logistic equation and a couple of forms of the corresponding logistic maps. For the case of the logistic equation we show that using the general Riccati solution only changes the initial conditions of the equation.
Elaydi S N +6 more
core +2 more sources
Chaos of Exponential Logistic Map
In this paper, chaos of a new exponential logistic map modulated by Gaussian function is investigated. Firstly, the stability of the fixed point is analyzed, and the occurrence of period doubling bifurcation in the system is verified theoretically ...
Li Zhang, Wenhui Yu, Shilong Gao
doaj +1 more source

