A novel chaotic stream cipher and its application to palmprint template protection
NASA Astrophysics Data System (ADS)
Li, Heng-Jian; Zhang, Jia-Shu
2010-04-01
Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.
A Novel Image Encryption Scheme Based on Intertwining Chaotic Maps and RC4 Stream Cipher
NASA Astrophysics Data System (ADS)
Kumari, Manju; Gupta, Shailender
2018-03-01
As the systems are enabling us to transmit large chunks of data, both in the form of texts and images, there is a need to explore algorithms which can provide a higher security without increasing the time complexity significantly. This paper proposes an image encryption scheme which uses intertwining chaotic maps and RC4 stream cipher to encrypt/decrypt the images. The scheme employs chaotic map for the confusion stage and for generation of key for the RC4 cipher. The RC4 cipher uses this key to generate random sequences which are used to implement an efficient diffusion process. The algorithm is implemented in MATLAB-2016b and various performance metrics are used to evaluate its efficacy. The proposed scheme provides highly scrambled encrypted images and can resist statistical, differential and brute-force search attacks. The peak signal-to-noise ratio values are quite similar to other schemes, the entropy values are close to ideal. In addition, the scheme is very much practical since having lowest time complexity then its counterparts.
Color encryption scheme based on adapted quantum logistic map
NASA Astrophysics Data System (ADS)
Zaghloul, Alaa; Zhang, Tiejun; Amin, Mohamed; Abd El-Latif, Ahmed A.
2014-04-01
This paper presents a new color image encryption scheme based on quantum chaotic system. In this scheme, a new encryption scheme is accomplished by generating an intermediate chaotic key stream with the help of quantum chaotic logistic map. Then, each pixel is encrypted by the cipher value of the previous pixel and the adapted quantum logistic map. The results show that the proposed scheme has adequate security for the confidentiality of color images.
Pseudo-Random Number Generator Based on Coupled Map Lattices
NASA Astrophysics Data System (ADS)
Lü, Huaping; Wang, Shihong; Hu, Gang
A one-way coupled chaotic map lattice is used for generating pseudo-random numbers. It is shown that with suitable cooperative applications of both chaotic and conventional approaches, the output of the spatiotemporally chaotic system can easily meet the practical requirements of random numbers, i.e., excellent random statistical properties, long periodicity of computer realizations, and fast speed of random number generations. This pseudo-random number generator system can be used as ideal synchronous and self-synchronizing stream cipher systems for secure communications.
Dynamic video encryption algorithm for H.264/AVC based on a spatiotemporal chaos system.
Xu, Hui; Tong, Xiao-Jun; Zhang, Miao; Wang, Zhu; Li, Ling-Hao
2016-06-01
Video encryption schemes mostly employ the selective encryption method to encrypt parts of important and sensitive video information, aiming to ensure the real-time performance and encryption efficiency. The classic block cipher is not applicable to video encryption due to the high computational overhead. In this paper, we propose the encryption selection control module to encrypt video syntax elements dynamically which is controlled by the chaotic pseudorandom sequence. A novel spatiotemporal chaos system and binarization method is used to generate a key stream for encrypting the chosen syntax elements. The proposed scheme enhances the resistance against attacks through the dynamic encryption process and high-security stream cipher. Experimental results show that the proposed method exhibits high security and high efficiency with little effect on the compression ratio and time cost.
Quantum enigma cipher as a generalization of the quantum stream cipher
NASA Astrophysics Data System (ADS)
Kato, Kentaro
2016-09-01
Various types of randomizations for the quantum stream cipher by Y00 protocol have been developed so far. In particular, it must be noted that the analysis of immunity against correlation attacks with a new type of randomization by Hirota and Kurosawa prompted a new look at the quantum stream cipher by Y00 protocol (Quant. Inform. Process. 6(2) 2007). From the preceding study on the quantum stream cipher, we recognized that the quantum stream cipher by Y00 protocol would be able to be generalized to a new type of physical cipher that has potential to exceed the Shannon limit by installing additional randomization mechanisms, in accordance with the law of quantum mechanics. We call this new type of physical random cipher the quantum enigma cipher. In this article, we introduce the recent developments for the quantum stream cipher by Y00 protocol and future plans toward the quantum enigma cipher.
NASA Astrophysics Data System (ADS)
Tong, Xiaojun; Cui, Minggen; Wang, Zhu
2009-07-01
The design of the new compound two-dimensional chaotic function is presented by exploiting two one-dimensional chaotic functions which switch randomly, and the design is used as a chaotic sequence generator which is proved by Devaney's definition proof of chaos. The properties of compound chaotic functions are also proved rigorously. In order to improve the robustness against difference cryptanalysis and produce avalanche effect, a new feedback image encryption scheme is proposed using the new compound chaos by selecting one of the two one-dimensional chaotic functions randomly and a new image pixels method of permutation and substitution is designed in detail by array row and column random controlling based on the compound chaos. The results from entropy analysis, difference analysis, statistical analysis, sequence randomness analysis, cipher sensitivity analysis depending on key and plaintext have proven that the compound chaotic sequence cipher can resist cryptanalytic, statistical and brute-force attacks, and especially it accelerates encryption speed, and achieves higher level of security. By the dynamical compound chaos and perturbation technology, the paper solves the problem of computer low precision of one-dimensional chaotic function.
A Study on the Stream Cipher Embedded Magic Square of Random Access Files
NASA Astrophysics Data System (ADS)
Liu, Chenglian; Zhao, Jian-Ming; Rafsanjani, Marjan Kuchaki; Shen, Yijuan
2011-09-01
Magic square and stream cipher issues are both interesting and well-tried topics. In this paper, we are proposing a new scheme which streams cipher applications for random access files based on the magic square method. There are two thresholds required to secure our data, if using only decrypts by the stream cipher. It isn't to recovery original source. On other hand, we improve the model of cipher stream to strengthen and defend efficiently; it also was its own high speed and calculates to most parts of the key stream generator.
Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers
NASA Astrophysics Data System (ADS)
Zhang, Leo Yu; Zhang, Yushu; Liu, Yuansheng; Yang, Anjia; Chen, Guanrong
As a variant of the substitution-permutation network, the permutation-diffusion structure has received extensive attention in the field of chaotic cryptography over the last three decades. Because of the high implementation speed and nonlinearity over GF(2), the Galois field of two elements, mixing modulo addition/multiplication and Exclusive OR becomes very popular in various designs to achieve the desired diffusion effect. This paper reports that some diffusion mechanisms based on modulo addition/multiplication and Exclusive OR are not resistant to plaintext attacks as claimed. By cracking several recently proposed chaotic ciphers as examples, it is demonstrated that a good understanding of the strength and weakness of these crypto-primitives is crucial for designing more practical chaotic encryption algorithms in the future.
Design of an image encryption scheme based on a multiple chaotic map
NASA Astrophysics Data System (ADS)
Tong, Xiao-Jun
2013-07-01
In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation-substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security.
NASA Astrophysics Data System (ADS)
Nurdiyanto, Heri; Rahim, Robbi; Wulan, Nur
2017-12-01
Symmetric type cryptography algorithm is known many weaknesses in encryption process compared with asymmetric type algorithm, symmetric stream cipher are algorithm that works on XOR process between plaintext and key, to improve the security of symmetric stream cipher algorithm done improvisation by using Triple Transposition Key which developed from Transposition Cipher and also use Base64 algorithm for encryption ending process, and from experiment the ciphertext that produced good enough and very random.
Attack to AN Image Encryption Based on Chaotic Logistic Map
NASA Astrophysics Data System (ADS)
Wang, Xing-Yuan; Chen, Feng; Wang, Tian; Xu, Dahai; Ma, Yutian
2013-10-01
This paper offers two different attacks on a freshly proposed image encryption based on chaotic logistic map. The cryptosystem under study first uses a secret key of 80-bit and employed two chaotic logistic maps. We derived the initial conditions of the logistic maps from using the secret key by providing different weights to all its bits. Additionally, in this paper eight different types of procedures are used to encrypt the pixels of an image in the proposed encryption process of which one of them will be used for a certain pixel which is determined by the product of the logistic map. The secret key is revised after encrypting each block which consisted of 16 pixels of the image. The encrypting process have weakness, worst of which is that every byte of plaintext is independent when substituted, so the cipher text of the byte will not change even the other bytes have changed. As a result of weakness, a chosen plaintext attack and a chosen cipher text attack can be completed without any knowledge of the key value to recuperate the ciphered image.
Cryptanalysis on classical cipher based on Indonesian language
NASA Astrophysics Data System (ADS)
Marwati, R.; Yulianti, K.
2018-05-01
Cryptanalysis is a process of breaking a cipher in an illegal decryption. This paper discusses about encryption some classic cryptography, breaking substitution cipher and stream cipher, and increasing its security. Encryption and ciphering based on Indonesian Language text. Microsoft Word and Microsoft Excel were chosen as ciphering and breaking tools.
Audio Steganography with Embedded Text
NASA Astrophysics Data System (ADS)
Teck Jian, Chua; Chai Wen, Chuah; Rahman, Nurul Hidayah Binti Ab.; Hamid, Isredza Rahmi Binti A.
2017-08-01
Audio steganography is about hiding the secret message into the audio. It is a technique uses to secure the transmission of secret information or hide their existence. It also may provide confidentiality to secret message if the message is encrypted. To date most of the steganography software such as Mp3Stego and DeepSound use block cipher such as Advanced Encryption Standard or Data Encryption Standard to encrypt the secret message. It is a good practice for security. However, the encrypted message may become too long to embed in audio and cause distortion of cover audio if the secret message is too long. Hence, there is a need to encrypt the message with stream cipher before embedding the message into the audio. This is because stream cipher provides bit by bit encryption meanwhile block cipher provide a fixed length of bits encryption which result a longer output compare to stream cipher. Hence, an audio steganography with embedding text with Rivest Cipher 4 encryption cipher is design, develop and test in this project.
Secure chaotic map based block cryptosystem with application to camera sensor networks.
Guo, Xianfeng; Zhang, Jiashu; Khan, Muhammad Khurram; Alghathbar, Khaled
2011-01-01
Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network.
Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks
Guo, Xianfeng; Zhang, Jiashu; Khan, Muhammad Khurram; Alghathbar, Khaled
2011-01-01
Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network. PMID:22319371
Design and Test of Pseudorandom Number Generator Using a Star Network of Lorenz Oscillators
NASA Astrophysics Data System (ADS)
Cho, Kenichiro; Miyano, Takaya
We have recently developed a chaos-based stream cipher based on augmented Lorenz equations as a star network of Lorenz subsystems. In our method, the augmented Lorenz equations are used as a pseudorandom number generator. In this study, we propose a new method based on the augmented Lorenz equations for generating binary pseudorandom numbers and evaluate its security using the statistical tests of SP800-22 published by the National Institute for Standards and Technology in comparison with the performances of other chaotic dynamical models used as binary pseudorandom number generators. We further propose a faster version of the proposed method and evaluate its security using the statistical tests of TestU01 published by L’Ecuyer and Simard.
Proving Chaotic Behavior of CBC Mode of Operation
NASA Astrophysics Data System (ADS)
Abidi, Abdessalem; Wang, Qianxue; Bouallegue, Belgacem; Machhout, Mohsen; Guyeux, Christophe
2016-06-01
The cipher block chaining (CBC) mode of operation was invented by IBM (International Business Machine) in 1976. It presents a very popular way of encrypting that is used in various applications. In this paper, we have mathematically proven that, under some conditions, the CBC mode of operation can admit a chaotic behavior according to Devaney. Some cases will be properly studied in order to provide evidence for this idea.
Possibilities and testing of CPRNG in block cipher mode of operation PM-DC-LM
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zacek, Petr; Jasek, Roman; Malanik, David
2016-06-08
This paper discusses the chaotic pseudo-random number generator (CPRNG), which is used in block cipher mode of operation called PM-DC-LM. PM-DC-LM is one of possible subversions of general PM mode. In this paper is not discussed the design of PM-DC-LM, but only CPRNG as a part of it because designing is written in other papers. Possibilities, how to change or to improve CPRNG are mentioned. The final part is devoted for a little testing of CPRNG and some testing data are shown.
An image encryption algorithm based on 3D cellular automata and chaotic maps
NASA Astrophysics Data System (ADS)
Del Rey, A. Martín; Sánchez, G. Rodríguez
2015-05-01
A novel encryption algorithm to cipher digital images is presented in this work. The digital image is rendering into a three-dimensional (3D) lattice and the protocol consists of two phases: the confusion phase where 24 chaotic Cat maps are applied and the diffusion phase where a 3D cellular automata is evolved. The encryption method is shown to be secure against the most important cryptanalytic attacks.
NASA Astrophysics Data System (ADS)
Hirota, Osamu; Ohhata, Kenichi; Honda, Makoto; Akutsu, Shigeto; Doi, Yoshifumi; Harasawa, Katsuyoshi; Yamashita, Kiichi
2009-08-01
The security issue for the next generation optical network which realizes Cloud Computing System Service with data center" is urgent problem. In such a network, the encryption by physical layer which provide super security and small delay should be employed. It must provide, however, very high speed encryption because the basic link is operated at 2.5 Gbit/sec or 10 Gbit/sec. The quantum stream cipher by Yuen-2000 protocol (Y-00) is a completely new type random cipher so called Gauss-Yuen random cipher, which can break the Shannon limit for the symmetric key cipher. We develop such a cipher which has good balance of the security, speed and cost performance. In SPIE conference on quantum communication and quantum imaging V, we reported a demonstration of 2.5 Gbit/sec system for the commercial link and proposed how to improve it to 10 Gbit/sec. This paper reports a demonstration of the Y-00 cipher system which works at 10 Gbit/sec. A transmission test in a laboratory is tried to get the basic data on what parameters are important to operate in the real commercial networks. In addition, we give some theoretical results on the security. It is clarified that the necessary condition to break the Shannon limit requires indeed the quantum phenomenon, and that the full information theoretically secure system is available in the satellite link application.
Running key mapping in a quantum stream cipher by the Yuen 2000 protocol
NASA Astrophysics Data System (ADS)
Shimizu, Tetsuya; Hirota, Osamu; Nagasako, Yuki
2008-03-01
A quantum stream cipher by Yuen 2000 protocol (so-called Y00 protocol or αη scheme) consisting of linear feedback shift register of short key is very attractive in implementing secure 40 Gbits/s optical data transmission, which is expected as a next-generation network. However, a basic model of the Y00 protocol with a very short key needs a careful design against fast correlation attacks as pointed out by Donnet This Brief Report clarifies an effectiveness of irregular mapping between running key and physical signals in the driver for selection of M -ary basis in the transmitter, and gives a design method. Consequently, quantum stream cipher by the Y00 protocol with our mapping has immunity against the proposed fast correlation attacks on a basic model of the Y00 protocol even if the key is very short.
A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map
NASA Astrophysics Data System (ADS)
Mirzaei Talarposhti, Khadijeh; Khaki Jamei, Mehrzad
2016-06-01
In recent years, there has been increasing interest in the security of digital images. This study focuses on the gray scale image encryption using dynamic harmony search (DHS). In this research, first, a chaotic map is used to create cipher images, and then the maximum entropy and minimum correlation coefficient is obtained by applying a harmony search algorithm on them. This process is divided into two steps. In the first step, the diffusion of a plain image using DHS to maximize the entropy as a fitness function will be performed. However, in the second step, a horizontal and vertical permutation will be applied on the best cipher image, which is obtained in the previous step. Additionally, DHS has been used to minimize the correlation coefficient as a fitness function in the second step. The simulation results have shown that by using the proposed method, the maximum entropy and the minimum correlation coefficient, which are approximately 7.9998 and 0.0001, respectively, have been obtained.
Chaos based video encryption using maps and Ikeda time delay system
NASA Astrophysics Data System (ADS)
Valli, D.; Ganesan, K.
2017-12-01
Chaos based cryptosystems are an efficient method to deal with improved speed and highly secured multimedia encryption because of its elegant features, such as randomness, mixing, ergodicity, sensitivity to initial conditions and control parameters. In this paper, two chaos based cryptosystems are proposed: one is the higher-dimensional 12D chaotic map and the other is based on the Ikeda delay differential equation (DDE) suitable for designing a real-time secure symmetric video encryption scheme. These encryption schemes employ a substitution box (S-box) to diffuse the relationship between pixels of plain video and cipher video along with the diffusion of current input pixel with the previous cipher pixel, called cipher block chaining (CBC). The proposed method enhances the robustness against statistical, differential and chosen/known plain text attacks. Detailed analysis is carried out in this paper to demonstrate the security and uniqueness of the proposed scheme.
NASA Astrophysics Data System (ADS)
Budiman, M. A.; Rachmawati, D.; Parlindungan, M. R.
2018-03-01
MDTM is a classical symmetric cryptographic algorithm. As with other classical algorithms, the MDTM Cipher algorithm is easy to implement but it is less secure compared to modern symmetric algorithms. In order to make it more secure, a stream cipher RC4A is added and thus the cryptosystem becomes super encryption. In this process, plaintexts derived from PDFs are firstly encrypted with the MDTM Cipher algorithm and are encrypted once more with the RC4A algorithm. The test results show that the value of complexity is Θ(n2) and the running time is linearly directly proportional to the length of plaintext characters and the keys entered.
NASA Astrophysics Data System (ADS)
Tan, Ru-Chao; Lei, Tong; Zhao, Qing-Min; Gong, Li-Hua; Zhou, Zhi-Hong
2016-12-01
To improve the slow processing speed of the classical image encryption algorithms and enhance the security of the private color images, a new quantum color image encryption algorithm based on a hyper-chaotic system is proposed, in which the sequences generated by the Chen's hyper-chaotic system are scrambled and diffused with three components of the original color image. Sequentially, the quantum Fourier transform is exploited to fulfill the encryption. Numerical simulations show that the presented quantum color image encryption algorithm possesses large key space to resist illegal attacks, sensitive dependence on initial keys, uniform distribution of gray values for the encrypted image and weak correlation between two adjacent pixels in the cipher-image.
Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption.
Chandrasekaran, Jeyamala; Thiruvengadam, S J
2015-01-01
Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i) generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES) and (ii) generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.
Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption
Chandrasekaran, Jeyamala; Thiruvengadam, S. J.
2015-01-01
Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i) generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES) and (ii) generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security. PMID:26550603
An Image Encryption Algorithm Based on Information Hiding
NASA Astrophysics Data System (ADS)
Ge, Xin; Lu, Bin; Liu, Fenlin; Gong, Daofu
Aiming at resolving the conflict between security and efficiency in the design of chaotic image encryption algorithms, an image encryption algorithm based on information hiding is proposed based on the “one-time pad” idea. A random parameter is introduced to ensure a different keystream for each encryption, which has the characteristics of “one-time pad”, improving the security of the algorithm rapidly without significant increase in algorithm complexity. The random parameter is embedded into the ciphered image with information hiding technology, which avoids negotiation for its transport and makes the application of the algorithm easier. Algorithm analysis and experiments show that the algorithm is secure against chosen plaintext attack, differential attack and divide-and-conquer attack, and has good statistical properties in ciphered images.
NASA Astrophysics Data System (ADS)
Budiman, M. A.; Amalia; Chayanie, N. I.
2018-03-01
Cryptography is the art and science of using mathematical methods to preserve message security. There are two types of cryptography, namely classical and modern cryptography. Nowadays, most people would rather use modern cryptography than classical cryptography because it is harder to break than the classical one. One of classical algorithm is the Zig-zag algorithm that uses the transposition technique: the original message is unreadable unless the person has the key to decrypt the message. To improve the security, the Zig-zag Cipher is combined with RC4+ Cipher which is one of the symmetric key algorithms in the form of stream cipher. The two algorithms are combined to make a super-encryption. By combining these two algorithms, the message will be harder to break by a cryptanalyst. The result showed that complexity of the combined algorithm is θ(n2 ), while the complexity of Zig-zag Cipher and RC4+ Cipher are θ(n2 ) and θ(n), respectively.
Generalized Smooth Transition Map Between Tent and Logistic Maps
NASA Astrophysics Data System (ADS)
Sayed, Wafaa S.; Fahmy, Hossam A. H.; Rezk, Ahmed A.; Radwan, Ahmed G.
There is a continuous demand on novel chaotic generators to be employed in various modeling and pseudo-random number generation applications. This paper proposes a new chaotic map which is a general form for one-dimensional discrete-time maps employing the power function with the tent and logistic maps as special cases. The proposed map uses extra parameters to provide responses that fit multiple applications for which conventional maps were not enough. The proposed generalization covers also maps whose iterative relations are not based on polynomials, i.e. with fractional powers. We introduce a framework for analyzing the proposed map mathematically and predicting its behavior for various combinations of its parameters. In addition, we present and explain the transition map which results in intermediate responses as the parameters vary from their values corresponding to tent map to those corresponding to logistic map case. We study the properties of the proposed map including graph of the map equation, general bifurcation diagram and its key-points, output sequences, and maximum Lyapunov exponent. We present further explorations such as effects of scaling, system response with respect to the new parameters, and operating ranges other than transition region. Finally, a stream cipher system based on the generalized transition map validates its utility for image encryption applications. The system allows the construction of more efficient encryption keys which enhances its sensitivity and other cryptographic properties.
A novel image encryption algorithm based on the chaotic system and DNA computing
NASA Astrophysics Data System (ADS)
Chai, Xiuli; Gan, Zhihua; Lu, Yang; Chen, Yiran; Han, Daojun
A novel image encryption algorithm using the chaotic system and deoxyribonucleic acid (DNA) computing is presented. Different from the traditional encryption methods, the permutation and diffusion of our method are manipulated on the 3D DNA matrix. Firstly, a 3D DNA matrix is obtained through bit plane splitting, bit plane recombination, DNA encoding of the plain image. Secondly, 3D DNA level permutation based on position sequence group (3DDNALPBPSG) is introduced, and chaotic sequences generated from the chaotic system are employed to permutate the positions of the elements of the 3D DNA matrix. Thirdly, 3D DNA level diffusion (3DDNALD) is given, the confused 3D DNA matrix is split into sub-blocks, and XOR operation by block is manipulated to the sub-DNA matrix and the key DNA matrix from the chaotic system. At last, by decoding the diffused DNA matrix, we get the cipher image. SHA 256 hash of the plain image is employed to calculate the initial values of the chaotic system to avoid chosen plaintext attack. Experimental results and security analyses show that our scheme is secure against several known attacks, and it can effectively protect the security of the images.
A novel chaos-based image encryption algorithm using DNA sequence operations
NASA Astrophysics Data System (ADS)
Chai, Xiuli; Chen, Yiran; Broyde, Lucie
2017-01-01
An image encryption algorithm based on chaotic system and deoxyribonucleic acid (DNA) sequence operations is proposed in this paper. First, the plain image is encoded into a DNA matrix, and then a new wave-based permutation scheme is performed on it. The chaotic sequences produced by 2D Logistic chaotic map are employed for row circular permutation (RCP) and column circular permutation (CCP). Initial values and parameters of the chaotic system are calculated by the SHA 256 hash of the plain image and the given values. Then, a row-by-row image diffusion method at DNA level is applied. A key matrix generated from the chaotic map is used to fuse the confused DNA matrix; also the initial values and system parameters of the chaotic system are renewed by the hamming distance of the plain image. Finally, after decoding the diffused DNA matrix, we obtain the cipher image. The DNA encoding/decoding rules of the plain image and the key matrix are determined by the plain image. Experimental results and security analyses both confirm that the proposed algorithm has not only an excellent encryption result but also resists various typical attacks.
A Scheme for Obtaining Secure S-Boxes Based on Chaotic Baker's Map
NASA Astrophysics Data System (ADS)
Gondal, Muhammad Asif; Abdul Raheem; Hussain, Iqtadar
2014-09-01
In this paper, a method for obtaining cryptographically strong 8 × 8 substitution boxes (S-boxes) is presented. The method is based on chaotic baker's map and a "mini version" of a new block cipher with block size 8 bits and can be easily and efficiently performed on a computer. The cryptographic strength of some 8 × 8 S-boxes randomly produced by the method is analyzed. The results show (1) all of them are bijective; (2) the nonlinearity of each output bit of them is usually about 100; (3) all of them approximately satisfy the strict avalanche criterion and output bits independence criterion; (4) they all have an almost equiprobable input/output XOR distribution.
NASA Astrophysics Data System (ADS)
Hirota, Osamu; Futami, Fumio
2014-10-01
To guarantee a security of Cloud Computing System is urgent problem. Although there are several threats in a security problem, the most serious problem is cyber attack against an optical fiber transmission among data centers. In such a network, an encryption scheme on Layer 1(physical layer) with an ultimately strong security, a small delay, and a very high speed should be employed, because a basic optical link is operated at 10 Gbit/sec/wavelength. We have developed a quantum noise randomied stream cipher so called Yuen- 2000 encryption scheme (Y-00) during a decade. This type of cipher is a completely new type random cipher in which ciphertext for a legitimate receiver and eavesdropper are different. This is a condition to break the Shannon limit in theory of cryptography. In addition, this scheme has a good balance on a security, a speed and a cost performance. To realize such an encryption, several modulation methods are candidates such as phase-modulation, intensity-modulation, quadrature amplitude modulation, and so on. Northwestern university group demonstrated a phase modulation system (α=η) in 2003. In 2005, we reported a demonstration of 1 Gbit/sec system based on intensity modulation scheme(ISK-Y00), and gave a design method for quadratic amplitude modulation (QAM-Y00) in 2005 and 2010. An intensity modulation scheme promises a real application to a secure fiber communication of current data centers. This paper presents a progress in quantum noise randomized stream cipher based on ISK-Y00, integrating our theoretical and experimental achievements in the past and recent 100 Gbit/sec(10Gbit/sec × 10 wavelengths) experiment.
Exponential H ∞ Synchronization of Chaotic Cryptosystems Using an Improved Genetic Algorithm
Hsiao, Feng-Hsiag
2015-01-01
This paper presents a systematic design methodology for neural-network- (NN-) based secure communications in multiple time-delay chaotic (MTDC) systems with optimal H ∞ performance and cryptography. On the basis of the Improved Genetic Algorithm (IGA), which is demonstrated to have better performance than that of a traditional GA, a model-based fuzzy controller is then synthesized to stabilize the MTDC systems. A fuzzy controller is synthesized to not only realize the exponential synchronization, but also achieve optimal H ∞ performance by minimizing the disturbance attenuation level. Furthermore, the error of the recovered message is stated by using the n-shift cipher and key. Finally, a numerical example with simulations is given to demonstrate the effectiveness of our approach. PMID:26366432
Fast, Parallel and Secure Cryptography Algorithm Using Lorenz's Attractor
NASA Astrophysics Data System (ADS)
Marco, Anderson Gonçalves; Martinez, Alexandre Souto; Bruno, Odemir Martinez
A novel cryptography method based on the Lorenz's attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.
A joint encryption/watermarking system for verifying the reliability of medical images.
Bouslimi, Dalel; Coatrieux, Gouenou; Cozic, Michel; Roux, Christian
2012-09-01
In this paper, we propose a joint encryption/water-marking system for the purpose of protecting medical images. This system is based on an approach which combines a substitutive watermarking algorithm, the quantization index modulation, with an encryption algorithm: a stream cipher algorithm (e.g., the RC4) or a block cipher algorithm (e.g., the AES in cipher block chaining (CBC) mode of operation). Our objective is to give access to the outcomes of the image integrity and of its origin even though the image is stored encrypted. If watermarking and encryption are conducted jointly at the protection stage, watermark extraction and decryption can be applied independently. The security analysis of our scheme and experimental results achieved on 8-bit depth ultrasound images as well as on 16-bit encoded positron emission tomography images demonstrate the capability of our system to securely make available security attributes in both spatial and encrypted domains while minimizing image distortion. Furthermore, by making use of the AES block cipher in CBC mode, the proposed system is compliant with or transparent to the DICOM standard.
Dragon Stream Cipher for Secure Blackbox Cockpit Voice Recorder
NASA Astrophysics Data System (ADS)
Akmal, Fadira; Michrandi Nasution, Surya; Azmi, Fairuz
2017-11-01
Aircraft blackbox is a device used to record all aircraft information, which consists of Flight Data Recorder (FDR) and Cockpit Voice Recorder (CVR). Cockpit Voice Recorder contains conversations in the aircraft during the flight.Investigations on aircraft crashes usually take a long time, because it is difficult to find the aircraft blackbox. Then blackbox should have the ability to send information to other places. Aircraft blackbox must have a data security system, data security is a very important part at the time of information exchange process. The system in this research is to perform the encryption and decryption process on Cockpit Voice Recorder by people who are entitled by using Dragon Stream Cipher algorithm. The tests performed are time of data encryption and decryption, and avalanche effect. Result in this paper show us time encryption and decryption are 0,85 seconds and 1,84 second for 30 seconds Cockpit Voice Recorder data witn an avalanche effect 48,67 %.
A novel algorithm for thermal image encryption.
Hussain, Iqtadar; Anees, Amir; Algarni, Abdulmohsen
2018-04-16
Thermal images play a vital character at nuclear plants, Power stations, Forensic labs biological research, and petroleum products extraction. Safety of thermal images is very important. Image data has some unique features such as intensity, contrast, homogeneity, entropy and correlation among pixels that is why somehow image encryption is trickier as compare to other encryptions. With conventional image encryption schemes it is normally hard to handle these features. Therefore, cryptographers have paid attention to some attractive properties of the chaotic maps such as randomness and sensitivity to build up novel cryptosystems. That is why, recently proposed image encryption techniques progressively more depends on the application of chaotic maps. This paper proposed an image encryption algorithm based on Chebyshev chaotic map and S8 Symmetric group of permutation based substitution boxes. Primarily, parameters of chaotic Chebyshev map are chosen as a secret key to mystify the primary image. Then, the plaintext image is encrypted by the method generated from the substitution boxes and Chebyshev map. By this process, we can get a cipher text image that is perfectly twisted and dispersed. The outcomes of renowned experiments, key sensitivity tests and statistical analysis confirm that the proposed algorithm offers a safe and efficient approach for real-time image encryption.
Deductive Verification of Cryptographic Software
NASA Technical Reports Server (NTRS)
Almeida, Jose Barcelar; Barbosa, Manuel; Pinto, Jorge Sousa; Vieira, Barbara
2009-01-01
We report on the application of an off-the-shelf verification platform to the RC4 stream cipher cryptographic software implementation (as available in the openSSL library), and introduce a deductive verification technique based on self-composition for proving the absence of error propagation.
A fast image encryption algorithm based on only blocks in cipher text
NASA Astrophysics Data System (ADS)
Wang, Xing-Yuan; Wang, Qian
2014-03-01
In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simultaneously. The cipher-text image is divided into blocks and each block has k ×k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed according to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks.
A new simple technique for improving the random properties of chaos-based cryptosystems
NASA Astrophysics Data System (ADS)
Garcia-Bosque, M.; Pérez-Resa, A.; Sánchez-Azqueta, C.; Celma, S.
2018-03-01
A new technique for improving the security of chaos-based stream ciphers has been proposed and tested experimentally. This technique manages to improve the randomness properties of the generated keystream by preventing the system to fall into short period cycles due to digitation. In order to test this technique, a stream cipher based on a Skew Tent Map algorithm has been implemented on a Virtex 7 FPGA. The randomness of the keystream generated by this system has been compared to the randomness of the keystream generated by the same system with the proposed randomness-enhancement technique. By subjecting both keystreams to the National Institute of Standards and Technology (NIST) tests, we have proved that our method can considerably improve the randomness of the generated keystreams. In order to incorporate our randomness-enhancement technique, only 41 extra slices have been needed, proving that, apart from effective, this method is also efficient in terms of area and hardware resources.
A Novel Bit-level Image Encryption Method Based on Chaotic Map and Dynamic Grouping
NASA Astrophysics Data System (ADS)
Zhang, Guo-Ji; Shen, Yan
2012-10-01
In this paper, a novel bit-level image encryption method based on dynamic grouping is proposed. In the proposed method, the plain-image is divided into several groups randomly, then permutation-diffusion process on bit level is carried out. The keystream generated by logistic map is related to the plain-image, which confuses the relationship between the plain-image and the cipher-image. The computer simulation results of statistical analysis, information entropy analysis and sensitivity analysis show that the proposed encryption method is secure and reliable enough to be used for communication application.
An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard
NASA Astrophysics Data System (ADS)
Fan, Yibo; Wang, Jidong; Ikenaga, Takeshi; Tsunoo, Yukiyasu; Goto, Satoshi
H.264/AVC is the newest video coding standard. There are many new features in it which can be easily used for video encryption. In this paper, we propose a new scheme to do video encryption for H.264/AVC video compression standard. We define Unequal Secure Encryption (USE) as an approach that applies different encryption schemes (with different security strength) to different parts of compressed video data. This USE scheme includes two parts: video data classification and unequal secure video data encryption. Firstly, we classify the video data into two partitions: Important data partition and unimportant data partition. Important data partition has small size with high secure protection, while unimportant data partition has large size with low secure protection. Secondly, we use AES as a block cipher to encrypt the important data partition and use LEX as a stream cipher to encrypt the unimportant data partition. AES is the most widely used symmetric cryptography which can ensure high security. LEX is a new stream cipher which is based on AES and its computational cost is much lower than AES. In this way, our scheme can achieve both high security and low computational cost. Besides the USE scheme, we propose a low cost design of hybrid AES/LEX encryption module. Our experimental results show that the computational cost of the USE scheme is low (about 25% of naive encryption at Level 0 with VEA used). The hardware cost for hybrid AES/LEX module is 4678 Gates and the AES encryption throughput is about 50Mbps.
A novel chaotic image encryption scheme using DNA sequence operations
NASA Astrophysics Data System (ADS)
Wang, Xing-Yuan; Zhang, Ying-Qian; Bao, Xue-Mei
2015-10-01
In this paper, we propose a novel image encryption scheme based on DNA (Deoxyribonucleic acid) sequence operations and chaotic system. Firstly, we perform bitwise exclusive OR operation on the pixels of the plain image using the pseudorandom sequences produced by the spatiotemporal chaos system, i.e., CML (coupled map lattice). Secondly, a DNA matrix is obtained by encoding the confused image using a kind of DNA encoding rule. Then we generate the new initial conditions of the CML according to this DNA matrix and the previous initial conditions, which can make the encryption result closely depend on every pixel of the plain image. Thirdly, the rows and columns of the DNA matrix are permuted. Then, the permuted DNA matrix is confused once again. At last, after decoding the confused DNA matrix using a kind of DNA decoding rule, we obtain the ciphered image. Experimental results and theoretical analysis show that the scheme is able to resist various attacks, so it has extraordinarily high security.
Single-channel 40 Gbit/s digital coherent QAM quantum noise stream cipher transmission over 480 km.
Yoshida, Masato; Hirooka, Toshihiko; Kasai, Keisuke; Nakazawa, Masataka
2016-01-11
We demonstrate the first 40 Gbit/s single-channel polarization-multiplexed, 5 Gsymbol/s, 16 QAM quantum noise stream cipher (QNSC) transmission over 480 km by incorporating ASE quantum noise from EDFAs as well as the quantum shot noise of the coherent state with multiple photons for the random masking of data. By using a multi-bit encoded scheme and digital coherent transmission techniques, secure optical communication with a record data capacity and transmission distance has been successfully realized. In this system, the signal level received by Eve is hidden by both the amplitude and the phase noise. The highest number of masked signals, 7.5 x 10(4), was achieved by using a QAM scheme with FEC, which makes it possible to reduce the output power from the transmitter while maintaining an error free condition for Bob. We have newly measured the noise distribution around I and Q encrypted data and shown experimentally with a data size of as large as 2(25) that the noise has a Gaussian distribution with no correlations. This distribution is suitable for the random masking of data.
Pre-Mrna Introns as a Model for Cryptographic Algorithm:. Theory and Experiments
NASA Astrophysics Data System (ADS)
Regoli, Massimo
2010-01-01
The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. In particular the RNA sequences have some sections called Introns. Introns, derived from the term "intragenic regions", are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by Biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behaviour in the access to the secret key to code the messages. In the RNA-Crypto System algorithm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.
a Simple Symmetric Algorithm Using a Likeness with Introns Behavior in RNA Sequences
NASA Astrophysics Data System (ADS)
Regoli, Massimo
2009-02-01
The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. The RNA sequences has some sections called Introns. Introns, derived from the term "intragenic regions", are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by Biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behaviour in the access to the secret key to code the messages. In the RNA-Crypto System algoritnm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.
Bio—Cryptography: A Possible Coding Role for RNA Redundancy
NASA Astrophysics Data System (ADS)
Regoli, M.
2009-03-01
The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. The RNA sequences have some sections called Introns. Introns, derived from the term "intragenic regions," are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behavior in the access to the secret key to code the messages. In the RNA-Crypto System algorithm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.
Toward privacy-preserving JPEG image retrieval
NASA Astrophysics Data System (ADS)
Cheng, Hang; Wang, Jingyue; Wang, Meiqing; Zhong, Shangping
2017-07-01
This paper proposes a privacy-preserving retrieval scheme for JPEG images based on local variance. Three parties are involved in the scheme: the content owner, the server, and the authorized user. The content owner encrypts JPEG images for privacy protection by jointly using permutation cipher and stream cipher, and then, the encrypted versions are uploaded to the server. With an encrypted query image provided by an authorized user, the server may extract blockwise local variances in different directions without knowing the plaintext content. After that, it can calculate the similarity between the encrypted query image and each encrypted database image by a local variance-based feature comparison mechanism. The authorized user with the encryption key can decrypt the returned encrypted images with plaintext content similar to the query image. The experimental results show that the proposed scheme not only provides effective privacy-preserving retrieval service but also ensures both format compliance and file size preservation for encrypted JPEG images.
SPENDING TOO MUCH TIME AT THE GALACTIC BAR: CHAOTIC FANNING OF THE OPHIUCHUS STREAM
DOE Office of Scientific and Technical Information (OSTI.GOV)
Price-Whelan, Adrian M.; Johnston, Kathryn V.; Sesar, Branimir
2016-06-20
The Ophiuchus stellar stream is peculiar: (1) its length is short given the age of its constituent stars, and (2) several probable member stars have dispersions in sky position and velocity that far exceed those seen within the stream. The stream’s proximity to the Galactic center suggests that its dynamical history is significantly influenced by the Galactic bar. We explore this hypothesis with models of stream formation along orbits consistent with Ophiuchus’ properties in a Milky Way potential model that includes a rotating bar. In all choices for the rotation parameters of the bar, orbits fit to the stream aremore » strongly chaotic. Mock streams generated along these orbits qualitatively match the observed properties of the stream: because of chaos, stars stripped early generally form low-density, high-dispersion “fans” leaving only the most recently disrupted material detectable as a strong over-density. Our models predict that there should be a significant amount of low-surface-brightness tidal debris around the stream with a complex phase-space morphology. The existence of or lack of these features could provide interesting constraints on the Milky Way bar and would rule out formation scenarios for the stream. This is the first time that chaos has been used to explain the properties of a stellar stream and is the first demonstration of the dynamical importance of chaos in the Galactic halo. The existence of long, thin streams around the Milky Way, presumably formed along non- or weakly chaotic orbits, may represent only a subset of the total population of disrupted satellites.« less
Lakshmi, C; Thenmozhi, K; Rayappan, John Bosco Balaguru; Amirtharajan, Rengarajan
2018-06-01
Digital Imaging and Communications in Medicine (DICOM) is one among the significant formats used worldwide for the representation of medical images. Undoubtedly, medical-image security plays a crucial role in telemedicine applications. Merging encryption and watermarking in medical-image protection paves the way for enhancing the authentication and safer transmission over open channels. In this context, the present work on DICOM image encryption has employed a fuzzy chaotic map for encryption and the Discrete Wavelet Transform (DWT) for watermarking. The proposed approach overcomes the limitation of the Arnold transform-one of the most utilised confusion mechanisms in image ciphering. Various metrics have substantiated the effectiveness of the proposed medical-image encryption algorithm. Copyright © 2018 Elsevier B.V. All rights reserved.
Block cipher based on modular arithmetic and methods of information compression
NASA Astrophysics Data System (ADS)
Krendelev, S.; Zbitnev, N.; Shishlyannikov, D.; Gridin, D.
2017-10-01
The article focuses on the description of a new block cipher. Due to the heightened interest in BigData the described cipher is used to encrypt big volumes of data in cloud storage services. The main advantages of the given cipher are the ease of implementation and the possibility of probabilistic encryption. This means that the text encryption will be different when the key is the same and the data is the same. So, the strength of the encryption is improved. Additionally, the ciphered message size can be hardly predicted.
Chaos based encryption system for encrypting electroencephalogram signals.
Lin, Chin-Feng; Shih, Shun-Han; Zhu, Jin-De
2014-05-01
In the paper, we use the Microsoft Visual Studio Development Kit and C# programming language to implement a chaos-based electroencephalogram (EEG) encryption system involving three encryption levels. A chaos logic map, initial value, and bifurcation parameter for the map were used to generate Level I chaos-based EEG encryption bit streams. Two encryption-level parameters were added to these elements to generate Level II chaos-based EEG encryption bit streams. An additional chaotic map and chaotic address index assignment process was used to implement the Level III chaos-based EEG encryption system. Eight 16-channel EEG Vue signals were tested using the encryption system. The encryption was the most rapid and robust in the Level III system. The test yielded superior encryption results, and when the correct deciphering parameter was applied, the EEG signals were completely recovered. However, an input parameter error (e.g., a 0.00001 % initial point error) causes chaotic encryption bit streams, preventing the recovery of 16-channel EEG Vue signals.
Cryptographic Properties of Monotone Boolean Functions
2016-01-01
Algebraic attacks on stream ciphers with linear feedback, in: Advances in Cryptology (Eurocrypt 2003), Lecture Notes in Comput. Sci. 2656, Springer, Berlin...spectrum, algebraic immu- nity MSC 2010: 06E30, 94C10, 94A60, 11T71, 05E99 || Communicated by: Carlo Blundo 1 Introduction Let F 2 be the prime eld of...7]. For the reader’s convenience, we recall some basic notions below. Any f ∈ Bn can be expressed in algebraic normal form (ANF) as f(x 1 , x 2
Optical design of cipher block chaining (CBC) encryption mode by using digital holography
NASA Astrophysics Data System (ADS)
Gil, Sang Keun; Jeon, Seok Hee; Jung, Jong Rae; Kim, Nam
2016-03-01
We propose an optical design of cipher block chaining (CBC) encryption by using digital holographic technique, which has higher security than the conventional electronic method because of the analog-type randomized cipher text with 2-D array. In this paper, an optical design of CBC encryption mode is implemented by 2-step quadrature phase-shifting digital holographic encryption technique using orthogonal polarization. A block of plain text is encrypted with the encryption key by applying 2-step phase-shifting digital holography, and it is changed into cipher text blocks which are digital holograms. These ciphered digital holograms with the encrypted information are Fourier transform holograms and are recorded on CCDs with 256 gray levels quantized intensities. The decryption is computed by these encrypted digital holograms of cipher texts, the same encryption key and the previous cipher text. Results of computer simulations are presented to verify that the proposed method shows the feasibility in the high secure CBC encryption system.
An Image Encryption Algorithm Utilizing Julia Sets and Hilbert Curves
Sun, Yuanyuan; Chen, Lina; Xu, Rudan; Kong, Ruiqing
2014-01-01
Image encryption is an important and effective technique to protect image security. In this paper, a novel image encryption algorithm combining Julia sets and Hilbert curves is proposed. The algorithm utilizes Julia sets’ parameters to generate a random sequence as the initial keys and gets the final encryption keys by scrambling the initial keys through the Hilbert curve. The final cipher image is obtained by modulo arithmetic and diffuse operation. In this method, it needs only a few parameters for the key generation, which greatly reduces the storage space. Moreover, because of the Julia sets’ properties, such as infiniteness and chaotic characteristics, the keys have high sensitivity even to a tiny perturbation. The experimental results indicate that the algorithm has large key space, good statistical property, high sensitivity for the keys, and effective resistance to the chosen-plaintext attack. PMID:24404181
Evidence of Fanning in the Ophiuchus Stream
NASA Astrophysics Data System (ADS)
Sesar, Branimir; Price-Whelan, Adrian M.; Cohen, Judith G.; Rix, Hans-Walter; Pearson, Sarah; Johnston, Kathryn V.; Bernard, Edouard J.; Ferguson, Annette M. N.; Martin, Nicolas F.; Slater, Colin T.; Chambers, Kenneth C.; Flewelling, Heather; Wainscoat, Richard J.; Waters, Christopher
2016-01-01
The Ophiuchus stellar stream presents a dynamical puzzle: its old stellar populations (˜12 Gyr) cannot be reconciled with (1) its orbit in a simple model for the Milky Way potential and (2) its short angular extent, both of which imply that the observed stream formed within the last \\lt 1 {{Gyr}}. Recent theoretical work has shown that streams on chaotic orbits may abruptly fan out near their apparent ends; stars in these fans are dispersed in both position and velocity and may be difficult to associate with the stream. Here we present the first evidence of such stream-fanning in the Ophiuchus stream, traced by four blue horizontal branch stars beyond the apparent end of the stream. These stars stand out from the background by their high velocities ({v}{{los}}\\gt 230 km s-1) against ˜40 other stars: their velocities are comparable to those of the stream, but would be exceptional if they were unrelated halo stars. Their positions and velocities are, however, inconsistent with simple extrapolation of the observed cold, high-density portion of the stream. These observations suggest that stream-fanning may be a real, observable effect and, therefore, that Ophiuchus may be on a chaotic orbit. They also show that the Ophiuchus stream is more extended and hence dynamically older than previously thought, easing the stellar population versus dynamical age tension.
Ganzua: A Cryptanalysis Tool for Monoalphabetic and Polyalphabetic Ciphers
ERIC Educational Resources Information Center
Garcia-Pasquel, Jesus Adolfo; Galaviz, Jose
2006-01-01
Many introductory courses to cryptology and computer security start with or include a discussion of classical ciphers that usually contemplates some cryptanalysis techniques used to break them. Ganzua (picklock in Spanish) is an application designed to assist the cryptanalysis of ciphertext obtained with monoalphabetic or polyalphabetic ciphers.…
Innovative hyperchaotic encryption algorithm for compressed video
NASA Astrophysics Data System (ADS)
Yuan, Chun; Zhong, Yuzhuo; Yang, Shiqiang
2002-12-01
It is accepted that stream cryptosystem can achieve good real-time performance and flexibility which implements encryption by selecting few parts of the block data and header information of the compressed video stream. Chaotic random number generator, for example Logistics Map, is a comparatively promising substitute, but it is easily attacked by nonlinear dynamic forecasting and geometric information extracting. In this paper, we present a hyperchaotic cryptography scheme to encrypt the compressed video, which integrates Logistics Map with Z(232 - 1) field linear congruential algorithm to strengthen the security of the mono-chaotic cryptography, meanwhile, the real-time performance and flexibility of the chaotic sequence cryptography are maintained. It also integrates with the dissymmetrical public-key cryptography and implements encryption and identity authentification on control parameters at initialization phase. In accord with the importance of data in compressed video stream, encryption is performed in layered scheme. In the innovative hyperchaotic cryptography, the value and the updating frequency of control parameters can be changed online to satisfy the requirement of the network quality, processor capability and security requirement. The innovative hyperchaotic cryprography proves robust security by cryptoanalysis, shows good real-time performance and flexible implement capability through the arithmetic evaluating and test.
Viswanathan, P; Krishna, P Venkata
2014-05-01
Teleradiology allows transmission of medical images for clinical data interpretation to provide improved e-health care access, delivery, and standards. The remote transmission raises various ethical and legal issues like image retention, fraud, privacy, malpractice liability, etc. A joint FED watermarking system means a joint fingerprint/encryption/dual watermarking system is proposed for addressing these issues. The system combines a region based substitution dual watermarking algorithm using spatial fusion, stream cipher algorithm using symmetric key, and fingerprint verification algorithm using invariants. This paper aims to give access to the outcomes of medical images with confidentiality, availability, integrity, and its origin. The watermarking, encryption, and fingerprint enrollment are conducted jointly in protection stage such that the extraction, decryption, and verification can be applied independently. The dual watermarking system, introducing two different embedding schemes, one used for patient data and other for fingerprint features, reduces the difficulty in maintenance of multiple documents like authentication data, personnel and diagnosis data, and medical images. The spatial fusion algorithm, which determines the region of embedding using threshold from the image to embed the encrypted patient data, follows the exact rules of fusion resulting in better quality than other fusion techniques. The four step stream cipher algorithm using symmetric key for encrypting the patient data with fingerprint verification system using algebraic invariants improves the robustness of the medical information. The experiment result of proposed scheme is evaluated for security and quality analysis in DICOM medical images resulted well in terms of attacks, quality index, and imperceptibility.
A secure transmission scheme of streaming media based on the encrypted control message
NASA Astrophysics Data System (ADS)
Li, Bing; Jin, Zhigang; Shu, Yantai; Yu, Li
2007-09-01
As the use of streaming media applications increased dramatically in recent years, streaming media security becomes an important presumption, protecting the privacy. This paper proposes a new encryption scheme in view of characteristics of streaming media and the disadvantage of the living method: encrypt the control message in the streaming media with the high security lever and permute and confuse the data which is non control message according to the corresponding control message. Here the so-called control message refers to the key data of the streaming media, including the streaming media header and the header of the video frame, and the seed key. We encrypt the control message using the public key encryption algorithm which can provide high security lever, such as RSA. At the same time we make use of the seed key to generate key stream, from which the permutation list P responding to GOP (group of picture) is derived. The plain text of the non-control message XORs the key stream and gets the middle cipher text. And then obtained one is permutated according to P. In contrast the decryption process is the inverse process of the above. We have set up a testbed for the above scheme and found our scheme is six to eight times faster than the conventional method. It can be applied not only between PCs but also between handheld devices.
Using the Hill Cipher to Teach Cryptographic Principles
ERIC Educational Resources Information Center
McAndrew, Alasdair
2008-01-01
The Hill cipher is the simplest example of a "block cipher," which takes a block of plaintext as input, and returns a block of ciphertext as output. Although it is insecure by modern standards, its simplicity means that it is well suited for the teaching of such concepts as encryption modes, and properties of cryptographic hash functions. Although…
Peng, Haipeng; Tian, Ye; Kurths, Jurgen; Li, Lixiang; Yang, Yixian; Wang, Daoshun
2017-06-01
Applications of wireless body area networks (WBANs) are extended from remote health care to military, sports, disaster relief, etc. With the network scale expanding, nodes increasing, and links complicated, a WBAN evolves to a body-to-body network. Along with the development, energy saving and data security problems are highlighted. In this paper, chaotic compressive sensing (CCS) is proposed to solve these two crucial problems, simultaneously. Compared with the traditional compressive sensing, CCS can save vast storage space by only storing the matrix generation parameters. Additionally, the sensitivity of chaos can improve the security of data transmission. Aimed at image transmission, modified CCS is proposed, which uses two encryption mechanisms, confusion and mask, and performs a much better encryption quality. Simulation is conducted to verify the feasibility and effectiveness of the proposed methods. The results show that the energy efficiency and security are strongly improved, while the storage space is saved. And the secret key is extremely sensitive, [Formula: see text] perturbation of the secret key could lead to a total different decoding, the relative error is larger than 100%. Particularly for image encryption, the performance of the modified method is excellent. The adjacent pixel correlation is smaller than 0.04 in different directions including horizontal, vertical, and diagonal; the entropy of the cipher image with a 256-level gray value is larger than 7.98.
Information Security Scheme Based on Computational Temporal Ghost Imaging.
Jiang, Shan; Wang, Yurong; Long, Tao; Meng, Xiangfeng; Yang, Xiulun; Shu, Rong; Sun, Baoqing
2017-08-09
An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.
Pseudo-random bit generator based on lag time series
NASA Astrophysics Data System (ADS)
García-Martínez, M.; Campos-Cantón, E.
2014-12-01
In this paper, we present a pseudo-random bit generator (PRBG) based on two lag time series of the logistic map using positive and negative values in the bifurcation parameter. In order to hidden the map used to build the pseudo-random series we have used a delay in the generation of time series. These new series when they are mapped xn against xn+1 present a cloud of points unrelated to the logistic map. Finally, the pseudo-random sequences have been tested with the suite of NIST giving satisfactory results for use in stream ciphers.
Defense in Depth Added to Malicious Activities Simulation Tools (MAST)
2015-09-01
cipher suites. The TLS Handshake is a combination of three components: handshake, change cipher spec, and alert. 41 (1) The Handshake ( Hello ) The...TLS Handshake, specifically the “ Hello ” portion, is designed to negotiate session parameters (cipher suite). The client informs the server of the...protocols and standards that it supports and then the server selects the highest common protocols and standards. Specifically, the Client Hello message
Affine Equivalence and Constructions of Cryptographically Strong Boolean Functions
2013-09-01
manner is crucial for today’s global citizen. We want our financial transactions over the Internet to get processed without error. Cyber warfare between...encryption and decryption processes . An asymmetric cipher uses different keys to encrypt and decrypt a message, and the connection between the encryption and...Depending on how a symmetric cipher processes a message before encryption or de- cryption, a symmetric cipher can be further classified into a block or
NASA Astrophysics Data System (ADS)
Basri, M.; Mawengkang, H.; Zamzami, E. M.
2018-03-01
Limitations of storage sources is one option to switch to cloud storage. Confidentiality and security of data stored on the cloud is very important. To keep up the confidentiality and security of such data can be done one of them by using cryptography techniques. Data Encryption Standard (DES) is one of the block cipher algorithms used as standard symmetric encryption algorithm. This DES will produce 8 blocks of ciphers combined into one ciphertext, but the ciphertext are weak against brute force attacks. Therefore, the last 8 block cipher will be converted into 8 random images using Least Significant Bit (LSB) algorithm which later draws the result of cipher of DES algorithm to be merged into one.
NASA Astrophysics Data System (ADS)
Al-Hayani, Nazar; Al-Jawad, Naseer; Jassim, Sabah A.
2014-05-01
Video compression and encryption became very essential in a secured real time video transmission. Applying both techniques simultaneously is one of the challenges where the size and the quality are important in multimedia transmission. In this paper we proposed a new technique for video compression and encryption. Both encryption and compression are based on edges extracted from the high frequency sub-bands of wavelet decomposition. The compression algorithm based on hybrid of: discrete wavelet transforms, discrete cosine transform, vector quantization, wavelet based edge detection, and phase sensing. The compression encoding algorithm treats the video reference and non-reference frames in two different ways. The encryption algorithm utilized A5 cipher combined with chaotic logistic map to encrypt the significant parameters and wavelet coefficients. Both algorithms can be applied simultaneously after applying the discrete wavelet transform on each individual frame. Experimental results show that the proposed algorithms have the following features: high compression, acceptable quality, and resistance to the statistical and bruteforce attack with low computational processing.
One-Time Pad as a nonlinear dynamical system
NASA Astrophysics Data System (ADS)
Nagaraj, Nithin
2012-11-01
The One-Time Pad (OTP) is the only known unbreakable cipher, proved mathematically by Shannon in 1949. In spite of several practical drawbacks of using the OTP, it continues to be used in quantum cryptography, DNA cryptography and even in classical cryptography when the highest form of security is desired (other popular algorithms like RSA, ECC, AES are not even proven to be computationally secure). In this work, we prove that the OTP encryption and decryption is equivalent to finding the initial condition on a pair of binary maps (Bernoulli shift). The binary map belongs to a family of 1D nonlinear chaotic and ergodic dynamical systems known as Generalized Luröth Series (GLS). Having established these interesting connections, we construct other perfect secrecy systems on the GLS that are equivalent to the One-Time Pad, generalizing for larger alphabets. We further show that OTP encryption is related to Randomized Arithmetic Coding - a scheme for joint compression and encryption.
Makkar, Steve R; Howe, Megan; Williamson, Anna; Gilham, Frances
2016-12-01
There is a need to develop innovations that can help bridge the gap between research and policy. Web CIPHER is an online tool designed to help policymakers better engage with research in order to increase its use in health policymaking. The aim of the present study was to test interventions in order to increase policymakers' usage of Web CIPHER. Namely, the impact of posting articles and blogs on topics relevant to the missions and scope of selected policy agencies in the Web CIPHER community. Five policy agencies were targeted for the intervention. Web CIPHER usage data was gathered over a 30-month period using Google Analytics. Time series analysis was used to evaluate whether publication of tailored articles and blogs led to significant changes in usage for all Web CIPHER members from policy agencies, including those from the five target agencies. We further evaluated whether these users showed greater increases in usage following publication of articles and blogs directly targeted at their agency, and if these effects were moderated by the blog author. Web CIPHER usage gradually increased over time and was significantly predicted by the number of articles but not blogs that were posted throughout the study period. Publication of articles on sexual and reproductive health was followed by sustained increases in usage among all users, including users from the policy agency that targets this area. This effect of topic relevance did not occur for the four remaining target agencies. Finally, page views were higher for articles targeted at one's agency compared to other agencies. This effect also occurred for blogs, particularly when the author was internal to one's agency. The findings suggest that Web CIPHER usage in general was motivated by general interest, engagement and appeal, as opposed to the agency specificity of content and work relevance. Blogs in and of themselves may not be effective at promoting usage. Thus, in order to increase policymakers' engagement with research through similar online platforms, a potentially effective approach would be to post abundant, frequently updated, engaging, interesting and widely appealing content irrespective of form.
From Greeks to Today: Cipher Trees and Computer Cryptography.
ERIC Educational Resources Information Center
Grady, M. Tim; Brumbaugh, Doug
1988-01-01
Explores the use of computers for teaching mathematical models of transposition ciphers. Illustrates the ideas, includes activities and extensions, provides a mathematical model and includes computer programs to implement these topics. (MVL)
NASA Astrophysics Data System (ADS)
Aryanti, Aryanti; Mekongga, Ikhthison
2018-02-01
Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decrypt files and transmit files. Tests performed on the process of encryption and decryption of files with different file sizes, file size affects the process of encryption and decryption. The larger the file size the longer the process of encryption and decryption.
Exploring Hill Ciphers with Graphing Calculators.
ERIC Educational Resources Information Center
St. John, Dennis
1998-01-01
Explains how to code and decode messages using Hill ciphers which combine matrix multiplication and modular arithmetic. Discusses how a graphing calculator can facilitate the matrix and modular arithmetic used in the coding and decoding procedures. (ASK)
Image encryption based on a delayed fractional-order chaotic logistic system
NASA Astrophysics Data System (ADS)
Wang, Zhen; Huang, Xia; Li, Ning; Song, Xiao-Na
2012-05-01
A new image encryption scheme is proposed based on a delayed fractional-order chaotic logistic system. In the process of generating a key stream, the time-varying delay and fractional derivative are embedded in the proposed scheme to improve the security. Such a scheme is described in detail with security analyses including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. Experimental results show that the newly proposed image encryption scheme possesses high security.
Coherent pulse position modulation quantum cipher
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sohma, Masaki; Hirota, Osamu
2014-12-04
On the basis of fundamental idea of Yuen, we present a new type of quantum random cipher, where pulse position modulated signals are encrypted in the picture of quantum Gaussian wave form. We discuss the security of our proposed system with a phase mask encryption.
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
Implementation of digital image encryption algorithm using logistic function and DNA encoding
NASA Astrophysics Data System (ADS)
Suryadi, MT; Satria, Yudi; Fauzi, Muhammad
2018-03-01
Cryptography is a method to secure information that might be in form of digital image. Based on past research, in order to increase security level of chaos based encryption algorithm and DNA based encryption algorithm, encryption algorithm using logistic function and DNA encoding was proposed. Digital image encryption algorithm using logistic function and DNA encoding use DNA encoding to scramble the pixel values into DNA base and scramble it in DNA addition, DNA complement, and XOR operation. The logistic function in this algorithm used as random number generator needed in DNA complement and XOR operation. The result of the test show that the PSNR values of cipher images are 7.98-7.99 bits, the entropy values are close to 8, the histogram of cipher images are uniformly distributed and the correlation coefficient of cipher images are near 0. Thus, the cipher image can be decrypted perfectly and the encryption algorithm has good resistance to entropy attack and statistical attack.
Quantum exhaustive key search with simplified-DES as a case study.
Almazrooie, Mishal; Samsudin, Azman; Abdullah, Rosni; Mutter, Kussay N
2016-01-01
To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version. Then, quantum attacks are conducted by using Grover's algorithm to recover the secret key. The proposed quantum cipher is used as a black box for the quantum search. The quantum oracle is then queried over the produced ciphertext to mark the quantum state, which consists of plaintext and key qubits. The experimental results show that for a key of n-bit size and key space of N such that [Formula: see text], the key can be recovered in [Formula: see text] computational steps.
Inertio-elastic mixing in a straight microchannel with side wells
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hong, Sun Ok; Cooper-White, Justin J.; School of Chemical Engineering, University of Queensland, St Lucia, 4072 QLD
Mixing remains a challenging task in microfluidic channels because of their inherently small length scale. In this work, we propose an efficient microfluidic mixer based on the chaotic vortex dynamics of a viscoelastic flow in a straight channel with side wells. When the inertia and elasticity of a dilute polymer solution are balanced (i.e., the Reynolds number Re and Weissenberg number Wi are both on the order of 10{sup 1}), chaotic vortices appear in the side wells (inertio-elastic flow instability), enhancing the mixing of adjacent fluid streams. However, there is no chaotic vortex motion in Newtonian flows for any flowmore » rate. Efficient mixing by such an inertio-elastic instability is found to be relevant for a wide range of Re values.« less
ERIC Educational Resources Information Center
Tech Directions, 2011
2011-01-01
Cryptology, or cryptography, is the study of writing and deciphering hidden messages in codes, ciphers, and writings. It is almost as old as writing itself. Ciphers are messages in which letters are rearranged or substituted for other letters or numbers. Codes are messages in which letters are replaced by letter groups, syllables, or sentences.…
Escaping Embarrassment: Face-Work in the Rap Cipher
ERIC Educational Resources Information Center
Lee, Jooyoung
2009-01-01
How do individuals escape embarrassing moments in interaction? Drawing from ethnographic fieldwork, in-depth interviews, and video recordings of weekly street corner ciphers (impromptu rap sessions), this paper expands Goffman's theory of defensive and protective face-work. The findings reveal formulaic and indirect dimensions of face-work. First,…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Modeste Nguimdo, Romain, E-mail: Romain.Nguimdo@vub.ac.be; Tchitnga, Robert; Woafo, Paul
We numerically investigate the possibility of using a coupling to increase the complexity in simplest chaotic two-component electronic circuits operating at high frequency. We subsequently show that complex behaviors generated in such coupled systems, together with the post-processing are suitable for generating bit-streams which pass all the NIST tests for randomness. The electronic circuit is built up by unidirectionally coupling three two-component (one active and one passive) oscillators in a ring configuration through resistances. It turns out that, with such a coupling, high chaotic signals can be obtained. By extracting points at fixed interval of 10 ns (corresponding to a bitmore » rate of 100 Mb/s) on such chaotic signals, each point being simultaneously converted in 16-bits (or 8-bits), we find that the binary sequence constructed by including the 10(or 2) least significant bits pass statistical tests of randomness, meaning that bit-streams with random properties can be achieved with an overall bit rate up to 10×100 Mb/s =1Gbit/s (or 2×100 Mb/s =200 Megabit/s). Moreover, by varying the bias voltages, we also investigate the parameter range for which more complex signals can be obtained. Besides being simple to implement, the two-component electronic circuit setup is very cheap as compared to optical and electro-optical systems.« less
NASA Astrophysics Data System (ADS)
Budiman, M. A.; Rachmawati, D.; Jessica
2018-03-01
This study aims to combine the trithemus algorithm and double transposition cipher in file security that will be implemented to be an Android-based application. The parameters being examined are the real running time, and the complexity value. The type of file to be used is a file in PDF format. The overall result shows that the complexity of the two algorithms with duper encryption method is reported as Θ (n 2). However, the processing time required in the encryption process uses the Trithemius algorithm much faster than using the Double Transposition Cipher. With the length of plaintext and password linearly proportional to the processing time.
Joint Schemes for Physical Layer Security and Error Correction
ERIC Educational Resources Information Center
Adamo, Oluwayomi
2011-01-01
The major challenges facing resource constraint wireless devices are error resilience, security and speed. Three joint schemes are presented in this research which could be broadly divided into error correction based and cipher based. The error correction based ciphers take advantage of the properties of LDPC codes and Nordstrom Robinson code. A…
Manticore and CS mode : parallelizable encryption with joint cipher-state authentication.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Torgerson, Mark Dolan; Draelos, Timothy John; Schroeppel, Richard Crabtree
2004-10-01
We describe a new mode of encryption with inexpensive authentication, which uses information from the internal state of the cipher to provide the authentication. Our algorithms have a number of benefits: (1) the encryption has properties similar to CBC mode, yet the encipherment and authentication can be parallelized and/or pipelined, (2) the authentication overhead is minimal, and (3) the authentication process remains resistant against some IV reuse. We offer a Manticore class of authenticated encryption algorithms based on cryptographic hash functions, which support variable block sizes up to twice the hash output length and variable key lengths. A proof ofmore » security is presented for the MTC4 and Pepper algorithms. We then generalize the construction to create the Cipher-State (CS) mode of encryption that uses the internal state of any round-based block cipher as an authenticator. We provide hardware and software performance estimates for all of our constructions and give a concrete example of the CS mode of encryption that uses AES as the encryption primitive and adds a small speed overhead (10-15%) compared to AES alone.« less
Self-balanced real-time photonic scheme for ultrafast random number generation
NASA Astrophysics Data System (ADS)
Li, Pu; Guo, Ya; Guo, Yanqiang; Fan, Yuanlong; Guo, Xiaomin; Liu, Xianglian; Shore, K. Alan; Dubrova, Elena; Xu, Bingjie; Wang, Yuncai; Wang, Anbang
2018-06-01
We propose a real-time self-balanced photonic method for extracting ultrafast random numbers from broadband randomness sources. In place of electronic analog-to-digital converters (ADCs), the balanced photo-detection technology is used to directly quantize optically sampled chaotic pulses into a continuous random number stream. Benefitting from ultrafast photo-detection, our method can efficiently eliminate the generation rate bottleneck from electronic ADCs which are required in nearly all the available fast physical random number generators. A proof-of-principle experiment demonstrates that using our approach 10 Gb/s real-time and statistically unbiased random numbers are successfully extracted from a bandwidth-enhanced chaotic source. The generation rate achieved experimentally here is being limited by the bandwidth of the chaotic source. The method described has the potential to attain a real-time rate of 100 Gb/s.
ERIC Educational Resources Information Center
Pryor, Robert G. L.; Bright, Jim
2003-01-01
Four theoretical streams--contexualism/ecology, systems theory, realism/constructivism, and chaos theory--contributed to a theory of individuals as complex, unique, nonlinear, adaptive chaotic and open systems. Individuals use purposive action to construct careers but can make maladaptive and inappropriate choices. (Contains 42 references.) (SK)
ERIC Educational Resources Information Center
Farag, Mark
2007-01-01
Hill ciphers are linear codes that use as input a "plaintext" vector [p-right arrow above] of size n, which is encrypted with an invertible n x n matrix E to produce a "ciphertext" vector [c-right arrow above] = E [middle dot] [p-right arrow above]. Informally, a near-field is a triple [left angle bracket]N; +, *[right angle bracket] that…
Chaos and Cryptography: A new dimension in secure communications
NASA Astrophysics Data System (ADS)
Banerjee, Santo; Kurths, J.
2014-06-01
This issue is a collection of contributions on recent developments and achievements of cryptography and communications using chaos. The various contributions report important and promising results such as synchronization of networks and data transmissions; image cipher; optical and TDMA communications, quantum keys etc. Various experiments and applications such as FPGA, smartphone cipher, semiconductor lasers etc, are also included.
A pipelined FPGA implementation of an encryption algorithm based on genetic algorithm
NASA Astrophysics Data System (ADS)
Thirer, Nonel
2013-05-01
With the evolution of digital data storage and exchange, it is essential to protect the confidential information from every unauthorized access. High performance encryption algorithms were developed and implemented by software and hardware. Also many methods to attack the cipher text were developed. In the last years, the genetic algorithm has gained much interest in cryptanalysis of cipher texts and also in encryption ciphers. This paper analyses the possibility to use the genetic algorithm as a multiple key sequence generator for an AES (Advanced Encryption Standard) cryptographic system, and also to use a three stages pipeline (with four main blocks: Input data, AES Core, Key generator, Output data) to provide a fast encryption and storage/transmission of a large amount of data.
NASA Astrophysics Data System (ADS)
Rachmawati, D.; Budiman, M. A.; Atika, F.
2018-03-01
Data security is becoming one of the most significant challenges in the digital world. Retrieval of data by unauthorized parties will result in harm to the owner of the data. PDF data are also susceptible to data security disorder. These things affect the security of the information. To solve the security problem, it needs a method to maintain the protection of the data, such as cryptography. In cryptography, several algorithms can encode data, one of them is Two Square Cipher algorithm which is a symmetric algorithm. At this research, Two Square Cipher algorithm has already developed into a 16 x 16 key aims to enter the various plaintexts. However, for more enhancement security it will be combined with the VMPC algorithm which is a symmetric algorithm. The combination of the two algorithms is called with the super-encryption. At this point, the data already can be stored on a mobile phone allowing users to secure data flexibly and can be accessed anywhere. The application of PDF document security on this research built by Android-platform. At this study will also calculate the complexity of algorithms and process time. Based on the test results the complexity of the algorithm is θ (n) for Two Square Cipher and θ (n) for VMPC algorithm, so the complexity of the super-encryption is also θ (n). VMPC algorithm processing time results quicker than on Two Square Cipher. And the processing time is directly proportional to the length of the plaintext and passwords.
A wavelet domain adaptive image watermarking method based on chaotic encryption
NASA Astrophysics Data System (ADS)
Wei, Fang; Liu, Jian; Cao, Hanqiang; Yang, Jun
2009-10-01
A digital watermarking technique is a specific branch of steganography, which can be used in various applications, provides a novel way to solve security problems for multimedia information. In this paper, we proposed a kind of wavelet domain adaptive image digital watermarking method using chaotic stream encrypt and human eye visual property. The secret information that can be seen as a watermarking is hidden into a host image, which can be publicly accessed, so the transportation of the secret information will not attract the attention of illegal receiver. The experimental results show that the method is invisible and robust against some image processing.
Chaotic Mixing in Magmatic Systems: a new experiment
NASA Astrophysics Data System (ADS)
de Campos, C. P.; Perugini, D.; Dingwell, D. B.; Poli, G.; Ertel-Ingrisch, W.; Hess, K.
2007-12-01
Previous studies on magma mixing systems have evidenced that mixing processes could be controlled by chaotic dynamics. These processes are thought to be the source of fractal structures propagating within natural magmatic systems, from meter to the micrometer length scale (Perugini et al., 2006. EPSL, 234: 669-680 and references therein). We have developed a device for experimental studies of chaotic mixing dynamics in silicate melts at high temperatures (up to 1700°C). This device has been inspired by the journal bearing or eccentric cylinder geometry for viscous fluids for the study of chaotic mixing in slow flows (Swanson and Ottino, 1990. J. Fluid Mech., 213:227-249). This geometry is thought to be an ideal system for chaotic studies because a) it is experimentally accessible/feasible for silicate rheologies and b) it is subject to an analytical solution for the stream function. In the journal bearing system the flow region, is confined in the torus between the centers of the two cylinders. Their central axes are parallel but not coincident, i. e. the cylinders are eccentric. In order to generate chaos in a flow, the streamlines must be time dependent, resulting in alternating movements between the two cylinders. This means that at least one of the cylinders has alternating rotation directions. The dimension of this new experimental device follows the required main dimensionless numbers for a chaotic flow. Our first experimental goal is to characterize the mixing process in a prototypical system (haplogranite-haplobasalt)under variable mixing protocols. muenchen.de/
Image Encryption Algorithm Based on Hyperchaotic Maps and Nucleotide Sequences Database
2017-01-01
Image encryption technology is one of the main means to ensure the safety of image information. Using the characteristics of chaos, such as randomness, regularity, ergodicity, and initial value sensitiveness, combined with the unique space conformation of DNA molecules and their unique information storage and processing ability, an efficient method for image encryption based on the chaos theory and a DNA sequence database is proposed. In this paper, digital image encryption employs a process of transforming the image pixel gray value by using chaotic sequence scrambling image pixel location and establishing superchaotic mapping, which maps quaternary sequences and DNA sequences, and by combining with the logic of the transformation between DNA sequences. The bases are replaced under the displaced rules by using DNA coding in a certain number of iterations that are based on the enhanced quaternary hyperchaotic sequence; the sequence is generated by Chen chaos. The cipher feedback mode and chaos iteration are employed in the encryption process to enhance the confusion and diffusion properties of the algorithm. Theoretical analysis and experimental results show that the proposed scheme not only demonstrates excellent encryption but also effectively resists chosen-plaintext attack, statistical attack, and differential attack. PMID:28392799
NASA Astrophysics Data System (ADS)
Li, Jiafu; Xiang, Shuiying; Wang, Haoning; Gong, Junkai; Wen, Aijun
2018-03-01
In this paper, a novel image encryption algorithm based on synchronization of physical random bit generated in a cascade-coupled semiconductor ring lasers (CCSRL) system is proposed, and the security analysis is performed. In both transmitter and receiver parts, the CCSRL system is a master-slave configuration consisting of a master semiconductor ring laser (M-SRL) with cross-feedback and a solitary SRL (S-SRL). The proposed image encryption algorithm includes image preprocessing based on conventional chaotic maps, pixel confusion based on control matrix extracted from physical random bit, and pixel diffusion based on random bit stream extracted from physical random bit. Firstly, the preprocessing method is used to eliminate the correlation between adjacent pixels. Secondly, physical random bit with verified randomness is generated based on chaos in the CCSRL system, and is used to simultaneously generate the control matrix and random bit stream. Finally, the control matrix and random bit stream are used for the encryption algorithm in order to change the position and the values of pixels, respectively. Simulation results and security analysis demonstrate that the proposed algorithm is effective and able to resist various typical attacks, and thus is an excellent candidate for secure image communication application.
Nonquadratic Variation of the Blum Blum Shub Pseudorandom Number Generator
2016-09-01
maximum 200 words) Cryptography is essential for secure online communications. Many different types of ciphers are implemented in modern-day... cryptography , but they all have one common factor. All ciphers require a source of randomness, which makes them unpre- dictable. One such source of this...Martinsen Second Reader Craig Rasmussen Chair, Department of Applied Mathematics iii THIS PAGE INTENTIONALLY LEFT BLANK iv ABSTRACT Cryptography is
HEaDS-UP Phase IV Assessment: Headgear Effects on Auditory Perception
2015-02-01
8 Fig. 6 Average attenuation measured for the CIPHER and INTERCPT helmets as a function of noise level, mandible/ eyewear ...impulsive noise consistent with the US Occupational Safety and Health Administration (OSHA 1981), the National Institute for Occupational Safety and... eyewear , or HPDs) (Fig. 5) show that the CIPHER and INTERCPT compared favorably with the currently fielded advanced combat helmet (ACH). Figure 6
Field performance of timber bridges. 17, Ciphers stress-laminated deck bridge
James P. Wacker; James A. Kainz; Michael A. Ritter
In September 1989, the Ciphers bridge was constructed within the Beltrami Island State Forest in Roseau County, Minnesota. The bridge superstructure is a two-span continuous stress-laminated deck that is approximately 12.19 m long, 5.49 m wide, and 305 mm deep (40 ft long, 18 ft wide, and 12 in. deep). The bridge is one of the first to utilize red pine sawn lumber for...
DNA-based cryptographic methods for data hiding in DNA media.
Marwan, Samiha; Shawish, Ahmed; Nagaty, Khaled
2016-12-01
Information security can be achieved using cryptography, steganography or a combination of them, where data is firstly encrypted using any of the available cryptography techniques and then hid into any hiding medium. Recently, the famous genomic DNA has been introduced as a hiding medium, known as DNA steganography, due to its notable ability to hide huge data sets with a high level of randomness and hence security. Despite the numerous cryptography techniques, to our knowledge only the vigenere cipher and the DNA-based playfair cipher have been combined with the DNA steganography, which keeps space for investigation of other techniques and coming up with new improvements. This paper presents a comprehensive analysis between the DNA-based playfair, vigenere, RSA and the AES ciphers, each combined with a DNA hiding technique. The conducted analysis reports the performance diversity of each combined technique in terms of security, speed, hiding capacity in addition to both key size and data size. Moreover, this paper proposes a modification of the current combined DNA-based playfair cipher technique, which makes it not only simple and fast but also provides a significantly higher hiding capacity and security. The conducted extensive experimental studies confirm such outstanding performance in comparison with all the discussed combined techniques. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Logistic Map for Cancellable Biometrics
NASA Astrophysics Data System (ADS)
Supriya, V. G., Dr; Manjunatha, Ramachandra, Dr
2017-08-01
This paper presents design and implementation of secured biometric template protection system by transforming the biometric template using binary chaotic signals and 3 different key streams to obtain another form of template and demonstrating its efficiency by the results and investigating on its security through analysis including, key space analysis, information entropy and key sensitivity analysis.
Yang, Xiuping; Min, Lequan; Wang, Xue
2015-05-01
This paper sets up a chaos criterion theorem on a kind of cubic polynomial discrete maps. Using this theorem, Zhou-Song's chaos criterion theorem on quadratic polynomial discrete maps and generalized synchronization (GS) theorem construct an eight-dimensional chaotic GS system. Numerical simulations have been carried out to verify the effectiveness of theoretical results. The chaotic GS system is used to design a chaos-based pseudorandom number generator (CPRNG). Using FIPS 140-2 test suit/Generalized FIPS 140-2, test suit tests the randomness of two 1000 key streams consisting of 20 000 bits generated by the CPRNG, respectively. The results show that there are 99.9%/98.5% key streams to have passed the FIPS 140-2 test suit/Generalized FIPS 140-2 test. Numerical simulations show that the different keystreams have an average 50.001% same codes. The key space of the CPRNG is larger than 2(1345). As an application of the CPRNG, this study gives an image encryption example. Experimental results show that the linear coefficients between the plaintext and the ciphertext and the decrypted ciphertexts via the 100 key streams with perturbed keys are less than 0.00428. The result suggests that the decrypted texts via the keystreams generated via perturbed keys of the CPRNG are almost completely independent on the original image text, and brute attacks are needed to break the cryptographic system.
NASA Astrophysics Data System (ADS)
Yang, Xiuping; Min, Lequan; Wang, Xue
2015-05-01
This paper sets up a chaos criterion theorem on a kind of cubic polynomial discrete maps. Using this theorem, Zhou-Song's chaos criterion theorem on quadratic polynomial discrete maps and generalized synchronization (GS) theorem construct an eight-dimensional chaotic GS system. Numerical simulations have been carried out to verify the effectiveness of theoretical results. The chaotic GS system is used to design a chaos-based pseudorandom number generator (CPRNG). Using FIPS 140-2 test suit/Generalized FIPS 140-2, test suit tests the randomness of two 1000 key streams consisting of 20 000 bits generated by the CPRNG, respectively. The results show that there are 99.9%/98.5% key streams to have passed the FIPS 140-2 test suit/Generalized FIPS 140-2 test. Numerical simulations show that the different keystreams have an average 50.001% same codes. The key space of the CPRNG is larger than 21345. As an application of the CPRNG, this study gives an image encryption example. Experimental results show that the linear coefficients between the plaintext and the ciphertext and the decrypted ciphertexts via the 100 key streams with perturbed keys are less than 0.00428. The result suggests that the decrypted texts via the keystreams generated via perturbed keys of the CPRNG are almost completely independent on the original image text, and brute attacks are needed to break the cryptographic system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yang, Xiuping, E-mail: yangxiuping-1990@163.com; Min, Lequan, E-mail: minlequan@sina.com; Wang, Xue, E-mail: wangxue-20130818@163.com
This paper sets up a chaos criterion theorem on a kind of cubic polynomial discrete maps. Using this theorem, Zhou-Song's chaos criterion theorem on quadratic polynomial discrete maps and generalized synchronization (GS) theorem construct an eight-dimensional chaotic GS system. Numerical simulations have been carried out to verify the effectiveness of theoretical results. The chaotic GS system is used to design a chaos-based pseudorandom number generator (CPRNG). Using FIPS 140-2 test suit/Generalized FIPS 140-2, test suit tests the randomness of two 1000 key streams consisting of 20 000 bits generated by the CPRNG, respectively. The results show that there are 99.9%/98.5% keymore » streams to have passed the FIPS 140-2 test suit/Generalized FIPS 140-2 test. Numerical simulations show that the different keystreams have an average 50.001% same codes. The key space of the CPRNG is larger than 2{sup 1345}. As an application of the CPRNG, this study gives an image encryption example. Experimental results show that the linear coefficients between the plaintext and the ciphertext and the decrypted ciphertexts via the 100 key streams with perturbed keys are less than 0.00428. The result suggests that the decrypted texts via the keystreams generated via perturbed keys of the CPRNG are almost completely independent on the original image text, and brute attacks are needed to break the cryptographic system.« less
Studies and simulations of the DigiCipher system
NASA Technical Reports Server (NTRS)
Sayood, K.; Chen, Y. C.; Kipp, G.
1993-01-01
During this period the development of simulators for the various high definition television (HDTV) systems proposed to the FCC was continued. The FCC has indicated that it wants the various proposers to collaborate on a single system. Based on all available information this system will look very much like the advanced digital television (ADTV) system with major contributions only from the DigiCipher system. The results of our simulations of the DigiCipher system are described. This simulator was tested using test sequences from the MPEG committee. The results are extrapolated to HDTV video sequences. Once again, some caveats are in order. The sequences used for testing the simulator and generating the results are those used for testing the MPEG algorithm. The sequences are of much lower resolution than the HDTV sequences would be, and therefore the extrapolations are not totally accurate. One would expect to get significantly higher compression in terms of bits per pixel with sequences that are of higher resolution. However, the simulator itself is a valid one, and should HDTV sequences become available, they could be used directly with the simulator. A brief overview of the DigiCipher system is given. Some coding results obtained using the simulator are looked at. These results are compared to those obtained using the ADTV system. These results are evaluated in the context of the CCSDS specifications and make some suggestions as to how the DigiCipher system could be implemented in the NASA network. Simulations such as the ones reported can be biased depending on the particular source sequence used. In order to get more complete information about the system one needs to obtain a reasonable set of models which mirror the various kinds of sources encountered during video coding. A set of models which can be used to effectively model the various possible scenarios is provided. As this is somewhat tangential to the other work reported, the results are included as an appendix.
NASA Astrophysics Data System (ADS)
Kohler, Susanna
2016-01-01
Dwarf galaxies or globular clusters orbiting the Milky Way can be pulled apart by tidal forces, leaving behind a trail of stars known as a stellar stream. One such trail, the Ophiuchus stream, has posed a serious dynamical puzzle since its discovery. But a recent study has identified four stars that might help resolve this streams mystery.Conflicting TimescalesThe stellar stream Ophiuchus was discovered around our galaxy in 2014. Based on its length, which appears to be 1.6 kpc, we can calculate the time that has passed since its progenitor was disrupted and the stream was created: ~250 Myr. But the stars within it are ~12 Gyr old, and the stream orbits the galaxy with a period of ~350 Myr.Given these numbers, we can assume that Ophiuchuss progenitor completed many orbits of the Milky Way in its lifetime. So why would it only have been disrupted 250 million years ago?Fanning StreamLed by Branimir Sesar (Max Planck Institute for Astronomy), a team of scientists has proposed an idea that might help solve this puzzle. If the Ophiuchus stellar stream is on a chaotic orbit common in triaxial potentials, which the Milky Ways may be then the stream ends can fan out, with stars spreading in position and velocity.The fanned part of the stream, however, would be difficult to detect because of its low surface brightness. As a result, the Ophiuchus stellar stream could actually be longer than originally measured, implying that it was disrupted longer ago than was believed.Search for Fan StarsTo test this idea, Sesar and collaborators performed a search around the ends of the stream, looking for stars thatare of the right type to match the stream,are at the predicted distance of the stream,are located near the stream ends, andhave velocities that match the stream and dont match the background halo stars.Histogram of the heliocentric velocities of the 43 target stars. Six stars have velocities matching the stream velocity. Two of these are located in the main stream; the other four may be part of a fan at the end of the stream. [Sesar et al. 2016]Of the 43 targets for which the authors obtained spectra, four stars met these criteria and are located beyond the main extent of the stream, possibly comprising a fan at the streams end. Including these stars as part of the Ophiuchus stream, its length becomes 3 kpc, implying that its time of disruption was closer to 400 million years ago. This relieves the timescale tension but does not resolve it.That said, the mere evidence of a fan in the Ophiuchus stream suggests that its progenitor may have been on a chaotic orbit. If this is the case, its entirely possible that the progenitor could have survived for ~11 Gyr, only to have been disrupted within the last 0.5 Gyr. Detailed modeling and further identification of potential fan stars in the Ophiuchus stream will help to test this idea and resolve the puzzle of this stream.CitationBranimir Sesar et al 2016 ApJ 816 L4. doi:10.3847/2041-8205/816/1/L4
Mobile Assisted Security in Wireless Sensor Networks
2015-08-03
server from Google’s DNS, Chromecast and the content server does the 3-way TCP Handshake which is followed by Client Hello and Server Hello TLS messages...utilized TLS v1.2, except NTP servers and google’s DNS server. In the TLS v1.2, after handshake, client and server sends Client Hello and Server Hello ...Messages in order. In Client Hello messages, client offers a list of Cipher Suites that it supports. Each Cipher Suite defines the key exchange algorithm
Tashima, Hideaki; Takeda, Masafumi; Suzuki, Hiroyuki; Obi, Takashi; Yamaguchi, Masahiro; Ohyama, Nagaaki
2010-06-21
We have shown that the application of double random phase encoding (DRPE) to biometrics enables the use of biometrics as cipher keys for binary data encryption. However, DRPE is reported to be vulnerable to known-plaintext attacks (KPAs) using a phase recovery algorithm. In this study, we investigated the vulnerability of DRPE using fingerprints as cipher keys to the KPAs. By means of computational experiments, we estimated the encryption key and restored the fingerprint image using the estimated key. Further, we propose a method for avoiding the KPA on the DRPE that employs the phase retrieval algorithm. The proposed method makes the amplitude component of the encrypted image constant in order to prevent the amplitude component of the encrypted image from being used as a clue for phase retrieval. Computational experiments showed that the proposed method not only avoids revealing the cipher key and the fingerprint but also serves as a sufficiently accurate verification system.
Multicollision attack on CBC-MAC, EMAC, and XCBC-MAC of AES-128 algorithm
NASA Astrophysics Data System (ADS)
Brolin Sihite, Alfonso; Hayat Susanti, Bety
2017-10-01
A Message Authentication Codes (MAC) can be constructed based on a block cipher algorithm. CBC-MAC, EMAC, and XCBC-MAC constructions are some of MAC schemes that used in the hash function. In this paper, we do multicollision attack on CBC-MAC, EMAC, and XCBC-MAC construction which uses AES-128 block cipher algorithm as basic construction. The method of multicollision attack utilizes the concept of existential forgery on CBC-MAC. The results show that the multicollision can be obtained easily in CBC-MAC, EMAC, and XCBC-MAC construction.
NASA Astrophysics Data System (ADS)
Terentjeva, Alexandra
2017-03-01
3600 individual photographic orbits of meteor bodies and about 2000 visual meteor radiants with corresponding velocities were compiled and carefully studied in detail. 154 minor meteor streams were detected in the Solar System, their basic orbital and other data are given. Firstly some remarkable shower and stream properties are established: examples of the large elliptic radiation areas with semi-major axes perpendicular to the Ecliptic; the existence of the Northern (N) , Southern (S) and Ecliptical (Q) branches of some streams; stream-antipodes and radiant-antipodes (symmetrically arranged relatively to the Ecliptic) with angular distances from the Ecliptic to 40-80°; a number of short-perihelion streams (q 0.05-0.07 A.U.); some meteor streams perpendicular to the Ecliptic's plane. There are also some unique meteor bodies with their orbits enclosed within the limits of the Earth's one, or having the clockwise and anticlockwise direction in two similar orbits. Hyperbolic photographic velocities vh = 57-88 km /sec are treated as real ones according to the best radar and visual observations. A "bunch" of ecliptical streams, discovered in the USSR in 1950, is a complex of orbits of the mostly massive meteor particles of the Zodiacal Cloud. The stream evolution rate is comparatively high. The total complex of sporadic meteor bodies is not totally chaotic and accidental.
Engineering fluid flow using sequenced microstructures
NASA Astrophysics Data System (ADS)
Amini, Hamed; Sollier, Elodie; Masaeli, Mahdokht; Xie, Yu; Ganapathysubramanian, Baskar; Stone, Howard A.; di Carlo, Dino
2013-05-01
Controlling the shape of fluid streams is important across scales: from industrial processing to control of biomolecular interactions. Previous approaches to control fluid streams have focused mainly on creating chaotic flows to enhance mixing. Here we develop an approach to apply order using sequences of fluid transformations rather than enhancing chaos. We investigate the inertial flow deformations around a library of single cylindrical pillars within a microfluidic channel and assemble these net fluid transformations to engineer fluid streams. As these transformations provide a deterministic mapping of fluid elements from upstream to downstream of a pillar, we can sequentially arrange pillars to apply the associated nested maps and, therefore, create complex fluid structures without additional numerical simulation. To show the range of capabilities, we present sequences that sculpt the cross-sectional shape of a stream into complex geometries, move and split a fluid stream, perform solution exchange and achieve particle separation. A general strategy to engineer fluid streams into a broad class of defined configurations in which the complexity of the nonlinear equations of fluid motion are abstracted from the user is a first step to programming streams of any desired shape, which would be useful for biological, chemical and materials automation.
NASA Astrophysics Data System (ADS)
El-Shafai, W.; El-Bakary, E. M.; El-Rabaie, S.; Zahran, O.; El-Halawany, M.; Abd El-Samie, F. E.
2017-06-01
Three-Dimensional Multi-View Video (3D-MVV) transmission over wireless networks suffers from Macro-Blocks losses due to either packet dropping or fading-motivated bit errors. Thus, the robust performance of 3D-MVV transmission schemes over wireless channels becomes a recent considerable hot research issue due to the restricted resources and the presence of severe channel errors. The 3D-MVV is composed of multiple video streams shot by several cameras around a single object, simultaneously. Therefore, it is an urgent task to achieve high compression ratios to meet future bandwidth constraints. Unfortunately, the highly-compressed 3D-MVV data becomes more sensitive and vulnerable to packet losses, especially in the case of heavy channel faults. Thus, in this paper, we suggest the application of a chaotic Baker interleaving approach with equalization and convolution coding for efficient Singular Value Decomposition (SVD) watermarked 3D-MVV transmission over an Orthogonal Frequency Division Multiplexing wireless system. Rayleigh fading and Additive White Gaussian Noise are considered in the real scenario of 3D-MVV transmission. The SVD watermarked 3D-MVV frames are primarily converted to their luminance and chrominance components, which are then converted to binary data format. After that, chaotic interleaving is applied prior to the modulation process. It is used to reduce the channel effects on the transmitted bit streams and it also adds a degree of encryption to the transmitted 3D-MVV frames. To test the performance of the proposed framework; several simulation experiments on different SVD watermarked 3D-MVV frames have been executed. The experimental results show that the received SVD watermarked 3D-MVV frames still have high Peak Signal-to-Noise Ratios and watermark extraction is possible in the proposed framework.
Three-pass protocol scheme for bitmap image security by using vernam cipher algorithm
NASA Astrophysics Data System (ADS)
Rachmawati, D.; Budiman, M. A.; Aulya, L.
2018-02-01
Confidentiality, integrity, and efficiency are the crucial aspects of data security. Among the other digital data, image data is too prone to abuse of operation like duplication, modification, etc. There are some data security techniques, one of them is cryptography. The security of Vernam Cipher cryptography algorithm is very dependent on the key exchange process. If the key is leaked, security of this algorithm will collapse. Therefore, a method that minimizes key leakage during the exchange of messages is required. The method which is used, is known as Three-Pass Protocol. This protocol enables message delivery process without the key exchange. Therefore, the sending messages process can reach the receiver safely without fear of key leakage. The system is built by using Java programming language. The materials which are used for system testing are image in size 200×200 pixel, 300×300 pixel, 500×500 pixel, 800×800 pixel and 1000×1000 pixel. The result of experiments showed that Vernam Cipher algorithm in Three-Pass Protocol scheme could restore the original image.
Controlling chaotic behavior in CO2 and other lasers
NASA Astrophysics Data System (ADS)
1993-06-01
Additional substantial experimental progress has been made, in the third month of the project, in setting up equipment and testing for producing chaotic behavior with a CO2 laser. The project goal is to synchronize and control chaos in CO2 and other lasers, and thereby increase the power in ensembles of coupled laser sources. Numerous investigations into the chaos regime have been made, a second CO2 laser has been brought on stream, and work is progressing in the fourth month toward coupling the two lasers and control of the first laser. It is also intended to submit at least two papers to the Second Experimental Chaos Conference which is supported by the Office of Naval Research. Abstracts to those two papers are attached. Last month's report discussed the experimental investigation of nonlinear dynamics of CO2 lasers which involved a new technique of inducing chaos. In this new technique, an acoustically modulated feedback of the laser light was used and led to chaotic dynamics at a very low modulation frequency of 375 Hz. Since then, new results have been obtained by an Electro-Optical Modulation (EOM) technique. In the new setup, the electro-optical modulator is placed in an external cavity outside the laser.
Characterization of mixing in an electroosmotically stirred continuous micro mixer
NASA Astrophysics Data System (ADS)
Beskok, Ali
2005-11-01
We present theoretical and numerical studies of mixing in a straight micro channel with zeta potential patterned surfaces. A steady pressure driven flow is maintained in the channel in addition to a time dependent electroosmotic flow, generated by a stream-wise AC electric field. The zeta potential patterns are placed critically in the channel to achieve spatially asymmetric time-dependent flow patterns that lead to chaotic stirring. Fixing the geometry, we performed parametric studies of passive particle motion that led to generation of Poincare sections and characterization of chaotic strength by finite time Lyapunov exponents. The parametric studies were performed as a function of the Womersley number (normalized AC frequency) and the ratio of Poiseuille flow and electroosmotic velocities. After determining the non-dimensional parameters that led to high chaotic strength, we performed spectral element simulations of species transport and mixing at high Peclet numbers, and characterized mixing efficiency using the Mixing Index inverse. Mixing lengths proportional to the natural logarithm of the Peclet number are reported. Using the optimum non-dimensional parameters and the typical magnitudes involved in electroosmotic flows, we were able to determine the physical dimensions and operation conditions for a prototype micro-mixer.
Architecture of security management unit for safe hosting of multiple agents
NASA Astrophysics Data System (ADS)
Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques
1999-04-01
In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.
William Friedman, Geneticist Turned Cryptographer
Goldman, Irwin L.
2017-01-01
William Friedman (1891–1969), trained as a plant geneticist at Cornell University, was employed at Riverbank Laboratories by the eccentric millionaire George Fabyan to work on wheat breeding. Friedman, however, soon became intrigued by and started working on a pet project of Fabyan’s involving the conjecture that Francis Bacon, a polymath known for the study of ciphers, was the real author of Shakespeare’s plays. Thus, beginning in ∼1916, Friedman turned his attention to the so called “Baconian cipher,” and developed decryption techniques that bore similarity to approaches for solving problems in population genetics. His most significant, indeed pathbreaking, work used ideas from genetics and statistics, focusing on analysis of the frequencies of letters in language use. Although he had transitioned from being a geneticist to a cryptographer, his earlier work had resonance in his later pursuits. He soon began working directly for the United States government and produced solutions used to solve complex military ciphers, in particular to break the Japanese Purple code during World War II. Another important legacy of his work was the establishment of the Signal Intelligence Service and eventually the National Security Agency. PMID:28476859
William Friedman, Geneticist Turned Cryptographer.
Goldman, Irwin L
2017-05-01
William Friedman (1891-1969), trained as a plant geneticist at Cornell University, was employed at Riverbank Laboratories by the eccentric millionaire George Fabyan to work on wheat breeding. Friedman, however, soon became intrigued by and started working on a pet project of Fabyan's involving the conjecture that Francis Bacon, a polymath known for the study of ciphers, was the real author of Shakespeare's plays. Thus, beginning in ∼1916, Friedman turned his attention to the so called "Baconian cipher," and developed decryption techniques that bore similarity to approaches for solving problems in population genetics. His most significant, indeed pathbreaking, work used ideas from genetics and statistics, focusing on analysis of the frequencies of letters in language use. Although he had transitioned from being a geneticist to a cryptographer, his earlier work had resonance in his later pursuits. He soon began working directly for the United States government and produced solutions used to solve complex military ciphers, in particular to break the Japanese Purple code during World War II. Another important legacy of his work was the establishment of the Signal Intelligence Service and eventually the National Security Agency. Copyright © 2017 by the Genetics Society of America.
Did ice streams carve martian outflow channels?
Lucchitta, B.K.; Anderson, D.M.; Shoji, H.
1981-01-01
Outflow channels on Mars1 are long sinuous linear depressions that occur mostly in the equatorial area (??30?? lat.). They differ from small valley networks2 by being larger and arising full born from chaotic terrains. Outflow channels resemble terrestrial stream beds, and their origin has generally been attributed to water3-5 in catastrophic floods6,7 or mudflows8. The catastrophic-flood hypothesis is derived primarily from the morphological similarities of martian outflow channels and features created by the catastrophic Spokane flood that formed the Washington scablands. These similarities have been documented extensively3,6,7, but differences of scale remain a major problemmartian channel features are on the average much larger than their proposed terrestrial analogues. We examine here the problem of channel origin from the perspective of erosional characteristics and the resultant landf orms created by former and present-day ice streams and glaciers on Earth. From morphologic comparisons, an ice-stream origin seems equally well suited to explain the occurrences and form of the outflow channels on Mars, and in contrast with the hydraulic hypothesis, ice streams and ice sheets produce terrestrial features of the same scale as those observed on Mars. ?? 1981 Nature Publishing Group.
Encryption and decryption using FPGA
NASA Astrophysics Data System (ADS)
Nayak, Nikhilesh; Chandak, Akshay; Shah, Nisarg; Karthikeyan, B.
2017-11-01
In this paper, we are performing multiple cryptography methods on a set of data and comparing their outputs. Here AES algorithm and RSA algorithm are used. Using AES Algorithm an 8 bit input (plain text) gets encrypted using a cipher key and the result is displayed on tera term (serially). For simulation a 128 bit input is used and operated with a 128 bit cipher key to generate encrypted text. The reverse operations are then performed to get decrypted text. In RSA Algorithm file handling is used to input plain text. This text is then operated on to get the encrypted and decrypted data, which are then stored in a file. Finally the results of both the algorithms are compared.
NASA Astrophysics Data System (ADS)
Amalia; Budiman, M. A.; Sitepu, R.
2018-03-01
Cryptography is one of the best methods to keep the information safe from security attack by unauthorized people. At present, Many studies had been done by previous researchers to generate a more robust cryptographic algorithm to provide high security for data communication. To strengthen data security, one of the methods is hybrid cryptosystem method that combined symmetric and asymmetric algorithm. In this study, we observed a hybrid cryptosystem method contain Modification Playfair Cipher 16x16 algorithm as a symmetric algorithm and Knapsack Naccache-Stern as an asymmetric algorithm. We observe a running time of this hybrid algorithm with some of the various experiments. We tried different amount of characters to be tested which are 10, 100, 1000, 10000 and 100000 characters and we also examined the algorithm with various key’s length which are 10, 20, 30, 40 of key length. The result of our study shows that the processing time for encryption and decryption process each algorithm is linearly proportional, it means the longer messages character then, the more significant times needed to encrypt and decrypt the messages. The encryption running time of Knapsack Naccache-Stern algorithm takes a longer time than its decryption, while the encryption running time of modification Playfair Cipher 16x16 algorithm takes less time than its decryption.
Rajagopalan, S. P.
2017-01-01
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network. PMID:29040290
Alagarsamy, Sumithra; Rajagopalan, S P
2017-01-01
Certificateless-based signcryption overcomes inherent shortcomings in traditional Public Key Infrastructure (PKI) and Key Escrow problem. It imparts efficient methods to design PKIs with public verifiability and cipher text authenticity with minimum dependency. As a classic primitive in public key cryptography, signcryption performs validity of cipher text without decryption by combining authentication, confidentiality, public verifiability and cipher text authenticity much more efficiently than the traditional approach. In this paper, we first define a security model for certificateless-based signcryption called, Complex Conjugate Differential Integrated Factor (CC-DIF) scheme by introducing complex conjugates through introduction of the security parameter and improving secured message distribution rate. However, both partial private key and secret value changes with respect to time. To overcome this weakness, a new certificateless-based signcryption scheme is proposed by setting the private key through Differential (Diff) Equation using an Integration Factor (DiffEIF), minimizing computational cost and communication overhead. The scheme is therefore said to be proven secure (i.e. improving the secured message distributing rate) against certificateless access control and signcryption-based scheme. In addition, compared with the three other existing schemes, the CC-DIF scheme has the least computational cost and communication overhead for secured message communication in mobile network.
Theoretical and numerical studies of chaotic mixing
NASA Astrophysics Data System (ADS)
Kim, Ho Jun
Theoretical and numerical studies of chaotic mixing are performed to circumvent the difficulties of efficient mixing, which come from the lack of turbulence in microfluidic devices. In order to carry out efficient and accurate parametric studies and to identify a fully chaotic state, a spectral element algorithm for solution of the incompressible Navier-Stokes and species transport equations is developed. Using Taylor series expansions in time marching, the new algorithm employs an algebraic factorization scheme on multi-dimensional staggered spectral element grids, and extends classical conforming Galerkin formulations to nonconforming spectral elements. Lagrangian particle tracking methods are utilized to study particle dispersion in the mixing device using spectral element and fourth order Runge-Kutta discretizations in space and time, respectively. Comparative studies of five different techniques commonly employed to identify the chaotic strength and mixing efficiency in microfluidic systems are presented to demonstrate the competitive advantages and shortcomings of each method. These are the stirring index based on the box counting method, Poincare sections, finite time Lyapunov exponents, the probability density function of the stretching field, and mixing index inverse, based on the standard deviation of scalar species distribution. Series of numerical simulations are performed by varying the Peclet number (Pe) at fixed kinematic conditions. The mixing length (lm) is characterized as function of the Pe number, and lm ∝ ln(Pe) scaling is demonstrated for fully chaotic cases. Employing the aforementioned techniques, optimum kinematic conditions and the actuation frequency of the stirrer that result in the highest mixing/stirring efficiency are identified in a zeta potential patterned straight micro channel, where a continuous flow is generated by superposition of a steady pressure driven flow and time periodic electroosmotic flow induced by a stream-wise AC electric field. Finally, it is shown that the invariant manifold of hyperbolic periodic point determines the geometry of fast mixing zones in oscillatory flows in two-dimensional cavity.
Chaotic vortex induced vibrations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhao, J.; Sheridan, J.; Leontini, J. S.
2014-12-15
This study investigates the nature of the dynamic response of an elastically mounted cylinder immersed in a free stream. A novel method is utilized, where the motion of the body during a free vibration experiment is accurately recorded, and then a second experiment is conducted where the cylinder is externally forced to follow this recorded trajectory. Generally, the flow response during both experiments is identical. However, particular regimes exist where the flow response is significantly different. This is taken as evidence of chaos in these regimes.
Bouslimi, D; Coatrieux, G; Roux, Ch
2011-01-01
In this paper, we propose a new joint watermarking/encryption algorithm for the purpose of verifying the reliability of medical images in both encrypted and spatial domains. It combines a substitutive watermarking algorithm, the quantization index modulation (QIM), with a block cipher algorithm, the Advanced Encryption Standard (AES), in CBC mode of operation. The proposed solution gives access to the outcomes of the image integrity and of its origins even though the image is stored encrypted. Experimental results achieved on 8 bits encoded Ultrasound images illustrate the overall performances of the proposed scheme. By making use of the AES block cipher in CBC mode, the proposed solution is compliant with or transparent to the DICOM standard.
A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism
NASA Astrophysics Data System (ADS)
Chen, Jun-xin; Zhu, Zhi-liang; Fu, Chong; Yu, Hai; Zhang, Li-bo
2015-03-01
In recent years, a variety of chaos-based image cryptosystems have been investigated to meet the increasing demand for real-time secure image transmission. Most of them are based on permutation-diffusion architecture, in which permutation and diffusion are two independent procedures with fixed control parameters. This property results in two flaws. (1) At least two chaotic state variables are required for encrypting one plain pixel, in permutation and diffusion stages respectively. Chaotic state variables produced with high computation complexity are not sufficiently used. (2) The key stream solely depends on the secret key, and hence the cryptosystem is vulnerable against known/chosen-plaintext attacks. In this paper, a fast chaos-based image encryption scheme with a dynamic state variables selection mechanism is proposed to enhance the security and promote the efficiency of chaos-based image cryptosystems. Experimental simulations and extensive cryptanalysis have been carried out and the results prove the superior security and high efficiency of the scheme.
Context adaptive binary arithmetic coding-based data hiding in partially encrypted H.264/AVC videos
NASA Astrophysics Data System (ADS)
Xu, Dawen; Wang, Rangding
2015-05-01
A scheme of data hiding directly in a partially encrypted version of H.264/AVC videos is proposed which includes three parts, i.e., selective encryption, data embedding and data extraction. Selective encryption is performed on context adaptive binary arithmetic coding (CABAC) bin-strings via stream ciphers. By careful selection of CABAC entropy coder syntax elements for selective encryption, the encrypted bitstream is format-compliant and has exactly the same bit rate. Then a data-hider embeds the additional data into partially encrypted H.264/AVC videos using a CABAC bin-string substitution technique without accessing the plaintext of the video content. Since bin-string substitution is carried out on those residual coefficients with approximately the same magnitude, the quality of the decrypted video is satisfactory. Video file size is strictly preserved even after data embedding. In order to adapt to different application scenarios, data extraction can be done either in the encrypted domain or in the decrypted domain. Experimental results have demonstrated the feasibility and efficiency of the proposed scheme.
Quantum key based burst confidentiality in optical burst switched networks.
Balamurugan, A M; Sivasubramanian, A
2014-01-01
The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks.
Quantum Key Based Burst Confidentiality in Optical Burst Switched Networks
Balamurugan, A. M.; Sivasubramanian, A.
2014-01-01
The optical burst switching (OBS) is an emergent result to the technology concern that could achieve a feasible network in future. They are endowed with the ability to meet the bandwidth requirement of those applications that require intensive bandwidth. There are more domains opening up in the OBS that evidently shows their advantages and their capability to face the future network traffic. However, the concept of OBS is still far from perfection facing issues in case of security threat. The transfer of optical switching paradigm to optical burst switching faces serious downfall in the fields of burst aggregation, routing, authentication, dispute resolution, and quality of service (QoS). This paper deals with employing RC4 (stream cipher) to encrypt and decrypt bursts thereby ensuring the confidentiality of the burst. Although the use of AES algorithm has already been proposed for the same issue, by contrasting the two algorithms under the parameters of burst encryption and decryption time, end-to-end delay, it was found that RC4 provided better results. This paper looks to provide a better solution for the confidentiality of the burst in OBS networks. PMID:24578663
Investigating the structure preserving encryption of high efficiency video coding (HEVC)
NASA Astrophysics Data System (ADS)
Shahid, Zafar; Puech, William
2013-02-01
This paper presents a novel method for the real-time protection of new emerging High Efficiency Video Coding (HEVC) standard. Structure preserving selective encryption is being performed in CABAC entropy coding module of HEVC, which is significantly different from CABAC entropy coding of H.264/AVC. In CABAC of HEVC, exponential Golomb coding is replaced by truncated Rice (TR) up to a specific value for binarization of transform coefficients. Selective encryption is performed using AES cipher in cipher feedback mode on a plaintext of binstrings in a context aware manner. The encrypted bitstream has exactly the same bit-rate and is format complaint. Experimental evaluation and security analysis of the proposed algorithm is performed on several benchmark video sequences containing different combinations of motion, texture and objects.
Direct generation of all-optical random numbers from optical pulse amplitude chaos.
Li, Pu; Wang, Yun-Cai; Wang, An-Bang; Yang, Ling-Zhen; Zhang, Ming-Jiang; Zhang, Jian-Zhong
2012-02-13
We propose and theoretically demonstrate an all-optical method for directly generating all-optical random numbers from pulse amplitude chaos produced by a mode-locked fiber ring laser. Under an appropriate pump intensity, the mode-locked laser can experience a quasi-periodic route to chaos. Such a chaos consists of a stream of pulses with a fixed repetition frequency but random intensities. In this method, we do not require sampling procedure and external triggered clocks but directly quantize the chaotic pulses stream into random number sequence via an all-optical flip-flop. Moreover, our simulation results show that the pulse amplitude chaos has no periodicity and possesses a highly symmetric distribution of amplitude. Thus, in theory, the obtained random number sequence without post-processing has a high-quality randomness verified by industry-standard statistical tests.
Dynamical turbulent flow on the Galton board with friction.
Chepelianskii, A D; Shepelyansky, D L
2001-07-16
We study numerically and analytically the dynamics of charged particles on the Galton board, a regular lattice of disk scatters, in the presence of constant external force, magnetic field, and friction. It is shown that under certain conditions friction leads to the appearance of a strange chaotic attractor. In this regime the average velocity and direction of particle flow can be effectively affected by electric and magnetic fields. We discuss the applications of these results to the charge transport in antidot superlattices and the stream of suspended particles in a viscous flow through scatters.
ERIC Educational Resources Information Center
Tapson, Frank
1996-01-01
Describes public key cryptography, also known as RSA, which is a system using two keys, one used to put a message into cipher and another used to decipher the message. Presents examples using small prime numbers. (MKR)
Protecting privacy in a clinical data warehouse.
Kong, Guilan; Xiao, Zhichun
2015-06-01
Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.
NASA Astrophysics Data System (ADS)
Nofriansyah, Dicky; Defit, Sarjon; Nurcahyo, Gunadi W.; Ganefri, G.; Ridwan, R.; Saleh Ahmar, Ansari; Rahim, Robbi
2018-01-01
Cybercrime is one of the most serious threats. Efforts are made to reduce the number of cybercrime is to find new techniques in securing data such as Cryptography, Steganography and Watermarking combination. Cryptography and Steganography is a growing data security science. A combination of Cryptography and Steganography is one effort to improve data integrity. New techniques are used by combining several algorithms, one of which is the incorporation of hill cipher method and Morse code. Morse code is one of the communication codes used in the Scouting field. This code consists of dots and lines. This is a new modern and classic concept to maintain data integrity. The result of the combination of these three methods is expected to generate new algorithms to improve the security of the data, especially images.
Physical layer one-time-pad data encryption through synchronized semiconductor laser networks
NASA Astrophysics Data System (ADS)
Argyris, Apostolos; Pikasis, Evangelos; Syvridis, Dimitris
2016-02-01
Semiconductor lasers (SL) have been proven to be a key device in the generation of ultrafast true random bit streams. Their potential to emit chaotic signals under conditions with desirable statistics, establish them as a low cost solution to cover various needs, from large volume key generation to real-time encrypted communications. Usually, only undemanding post-processing is needed to convert the acquired analog timeseries to digital sequences that pass all established tests of randomness. A novel architecture that can generate and exploit these true random sequences is through a fiber network in which the nodes are semiconductor lasers that are coupled and synchronized to central hub laser. In this work we show experimentally that laser nodes in such a star network topology can synchronize with each other through complex broadband signals that are the seed to true random bit sequences (TRBS) generated at several Gb/s. The potential for each node to access real-time generated and synchronized with the rest of the nodes random bit streams, through the fiber optic network, allows to implement an one-time-pad encryption protocol that mixes the synchronized true random bit sequence with real data at Gb/s rates. Forward-error correction methods are used to reduce the errors in the TRBS and the final error rate at the data decoding level. An appropriate selection in the sampling methodology and properties, as well as in the physical properties of the chaotic seed signal through which network locks in synchronization, allows an error free performance.
Chaotic behavior in the locomotion of Amoeba proteus.
Miyoshi, H; Kagawa, Y; Tsuchiya, Y
2001-01-01
The locomotion of Amoeba proteus has been investigated by algorithms evaluating correlation dimension and Lyapunov spectrum developed in the field of nonlinear science. It is presumed by these parameters whether the random behavior of the system is stochastic or deterministic. For the analysis of the nonlinear parameters, n-dimensional time-delayed vectors have been reconstructed from a time series of periphery and area of A. proteus images captured with a charge-coupled-device camera, which characterize its random motion. The correlation dimension analyzed has shown the random motion of A. proteus is subjected only to 3-4 macrovariables, though the system is a complex system composed of many degrees of freedom. Furthermore, the analysis of the Lyapunov spectrum has shown its largest exponent takes positive values. These results indicate the random behavior of A. proteus is chaotic and deterministic motion on an attractor with low dimension. It may be important for the elucidation of the cell locomotion to take account of nonlinear interactions among a small number of dynamics such as the sol-gel transformation, the cytoplasmic streaming, and the relating chemical reaction occurring in the cell.
NASA Astrophysics Data System (ADS)
Chai, Xiu-Li; Gan, Zhi-Hua; Lu, Yang; Zhang, Miao-Hui; Chen, Yi-Ran
2016-10-01
Recently, many image encryption algorithms based on chaos have been proposed. Most of the previous algorithms encrypt components R, G, and B of color images independently and neglect the high correlation between them. In the paper, a novel color image encryption algorithm is introduced. The 24 bit planes of components R, G, and B of the color plain image are obtained and recombined into 4 compound bit planes, and this can make the three components affect each other. A four-dimensional (4D) memristive hyperchaotic system generates the pseudorandom key streams and its initial values come from the SHA 256 hash value of the color plain image. The compound bit planes and key streams are confused according to the principles of genetic recombination, then confusion and diffusion as a union are applied to the bit planes, and the color cipher image is obtained. Experimental results and security analyses demonstrate that the proposed algorithm is secure and effective so that it may be adopted for secure communication. Project supported by the National Natural Science Foundation of China (Grant Nos. 61203094 and 61305042), the Natural Science Foundation of the United States (Grant Nos. CNS-1253424 and ECCS-1202225), the Science and Technology Foundation of Henan Province, China (Grant No. 152102210048), the Foundation and Frontier Project of Henan Province, China (Grant No. 162300410196), the Natural Science Foundation of Educational Committee of Henan Province, China (Grant No. 14A413015), and the Research Foundation of Henan University, China (Grant No. xxjc20140006).
Experimental and numerical investigation of Acoustic streaming (Eckart streaming)
NASA Astrophysics Data System (ADS)
Dridi, Walid; Botton, Valery; Henry, Daniel; Ben Hadid, Hamda
The application of sound waves in the bulk of a fluid can generate steady or quasi-steady flows reffered to as Acoustic streaming flows. We can distinguish two kind of acoustic streaming: The Rayleigh Streaming is generated when a standing acoustic waves interfere with solid walls to give birth to an acoustic boundary layer. Steady recirculations are then driven out of the boundary layer and can be used in micro-gravity, where the free convection is too weak or absent, to enhance the convective heat or mass transfer and cooling the electronic devises [1]. The second kind is the Eckart streaming, which is a flow generated far from the solid boundaries, it can be used to mix a chemical solutions [2], and to drive a viscous liquids in channels [3-4], in micro-gravity area. Our study focuses on the Eckart streaming configuration, which is investigated both numerical and experimental means. The experimental configuration is restricted to the case of a cylindrical non-heated cavity full of water or of a water+glycerol mixture. At the middle of one side of the cavity, a plane ultrasonic transducer generates a 2MHz wave; an absorber is set at the opposite side of the cavity to avoid any reflections. The velocity field is measured with a standard PIV system. [1] P. Vainshtein, M. Fichman and C. Gutfinger, "Acoustic enhancement of heat transfer between two parallel plates", International Journal of Heat and Mass Transfert, 1995, 38(10), 1893. [2] C. Suri, K. Tekenaka, H. Yanagida, Y. Kojima and K. Koyama, "Chaotic mixing generated by acoustic streaming", Ultrasonics, 2002, 40, 393 [3] O.V. Rudenko and A.A. Sukhorukov, "Nonstationnary Eckart streaming and pumping of liquid in ultrasonic field", Acoustical Physics, 1998, 44, 653. [4] Kenneth D. Frampton, Shawn E. Martin and Keith Minor, "The scaling of acoustic streaming for application in micro-fluidic devices", Applied Acoustics, 2003, 64,681
Fast encryption of RGB color digital images using a tweakable cellular automaton based schema
NASA Astrophysics Data System (ADS)
Faraoun, Kamel Mohamed
2014-12-01
We propose a new tweakable construction of block-enciphers using second-order reversible cellular automata, and we apply it to encipher RGB-colored images. The proposed construction permits a parallel encryption of the image content by extending the standard definition of a block cipher to take into account a supplementary parameter used as a tweak (nonce) to control the behavior of the cipher from one region of the image to the other, and hence avoid the necessity to use slow sequential encryption's operating modes. The proposed construction defines a flexible pseudorandom permutation that can be used with efficacy to solve the electronic code book problem without the need to a specific sequential mode. Obtained results from various experiments show that the proposed schema achieves high security and execution performances, and enables an interesting mode of selective area decryption due to the parallel character of the approach.
Searchable attribute-based encryption scheme with attribute revocation in cloud storage.
Wang, Shangping; Zhao, Duqiao; Zhang, Yaling
2017-01-01
Attribute based encryption (ABE) is a good way to achieve flexible and secure access control to data, and attribute revocation is the extension of the attribute-based encryption, and the keyword search is an indispensable part for cloud storage. The combination of both has an important application in the cloud storage. In this paper, we construct a searchable attribute-based encryption scheme with attribute revocation in cloud storage, the keyword search in our scheme is attribute based with access control, when the search succeeds, the cloud server returns the corresponding cipher text to user and the user can decrypt the cipher text definitely. Besides, our scheme supports multiple keywords search, which makes the scheme more practical. Under the assumption of decisional bilinear Diffie-Hellman exponent (q-BDHE) and decisional Diffie-Hellman (DDH) in the selective security model, we prove that our scheme is secure.
Data compression and information retrieval via symbolization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tang, X.Z.; Tracy, E.R.
Converting a continuous signal into a multisymbol stream is a simple method of data compression which preserves much of the dynamical information present in the original signal. The retrieval of selected types of information from symbolic data involves binary operations and is therefore optimal for digital computers. For example, correlation time scales can be easily recovered, even at high noise levels, by varying the time delay for symbolization. Also, the presence of periodicity in the signal can be reliably detected even if it is weak and masked by a dominant chaotic/stochastic background. {copyright} {ital 1998 American Institute of Physics.}
Mixing in the shear superposition micromixer: three-dimensional analysis.
Bottausci, Frederic; Mezić, Igor; Meinhart, Carl D; Cardonne, Caroline
2004-05-15
In this paper, we analyse mixing in an active chaotic advection micromixer. The micromixer consists of a main rectangular channel and three cross-stream secondary channels that provide ability for time-dependent actuation of the flow stream in the direction orthogonal to the main stream. Three-dimensional motion in the mixer is studied. Numerical simulations and modelling of the flow are pursued in order to understand the experiments. It is shown that for some values of parameters a simple model can be derived that clearly represents the flow nature. Particle image velocimetry measurements of the flow are compared with numerical simulations and the analytical model. A measure for mixing, the mixing variance coefficient (MVC), is analysed. It is shown that mixing is substantially improved with multiple side channels with oscillatory flows, whose frequencies are increasing downstream. The optimization of MVC results for single side-channel mixing is presented. It is shown that dependence of MVC on frequency is not monotone, and a local minimum is found. Residence time distributions derived from the analytical model are analysed. It is shown that, while the average Lagrangian velocity profile is flattened over the steady flow, Taylor-dispersion effects are still present for the current micromixer configuration.
Analysis of chaotic saddles in a nonlinear vibro-impact system
NASA Astrophysics Data System (ADS)
Feng, Jinqian
2017-07-01
In this paper, a computational investigation of chaotic saddles in a nonlinear vibro-impact system is presented. For a classical Duffing vibro-impact oscillator, we employ the bisection procedure and an improved stagger-and-step method to present evidence of visual chaotic saddles on the fractal basin boundary and in the internal basin, respectively. The results show that the period saddles play an important role in the evolution of chaotic saddle. The dynamics mechanics of three types of bifurcation such as saddle-node bifurcation, chaotic saddle crisis bifurcation and interior chaotic crisis bifurcation are discussed. The results reveal that the period saddle created at saddle-node bifurcation is responsible for the switch of the internal chaotic saddle to the boundary chaotic saddle. At chaotic saddle crisis bifurcation, a large chaotic saddle can divide into two different chaotic saddle connected by a period saddle. The intersection points between stable and unstable manifolds of this period saddle supply access for chaotic orbits from one chaotic saddle to another and eventually induce the coupling of these two chaotic saddle. Interior chaotic crisis bifurcation is associated with the intersection of stable and unstable manifolds of the period saddle connecting two chaotic invariant sets. In addition, the gaps in chaotic saddle is responsible for the fractal structure.
A novel high-resolution chaotic lidar with optical injection to chaotic laser diode
NASA Astrophysics Data System (ADS)
Wang, Yun-cai; Wang, An-bang
2008-03-01
A novel chaotic lidar with high resolution is proposed and studied theoretically. In chaotic lidar system, the chaotic laser emitted from chaotic laser diode is split into two beams: the probe and the reference light. The ranging is achieved by correlating the reference waveform with the delayed probe waveform backscattered from the target. In chaotic lidar systems presented previously, the chaotic signal source is laser diode with optical feedback or with optical injection by another one. The ranging resolution is limited by the bandwidth of chaotic laser which determined by the configuration of chaotic signal source. We proposed a novel chaotic lidar which ranging resolution is enhanced significantly by external optical injected chaotic laser diode. With the bandwidth-enhanced chaotic laser, the range resolution of the chaotic lidar system with optical injection is roughly two times compared with that of without optical injection. The resolution increases with injection strength increasing in a certain frequency detuning range.
Medical Image Encryption: An Application for Improved Padding Based GGH Encryption Algorithm
Sokouti, Massoud; Zakerolhosseini, Ali; Sokouti, Babak
2016-01-01
Medical images are regarded as important and sensitive data in the medical informatics systems. For transferring medical images over an insecure network, developing a secure encryption algorithm is necessary. Among the three main properties of security services (i.e., confidentiality, integrity, and availability), the confidentiality is the most essential feature for exchanging medical images among physicians. The Goldreich Goldwasser Halevi (GGH) algorithm can be a good choice for encrypting medical images as both the algorithm and sensitive data are represented by numeric matrices. Additionally, the GGH algorithm does not increase the size of the image and hence, its complexity will remain as simple as O(n2). However, one of the disadvantages of using the GGH algorithm is the Chosen Cipher Text attack. In our strategy, this shortcoming of GGH algorithm has been taken in to consideration and has been improved by applying the padding (i.e., snail tour XORing), before the GGH encryption process. For evaluating their performances, three measurement criteria are considered including (i) Number of Pixels Change Rate (NPCR), (ii) Unified Average Changing Intensity (UACI), and (iii) Avalanche effect. The results on three different sizes of images showed that padding GGH approach has improved UACI, NPCR, and Avalanche by almost 100%, 35%, and 45%, respectively, in comparison to the standard GGH algorithm. Also, the outcomes will make the padding GGH resist against the cipher text, the chosen cipher text, and the statistical attacks. Furthermore, increasing the avalanche effect of more than 50% is a promising achievement in comparison to the increased complexities of the proposed method in terms of encryption and decryption processes. PMID:27857824
Secure biometric image sensor and authentication scheme based on compressed sensing.
Suzuki, Hiroyuki; Suzuki, Masamichi; Urabe, Takuya; Obi, Takashi; Yamaguchi, Masahiro; Ohyama, Nagaaki
2013-11-20
It is important to ensure the security of biometric authentication information, because its leakage causes serious risks, such as replay attacks using the stolen biometric data, and also because it is almost impossible to replace raw biometric information. In this paper, we propose a secure biometric authentication scheme that protects such information by employing an optical data ciphering technique based on compressed sensing. The proposed scheme is based on two-factor authentication, the biometric information being supplemented by secret information that is used as a random seed for a cipher key. In this scheme, a biometric image is optically encrypted at the time of image capture, and a pair of restored biometric images for enrollment and verification are verified in the authentication server. If any of the biometric information is exposed to risk, it can be reenrolled by changing the secret information. Through numerical experiments, we confirm that finger vein images can be restored from the compressed sensing measurement data. We also present results that verify the accuracy of the scheme.
Virtual Libraries: Interactive Support Software and an Application in Chaotic Models.
ERIC Educational Resources Information Center
Katsirikou, Anthi; Skiadas, Christos; Apostolou, Apostolos; Rompogiannakis, Giannis
This paper begins with a discussion of the characteristics and the singularity of chaotic systems, including dynamic systems theory, chaotic orbit, fractals, chaotic attractors, and characteristics of chaotic systems. The second section addresses the digital libraries (DL) concept and the appropriateness of chaotic models, including definition and…
Urey Prize Lecture - Chaotic dynamics in the solar system
NASA Technical Reports Server (NTRS)
Wisdom, Jack
1987-01-01
Attention is given to solar system cases in which chaotic solutions of Newton's equations are important, as in chaotic rotation and orbital evolution. Hyperion is noted to be tumbling chaotically; chaotic orbital evolution is suggested to be of fundamental importance to an accounting for the Kirkwood gaps in asteroid distribution and for the phase space boundary of the chaotic zone at the 3/1 mean-motion commensurability with Jupiter. In addition, chaotic trajectories in the 2/1 chaotic zone reach very high eccentricities by a route that carries them to high inclinations temporarily.
DNA based random key generation and management for OTP encryption.
Zhang, Yunpeng; Liu, Xin; Sun, Manhui
2017-09-01
One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.
Efficient reversible data hiding in encrypted H.264/AVC videos
NASA Astrophysics Data System (ADS)
Xu, Dawen; Wang, Rangding
2014-09-01
Due to the security and privacy-preserving requirements for cloud data management, it is sometimes desired that video content is accessible in an encrypted form. Reversible data hiding in the encrypted domain is an emerging technology, as it can perform data hiding in encrypted videos without decryption, which preserves the confidentiality of the content. Furthermore, the original cover can be losslessly restored after decryption and data extraction. An efficient reversible data hiding scheme for encrypted H.264/AVC videos is proposed. During H.264/AVC encoding, the intraprediction mode, motion vector difference, and the sign bits of the residue coefficients are encrypted using a standard stream cipher. Then, the data-hider who does not know the original video content, may reversibly embed secret data into the encrypted H.264/AVC video by using a modified version of the histogram shifting technique. A scale factor is utilized for selecting the embedding zone, which is scalable for different capacity requirements. With an encrypted video containing hidden data, data extraction can be carried out either in the encrypted or decrypted domain. In addition, real reversibility is realized so that data extraction and video recovery are free of any error. Experimental results demonstrate the feasibility and efficiency of the proposed scheme.
The Vigenere Cipher with the TI-83
ERIC Educational Resources Information Center
Hamilton, Michael; Yankosky, Bill
2004-01-01
Cryptology, the science of secret writing, is a great way to introduce students to different areas of mathematics such as number theory, linear algebra, probability and statistics. Cryptology consists of two branches: cryptography and cryptanalysis. Cryptography is the science of designing techniques for encrypting and decrypting a message.…
FBIS report. Science and technology: Japan, November 6, 1995
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-11-06
Some articles are: R&D on Microfactory Technologies; MHI Develops Low Cost, Low Noise Mid-size Helicopters; Kumamoto University to Apply for Approval to Conduct Clinical Experiment for Gene Therapy; MITI To Support Private Sector to Develop Cipher Technology; and Hitachi Electronics Develops Digital Broadcasting Camera System.
Experimental Reacting Hydrogen Shear Layer Data at High Subsonic Mach Number
NASA Technical Reports Server (NTRS)
Chang, C. T.; Marek, C. J.; Wey, C.; Wey, C. C.
1996-01-01
The flow in a planar shear layer of hydrogen reacting with hot air was measured with a two-component laser Doppler velocimeter (LDV) system, a schlieren system, and OH fluorescence imaging. It was compared with a similar air-to-air case without combustion. The high-speed stream's flow speed was about 390 m/s, or Mach 0.71, and the flow speed ratio was 0.34. The results showed that a shear layer with reaction grows faster than one without; both cases are within the range of data scatter presented by the established data base. The coupling between the streamwise and the cross-stream turbulence components inside the shear layers was low, and reaction only increased it slightly. However, the shear layer shifted laterally into the lower speed fuel stream, and a more organized pattern of Reynolds stress was present in the reaction shear layer, likely as a result of the formation of a larger scale structure associated with shear layer corrugation from heat release. Dynamic pressure measurements suggest that coherent flow perturbations existed inside the shear layer and that this flow became more chaotic as the flow advected downstream. Velocity and thermal variable values are listed in this report for a computational fluid dynamics (CFD) benchmark.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Xiaojun; School of Mathematics and Statistics, Tianshui Normal University, Tianshui 741001; Hong, Ling, E-mail: hongling@mail.xjtu.edu.cn
Global bifurcations include sudden changes in chaotic sets due to crises. There are three types of crises defined by Grebogi et al. [Physica D 7, 181 (1983)]: boundary crisis, interior crisis, and metamorphosis. In this paper, by means of the extended generalized cell mapping (EGCM), boundary and interior crises of a fractional-order Duffing system are studied as one of the system parameters or the fractional derivative order is varied. It is found that a crisis can be generally defined as a collision between a chaotic basic set and a basic set, either periodic or chaotic, to cause a sudden discontinuousmore » change in chaotic sets. Here chaotic sets involve three different kinds: a chaotic attractor, a chaotic saddle on a fractal basin boundary, and a chaotic saddle in the interior of a basin and disjoint from the attractor. A boundary crisis results from the collision of a periodic (or chaotic) attractor with a chaotic (or regular) saddle in the fractal (or smooth) boundary. In such a case, the attractor, together with its basin of attraction, is suddenly destroyed as the control parameter passes through a critical value, leaving behind a chaotic saddle in the place of the original attractor and saddle after the crisis. An interior crisis happens when an unstable chaotic set in the basin of attraction collides with a periodic attractor, which causes the appearance of a new chaotic attractor, while the original attractor and the unstable chaotic set are converted to the part of the chaotic attractor after the crisis. These results further demonstrate that the EGCM is a powerful tool to reveal the mechanism of crises in fractional-order systems.« less
NASA Astrophysics Data System (ADS)
Vaidyanathan, S.; Sambas, A.; Sukono; Mamat, M.; Gundara, G.; Mada Sanjaya, W. S.; Subiyanto
2018-03-01
A 3-D new chaotic attractor with two quadratic nonlinearities is proposed in this paper. The dynamical properties of the new chaotic system are described in terms of phase portraits, equilibrium points, Lyapunov exponents, Kaplan-Yorke dimension, dissipativity, etc. We show that the new chaotic system has three unstable equilibrium points. The new chaotic attractor is dissipative in nature. As an engineering application, adaptive synchronization of identical new chaotic attractors is designed via nonlinear control and Lyapunov stability theory. Furthermore, an electronic circuit realization of the new chaotic attractor is presented in detail to confirm the feasibility of the theoretical chaotic attractor model.
Breaking chaotic secure communication using a spectrogram
NASA Astrophysics Data System (ADS)
Yang, Tao; Yang, Lin-Bao; Yang, Chun-Mei
1998-10-01
We present the results of breaking a kind of chaotic secure communication system called chaotic switching scheme, also known as chaotic shift keying, in which a binary message signal is scrambled by two chaotic attractors. The spectrogram which can reveal the energy evolving process in the spectral-temporal space is used to distinguish the two different chaotic attractors, which are qualitatively and statistically similar in phase space. Then mathematical morphological filters are used to decode the binary message signal without the knowledge of the binary message signal and the transmitter. The computer experimental results are provided to show how our method works when both the chaotic and hyper-chaotic transmitter are used.
Hayasaki, Kimitake; Loeb, Abraham
2016-10-21
Galaxy mergers produce supermassive black hole binaries, which emit gravitational waves prior to their coalescence. We perform three-dimensional hydrodynamic simulations to study the tidal disruption of stars by such a binary in the final centuries of its life. We find that the gas stream of the stellar debris moves chaotically in the binary potential and forms accretion disks around both black holes. The accretion light curve is modulated over the binary orbital period owing to relativistic beaming. This periodic signal allows to detect the decay of the binary orbit due to gravitational wave emission by observing two tidal disruption events that are separated by more than a decade.
Hayasaki, Kimitake; Loeb, Abraham
2016-01-01
Galaxy mergers produce supermassive black hole binaries, which emit gravitational waves prior to their coalescence. We perform three-dimensional hydrodynamic simulations to study the tidal disruption of stars by such a binary in the final centuries of its life. We find that the gas stream of the stellar debris moves chaotically in the binary potential and forms accretion disks around both black holes. The accretion light curve is modulated over the binary orbital period owing to relativistic beaming. This periodic signal allows to detect the decay of the binary orbit due to gravitational wave emission by observing two tidal disruption events that are separated by more than a decade. PMID:27767188
Moody, K N; Hunter, S N; Childress, M J; Blob, R W; Schoenfuss, H L; Blum, M J; Ptacek, M B
2015-02-01
Environmental heterogeneity can promote the emergence of locally adapted phenotypes among subpopulations of a species, whereas gene flow can result in phenotypic and genotypic homogenization. For organisms like amphidromous fishes that change habitats during their life history, the balance between selection and migration can shift through ontogeny, making the likelihood of local adaptation difficult to predict. In Hawaiian waterfall-climbing gobies, it has been hypothesized that larval mixing during oceanic dispersal counters local adaptation to contrasting topographic features of streams, like slope gradient, that can select for predator avoidance or climbing ability in juvenile recruits. To test this hypothesis, we used morphological traits and neutral genetic markers to compare phenotypic and genotypic distributions in recruiting juveniles and adult subpopulations of the waterfall-climbing amphidromous goby, Sicyopterus stimpsoni, from the islands of Hawai'i and Kaua'i. We found that body shape is significantly different between adult subpopulations from streams with contrasting slopes and that trait divergence in recruiting juveniles tracked stream topography more so than morphological measures of adult subpopulation differentiation. Although no evidence of population genetic differentiation was observed among adult subpopulations, we observed low but significant levels of spatially and temporally variable genetic differentiation among juvenile cohorts, which correlated with morphological divergence. Such a pattern of genetic differentiation is consistent with chaotic genetic patchiness arising from variable sources of recruits to different streams. Thus, at least in S. stimpsoni, the combination of variation in settlement cohorts in space and time coupled with strong postsettlement selection on juveniles as they migrate upstream to adult habitats provides the opportunity for morphological adaptation to local stream environments despite high gene flow. © 2014 John Wiley & Sons Ltd.
Hybrid electronic/optical synchronized chaos communication system.
Toomey, J P; Kane, D M; Davidović, A; Huntington, E H
2009-04-27
A hybrid electronic/optical system for synchronizing a chaotic receiver to a chaotic transmitter has been demonstrated. The chaotic signal is generated electronically and injected, in addition to a constant bias current, to a semiconductor laser to produce an optical carrier for transmission. The optical chaotic carrier is photodetected to regenerate an electronic signal for synchronization in a matched electronic receiver The system has been successfully used for the transmission and recovery of a chaos masked message that is added to the chaotic optical carrier. Past demonstrations of synchronized chaos based, secure communication systems have used either an electronic chaotic carrier or an optical chaotic carrier (such as the chaotic output of various nonlinear laser systems). This is the first electronic/optical hybrid system to be demonstrated. We call this generation of a chaotic optical carrier by electronic injection.
Modulation for terrestrial broadcasting of digital HDTV
NASA Technical Reports Server (NTRS)
Kohn, Elliott S.
1991-01-01
The digital modulation methods used by the DigiCipher, DSC-HDTV, ADTV, and ATVA-P digital high-definition television (HDTV) systems are discussed. Three of the systems use a quadrature amplitude modulation method, and the fourth uses a vestigial sideband modulation method. The channel equalization and spectrum sharing of the digital HDTV systems is discussed.
College and Industry: Partners in the Handicapped Role (Cipher III).
ERIC Educational Resources Information Center
Katz, David; And Others
A project was designed and instituted to furnish a structure that would bring together three groups--potential employers, college personnel, and disabled people--to increase employment opportunities for the handicapped. During the third and final project year, representatives of all three groups met in workshops to discuss issues and concerns.…
Signatures and Popular Literacy in Early Seventeenth-Century Japan
ERIC Educational Resources Information Center
Rubinger, Richard
2006-01-01
My paper looks at "signatures" in the form of "ciphers" (kao) and other personal marks made on population registers, town rules, and apostasy oaths in the early seventeenth century to provide some empirical evidence of very high literacy among village leaders. The essay also argues, using the same data, that literacy had…
NASA Astrophysics Data System (ADS)
Rojali, Salman, Afan Galih; George
2017-08-01
Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or image quality that is approaching very good.
The role of the margins in ice stream dynamics
NASA Technical Reports Server (NTRS)
Echelmeyer, Keith; Harrison, William
1993-01-01
At first glance, it would appear that the bed of the active ice stream plays a much more important role in the overall force balance than do the margins, especially because the ratio of the half-width to depth for a typical ice stream is large (15:1 to 50:1). On the other hand, recent observations indicate that at least part of the ice stream is underlain by a layer of very weak till (shear strength about 2 kPa), and this weak basal layer would then imply that some or all of the resistive drag is transferred to the margins. In order to address this question, a detailed velocity profile near Upstream B Camp, which extends from the center of the ice stream, across the chaotic shear margin, and onto the Unicorn, which is part of the slow-moving ice sheet was measured. Comparison of this observed velocity profile with finite-element models of flow shows several interesting features. First, the shear stress at the margin is on the order of 130 kPa, while the mean value along the bed is about 15 kPa. Integration of these stresses along the boundaries indicates that the margins provide 40 to 50 percent, and the bed, 60 to 40 percent of the total resistive drag needed to balance the gravitational driving stress in this region. (The range of values represents calculations for different values of surface slope.) Second, the mean basal stress predicted by the models shows that the entire bed cannot be blanketed by the weak till observed beneath upstream B - instead there must be a distribution of weak till and 'sticky spots' (e.g., 85 percent till and 15 percent sticky spots of resistive stress equal to 100 kPa). If more of the bed were composed of weak till, then the modeled velocity would not match that observed. Third, the ice must exhibit an increasing enhancement factor as the margins are approached (E equals 10 in the chaotic zone), in keeping with laboratory measurements on ice under prolonged shear strain. Also, there is either a narrow zone of somewhat stiffer ice (E equals 5) outward of the shear margin, or the bed is frozen there. And last, the high shear stress and strain rate found at the margin are likely to cause significant viscous heating (q) in the marginal ice. The increase in temperature is proportional to qX/u, where X is the width of the shear zone and u is the transverse velocity component bringing cold ice in from the ice sheet outside the shear zone. Near upstream B, this heating is likely to cause an increase in temperature of 4 to 10 K. Plans are to measure this temperature increase in a series of bore holes near the margin during the 1992-93 field season, as well as to provide a more detailed description of the velocity field there.
The role of the margins in ice stream dynamics
NASA Astrophysics Data System (ADS)
Echelmeyer, Keith; Harrison, William
1993-07-01
At first glance, it would appear that the bed of the active ice stream plays a much more important role in the overall force balance than do the margins, especially because the ratio of the half-width to depth for a typical ice stream is large (15:1 to 50:1). On the other hand, recent observations indicate that at least part of the ice stream is underlain by a layer of very weak till (shear strength about 2 kPa), and this weak basal layer would then imply that some or all of the resistive drag is transferred to the margins. In order to address this question, a detailed velocity profile near Upstream B Camp, which extends from the center of the ice stream, across the chaotic shear margin, and onto the Unicorn, which is part of the slow-moving ice sheet was measured. Comparison of this observed velocity profile with finite-element models of flow shows several interesting features. First, the shear stress at the margin is on the order of 130 kPa, while the mean value along the bed is about 15 kPa. Integration of these stresses along the boundaries indicates that the margins provide 40 to 50 percent, and the bed, 60 to 40 percent of the total resistive drag needed to balance the gravitational driving stress in this region. (The range of values represents calculations for different values of surface slope.) Second, the mean basal stress predicted by the models shows that the entire bed cannot be blanketed by the weak till observed beneath upstream B - instead there must be a distribution of weak till and 'sticky spots' (e.g., 85 percent till and 15 percent sticky spots of resistive stress equal to 100 kPa). If more of the bed were composed of weak till, then the modeled velocity would not match that observed. Third, the ice must exhibit an increasing enhancement factor as the margins are approached (E equals 10 in the chaotic zone), in keeping with laboratory measurements on ice under prolonged shear strain. Also, there is either a narrow zone of somewhat stiffer ice (E equals 5) outward of the shear margin, or the bed is frozen there. And last, the high shear stress and strain rate found at the margin are likely to cause significant viscous heating (q) in the marginal ice. The increase in temperature is proportional to qX/u, where X is the width of the shear zone and u is the transverse velocity component bringing cold ice in from the ice sheet outside the shear zone. Near upstream B, this heating is likely to cause an increase in temperature of 4 to 10 K. Plans are to measure this temperature increase in a series of bore holes near the margin during the 1992-93 field season, as well as to provide a more detailed description of the velocity field there.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Saiki, Yoshitaka, E-mail: yoshi.saiki@r.hit-u.ac.jp; Yamada, Michio; Chian, Abraham C.-L.
The unstable periodic orbits (UPOs) embedded in a chaotic attractor after an attractor merging crisis (MC) are classified into three subsets, and employed to reconstruct chaotic saddles in the Kuramoto-Sivashinsky equation. It is shown that in the post-MC regime, the two chaotic saddles evolved from the two coexisting chaotic attractors before crisis can be reconstructed from the UPOs embedded in the pre-MC chaotic attractors. The reconstruction also involves the detection of the mediating UPO responsible for the crisis, and the UPOs created after crisis that fill the gap regions of the chaotic saddles. We show that the gap UPOs originatemore » from saddle-node, period-doubling, and pitchfork bifurcations inside the periodic windows in the post-MC chaotic region of the bifurcation diagram. The chaotic attractor in the post-MC regime is found to be the closure of gap UPOs.« less
Saiki, Yoshitaka; Yamada, Michio; Chian, Abraham C-L; Miranda, Rodrigo A; Rempel, Erico L
2015-10-01
The unstable periodic orbits (UPOs) embedded in a chaotic attractor after an attractor merging crisis (MC) are classified into three subsets, and employed to reconstruct chaotic saddles in the Kuramoto-Sivashinsky equation. It is shown that in the post-MC regime, the two chaotic saddles evolved from the two coexisting chaotic attractors before crisis can be reconstructed from the UPOs embedded in the pre-MC chaotic attractors. The reconstruction also involves the detection of the mediating UPO responsible for the crisis, and the UPOs created after crisis that fill the gap regions of the chaotic saddles. We show that the gap UPOs originate from saddle-node, period-doubling, and pitchfork bifurcations inside the periodic windows in the post-MC chaotic region of the bifurcation diagram. The chaotic attractor in the post-MC regime is found to be the closure of gap UPOs.
NASA Astrophysics Data System (ADS)
Chen, Jianjun; Duan, Yingni; Zhong, Zhuqiang
2018-06-01
A chaotic system is constructed on the basis of vertical-cavity surface-emitting lasers (VCSELs), where a slave VCSEL subject to chaotic optical injection (COI) from a master VCSEL with the external feedback. The complex degree (CD) and time-delay signature (TDS) of chaotic signals generated by this chaotic system are investigated numerically via permutation entropy (PE) and self-correlation function (SF) methods, respectively. The results show that, compared with master VCSEL subject to optical feedback, complex-enhanced chaotic signals with TDS suppression can be achieved for S-VCSEL subject to COI. Meanwhile, the influences of several controllable parameters on the evolution maps of CD of chaotic signals are carefully considered. It is shown that the CD of chaotic signals for S-VCSEL is always higher than that for M-VCSEL due to the CIO effect. The TDS of chaotic signals can be significantly suppressed by choosing the reasonable parameters in this system. Furthermore, TDS suppression and high CD chaos can be obtained simultaneously in the specific parameter ranges. The results confirm that this chaotic system may effectively improve the security of a chaos-based communication scheme.
NASA Astrophysics Data System (ADS)
Chen, Jianjun; Duan, Yingni; Zhong, Zhuqiang
2018-03-01
A chaotic system is constructed on the basis of vertical-cavity surface-emitting lasers (VCSELs), where a slave VCSEL subject to chaotic optical injection (COI) from a master VCSEL with the external feedback. The complex degree (CD) and time-delay signature (TDS) of chaotic signals generated by this chaotic system are investigated numerically via permutation entropy (PE) and self-correlation function (SF) methods, respectively. The results show that, compared with master VCSEL subject to optical feedback, complex-enhanced chaotic signals with TDS suppression can be achieved for S-VCSEL subject to COI. Meanwhile, the influences of several controllable parameters on the evolution maps of CD of chaotic signals are carefully considered. It is shown that the CD of chaotic signals for S-VCSEL is always higher than that for M-VCSEL due to the CIO effect. The TDS of chaotic signals can be significantly suppressed by choosing the reasonable parameters in this system. Furthermore, TDS suppression and high CD chaos can be obtained simultaneously in the specific parameter ranges. The results confirm that this chaotic system may effectively improve the security of a chaos-based communication scheme.
Chaos in driven Alfvén systems: unstable periodic orbits and chaotic saddles
NASA Astrophysics Data System (ADS)
Chian, A. C.-L.; Santana, W. M.; Rempel, E. L.; Borotto, F. A.; Hada, T.; Kamide, Y.
2007-01-01
The chaotic dynamics of Alfvén waves in space plasmas governed by the derivative nonlinear Schrödinger equation, in the low-dimensional limit described by stationary spatial solutions, is studied. A bifurcation diagram is constructed, by varying the driver amplitude, to identify a number of nonlinear dynamical processes including saddle-node bifurcation, boundary crisis, and interior crisis. The roles played by unstable periodic orbits and chaotic saddles in these transitions are analyzed, and the conversion from a chaotic saddle to a chaotic attractor in these dynamical processes is demonstrated. In particular, the phenomenon of gap-filling in the chaotic transition from weak chaos to strong chaos via an interior crisis is investigated. A coupling unstable periodic orbit created by an explosion, within the gaps of the chaotic saddles embedded in a chaotic attractor following an interior crisis, is found numerically. The gap-filling unstable periodic orbits are responsible for coupling the banded chaotic saddle (BCS) to the surrounding chaotic saddle (SCS), leading to crisis-induced intermittency. The physical relevance of chaos for Alfvén intermittent turbulence observed in the solar wind is discussed.
Ciphers and Currencies: Literacy Dilemmas and Shifting Knowledges.
ERIC Educational Resources Information Center
Kell, Catherine
2001-01-01
Provides an overview of issues in the literacy policy field from a social practices perspective. Outlines a central dilemma in both theory and practice in adult literacy work: that practice theory has not impacted on literacy policy in large parts of the world. Suggests there is an ever-widening gap between literacies of everyday life and the…
Secret Writing. Keys to the Mysteries of Reading and Writing.
ERIC Educational Resources Information Center
Sears, Peter
With a central theme of how people create a means to communicate reliably, and based on language-making exercises that touch students' imaginations, this book aims to interest students in language and how language is made. Since students like codes and ciphers, the book begins with secret writing, which is then used to reveal the foundation of…
Codes, Ciphers, and Cryptography--An Honors Colloquium
ERIC Educational Resources Information Center
Karls, Michael A.
2010-01-01
At the suggestion of a colleague, I read "The Code Book", [32], by Simon Singh to get a basic introduction to the RSA encryption scheme. Inspired by Singh's book, I designed a Ball State University Honors Colloquium in Mathematics for both majors and non-majors, with material coming from "The Code Book" and many other sources. This course became…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jung, Jinwoo; Lee, Jewon; Song, Hanjung
2011-03-15
This paper presents a fully integrated circuit implementation of an operational amplifier (op-amp) based chaotic neuron model with a bipolar output function, experimental measurements, and analyses of its chaotic behavior. The proposed chaotic neuron model integrated circuit consists of several op-amps, sample and hold circuits, a nonlinear function block for chaotic signal generation, a clock generator, a nonlinear output function, etc. Based on the HSPICE (circuit program) simulation results, approximated empirical equations for analyses were formulated. Then, the chaotic dynamical responses such as bifurcation diagrams, time series, and Lyapunov exponent were calculated using these empirical equations. In addition, we performedmore » simulations about two chaotic neuron systems with four synapses to confirm neural network connections and got normal behavior of the chaotic neuron such as internal state bifurcation diagram according to the synaptic weight variation. The proposed circuit was fabricated using a 0.8-{mu}m single poly complementary metal-oxide semiconductor technology. Measurements of the fabricated single chaotic neuron with {+-}2.5 V power supplies and a 10 kHz sampling clock frequency were carried out and compared with the simulated results.« less
Partially chaotic orbits in a perturbed cubic force model
NASA Astrophysics Data System (ADS)
Muzzio, J. C.
2017-11-01
Three types of orbits are theoretically possible in autonomous Hamiltonian systems with 3 degrees of freedom: fully chaotic (they only obey the energy integral), partially chaotic (they obey an additional isolating integral besides energy) and regular (they obey two isolating integrals besides energy). The existence of partially chaotic orbits has been denied by several authors, however, arguing either that there is a sudden transition from regularity to full chaoticity or that a long enough follow-up of a supposedly partially chaotic orbit would reveal a fully chaotic nature. This situation needs clarification, because partially chaotic orbits might play a significant role in the process of chaotic diffusion. Here we use numerically computed Lyapunov exponents to explore the phase space of a perturbed three-dimensional cubic force toy model, and a generalization of the Poincaré maps to show that partially chaotic orbits are actually present in that model. They turn out to be double orbits joined by a bifurcation zone, which is the most likely source of their chaos, and they are encapsulated in regions of phase space bounded by regular orbits similar to each one of the components of the double orbit.
NASA Astrophysics Data System (ADS)
Lien, C.-H.; Vaidyanathan, S.; Sambas, A.; Sukono; Mamat, M.; Sanjaya, W. S. M.; Subiyanto
2018-03-01
A 3-D new two-scroll chaotic attractor with three quadratic nonlinearities is investigated in this paper. First, the qualitative and dynamical properties of the new two-scroll chaotic system are described in terms of phase portraits, equilibrium points, Lyapunov exponents, Kaplan-Yorke dimension, dissipativity, etc. We show that the new two-scroll dissipative chaotic system has three unstable equilibrium points. As an engineering application, global chaos control of the new two-scroll chaotic system with unknown system parameters is designed via adaptive feedback control and Lyapunov stability theory. Furthermore, an electronic circuit realization of the new chaotic attractor is presented in detail to confirm the feasibility of the theoretical chaotic two-scroll attractor model.
A mixed analog/digital chaotic neuro-computer system for quadratic assignment problems.
Horio, Yoshihiko; Ikeguchi, Tohru; Aihara, Kazuyuki
2005-01-01
We construct a mixed analog/digital chaotic neuro-computer prototype system for quadratic assignment problems (QAPs). The QAP is one of the difficult NP-hard problems, and includes several real-world applications. Chaotic neural networks have been used to solve combinatorial optimization problems through chaotic search dynamics, which efficiently searches optimal or near optimal solutions. However, preliminary experiments have shown that, although it obtained good feasible solutions, the Hopfield-type chaotic neuro-computer hardware system could not obtain the optimal solution of the QAP. Therefore, in the present study, we improve the system performance by adopting a solution construction method, which constructs a feasible solution using the analog internal state values of the chaotic neurons at each iteration. In order to include the construction method into our hardware, we install a multi-channel analog-to-digital conversion system to observe the internal states of the chaotic neurons. We show experimentally that a great improvement in the system performance over the original Hopfield-type chaotic neuro-computer is obtained. That is, we obtain the optimal solution for the size-10 QAP in less than 1000 iterations. In addition, we propose a guideline for parameter tuning of the chaotic neuro-computer system according to the observation of the internal states of several chaotic neurons in the network.
Video encryption using chaotic masks in joint transform correlator
NASA Astrophysics Data System (ADS)
Saini, Nirmala; Sinha, Aloka
2015-03-01
A real-time optical video encryption technique using a chaotic map has been reported. In the proposed technique, each frame of video is encrypted using two different chaotic random phase masks in the joint transform correlator architecture. The different chaotic random phase masks can be obtained either by using different iteration levels or by using different seed values of the chaotic map. The use of different chaotic random phase masks makes the decryption process very complex for an unauthorized person. Optical, as well as digital, methods can be used for video encryption but the decryption is possible only digitally. To further enhance the security of the system, the key parameters of the chaotic map are encoded using RSA (Rivest-Shamir-Adleman) public key encryption. Numerical simulations are carried out to validate the proposed technique.
Visibility graphlet approach to chaotic time series
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mutua, Stephen; Computer Science Department, Masinde Muliro University of Science and Technology, P.O. Box 190-50100, Kakamega; Gu, Changgui, E-mail: gu-changgui@163.com, E-mail: hjyang@ustc.edu.cn
Many novel methods have been proposed for mapping time series into complex networks. Although some dynamical behaviors can be effectively captured by existing approaches, the preservation and tracking of the temporal behaviors of a chaotic system remains an open problem. In this work, we extended the visibility graphlet approach to investigate both discrete and continuous chaotic time series. We applied visibility graphlets to capture the reconstructed local states, so that each is treated as a node and tracked downstream to create a temporal chain link. Our empirical findings show that the approach accurately captures the dynamical properties of chaotic systems.more » Networks constructed from periodic dynamic phases all converge to regular networks and to unique network structures for each model in the chaotic zones. Furthermore, our results show that the characterization of chaotic and non-chaotic zones in the Lorenz system corresponds to the maximal Lyapunov exponent, thus providing a simple and straightforward way to analyze chaotic systems.« less
ERIC Educational Resources Information Center
Kynard, Carmen
2010-01-01
In this article, Carmen Kynard provides a window into a present-day "hush harbor," a site where a group of black women build generative virtual spaces for counterstories that fight institutional racism. Hidden in plain view, these intentional communities have historically allowed African American participants to share and create knowledge and find…
Hybrid Cryptosystem Using Tiny Encryption Algorithm and LUC Algorithm
NASA Astrophysics Data System (ADS)
Rachmawati, Dian; Sharif, Amer; Jaysilen; Andri Budiman, Mohammad
2018-01-01
Security becomes a very important issue in data transmission and there are so many methods to make files more secure. One of that method is cryptography. Cryptography is a method to secure file by writing the hidden code to cover the original file. Therefore, if the people do not involve in cryptography, they cannot decrypt the hidden code to read the original file. There are many methods are used in cryptography, one of that method is hybrid cryptosystem. A hybrid cryptosystem is a method that uses a symmetric algorithm to secure the file and use an asymmetric algorithm to secure the symmetric algorithm key. In this research, TEA algorithm is used as symmetric algorithm and LUC algorithm is used as an asymmetric algorithm. The system is tested by encrypting and decrypting the file by using TEA algorithm and using LUC algorithm to encrypt and decrypt the TEA key. The result of this research is by using TEA Algorithm to encrypt the file, the cipher text form is the character from ASCII (American Standard for Information Interchange) table in the form of hexadecimal numbers and the cipher text size increase by sixteen bytes as the plaintext length is increased by eight characters.
NASA Astrophysics Data System (ADS)
Rachmawati, D.; Budiman, M. A.; Siburian, W. S. E.
2018-05-01
On the process of exchanging files, security is indispensable to avoid the theft of data. Cryptography is one of the sciences used to secure the data by way of encoding. Fast Data Encipherment Algorithm (FEAL) is a block cipher symmetric cryptographic algorithms. Therefore, the file which wants to protect is encrypted and decrypted using the algorithm FEAL. To optimize the security of the data, session key that is utilized in the algorithm FEAL encoded with the Goldwasser-Micali algorithm, which is an asymmetric cryptographic algorithm and using probabilistic concept. In the encryption process, the key was converted into binary form. The selection of values of x that randomly causes the results of the cipher key is different for each binary value. The concept of symmetry and asymmetry algorithm merger called Hybrid Cryptosystem. The use of the algorithm FEAL and Goldwasser-Micali can restore the message to its original form and the algorithm FEAL time required for encryption and decryption is directly proportional to the length of the message. However, on Goldwasser- Micali algorithm, the length of the message is not directly proportional to the time of encryption and decryption.
Guo, Ping; Wang, Jin; Ji, Sai; Geng, Xue Hua; Xiong, Neal N
2015-12-01
With the pervasiveness of smart phones and the advance of wireless body sensor network (BSN), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving framework combining with multilevel trust management. In our scheme, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive PHI (personal health information) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient lightweight encryption for those users whose trust level is low, which is based on mix cipher algorithms and pair of plain text and cipher texts, and allow a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis and simulations show that the proposed framework can efficiently achieve user-centric privacy protection in m-Healthcare system.
Jiao, Haisong; Pu, Tao; Zheng, Jilin; Xiang, Peng; Fang, Tao
2017-05-15
The physical-layer security of a quantum-noise randomized cipher (QNRC) system is, for the first time, quantitatively evaluated with secrecy capacity employed as the performance metric. Considering quantum noise as a channel advantage for legitimate parties over eavesdroppers, the specific wire-tap models for both channels of the key and data are built with channel outputs yielded by quantum heterodyne measurement; the general expressions of secrecy capacities for both channels are derived, where the matching codes are proved to be uniformly distributed. The maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. The influences of various system parameters on secrecy capacities are assessed in detail. The results indicate that QNRC combined with proper channel codes is a promising framework of secure communication for long distance with high speed, which can be orders of magnitude higher than the perfect secrecy rates of other encryption systems. Even if the eavesdropper intercepts more signal power than the legitimate receiver, secure communication (up to Gb/s) can still be achievable. Moreover, the secrecy of running key is found to be the main constraint to the systemic maximal secrecy rate.
Brendel, Benjamin
2017-09-01
This article analyzes the modernization campaigns in Egypt in the 1960s and early 1970s. The regulation of the Nile by the Aswan High Dam and the resulting irrigation projects caused the rate of schistosomiasis infestation in the population to rise. The result was a discourse between experts from the global north and Egyptian elites about modernization, development aid, dam building and health care. The fight against schistosomiasis was like a cipher, which combined different power-laden concepts and arguments. This article will decode the cipher and allow a deeper look into the contemporary dimensions of power bound to this subject. The text is conceived around three thematic axes. The first deals with the discursive interplay of modernization, health and development aid in and for Egypt. The second focuses on far-reaching and long-standing arguments within an international expert discourse about these concepts. Finally, the third presents an exemplary case study of West German health and development aid for fighting schistosomiasis in the Egyptian Fayoum oasis.
Physical-layer security analysis of PSK quantum-noise randomized cipher in optically amplified links
NASA Astrophysics Data System (ADS)
Jiao, Haisong; Pu, Tao; Xiang, Peng; Zheng, Jilin; Fang, Tao; Zhu, Huatao
2017-08-01
The quantitative security of quantum-noise randomized cipher (QNRC) in optically amplified links is analyzed from the perspective of physical-layer advantage. Establishing the wire-tap channel models for both key and data, we derive the general expressions of secrecy capacities for the key against ciphertext-only attack and known-plaintext attack, and that for the data, which serve as the basic performance metrics. Further, the maximal achievable secrecy rate of the system is proposed, under which secrecy of both the key and data is guaranteed. Based on the same framework, the secrecy capacities of various cases can be assessed and compared. The results indicate perfect secrecy is potentially achievable for data transmission, and an elementary principle of setting proper number of photons and bases is given to ensure the maximal data secrecy capacity. But the key security is asymptotically perfect, which tends to be the main constraint of systemic maximal secrecy rate. Moreover, by adopting cascaded optical amplification, QNRC can realize long-haul transmission with secure rate up to Gb/s, which is orders of magnitude higher than the perfect secrecy rates of other encryption systems.
Enhanced K-means clustering with encryption on cloud
NASA Astrophysics Data System (ADS)
Singh, Iqjot; Dwivedi, Prerna; Gupta, Taru; Shynu, P. G.
2017-11-01
This paper tries to solve the problem of storing and managing big files over cloud by implementing hashing on Hadoop in big-data and ensure security while uploading and downloading files. Cloud computing is a term that emphasis on sharing data and facilitates to share infrastructure and resources.[10] Hadoop is an open source software that gives us access to store and manage big files according to our needs on cloud. K-means clustering algorithm is an algorithm used to calculate distance between the centroid of the cluster and the data points. Hashing is a algorithm in which we are storing and retrieving data with hash keys. The hashing algorithm is called as hash function which is used to portray the original data and later to fetch the data stored at the specific key. [17] Encryption is a process to transform electronic data into non readable form known as cipher text. Decryption is the opposite process of encryption, it transforms the cipher text into plain text that the end user can read and understand well. For encryption and decryption we are using Symmetric key cryptographic algorithm. In symmetric key cryptography are using DES algorithm for a secure storage of the files. [3
A novel double-convection chaotic attractor, its adaptive control and circuit simulation
NASA Astrophysics Data System (ADS)
Mamat, M.; Vaidyanathan, S.; Sambas, A.; Mujiarto; Sanjaya, W. S. M.; Subiyanto
2018-03-01
A 3-D novel double-convection chaotic system with three nonlinearities is proposed in this research work. The dynamical properties of the new chaotic system are described in terms of phase portraits, Lyapunov exponents, Kaplan-Yorke dimension, dissipativity, stability analysis of equilibria, etc. Adaptive control and synchronization of the new chaotic system with unknown parameters are achieved via nonlinear controllers and the results are established using Lyapunov stability theory. Furthermore, an electronic circuit realization of the new 3-D novel chaotic system is presented in detail. Finally, the circuit experimental results of the 3-D novel chaotic attractor show agreement with the numerical simulations.
Finite Larmor radius effects on weak turbulence transport
NASA Astrophysics Data System (ADS)
Kryukov, N.; Martinell, J. J.
2018-06-01
Transport of test particles in two-dimensional weak turbulence with waves propagating along the poloidal direction is studied using a reduced model. Finite Larmor radius (FLR) effects are included by gyroaveraging over one particle orbit. For low wave amplitudes the motion is mostly regular with particles trapped in the potential wells. As the amplitude increases the trajectories become chaotic and the Larmor radius modifies the orbits. For a thermal distribution of Finite Larmor radii the particle distribution function (PDF) is Gaussian for small th$ (thermal gyroradius) but becomes non-Gaussian for large th$ . However, the time scaling of transport is diffusive, as characterized by a linear dependence of the variance of the PDF with time. An explanation for this behaviour is presented that provides an expression for an effective diffusion coefficient and reproduces the numerical results for large wave amplitudes which implies generalized chaos. When a shear flow is added in the direction of wave propagation, a modified model is obtained that produces free-streaming particle trajectories in addition to trapped ones; these contribute to ballistic transport for low wave amplitude but produce super-ballistic transport in the chaotic regime. As in the previous case, the PDF is Gaussian for low th$ becoming non-Gaussian as it increases. The perpendicular transport presents the same behaviour as in the case with no flow but the diffusion is faster in the presence of the flow.
Characterizing chaotic melodies in automatic music composition
NASA Astrophysics Data System (ADS)
Coca, Andrés E.; Tost, Gerard O.; Zhao, Liang
2010-09-01
In this paper, we initially present an algorithm for automatic composition of melodies using chaotic dynamical systems. Afterward, we characterize chaotic music in a comprehensive way as comprising three perspectives: musical discrimination, dynamical influence on musical features, and musical perception. With respect to the first perspective, the coherence between generated chaotic melodies (continuous as well as discrete chaotic melodies) and a set of classical reference melodies is characterized by statistical descriptors and melodic measures. The significant differences among the three types of melodies are determined by discriminant analysis. Regarding the second perspective, the influence of dynamical features of chaotic attractors, e.g., Lyapunov exponent, Hurst coefficient, and correlation dimension, on melodic features is determined by canonical correlation analysis. The last perspective is related to perception of originality, complexity, and degree of melodiousness (Euler's gradus suavitatis) of chaotic and classical melodies by nonparametric statistical tests.
Stages of chaotic synchronization.
Tang, D. Y.; Dykstra, R.; Hamilton, M. W.; Heckenberg, N. R.
1998-09-01
In an experimental investigation of the response of a chaotic system to a chaotic driving force, we have observed synchronization of chaos of the response system in the forms of generalized synchronization, phase synchronization, and lag synchronization to the driving signal. In this paper we compare the features of these forms of synchronized chaos and study their relations and physical origins. We found that different forms of chaotic synchronization could be interpreted as different stages of nonlinear interaction between the coupled chaotic systems. (c) 1998 American Institute of Physics.
Chaotic Stochasticity: A Ubiquitous Source of Unpredictability in Epidemics
NASA Astrophysics Data System (ADS)
Rand, D. A.; Wilson, H. B.
1991-11-01
We address the question of whether or not childhood epidemics such as measles and chickenpox are chaotic, and argue that the best explanation of the observed unpredictability is that it is a manifestation of what we call chaotic stochasticity. Such chaos is driven and made permanent by the fluctuations from the mean field encountered in epidemics, or by extrinsic stochastic noise, and is dependent upon the existence of chaotic repellors in the mean field dynamics. Its existence is also a consequence of the near extinctions in the epidemic. For such systems, chaotic stochasticity is likely to be far more ubiquitous than the presence of deterministic chaotic attractors. It is likely to be a common phenomenon in biological dynamics.
NASA Technical Reports Server (NTRS)
Scargle, Jeffrey D.
1990-01-01
While chaos arises only in nonlinear systems, standard linear time series models are nevertheless useful for analyzing data from chaotic processes. This paper introduces such a model, the chaotic moving average. This time-domain model is based on the theorem that any chaotic process can be represented as the convolution of a linear filter with an uncorrelated process called the chaotic innovation. A technique, minimum phase-volume deconvolution, is introduced to estimate the filter and innovation. The algorithm measures the quality of a model using the volume covered by the phase-portrait of the innovation process. Experiments on synthetic data demonstrate that the algorithm accurately recovers the parameters of simple chaotic processes. Though tailored for chaos, the algorithm can detect both chaos and randomness, distinguish them from each other, and separate them if both are present. It can also recover nonminimum-delay pulse shapes in non-Gaussian processes, both random and chaotic.
NASA Astrophysics Data System (ADS)
Sun, Changchun; Chen, Zhongtang; Xu, Qicheng
2017-12-01
An original three-dimensional (3D) smooth continuous chaotic system and its mirror-image system with eight common parameters are constructed and a pair of symmetric chaotic attractors can be generated simultaneously. Basic dynamical behaviors of two 3D chaotic systems are investigated respectively. A double-scroll chaotic attractor by connecting the pair of mutual mirror-image attractors is generated via a novel planar switching control approach. Chaos can also be controlled to a fixed point, a periodic orbit and a divergent orbit respectively by switching between two chaotic systems. Finally, an equivalent 3D chaotic system by combining two 3D chaotic systems with a switching law is designed by utilizing a sign function. Two circuit diagrams for realizing the double-scroll attractor are depicted by employing an improved module-based design approach.
NASA Astrophysics Data System (ADS)
Vaidyanathan, S.; Akgul, A.; Kaçar, S.; Çavuşoğlu, U.
2018-02-01
Hyperjerk systems have received significant interest in the literature because of their simple structure and complex dynamical properties. This work presents a new chaotic hyperjerk system having two exponential nonlinearities. Dynamical properties of the chaotic hyperjerk system are discovered through equilibrium point analysis, bifurcation diagram, dissipativity and Lyapunov exponents. Moreover, an adaptive backstepping controller is designed for the synchronization of the chaotic hyperjerk system. Also, a real circuit of the chaotic hyperjerk system has been carried out to show the feasibility of the theoretical hyperjerk model. The chaotic hyperjerk system can also be useful in scientific fields such as Random Number Generators (RNGs), data security, data hiding, etc. In this work, three implementations of the chaotic hyperjerk system, viz. RNG, image encryption and sound steganography have been performed by using complex dynamics characteristics of the system.
Chaotic Signal Denoising Based on Hierarchical Threshold Synchrosqueezed Wavelet Transform
NASA Astrophysics Data System (ADS)
Wang, Wen-Bo; Jing, Yun-yu; Zhao, Yan-chao; Zhang, Lian-Hua; Wang, Xiang-Li
2017-12-01
In order to overcoming the shortcoming of single threshold synchrosqueezed wavelet transform(SWT) denoising method, an adaptive hierarchical threshold SWT chaotic signal denoising method is proposed. Firstly, a new SWT threshold function is constructed based on Stein unbiased risk estimation, which is two order continuous derivable. Then, by using of the new threshold function, a threshold process based on the minimum mean square error was implemented, and the optimal estimation value of each layer threshold in SWT chaotic denoising is obtained. The experimental results of the simulating chaotic signal and measured sunspot signals show that, the proposed method can filter the noise of chaotic signal well, and the intrinsic chaotic characteristic of the original signal can be recovered very well. Compared with the EEMD denoising method and the single threshold SWT denoising method, the proposed method can obtain better denoising result for the chaotic signal.
Dynamics, Analysis and Implementation of a Multiscroll Memristor-Based Chaotic Circuit
NASA Astrophysics Data System (ADS)
Alombah, N. Henry; Fotsin, Hilaire; Ngouonkadi, E. B. Megam; Nguazon, Tekou
This article introduces a novel four-dimensional autonomous multiscroll chaotic circuit which is derived from the actual simplest memristor-based chaotic circuit. A fourth circuit element — another inductor — is introduced to generate the complex behavior observed. A systematic study of the chaotic behavior is performed with the help of some nonlinear tools such as Lyapunov exponents, phase portraits, and bifurcation diagrams. Multiple scroll attractors are observed in Matlab, Pspice environments and also experimentally. We also observe the phenomenon of antimonotonicity, periodic and chaotic bubbles, multiple periodic-doubling bifurcations, Hopf bifurcations, crises and the phenomenon of intermittency. The chaotic dynamics of this circuit is realized by laboratory experiments, Pspice simulations, numerical and analytical investigations. It is observed that the results from the three environments agree to a great extent. This topology is likely convenient to be used to intentionally generate chaos in memristor-based chaotic circuit applications, given the fact that multiscroll chaotic systems have found important applications as broadband signal generators, pseudorandom number generators for communication engineering and also in biometric authentication.
2015-01-01
We present and discuss philosophy and methodology of chaotic evolution that is theoretically supported by chaos theory. We introduce four chaotic systems, that is, logistic map, tent map, Gaussian map, and Hénon map, in a well-designed chaotic evolution algorithm framework to implement several chaotic evolution (CE) algorithms. By comparing our previous proposed CE algorithm with logistic map and two canonical differential evolution (DE) algorithms, we analyse and discuss optimization performance of CE algorithm. An investigation on the relationship between optimization capability of CE algorithm and distribution characteristic of chaotic system is conducted and analysed. From evaluation result, we find that distribution of chaotic system is an essential factor to influence optimization performance of CE algorithm. We propose a new interactive EC (IEC) algorithm, interactive chaotic evolution (ICE) that replaces fitness function with a real human in CE algorithm framework. There is a paired comparison-based mechanism behind CE search scheme in nature. A simulation experimental evaluation is conducted with a pseudo-IEC user to evaluate our proposed ICE algorithm. The evaluation result indicates that ICE algorithm can obtain a significant better performance than or the same performance as interactive DE. Some open topics on CE, ICE, fusion of these optimization techniques, algorithmic notation, and others are presented and discussed. PMID:25879067
Pei, Yan
2015-01-01
We present and discuss philosophy and methodology of chaotic evolution that is theoretically supported by chaos theory. We introduce four chaotic systems, that is, logistic map, tent map, Gaussian map, and Hénon map, in a well-designed chaotic evolution algorithm framework to implement several chaotic evolution (CE) algorithms. By comparing our previous proposed CE algorithm with logistic map and two canonical differential evolution (DE) algorithms, we analyse and discuss optimization performance of CE algorithm. An investigation on the relationship between optimization capability of CE algorithm and distribution characteristic of chaotic system is conducted and analysed. From evaluation result, we find that distribution of chaotic system is an essential factor to influence optimization performance of CE algorithm. We propose a new interactive EC (IEC) algorithm, interactive chaotic evolution (ICE) that replaces fitness function with a real human in CE algorithm framework. There is a paired comparison-based mechanism behind CE search scheme in nature. A simulation experimental evaluation is conducted with a pseudo-IEC user to evaluate our proposed ICE algorithm. The evaluation result indicates that ICE algorithm can obtain a significant better performance than or the same performance as interactive DE. Some open topics on CE, ICE, fusion of these optimization techniques, algorithmic notation, and others are presented and discussed.
Cryptanalysis of the Sodark Family of Cipher Algorithms
2017-09-01
software project for building three-bit LUT circuit representations of S- boxes is available as a GitHub repository [40]. It contains several improvements...DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release. Distribution is unlimited. 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) The...second- and third-generation automatic link establishment (ALE) systems for high frequency radios. Radios utilizing ALE technology are in use by a
Exploitation of Unintentional Information Leakage from Integrated Circuits
2011-12-01
U.S. Defense Science Board Task Force examined the effects and risks of outsourcing high performance microchip production to foreign countries [Off05...mapping methodology is developed and demon- strated to comprehensively assess the information leakage of arbitrary block cipher implementations. The...engineering poses a serious threat since it can en- able competitors or adversaries to bypass years of research and development through counterfeiting or
Information encoder/decoder using chaotic systems
Miller, Samuel Lee; Miller, William Michael; McWhorter, Paul Jackson
1997-01-01
The present invention discloses a chaotic system-based information encoder and decoder that operates according to a relationship defining a chaotic system. Encoder input signals modify the dynamics of the chaotic system comprising the encoder. The modifications result in chaotic, encoder output signals that contain the encoder input signals encoded within them. The encoder output signals are then capable of secure transmissions using conventional transmission techniques. A decoder receives the encoder output signals (i.e., decoder input signals) and inverts the dynamics of the encoding system to directly reconstruct the original encoder input signals.
Information encoder/decoder using chaotic systems
Miller, S.L.; Miller, W.M.; McWhorter, P.J.
1997-10-21
The present invention discloses a chaotic system-based information encoder and decoder that operates according to a relationship defining a chaotic system. Encoder input signals modify the dynamics of the chaotic system comprising the encoder. The modifications result in chaotic, encoder output signals that contain the encoder input signals encoded within them. The encoder output signals are then capable of secure transmissions using conventional transmission techniques. A decoder receives the encoder output signals (i.e., decoder input signals) and inverts the dynamics of the encoding system to directly reconstruct the original encoder input signals. 32 figs.
Using Chaotic System in Encryption
NASA Astrophysics Data System (ADS)
Findik, Oğuz; Kahramanli, Şirzat
In this paper chaotic systems and RSA encryption algorithm are combined in order to develop an encryption algorithm which accomplishes the modern standards. E.Lorenz's weather forecast' equations which are used to simulate non-linear systems are utilized to create chaotic map. This equation can be used to generate random numbers. In order to achieve up-to-date standards and use online and offline status, a new encryption technique that combines chaotic systems and RSA encryption algorithm has been developed. The combination of RSA algorithm and chaotic systems makes encryption system.
Design and Hardware Implementation of a New Chaotic Secure Communication Technique
Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag
2016-01-01
In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness. PMID:27548385
Design and Hardware Implementation of a New Chaotic Secure Communication Technique.
Xiong, Li; Lu, Yan-Jun; Zhang, Yong-Fang; Zhang, Xin-Guo; Gupta, Parag
2016-01-01
In this paper, a scheme for chaotic modulation secure communication is proposed based on chaotic synchronization of an improved Lorenz system. For the first time, the intensity limit and stability of the transmitted signal, the characteristics of broadband and the requirements for accuracy of electronic components are presented by Multisim simulation. In addition, some improvements are made on the measurement method and the proposed experimental circuit in order to facilitate the experiments of chaotic synchronization, chaotic non-synchronization, experiment without signal and experiment with signal. To illustrate the effectiveness of the proposed scheme, some numerical simulations are presented. Then, the proposed chaotic secure communication circuit is implemented through analog electronic circuit, which is characterized by its high accuracy and good robustness.
Reducing the Dynamical Degradation by Bi-Coupling Digital Chaotic Maps
NASA Astrophysics Data System (ADS)
Liu, Lingfeng; Liu, Bocheng; Hu, Hanping; Miao, Suoxia
A chaotic map which is realized on a computer will suffer dynamical degradation. Here, a coupled chaotic model is proposed to reduce the dynamical degradation. In this model, the state variable of one digital chaotic map is used to control the parameter of the other digital map. This coupled model is universal and can be used for all chaotic maps. In this paper, two coupled models (one is coupled by two logistic maps, the other is coupled by Chebyshev map and Baker map) are performed, and the numerical experiments show that the performances of these two coupled chaotic maps are greatly improved. Furthermore, a simple pseudorandom bit generator (PRBG) based on coupled digital logistic maps is proposed as an application for our method.
NASA Astrophysics Data System (ADS)
de Oliveira, G. L.; Ramos, R. V.
2018-03-01
In this work, it is presented an optical scheme for quantum key distribution employing two synchronized optoelectronic oscillators (OEO) working in the chaotic regime. The produced key depends on the chaotic dynamic, and the synchronization between Alice's and Bob's OEOs uses quantum states. An attack on the synchronization signals will disturb the synchronization of the chaotic systems increasing the error rate in the final key.
Synchronization transition in neuronal networks composed of chaotic or non-chaotic oscillators.
Xu, Kesheng; Maidana, Jean Paul; Castro, Samy; Orio, Patricio
2018-05-30
Chaotic dynamics has been shown in the dynamics of neurons and neural networks, in experimental data and numerical simulations. Theoretical studies have proposed an underlying role of chaos in neural systems. Nevertheless, whether chaotic neural oscillators make a significant contribution to network behaviour and whether the dynamical richness of neural networks is sensitive to the dynamics of isolated neurons, still remain open questions. We investigated synchronization transitions in heterogeneous neural networks of neurons connected by electrical coupling in a small world topology. The nodes in our model are oscillatory neurons that - when isolated - can exhibit either chaotic or non-chaotic behaviour, depending on conductance parameters. We found that the heterogeneity of firing rates and firing patterns make a greater contribution than chaos to the steepness of the synchronization transition curve. We also show that chaotic dynamics of the isolated neurons do not always make a visible difference in the transition to full synchrony. Moreover, macroscopic chaos is observed regardless of the dynamics nature of the neurons. However, performing a Functional Connectivity Dynamics analysis, we show that chaotic nodes can promote what is known as multi-stable behaviour, where the network dynamically switches between a number of different semi-synchronized, metastable states.
Chimera states in coupled Kuramoto oscillators with inertia.
Olmi, Simona
2015-12-01
The dynamics of two symmetrically coupled populations of rotators is studied for different values of the inertia. The system is characterized by different types of solutions, which all coexist with the fully synchronized state. At small inertia, the system is no more chaotic and one observes mainly quasi-periodic chimeras, while the usual (stationary) chimera state is not anymore observable. At large inertia, one observes two different kind of chaotic solutions with broken symmetry: the intermittent chaotic chimera, characterized by a synchronized population and a population displaying a turbulent behaviour, and a second state where the two populations are both chaotic but whose dynamics adhere to two different macroscopic attractors. The intermittent chaotic chimeras are characterized by a finite life-time, whose duration increases as a power-law with the system size and the inertia value. Moreover, the chaotic population exhibits clear intermittent behavior, displaying a laminar phase where the two populations tend to synchronize, and a turbulent phase where the macroscopic motion of one population is definitely erratic. In the thermodynamic limit, these states survive for infinite time and the laminar regimes tends to disappear, thus giving rise to stationary chaotic solutions with broken symmetry contrary to what observed for chaotic chimeras on a ring geometry.
NASA Astrophysics Data System (ADS)
Lu, Jia; Zhang, Xiaoxing; Xiong, Hao
The chaotic van der Pol oscillator is a powerful tool for detecting defects in electric systems by using online partial discharge (PD) monitoring. This paper focuses on realizing weak PD signal detection in the strong periodic narrowband interference by using high sensitivity to the periodic narrowband interference signals and immunity to white noise and PD signals of chaotic systems. A new approach to removing the periodic narrowband interference by using a van der Pol chaotic oscillator is described by analyzing the motion characteristic of the chaotic oscillator on the basis of the van der Pol equation. Furthermore, the Floquet index for measuring the amplitude of periodic narrowband signals is redefined. The denoising signal processed by the chaotic van der Pol oscillators is further processed by wavelet analysis. Finally, the denoising results verify that the periodic narrowband and white noise interference can be removed efficiently by combining the theory of the chaotic van der Pol oscillator and wavelet analysis.
Analysis, synchronisation and circuit design of a new highly nonlinear chaotic system
NASA Astrophysics Data System (ADS)
Mobayen, Saleh; Kingni, Sifeu Takougang; Pham, Viet-Thanh; Nazarimehr, Fahimeh; Jafari, Sajad
2018-02-01
This paper investigates a three-dimensional autonomous chaotic flow without linear terms. Dynamical behaviour of the proposed system is investigated through eigenvalue structures, phase portraits, bifurcation diagram, Lyapunov exponents and basin of attraction. For a suitable choice of the parameters, the proposed system can exhibit anti-monotonicity, periodic oscillations and double-scroll chaotic attractor. Basin of attraction of the proposed system shows that the chaotic attractor is self-excited. Furthermore, feasibility of double-scroll chaotic attractor in the real word is investigated by using the OrCAD-PSpice software via an electronic implementation of the proposed system. A good qualitative agreement is illustrated between the numerical simulations and the OrCAD-PSpice results. Finally, a finite-time control method based on dynamic sliding surface for the synchronisation of master and slave chaotic systems in the presence of external disturbances is performed. Using the suggested control technique, the superior master-slave synchronisation is attained. Illustrative simulation results on the studied chaotic system are presented to indicate the effectiveness of the suggested scheme.
Dynamics and circuit of a chaotic system with a curve of equilibrium points
NASA Astrophysics Data System (ADS)
Pham, Viet-Thanh; Volos, Christos; Kapitaniak, Tomasz; Jafari, Sajad; Wang, Xiong
2018-03-01
Although chaotic systems have been intensively studied since the 1960s, new systems with mysterious features are still of interest. A novel chaotic system including hyperbolic functions is proposed in this work. Especially, the system has an infinite number of equilibrium points. Dynamics of the system are investigated by using non-linear tools such as phase portrait, bifurcation diagram, and Lyapunov exponent. It is interesting that the system can display coexisting chaotic attractors. An electronic circuit for realising the chaotic system has been implemented. Experimental results show a good agreement with theoretical ones.
Computations of Chaotic Flows in Micromixers
2006-04-07
Naval Research Laboratory Washington, DC 20375-5320 NRL/MR/6410--06-8948 Computations of Chaotic Flows in Micromixers April 7, 2006 Approved for...PAGES 17. LIMITATION OF ABSTRACT Computations of Chaotic Flows in Micromixers Carolyn R. Kaplan, Junhui Liu, David R. Mott, and Elaine S. Oran NRL/MR...striations form in time 1 _______________ Manuscript approved December 8, 2005. COMPUTATIONS OF CHAOTIC FLOWS IN MICROMIXERS or distance. Sometimes it is
Performance of Multi-chaotic PSO on a shifted benchmark functions set
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pluhacek, Michal; Senkerik, Roman; Zelinka, Ivan
2015-03-10
In this paper the performance of Multi-chaotic PSO algorithm is investigated using two shifted benchmark functions. The purpose of shifted benchmark functions is to simulate the time-variant real-world problems. The results of chaotic PSO are compared with canonical version of the algorithm. It is concluded that using the multi-chaotic approach can lead to better results in optimization of shifted functions.
Nonlinear optimal control for the synchronization of chaotic and hyperchaotic finance systems
NASA Astrophysics Data System (ADS)
Rigatos, G.; Siano, P.; Loia, V.; Ademi, S.; Ghosh, T.
2017-11-01
It is possible to make specific finance systems get synchronized to other finance systems exhibiting chaotic and hyperchaotic dynamics, by applying nonlinear optimal (H-infinity) control. This signifies that chaotic behavior can be generated in finance systems by exerting a suitable control input. Actually, a lead financial system is considered which exhibits inherently chaotic dynamics. Moreover, a follower finance system is introduced having parameters in its model that inherently prohibit the appearance of chaotic dynamics. Through the application of a suitable nonlinear optimal (H-infinity) control input it is proven that the follower finance system can replicate the chaotic dynamics of the lead finance system. By applying Lyapunov analysis it is proven that asymptotically the follower finance system gets synchronized with the lead system and that the tracking error between the state variables of the two systems vanishes.
Least Squares Shadowing Sensitivity Analysis of Chaotic Flow Around a Two-Dimensional Airfoil
NASA Technical Reports Server (NTRS)
Blonigan, Patrick J.; Wang, Qiqi; Nielsen, Eric J.; Diskin, Boris
2016-01-01
Gradient-based sensitivity analysis has proven to be an enabling technology for many applications, including design of aerospace vehicles. However, conventional sensitivity analysis methods break down when applied to long-time averages of chaotic systems. This breakdown is a serious limitation because many aerospace applications involve physical phenomena that exhibit chaotic dynamics, most notably high-resolution large-eddy and direct numerical simulations of turbulent aerodynamic flows. A recently proposed methodology, Least Squares Shadowing (LSS), avoids this breakdown and advances the state of the art in sensitivity analysis for chaotic flows. The first application of LSS to a chaotic flow simulated with a large-scale computational fluid dynamics solver is presented. The LSS sensitivity computed for this chaotic flow is verified and shown to be accurate, but the computational cost of the current LSS implementation is high.
NASA Astrophysics Data System (ADS)
Kiani-B, Arman; Fallahi, Kia; Pariz, Naser; Leung, Henry
2009-03-01
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. In this paper, for the first time, a fractional chaotic communication method using an extended fractional Kalman filter is presented. The chaotic synchronization is implemented by the EFKF design in the presence of channel additive noise and processing noise. Encoding chaotic communication achieves a satisfactory, typical secure communication scheme. In the proposed system, security is enhanced based on spreading the signal in frequency and encrypting it in time domain. In this paper, the main advantages of using fractional order systems, increasing nonlinearity and spreading the power spectrum are highlighted. To illustrate the effectiveness of the proposed scheme, a numerical example based on the fractional Lorenz dynamical system is presented and the results are compared to the integer Lorenz system.
Design and simulation of the micromixer with chaotic advection in twisted microchannels.
Jen, Chun-Ping; Wu, Chung-Yi; Lin, Yu-Cheng; Wu, Ching-Yi
2003-05-01
Chaotic mixers with twisted microchannels were designed and simulated numerically in the present study. The phenomenon whereby a simple Eulerian velocity field may generate a chaotic response in the distribution of a Lagrangian marker is termed chaotic advection. Dynamic system theory indicates that chaotic particle motion can occur when a velocity field is either two-dimensional and time-dependent, or three-dimensional. In the present study, micromixers with three-dimensional structures of the twisted microchannel were designed in order to induce chaotic mixing. In addition to the basic T-mixer, three types of micromixers with inclined, oblique and wavelike microchannels were investigated. In the design of each twisted microchannel, the angle of the channels' bottoms alternates in each subsection. When the fluids enter the twisted microchannels, the flow sways around the varying structures within the microchannels. The designs of the twisted microchannels provide a third degree of freedom to the flow field in the microchannel. Therefore, chaotic regimes that lead to chaotic mixing may arise. The numerical results indicate that mixing occurs in the main channel and progressively larger mixing lengths are required as the Peclet number increased. The swaying of the flow in the twisted microchannel causes chaotic advection. Among the four micromixer designs, the micromixer with the inclined channel most improved mixing. Furthermore, using the inclined mixer with six subsections yielded optimum performance, decreasing the mixing length by up to 31% from that of the basic T-mixer.
NASA Astrophysics Data System (ADS)
Wen-Bo, Wang; Xiao-Dong, Zhang; Yuchan, Chang; Xiang-Li, Wang; Zhao, Wang; Xi, Chen; Lei, Zheng
2016-01-01
In this paper, a new method to reduce noises within chaotic signals based on ICA (independent component analysis) and EMD (empirical mode decomposition) is proposed. The basic idea is decomposing chaotic signals and constructing multidimensional input vectors, firstly, on the base of EMD and its translation invariance. Secondly, it makes the independent component analysis on the input vectors, which means that a self adapting denoising is carried out for the intrinsic mode functions (IMFs) of chaotic signals. Finally, all IMFs compose the new denoised chaotic signal. Experiments on the Lorenz chaotic signal composed of different Gaussian noises and the monthly observed chaotic sequence on sunspots were put into practice. The results proved that the method proposed in this paper is effective in denoising of chaotic signals. Moreover, it can correct the center point in the phase space effectively, which makes it approach the real track of the chaotic attractor. Project supported by the National Science and Technology, China (Grant No. 2012BAJ15B04), the National Natural Science Foundation of China (Grant Nos. 41071270 and 61473213), the Natural Science Foundation of Hubei Province, China (Grant No. 2015CFB424), the State Key Laboratory Foundation of Satellite Ocean Environment Dynamics, China (Grant No. SOED1405), the Hubei Provincial Key Laboratory Foundation of Metallurgical Industry Process System Science, China (Grant No. Z201303), and the Hubei Key Laboratory Foundation of Transportation Internet of Things, Wuhan University of Technology, China (Grant No.2015III015-B02).
Federation for a Secure Enterprise
2016-09-10
12 October 2005 e. RFC Internet X.509 Public Key Infrastructure: Certification Path Building, 2005 f. Public Key Cryptography Standard, PKCS #1...v2.2: RSA Cryptography Standard, RSA Laboratories, October 27, 2012 g. PKCS#12 format PKCS #12 v1.0: Personal Information Exchange Syntax Standard, RSA...ClientHello padding extension, 2015-02-17 f. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier
The Role of Counterintelligence in the European Theater of Operations During World War II
1993-06-04
revolvers, Minox cameras, portable typewriters, 48 fingerprint cameras, latent fingerprint kits, handcuffs, and listening and recording devices.13 This...Comments from the detachments indicated that the fingerprint equipment, and listening and recording devices were of little use. However, the revolvers...40-49. 138 Moulage* 2 Fingerprinting 2 Latent Fingerprinting 3 System of Identification 1 Codes and Ciphers 1 Handwriting Comparison 2 Documentary
NASA Astrophysics Data System (ADS)
Gunn, Lachlan J.; Chappell, James M.; Allison, Andrew; Abbott, Derek
2014-09-01
While information-theoretic security is often associated with the one-time pad and quantum key distribution, noisy transport media leave room for classical techniques and even covert operation. Transit times across the public internet exhibit a degree of randomness, and cannot be determined noiselessly by an eavesdropper. We demonstrate the use of these measurements for information-theoretically secure communication over the public internet.
An Architecture for Enabling Migration of Tactical Networks to Future Flexible Ad Hoc WBWF
2010-09-01
Requirements Several multiple access schemes TDMA OFDMA SC-OFDMA, FH- CDMA , DS - CDMA , hybrid access schemes, transitions between them Dynamic...parameters algorithms depend on the multiple access scheme If DS - CDMA : handling of macro-diversity (linked to cooperative routing) TDMA and/of OFDMA...Transport format Ciphering @MAC/RLC level : SCM Physical layer (PHY) : signal processing (mod, FEC, etc) CDMA : macro-diversity CDMA , OFDMA
Developing of Library for Proofs of Data Possession in Charm
2013-06-01
INTENTIONALLY LEFT BLANK x LIST OF ACRONYMS AND ABBREVIATIONS API Application Programmer Interface DTP Datatype -preserving Encryption FedRAMP U.S...proposed block-cipher mode for Datatype -Preserving Encryption (DTP) uses the Knuth Shuffle in one of its steps [19]. It may be advantageous to...http://www.clustal.org/omega/clustalo-api/util_8c.html. [19] U. T. Mattsson, “Format-controlling encryption using datatype -preserving encryption
Infrared spectrometry studies: Spectral digital data acquisition system (1971 version)
NASA Technical Reports Server (NTRS)
Lu, L.; Lyon, R. J. P.
1971-01-01
The construction of the Stanford Spectral Digital Data Acquisition System is described. The objective of the system is to record both the spectral distribution of incoming radiation from the rock samples measured by the spectroradiometer (Exotech Model 10-34 Circular Variable Filter Infrared Spectroradiometer) together with other weather information. This system is designed for both laboratory and field measurement programs. The multichannel inputs (8 channels) of the system are as follows: Ch 1 the Spectro-radiometer, Ch 2 the radiometer (PRT-5), and Ch 3 to Ch 8 for the weather information. The system records data from channel 1 and channel 2 alternately for 48 times, before a fast sweep across the six weather channels, to form a single scan in the scan counter. The operation is illustrated in a block diagram, and the theory of operation is described. The outputs are written on a 7-track magnetic tape with IBM compatible form. The format of the tape and the playback computer programs are included. The micro-pac digital modules and a CIPHER model 70 tape recorder (Cipher Data Products) are used. One of the major characteristics of this system is that it is externally clocked by the spectroradiometer instead of taking data at intervals of various wavelengths by using internal-clocking.
A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State
NASA Technical Reports Server (NTRS)
Guo, Guang-Can; Zhang, Xiao-Yu
1996-01-01
The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.
The equal combination synchronization of a class of chaotic systems with discontinuous output
DOE Office of Scientific and Technical Information (OSTI.GOV)
Luo, Runzi; Zeng, Yanhui
This paper investigates the equal combination synchronization of a class of chaotic systems. The chaotic systems are assumed that only the output state variable is available and the output may be discontinuous state variable. By constructing proper observers, some novel criteria for the equal combination synchronization are proposed. The Lorenz chaotic system is taken as an example to demonstrate the efficiency of the proposed approach.
Modelling of long-wave chaotic radar system for anti-stealth applications
NASA Astrophysics Data System (ADS)
Al-Suhail, Ghaida A.; Tahir, Fadhil Rahma; Abd, Mariam Hussien; Pham, Viet-Thanh; Fortuna, Luigi
2018-04-01
Although the Very Low-Frequency (VLF) waveforms have limited practical applications in acoustics (sonar) and secure military communications with radars and submarines; to this end; this paper presents a new and simple analytical model of VLF monostatic direct chaotic radar system. The model hypothetically depends on the two identical coupled time-delayed feedback chaotic systems which can generate and recover a long-wave chaotic signal. To resist the influence of positive Lyapunov exponents of the time-delay chaotic systems, the complete replacement of Pecaro and Carroll (PC) synchronization is employed. It can faithfully recover the chaotic signal from the back-scattered (echo) signal from the target over a noisy channel. The system performance is characterized in terms of the time series of synchronization in addition to the peak of the cross-correlation. Simulation results are conducted for substantial sensitivities of the chaotic signal to the system parameters and initial conditions. As a result, it is found that an effective and robust chaotic radar (CRADAR) model can be obtained when the signal-to-noise ratio (SNR) highly degrades to 0 dB, but with clear peak in correlation performance for detecting the target. Then, the model can be considered as a state of the art towards counter stealth technology and might be developed for other acoustic secure applications.
A new chaotic oscillator with free control
NASA Astrophysics Data System (ADS)
Li, Chunbiao; Sprott, Julien Clinton; Akgul, Akif; Iu, Herbert H. C.; Zhao, Yibo
2017-08-01
A novel chaotic system is explored in which all terms are quadratic except for a linear function. The slope of the linear function rescales the amplitude and frequency of the variables linearly while its zero intercept allows offset boosting for one of the variables. Therefore, a free-controlled chaotic oscillation can be obtained with any desired amplitude, frequency, and offset by an easy modification of the linear function. When implemented as an electronic circuit, the corresponding chaotic signal can be controlled by two independent potentiometers, which is convenient for constructing a chaos-based application system. To the best of our knowledge, this class of chaotic oscillators has never been reported.
Macro- and micro-chaotic structures in the Hindmarsh-Rose model of bursting neurons
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barrio, Roberto, E-mail: rbarrio@unizar.es; Serrano, Sergio; Angeles Martínez, M.
2014-06-01
We study a plethora of chaotic phenomena in the Hindmarsh-Rose neuron model with the use of several computational techniques including the bifurcation parameter continuation, spike-quantification, and evaluation of Lyapunov exponents in bi-parameter diagrams. Such an aggregated approach allows for detecting regions of simple and chaotic dynamics, and demarcating borderlines—exact bifurcation curves. We demonstrate how the organizing centers—points corresponding to codimension-two homoclinic bifurcations—along with fold and period-doubling bifurcation curves structure the biparametric plane, thus forming macro-chaotic regions of onion bulb shapes and revealing spike-adding cascades that generate micro-chaotic structures due to the hysteresis.
Chaotic behaviour of Zeeman machines at introductory course of mechanics
NASA Astrophysics Data System (ADS)
Nagy, Péter; Tasnádi, Péter
2016-05-01
Investigation of chaotic motions and cooperative systems offers a magnificent opportunity to involve modern physics into the basic course of mechanics taught to engineering students. In the present paper it will be demonstrated that Zeeman Machine can be a versatile and motivating tool for students to get introductory knowledge about chaotic motion via interactive simulations. It works in a relatively simple way and its properties can be understood very easily. Since the machine can be built easily and the simulation of its movement is also simple the experimental investigation and the theoretical description can be connected intuitively. Although Zeeman Machine is known mainly for its quasi-static and catastrophic behaviour, its dynamic properties are also of interest with its typical chaotic features. By means of a periodically driven Zeeman Machine a wide range of chaotic properties of the simple systems can be demonstrated such as bifurcation diagrams, chaotic attractors, transient chaos and so on. The main goal of this paper is the presentation of an interactive learning material for teaching the basic features of the chaotic systems through the investigation of the Zeeman Machine.
NASA Astrophysics Data System (ADS)
Ibata, Rodrigo A.; Lewis, Geraint F.; Thomas, Guillaume; Martin, Nicolas F.; Chapman, Scott
2017-06-01
We present two spectroscopic surveys of the tidal stellar stream of the Palomar 5 globular cluster undertaken with the VLT/FLAMES and AAT/AAOmega instruments. We use these data in conjunction with photometric data presented in the previous contribution in this series to classify the survey stars in terms of their probability of belonging to the Palomar 5 stellar stream. We find that high-probability candidates are only found in a very narrow spatial interval surrounding the locus of the stream on the sky. PanSTARRS RR Lyrae stars in this region of the sky are also distributed in a similar manner. The absence of significant “fanning” of this stellar stream confirms that Palomar 5 does not follow a chaotic orbit. Previous studies have found that Palomar 5 is largely devoid of low-mass stars, and we show that this is true also of the stellar populations along the trailing arm out to 6^\\circ . Within this region, which contains 73% of the detected stars, the population is statistically identical to the core, implying that the ejection of the low-mass stars occurred before the formation of the stream. We also present an updated structural model fit to the bound remnant, which yields a total mass of 4297+/- 98{M}ȯ and a tidal radius 0.145+/- 0.009 {kpc}. We estimate the mass of the observed system including the stream to be 12,200 ± 400 M⊙, and the initial mass to have been ~47,000 ± 1500 M⊙. These observational constraints will be employed in our next study to model the dynamics of the system in detail. Based on observations obtained with MegaPrime/MegaCam, a joint project of CFHT and CEA/DAPNIA, at the Canada–France–Hawaii Telescope (CFHT), which is operated by the National Research Council (NRC) of Canada, the Institute National des Sciences de l’Univers of the Centre National de la Recherche Scientifique of France, and the University of Hawaii. Based on observations made with ESO Telescopes at the La Silla Paranal Observatory under programme ID 081.B-0258(A) and ID 083.B-0403(A).
Simple algorithm for improved security in the FDDI protocol
NASA Astrophysics Data System (ADS)
Lundy, G. M.; Jones, Benjamin
1993-02-01
We propose a modification to the Fiber Distributed Data Interface (FDDI) protocol based on a simple algorithm which will improve confidential communication capability. This proposed modification provides a simple and reliable system which exploits some of the inherent security properties in a fiber optic ring network. This method differs from conventional methods in that end to end encryption can be facilitated at the media access control sublayer of the data link layer in the OSI network model. Our method is based on a variation of the bit stream cipher method. The transmitting station takes the intended confidential message and uses a simple modulo two addition operation against an initialization vector. The encrypted message is virtually unbreakable without the initialization vector. None of the stations on the ring will have access to both the encrypted message and the initialization vector except the transmitting and receiving stations. The generation of the initialization vector is unique for each confidential transmission and thus provides a unique approach to the key distribution problem. The FDDI protocol is of particular interest to the military in terms of LAN/MAN implementations. Both the Army and the Navy are considering the standard as the basis for future network systems. A simple and reliable security mechanism with the potential to support realtime communications is a necessary consideration in the implementation of these systems. The proposed method offers several advantages over traditional methods in terms of speed, reliability, and standardization.
NASA Astrophysics Data System (ADS)
Yu, Nam Yul
2017-12-01
The principle of compressed sensing (CS) can be applied in a cryptosystem by providing the notion of security. In this paper, we study the computational security of a CS-based cryptosystem that encrypts a plaintext with a partial unitary sensing matrix embedding a secret keystream. The keystream is obtained by a keystream generator of stream ciphers, where the initial seed becomes the secret key of the CS-based cryptosystem. For security analysis, the total variation distance, bounded by the relative entropy and the Hellinger distance, is examined as a security measure for the indistinguishability. By developing upper bounds on the distance measures, we show that the CS-based cryptosystem can be computationally secure in terms of the indistinguishability, as long as the keystream length for each encryption is sufficiently large with low compression and sparsity ratios. In addition, we consider a potential chosen plaintext attack (CPA) from an adversary, which attempts to recover the key of the CS-based cryptosystem. Associated with the key recovery attack, we show that the computational security of our CS-based cryptosystem is brought by the mathematical intractability of a constrained integer least-squares (ILS) problem. For a sub-optimal, but feasible key recovery attack, we consider a successive approximate maximum-likelihood detection (SAMD) and investigate the performance by developing an upper bound on the success probability. Through theoretical and numerical analyses, we demonstrate that our CS-based cryptosystem can be secure against the key recovery attack through the SAMD.
A combination chaotic system and application in color image encryption
NASA Astrophysics Data System (ADS)
Parvaz, R.; Zarebnia, M.
2018-05-01
In this paper, by using Logistic, Sine and Tent systems we define a combination chaotic system. Some properties of the chaotic system are studied by using figures and numerical results. A color image encryption algorithm is introduced based on new chaotic system. Also this encryption algorithm can be used for gray scale or binary images. The experimental results of the encryption algorithm show that the encryption algorithm is secure and practical.
Timing variation in an analytically solvable chaotic system
NASA Astrophysics Data System (ADS)
Blakely, J. N.; Milosavljevic, M. S.; Corron, N. J.
2017-02-01
We present analytic solutions for a chaotic dynamical system that do not have the regular timing characteristic of recently reported solvable chaotic systems. The dynamical system can be viewed as a first order filter with binary feedback. The feedback state may be switched only at instants defined by an external clock signal. Generalizing from a period one clock, we show analytic solutions for period two and higher period clocks. We show that even when the clock 'ticks' randomly the chaotic system has an analytic solution. These solutions can be visualized in a stroboscopic map whose complexity increases with the complexity of the clock. We provide both analytic results as well as experimental data from an electronic circuit implementation of the system. Our findings bridge the gap between the irregular timing of well known chaotic systems such as Lorenz and Rossler and the well regulated oscillations of recently reported solvable chaotic systems.
Wang, Lipo; Li, Sa; Tian, Fuyu; Fu, Xiuju
2004-10-01
Recently Chen and Aihara have demonstrated both experimentally and mathematically that their chaotic simulated annealing (CSA) has better search ability for solving combinatorial optimization problems compared to both the Hopfield-Tank approach and stochastic simulated annealing (SSA). However, CSA may not find a globally optimal solution no matter how slowly annealing is carried out, because the chaotic dynamics are completely deterministic. In contrast, SSA tends to settle down to a global optimum if the temperature is reduced sufficiently slowly. Here we combine the best features of both SSA and CSA, thereby proposing a new approach for solving optimization problems, i.e., stochastic chaotic simulated annealing, by using a noisy chaotic neural network. We show the effectiveness of this new approach with two difficult combinatorial optimization problems, i.e., a traveling salesman problem and a channel assignment problem for cellular mobile communications.
Synchronisation and Circuit Realisation of Chaotic Hartley System
NASA Astrophysics Data System (ADS)
Varan, Metin; Akgül, Akif; Güleryüz, Emre; Serbest, Kasım
2018-06-01
Hartley chaotic system is topologically the simplest, but its dynamical behaviours are very rich and its synchronisation has not been seen in literature. This paper aims to introduce a simple chaotic system which can be used as alternative to classical chaotic systems in synchronisation fields. Time series, phase portraits, and bifurcation diagrams reveal the dynamics of the mentioned system. Chaotic Hartley model is also supported with electronic circuit model simulations. Its exponential dynamics are hard to realise on circuit model; this paper is the first in literature that handles such a complex modelling problem. Modelling, synchronisation, and circuit realisation of the Hartley system are implemented respectively in MATLAB-Simulink and ORCAD environments. The effectiveness of the applied synchronisation method is revealed via numerical methods, and the results are discussed. Retrieved results show that this complex chaotic system can be used in secure communication fields.
Generating random numbers by means of nonlinear dynamic systems
NASA Astrophysics Data System (ADS)
Zang, Jiaqi; Hu, Haojie; Zhong, Juhua; Luo, Duanbin; Fang, Yi
2018-07-01
To introduce the randomness of a physical process to students, a chaotic pendulum experiment was opened in East China University of Science and Technology (ECUST) on the undergraduate level in the physics department. It was shown chaotic motion could be initiated through adjusting the operation of a chaotic pendulum. By using the data of the angular displacements of chaotic motion, random binary numerical arrays can be generated. To check the randomness of generated numerical arrays, the NIST Special Publication 800-20 method was adopted. As a result, it was found that all the random arrays which were generated by the chaotic motion could pass the validity criteria and some of them were even better than the quality of pseudo-random numbers generated by a computer. Through the experiments, it is demonstrated that chaotic pendulum can be used as an efficient mechanical facility in generating random numbers, and can be applied in teaching random motion to the students.
Quantification of chaotic strength and mixing in a micro fluidic system
NASA Astrophysics Data System (ADS)
Kim, Ho Jun; Beskok, Ali
2007-11-01
Comparative studies of five different techniques commonly employed to identify the chaotic strength and mixing efficiency in micro fluidic systems are presented to demonstrate the competitive advantages and shortcomings of each method. The 'chaotic electroosmotic stirrer' of Qian and Bau (2002 Anal. Chem. 74 3616-25) is utilized as the benchmark case due to its well-defined flow kinematics. Lagrangian particle tracking methods are utilized to study particle dispersion in the conceptual device using spectral element and fourth-order Runge-Kutta discretizations in space and time, respectively. Stirring efficiency is predicted using the stirring index based on the box counting method, and Poincaré sections are utilized to identify the chaotic and regular regions under various actuation conditions. Finite time Lyapunov exponents are calculated to quantify the chaotic strength, while the probability density function of the stretching field is utilized as an alternative method to demonstrate the statistical analysis of chaotic and partially chaotic cases. Mixing index inverse, based on the standard deviation of scalar species distribution, is utilized as a metric to quantify the mixing efficiency. Series of numerical simulations are performed by varying the Peclet number (Pe) at fixed kinematic conditions. The mixing time (tm) is characterized as a function of the Pe number, and tm ~ ln(Pe) scaling is demonstrated for fully chaotic cases, while tm ~ Peα scaling with α ≈ 0.33 and α = 0.5 are observed for partially chaotic and regular cases, respectively. Employing the aforementioned techniques, optimum kinematic conditions and the actuation frequency of the stirrer that result in the highest mixing/stirring efficiency are identified.
Analytical Studies on the Synchronization of a Network of Linearly-Coupled Simple Chaotic Systems
NASA Astrophysics Data System (ADS)
Sivaganesh, G.; Arulgnanam, A.; Seethalakshmi, A. N.; Selvaraj, S.
2018-05-01
We present explicit generalized analytical solutions for a network of linearly-coupled simple chaotic systems. Analytical solutions are obtained for the normalized state equations of a network of linearly-coupled systems driven by a common chaotic drive system. Two parameter bifurcation diagrams revealing the various hidden synchronization regions, such as complete, phase and phase-lag synchronization are identified using the analytical results. The synchronization dynamics and their stability are studied using phase portraits and the master stability function, respectively. Further, experimental results for linearly-coupled simple chaotic systems are presented to confirm the analytical results. The synchronization dynamics of a network of chaotic systems studied analytically is reported for the first time.
Synchronization and an application of a novel fractional order King Cobra chaotic system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Muthukumar, P., E-mail: muthukumardgl@gmail.com; Balasubramaniam, P., E-mail: balugru@gmail.com; Ratnavelu, K., E-mail: kuru052001@gmail.com
2014-09-01
In this paper, we design a new three dimensional King Cobra face shaped fractional order chaotic system. The multi-scale synchronization scheme of two fractional order chaotic systems is described. The necessary conditions for the multi-scale synchronization of two identical fractional order King Cobra chaotic systems are derived through feedback control. A new cryptosystem is proposed for an image encryption and decryption by using synchronized fractional order King Cobra chaotic systems with the supports of multiple cryptographic assumptions. The security of the proposed cryptosystem is analyzed by the well known algebraic attacks. Numerical simulations are given to show the effectiveness ofmore » the proposed theoretical results.« less
Analytically solvable chaotic oscillator based on a first-order filter.
Corron, Ned J; Cooper, Roy M; Blakely, Jonathan N
2016-02-01
A chaotic hybrid dynamical system is introduced and its analytic solution is derived. The system is described as an unstable first order filter subject to occasional switching of a set point according to a feedback rule. The system qualitatively differs from other recently studied solvable chaotic hybrid systems in that the timing of the switching is regulated by an external clock. The chaotic analytic solution is an optimal waveform for communications in noise when a resistor-capacitor-integrate-and-dump filter is used as a receiver. As such, these results provide evidence in support of a recent conjecture that the optimal communication waveform for any stable infinite-impulse response filter is chaotic.
Analytically solvable chaotic oscillator based on a first-order filter
DOE Office of Scientific and Technical Information (OSTI.GOV)
Corron, Ned J.; Cooper, Roy M.; Blakely, Jonathan N.
2016-02-15
A chaotic hybrid dynamical system is introduced and its analytic solution is derived. The system is described as an unstable first order filter subject to occasional switching of a set point according to a feedback rule. The system qualitatively differs from other recently studied solvable chaotic hybrid systems in that the timing of the switching is regulated by an external clock. The chaotic analytic solution is an optimal waveform for communications in noise when a resistor-capacitor-integrate-and-dump filter is used as a receiver. As such, these results provide evidence in support of a recent conjecture that the optimal communication waveform formore » any stable infinite-impulse response filter is chaotic.« less
Fuzzy fractals, chaos, and noise
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zardecki, A.
1997-05-01
To distinguish between chaotic and noisy processes, the authors analyze one- and two-dimensional chaotic mappings, supplemented by the additive noise terms. The predictive power of a fuzzy rule-based system allows one to distinguish ergodic and chaotic time series: in an ergodic series the likelihood of finding large numbers is small compared to the likelihood of finding them in a chaotic series. In the case of two dimensions, they consider the fractal fuzzy sets whose {alpha}-cuts are fractals, arising in the context of a quadratic mapping in the extended complex plane. In an example provided by the Julia set, the conceptmore » of Hausdorff dimension enables one to decide in favor of chaotic or noisy evolution.« less
NASA Astrophysics Data System (ADS)
Abdolmohammadi, Hamid Reza; Khalaf, Abdul Jalil M.; Panahi, Shirin; Rajagopal, Karthikeyan; Pham, Viet-Thanh; Jafari, Sajad
2018-06-01
Nowadays, designing chaotic systems with hidden attractor is one of the most interesting topics in nonlinear dynamics and chaos. In this paper, a new 4D chaotic system is proposed. This new chaotic system has no equilibria, and so it belongs to the category of systems with hidden attractors. Dynamical features of this system are investigated with the help of its state-space portraits, bifurcation diagram, Lyapunov exponents diagram, and basin of attraction. Also a hardware realisation of this system is proposed by using field programmable gate arrays (FPGA). In addition, an electronic circuit design for the chaotic system is introduced.
Wang, Li Xian; Zhu, Ning Hua; Zheng, Jian Yu; Liu, Jian Guo; Li, Wei
2012-05-20
We induce a microwave photonic bandpass filter into an optoelectronic oscillator to generate a chaotic ultra-wideband signal in both the optical and electrical domain. The theoretical analysis and numerical simulation indicate that this system is capable of generating band-limited high-dimensional chaos. Experimental results coincide well with the theoretical prediction and show that the power spectrum of the generated chaotic signal basically meets the Federal Communications Commission indoor mask. The generated chaotic carrier is further intensity modulated by a 10 MHz square wave, and the waveform of the output ultra-wideband signal is measured for demonstrating the chaotic on-off keying modulation.
NASA Astrophysics Data System (ADS)
Drótos, G.; Jung, C.
2016-06-01
The topic of this paper is hyperbolic chaotic scattering in a three degrees of freedom system. We generalize how shadows in the domain of the doubly differential cross-section are found: they are traced out by the appropriately filtered unstable manifolds of the periodic trajectories in the chaotic saddle. These shadows are related to the rainbow singularities in the doubly differential cross-section. As a result of this relation, we discover a method of how to recognize in the cross section a smoothly deformed image of the chaotic saddle, allowing the reconstruction of the symbolic dynamics of the chaotic saddle, its topology and its scaling factors.
A new transiently chaotic flow with ellipsoid equilibria
NASA Astrophysics Data System (ADS)
Panahi, Shirin; Aram, Zainab; Jafari, Sajad; Pham, Viet-Thanh; Volos, Christos; Rajagopal, Karthikeyan
2018-03-01
In this article, a simple autonomous transiently chaotic flow with cubic nonlinearities is proposed. This system represents some unusual features such as having a surface of equilibria. We shall describe some dynamical properties and behaviours of this system in terms of eigenvalue structures, bifurcation diagrams, time series, and phase portraits. Various behaviours of this system such as periodic and transiently chaotic dynamics can be shown by setting special parameters in proper values. Our system belongs to a newly introduced category of transiently chaotic systems: systems with hidden attractors. Transiently chaotic behaviour of our proposed system has been implemented and tested by the OrCAD-PSpise software. We have found a proper qualitative similarity between circuit and simulation results.
Chaotic Dynamics and Application of LCR Oscillators Sharing Common Nonlinearity
NASA Astrophysics Data System (ADS)
Jeevarekha, A.; Paul Asir, M.; Philominathan, P.
2016-06-01
This paper addresses the problem of sharing common nonlinearity among nonautonomous and autonomous oscillators. By choosing a suitable common nonlinear element with the driving point characteristics capable of bringing out chaotic motion in a combined system, we obtain identical chaotic states. The dynamics of the coupled system is explored through numerical and experimental studies. Employing the concept of common nonlinearity, a simple chaotic communication system is modeled and its performance is verified through Multisim simulation.
Environmental Requirements for Authentication Protocols
2002-01-01
Engineering for Informa- tion Security, March 2001. 10. D. Chaum . Blind signatures for untraceable payments. In Advances in Cryptology{ Proceedings of...the connection, the idea relies on a concept similar to blinding in the sense of Chaum [10], who used it e ectively in the design of anonymous payment...digital signature on the key and a nonce provided by the server, in which the client’s challenge response was independent of the type of cipher
Chuang, Li-Yeh; Moi, Sin-Hua; Lin, Yu-Da; Yang, Cheng-Hong
2016-10-01
Evolutionary algorithms could overcome the computational limitations for the statistical evaluation of large datasets for high-order single nucleotide polymorphism (SNP) barcodes. Previous studies have proposed several chaotic particle swarm optimization (CPSO) methods to detect SNP barcodes for disease analysis (e.g., for breast cancer and chronic diseases). This work evaluated additional chaotic maps combined with the particle swarm optimization (PSO) method to detect SNP barcodes using a high-dimensional dataset. Nine chaotic maps were used to improve PSO method results and compared the searching ability amongst all CPSO methods. The XOR and ZZ disease models were used to compare all chaotic maps combined with PSO method. Efficacy evaluations of CPSO methods were based on statistical values from the chi-square test (χ 2 ). The results showed that chaotic maps could improve the searching ability of PSO method when population are trapped in the local optimum. The minor allele frequency (MAF) indicated that, amongst all CPSO methods, the numbers of SNPs, sample size, and the highest χ 2 value in all datasets were found in the Sinai chaotic map combined with PSO method. We used the simple linear regression results of the gbest values in all generations to compare the all methods. Sinai chaotic map combined with PSO method provided the highest β values (β≥0.32 in XOR disease model and β≥0.04 in ZZ disease model) and the significant p-value (p-value<0.001 in both the XOR and ZZ disease models). The Sinai chaotic map was found to effectively enhance the fitness values (χ 2 ) of PSO method, indicating that the Sinai chaotic map combined with PSO method is more effective at detecting potential SNP barcodes in both the XOR and ZZ disease models. Copyright © 2016 Elsevier B.V. All rights reserved.
NASA Astrophysics Data System (ADS)
Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng
2016-06-01
Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Olmi, Simona, E-mail: simona.olmi@fi.isc.cnr.it; INFN Sez. Firenze, via Sansone, 1 - I-50019 Sesto Fiorentino
The dynamics of two symmetrically coupled populations of rotators is studied for different values of the inertia. The system is characterized by different types of solutions, which all coexist with the fully synchronized state. At small inertia, the system is no more chaotic and one observes mainly quasi-periodic chimeras, while the usual (stationary) chimera state is not anymore observable. At large inertia, one observes two different kind of chaotic solutions with broken symmetry: the intermittent chaotic chimera, characterized by a synchronized population and a population displaying a turbulent behaviour, and a second state where the two populations are both chaoticmore » but whose dynamics adhere to two different macroscopic attractors. The intermittent chaotic chimeras are characterized by a finite life-time, whose duration increases as a power-law with the system size and the inertia value. Moreover, the chaotic population exhibits clear intermittent behavior, displaying a laminar phase where the two populations tend to synchronize, and a turbulent phase where the macroscopic motion of one population is definitely erratic. In the thermodynamic limit, these states survive for infinite time and the laminar regimes tends to disappear, thus giving rise to stationary chaotic solutions with broken symmetry contrary to what observed for chaotic chimeras on a ring geometry.« less
Chaotic dynamics around cometary nuclei
NASA Astrophysics Data System (ADS)
Lages, José; Shevchenko, Ivan I.; Rollin, Guillaume
2018-06-01
We apply a generalized Kepler map theory to describe the qualitative chaotic dynamics around cometary nuclei, based on accessible observational data for five comets whose nuclei are well-documented to resemble dumb-bells. The sizes of chaotic zones around the nuclei and the Lyapunov times of the motion inside these zones are estimated. In the case of Comet 1P/Halley, the circumnuclear chaotic zone seems to engulf an essential part of the Hill sphere, at least for orbits of moderate to high eccentricity.
Synchronization of Chaotic Systems without Direct Connections Using Reinforcement Learning
NASA Astrophysics Data System (ADS)
Sato, Norihisa; Adachi, Masaharu
In this paper, we propose a control method for the synchronization of chaotic systems that does not require the systems to be connected, unlike existing methods such as that proposed by Pecora and Carroll in 1990. The method is based on the reinforcement learning algorithm. We apply our method to two discrete-time chaotic systems with mismatched parameters and achieve M step delay synchronization. Moreover, we extend the proposed method to the synchronization of continuous-time chaotic systems.
Multiswitching combination synchronisation of non-identical fractional-order chaotic systems
NASA Astrophysics Data System (ADS)
Bhat, Muzaffar Ahmad; Khan, Ayub
2018-06-01
In this paper, multiswitching combination synchronisation (MSCS) scheme has been investigated in a class of three non-identical fractional-order chaotic systems. The fractional-order Lorenz and Chen systems are taken as the drive systems. The combination of multidrive systems is then synchronised with the fractional-order Lü chaotic system. In MSCS, the state variables of the two drive systems synchronise with different state variables of the response system, simultaneously. Based on the stability of fractional-order chaotic systems, the MSCS of three fractional-order non-identical systems has been investigated. For the synchronisation of three non-identical fractional-order chaotic systems, suitable controllers have been designed. Theoretical analysis and numerical results are presented to demonstrate the validity and feasibility of the applied method.
Stability of uncertain impulsive complex-variable chaotic systems with time-varying delays.
Zheng, Song
2015-09-01
In this paper, the robust exponential stabilization of uncertain impulsive complex-variable chaotic delayed systems is considered with parameters perturbation and delayed impulses. It is assumed that the considered complex-variable chaotic systems have bounded parametric uncertainties together with the state variables on the impulses related to the time-varying delays. Based on the theories of adaptive control and impulsive control, some less conservative and easily verified stability criteria are established for a class of complex-variable chaotic delayed systems with delayed impulses. Some numerical simulations are given to validate the effectiveness of the proposed criteria of impulsive stabilization for uncertain complex-variable chaotic delayed systems. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.
Combined Microfluidic-Eectric Diffused Mixing of Living Cells in Continuous Flow
NASA Astrophysics Data System (ADS)
Ming-Wen Wang,
2010-02-01
The mixing process is a crucially important stage in the operation of biological and chemical microfluidic devices. If the mixing is inadequate, reactants do not fully interact with each other, and the device may not operate properly. This paper describes a simplified microfluidic mixer (different from a chaotic mixer) which can uniformly mix a buffer solution with living cells by applying an AC electric charge. Diffusion of the living cells into the buffer solution occurs rapidly following the interface of the flow stream with the electric charge; no further agitating step is needed. To accomplish this, an asymmetric pair of electrodes was integrated at the inlets of the buffer solution and the cells fluid. When the buffer solution and the cells fluid were introduced into one flow path, they remained limited to that flow stream. When the electrodes were charged, however, the cells in a short distance were efficiently moved into the solution flow, and the original fluids were mixed. The mixing efficiency depends on the polarizability of the cells, and this in turn is governed by the dielectric properties of the cells, the medium, and the solvent. This micro device, capable of efficiently mixing living cells with a buffer solution, may potentially allow biological mixing to be done outside of hospitals, in facilities without biological analyzing instruments.
The chaotic set and the cross section for chaotic scattering in three degrees of freedom
NASA Astrophysics Data System (ADS)
Jung, C.; Merlo, O.; Seligman, T. H.; Zapfe, W. P. K.
2010-10-01
This article treats chaotic scattering with three degrees of freedom, where one of them is open and the other two are closed, as a first step towards a more general understanding of chaotic scattering in higher dimensions. Despite the strong restrictions, it breaks the essential simplicity implicit in any two-dimensional time-independent scattering problem. Introducing the third degree of freedom by breaking a continuous symmetry, we first explore the topological structure of the homoclinic/heteroclinic tangle and the structures in the scattering functions. Then we work out the implications of these structures for the doubly differential cross section. The most prominent structures in the cross section are rainbow singularities. They form a fractal pattern that reflects the fractal structure of the chaotic invariant set. This allows us to determine structures in the cross section from the invariant set and, conversely, to obtain information about the topology of the invariant set from the cross section. The latter is a contribution to the inverse scattering problem for chaotic systems.
Synchronization of chaotic systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pecora, Louis M.; Carroll, Thomas L.
2015-09-15
We review some of the history and early work in the area of synchronization in chaotic systems. We start with our own discovery of the phenomenon, but go on to establish the historical timeline of this topic back to the earliest known paper. The topic of synchronization of chaotic systems has always been intriguing, since chaotic systems are known to resist synchronization because of their positive Lyapunov exponents. The convergence of the two systems to identical trajectories is a surprise. We show how people originally thought about this process and how the concept of synchronization changed over the years tomore » a more geometric view using synchronization manifolds. We also show that building synchronizing systems leads naturally to engineering more complex systems whose constituents are chaotic, but which can be tuned to output various chaotic signals. We finally end up at a topic that is still in very active exploration today and that is synchronization of dynamical systems in networks of oscillators.« less
Kwok, T; Smith, K A
2000-09-01
The aim of this paper is to study both the theoretical and experimental properties of chaotic neural network (CNN) models for solving combinatorial optimization problems. Previously we have proposed a unifying framework which encompasses the three main model types, namely, Chen and Aihara's chaotic simulated annealing (CSA) with decaying self-coupling, Wang and Smith's CSA with decaying timestep, and the Hopfield network with chaotic noise. Each of these models can be represented as a special case under the framework for certain conditions. This paper combines the framework with experimental results to provide new insights into the effect of the chaotic neurodynamics of each model. By solving the N-queen problem of various sizes with computer simulations, the CNN models are compared in different parameter spaces, with optimization performance measured in terms of feasibility, efficiency, robustness and scalability. Furthermore, characteristic chaotic neurodynamics crucial to effective optimization are identified, together with a guide to choosing the corresponding model parameters.
A new chaotic communication scheme based on adaptive synchronization.
Xiang-Jun, Wu
2006-12-01
A new chaotic communication scheme using adaptive synchronization technique of two unified chaotic systems is proposed. Different from the existing secure communication methods, the transmitted signal is modulated into the parameter of chaotic systems. The adaptive synchronization technique is used to synchronize two identical chaotic systems embedded in the transmitter and the receiver. It is assumed that the parameter of the receiver system is unknown. Based on the Lyapunov stability theory, an adaptive control law is derived to make the states of two identical unified chaotic systems with unknown system parameters asymptotically synchronized; thus the parameter of the receiver system is identified. Then the recovery of the original information signal in the receiver is successfully achieved on the basis of the estimated parameter. It is noticed that the time required for recovering the information signal and the accuracy of the recovered signal very sensitively depends on the frequency of the information signal. Numerical results have verified the effectiveness of the proposed scheme.
Chaotic carrier pulse position modulation communication system and method
Abarbanel, Henry D. I.; Larson, Lawrence E.; Rulkov, Nikolai F.; Sushchik, Mikhail M.; Tsimring, Lev S.; Volkovskii, Alexander R.
2001-01-01
A chaotic carrier pulse position modulation communication system and method is disclosed. The system includes a transmitter and receiver having matched chaotic pulse regenerators. The chaotic pulse regenerator in the receiver produces a synchronized replica of a chaotic pulse train generated by the regenerator in the transmitter. The pulse train from the transmitter can therefore act as a carrier signal. Data is encoded by the transmitter through selectively altering the interpulse timing between pulses in the chaotic pulse train. The altered pulse train is transmitted as a pulse signal. The receiver can detect whether a particular interpulse interval in the pulse signal has been altered by reference to the synchronized replica it generates, and can therefore detect the data transmitted by the receiver. Preferably, the receiver predicts the earliest moment in time it can expect a next pulse after observation of at least two consecutive pulses. It then decodes the pulse signal beginning at a short time before expected arrival of a pulse.
NASA Astrophysics Data System (ADS)
Tirandaz, Hamed
2018-03-01
Chaos control and synchronization of chaotic systems is seemingly a challenging problem and has got a lot of attention in recent years due to its numerous applications in science and industry. This paper concentrates on the control and synchronization problem of the three-dimensional (3D) Zhang chaotic system. At first, an adaptive control law and a parameter estimation law are achieved for controlling the behavior of the Zhang chaotic system. Then, non-identical synchronization of Zhang chaotic system is provided with considering the Lü chaotic system as the follower system. The synchronization problem and parameters identification are achieved by introducing an adaptive control law and a parameters estimation law. Stability analysis of the proposed method is proved by the Lyapanov stability theorem. In addition, the convergence of the estimated parameters to their truly unknown values are evaluated. Finally, some numerical simulations are carried out to illustrate and to validate the effectiveness of the suggested method.
Horseshoes in a Chaotic System with Only One Stable Equilibrium
NASA Astrophysics Data System (ADS)
Huan, Songmei; Li, Qingdu; Yang, Xiao-Song
To confirm the numerically demonstrated chaotic behavior in a chaotic system with only one stable equilibrium reported by Wang and Chen, we resort to Poincaré map technique and present a rigorous computer-assisted verification of horseshoe chaos by virtue of topological horseshoes theory.
Computations of Chaotic Flows in Micromixers
2005-01-01
2005 2. REPORT TYPE 3. DATES COVERED 00-00-2005 to 00-00-2005 4. TITLE AND SUBTITLE Computations of Chaotic Flows in Micromixers 5a. CONTRACT...Std Z39-18 215simulation, computing, and modeling 2005 NRL Review Computations of Chaotic Flows In Micromixers FIGURE 6 Schematic of staggered
Chaos in Atomic Force Microscopy
NASA Astrophysics Data System (ADS)
Hu, Shuiqing; Raman, Arvind
2006-01-01
Chaotic oscillations of microcantilever tips in dynamic atomic force microscopy (AFM) are reported and characterized. Systematic experiments performed using a variety of microcantilevers under a wide range of operating conditions indicate that softer AFM microcantilevers bifurcate from periodic to chaotic oscillations near the transition from the noncontact to the tapping regimes. Careful Lyapunov exponent and noise titration calculations of the tip oscillation data confirm their chaotic nature. AFM images taken by scanning the chaotically oscillating tips over the sample show small, but significant metrology errors at the nanoscale due to this “deterministic” uncertainty.
Simple Chaotic Flow with Circle and Square Equilibrium
NASA Astrophysics Data System (ADS)
Gotthans, Tomas; Sprott, Julien Clinton; Petrzela, Jiri
Simple systems of third-order autonomous nonlinear differential equations can exhibit chaotic behavior. In this paper, we present a new class of chaotic flow with a square-shaped equilibrium. This unique property has apparently not yet been described. Such a system belongs to a newly introduced category of chaotic systems with hidden attractors that are interesting and important in engineering applications. The mathematical model is accompanied by an electrical circuit implementation, demonstrating structural stability of the strange attractor. The circuit is simulated with PSpice, constructed, and analyzed (measured).
Experimental realization of a highly secure chaos communication under strong channel noise
NASA Astrophysics Data System (ADS)
Ye, Weiping; Dai, Qionglin; Wang, Shihong; Lu, Huaping; Kuang, Jinyu; Zhao, Zhenfeng; Zhu, Xiangqing; Tang, Guoning; Huang, Ronghuai; Hu, Gang
2004-09-01
A one-way coupled spatiotemporally chaotic map lattice is used to construct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better than the separative applications of known chaotic and conventional methods. We have realized experiments to practice duplex voice secure communications in realistic Wired Public Switched Telephone Network by applying our chaotic system and the system of Advanced Encryption Standard (AES), respectively, for cryptography. Our system can work stably against strong channel noise when AES fails to work.
Chaos enhancing tunneling in a coupled Bose-Einstein condensate with a double driving.
Rong, Shiguang; Hai, Wenhua; Xie, Qiongtao; Zhu, Qianquan
2009-09-01
We study the effects of chaotic dynamics on atomic tunneling between two weakly coupled Bose-Einstein condensates driven by a double-frequency periodic field. Under the Melnikov's chaos criterion, we divide the parameter space into three parts of different types, regular region, low-chaoticity region, and high-chaoticity region, and give the accurate boundaries between the different regions. It is found that the atomic tunneling can be enhanced in the presence of chaos. Particularly, in the high-chaoticity regions, the chaos-induced inversion of the population imbalance is observed numerically.
NASA Astrophysics Data System (ADS)
Sepantaie, Marc M.; Namazi, Nader M.; Sepantaie, Amir M.
2016-05-01
This paper is devoted to addressing the synchronization, and detection of random binary data exposed to inherent channel variations existing in Free Space Optical (FSO) communication systems. This task is achieved by utilizing the identical synchronization methodology of Lorenz chaotic communication system, and its synergetic interaction in adversities imposed by the FSO channel. Moreover, the Lorenz system has been analyzed, and revealed to induce Stochastic Resonance (SR) once exposed to Additive White Gaussian Noise (AWGN). In particular, the resiliency of the Lorenz chaotic system, in light of channel adversities, has been attributed to the success of the proposed communication system. Furthermore, this paper advocates the use of Haar wavelet transform for enhanced detection capability of the proposed chaotic communication system, which utilizes Chaotic Parameter Modulation (CPM) technique for means of transmission.
NASA Astrophysics Data System (ADS)
Deng, Ke; Zhang, Lu; Luo, Mao-Kang
2010-03-01
The chaotic oscillator has already been considered as a powerful method to detect weak signals, even weak signals accompanied with noises. However, many examples, analyses and simulations indicate that chaotic oscillator detection system cannot guarantee the immunity to noises (even white noise). In fact the randomness of noises has a serious or even a destructive effect on the detection results in many cases. To solve this problem, we present a new detecting method based on wavelet threshold processing that can detect the chaotic weak signal accompanied with noise. All theoretical analyses and simulation experiments indicate that the new method reduces the noise interferences to detection significantly, thereby making the corresponding chaotic oscillator that detects the weak signals accompanied with noises more stable and reliable.
Multiple shooting shadowing for sensitivity analysis of chaotic dynamical systems
NASA Astrophysics Data System (ADS)
Blonigan, Patrick J.; Wang, Qiqi
2018-02-01
Sensitivity analysis methods are important tools for research and design with simulations. Many important simulations exhibit chaotic dynamics, including scale-resolving turbulent fluid flow simulations. Unfortunately, conventional sensitivity analysis methods are unable to compute useful gradient information for long-time-averaged quantities in chaotic dynamical systems. Sensitivity analysis with least squares shadowing (LSS) can compute useful gradient information for a number of chaotic systems, including simulations of chaotic vortex shedding and homogeneous isotropic turbulence. However, this gradient information comes at a very high computational cost. This paper presents multiple shooting shadowing (MSS), a more computationally efficient shadowing approach than the original LSS approach. Through an analysis of the convergence rate of MSS, it is shown that MSS can have lower memory usage and run time than LSS.
NASA Technical Reports Server (NTRS)
Ashrafi, S.
1991-01-01
K. Schatten (1991) recently developed a method for combining his prediction model with our chaotic model. The philosophy behind this combined model and his method of combination is explained. Because the Schatten solar prediction model (KS) uses a dynamo to mimic solar dynamics, accurate prediction is limited to long-term solar behavior (10 to 20 years). The Chaotic prediction model (SA) uses the recently developed techniques of nonlinear dynamics to predict solar activity. It can be used to predict activity only up to the horizon. In theory, the chaotic prediction should be several orders of magnitude better than statistical predictions up to that horizon; beyond the horizon, chaotic predictions would theoretically be just as good as statistical predictions. Therefore, chaos theory puts a fundamental limit on predictability.
Chaos in the brain: imaging via chaoticity of EEG/MEG signals
NASA Astrophysics Data System (ADS)
Kowalik, Zbigniew J.; Elbert, Thomas; Rockstroh, Brigitte; Hoke, Manfried
1995-03-01
Brain electro- (EEG) or magnetoencephalogram (MEG) can be analyzed by using methods of the nonlinear system theory. We show that even for very short and nonstationary time series it is possible to functionally differentiate various brain activities. Usually the analysis assumes that the analyzed signals are both long and stationary, so that the classic spectral methods can be used. Even more convincing results can be obtained under these circumstances when the dimensional analysis or estimation of the Kolmogorov entropy or the Lyapunov exponent are performed. When measuring the spontaneous activity of a human brain the assumption of stationarity is questionable and `static' methods (correlation dimension, entropy, etc.) are then not adequate. In this case `dynamic' methods like pointwise-D2 dimension or chaoticity measures should be applied. Predictability measures in the form of local Lyapunov exponents are capable of revealing directly the chaoticity of a given process, and can practically be applied for functional differentiation of brain activity. We exemplify these in cases of apallic syndrome, tinnitus and schizophrenia. We show that: the average chaoticity in apallic syndrome differentiates brain states both in space and time, chaoticity changes temporally in case of schizophrenia (critical jumps of chaoticity), chaoticity changes locally in space, i.e., in the cortex plane in case of tinnitus.
Chaotic diffusion in the Gliese-876 planetary system
NASA Astrophysics Data System (ADS)
Martí, J. G.; Cincotta, P. M.; Beaugé, C.
2016-07-01
Chaotic diffusion is supposed to be responsible for orbital instabilities in planetary systems after the dissipation of the protoplanetary disc, and a natural consequence of irregular motion. In this paper, we show that resonant multiplanetary systems, despite being highly chaotic, not necessarily exhibit significant diffusion in phase space, and may still survive virtually unchanged over time-scales comparable to their age. Using the GJ-876 system as an example, we analyse the chaotic diffusion of the outermost (and less massive) planet. We construct a set of stability maps in the surrounding regions of the Laplace resonance. We numerically integrate ensembles of close initial conditions, compute Poincaré maps and estimate the chaotic diffusion present in this system. Our results show that, the Laplace resonance contains two different regions: an inner domain characterized by low chaoticity and slow diffusion, and an outer one displaying larger values of dynamical indicators. In the outer resonant domain, the stochastic borders of the Laplace resonance seem to prevent the complete destruction of the system. We characterize the diffusion for small ensembles along the parameters of the outermost planet. Finally, we perform a stability analysis of the inherent chaotic, albeit stable Laplace resonance, by linking the behaviour of the resonant variables of the configurations to the different sub-structures inside the three-body resonance.
NASA Astrophysics Data System (ADS)
Glenn, Chance Michael, Sr.
This work is the conceptualization, derivation, analysis, and fabrication of a fully practical digital signal source designed from a chaotic oscillator. In it we show how a simple electronic circuit based upon the Colpitts oscillator, can be made to produce highly complex signals capable of carrying digital information. We show a direct relationship between the continuous-time chaotic oscillations produced by the circuit and the logistic map, which is discrete-time, one-dimensional map that is a fundamental paradigm for the study of chaotic systems. We demonstrate the direct encoding of binary information into the oscillations of the chaotic circuit. We demonstrate a new concept in power amplification, called syncrodyne amplification , which uses fundamental properties of chaotic oscillators to provide high-efficiency, high gain amplification of standard communication waveforms as well as typical chaotic oscillations. We show modeling results of this system providing nearly 60-dB power gain and 80% PAE for communications waveforms conforming to GMSK modulation. Finally we show results from a fabricated syncrodyne amplifier circuit operating at 2 MHz, providing over 40-dB power gain and 72% PAE, and propose design criteria for an 824--850 MHz circuit utilizing heterojunction bipolar transistors (HBTs), providing the basis for microwave frequency realization.
Git as an Encrypted Distributed Version Control System
2015-03-01
options. The algorithm uses AES- 256 counter mode with an IV derived from SHA -1-HMAC hash (this is nearly identical to the GCM mode discussed earlier...built into the internal structure of Git. Every file in a Git repository is check summed with a SHA -1 hash, a one-way function with arbitrarily long...implementation. Git-encrypt calls OpenSSL cryptography library command line functions. The default cipher used is AES- 256 - Electronic Code Book (ECB), which is
Strong Password-Based Authentication in TLS Using the Three-PartyGroup Diffie-Hellman Protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abdalla, Michel; Bresson, Emmanuel; Chevassut, Olivier
2006-08-26
The Internet has evolved into a very hostile ecosystem where"phishing'' attacks are common practice. This paper shows that thethree-party group Diffie-Hellman key exchange can help protect againstthese attacks. We have developed a suite of password-based cipher suitesfor the Transport Layer Security (TLS) protocol that are not onlyprovably secure but also assumed to be free from patent and licensingrestrictions based on an analysis of relevant patents in thearea.
Cipher image damage and decisions in real time
NASA Astrophysics Data System (ADS)
Silva-García, Victor Manuel; Flores-Carapia, Rolando; Rentería-Márquez, Carlos; Luna-Benoso, Benjamín; Jiménez-Vázquez, Cesar Antonio; González-Ramírez, Marlon David
2015-01-01
This paper proposes a method for constructing permutations on m position arrangements. Our objective is to encrypt color images using advanced encryption standard (AES), using variable permutations means a different one for each 128-bit block in the first round after the x-or operation is applied. Furthermore, this research offers the possibility of knowing the original image when the encrypted figure suffered a failure from either an attack or not. This is achieved by permuting the original image pixel positions before being encrypted with AES variable permutations, which means building a pseudorandom permutation of 250,000 position arrays or more. To this end, an algorithm that defines a bijective function between the nonnegative integer and permutation sets is built. From this algorithm, the way to build permutations on the 0,1,…,m-1 array, knowing m-1 constants, is presented. The transcendental numbers are used to select these m-1 constants in a pseudorandom way. The quality of the proposed encryption according to the following criteria is evaluated: the correlation coefficient, the entropy, and the discrete Fourier transform. A goodness-of-fit test for each basic color image is proposed to measure the bits randomness degree of the encrypted figure. On the other hand, cipher images are obtained in a loss-less encryption way, i.e., no JPEG file formats are used.
Numerical explorations of R. M. Goodwin's business cycle model.
Jakimowicz, Aleksander
2010-01-01
Goodwin's model, which was formulated in , still attracts economists' attention. The model possesses numerous interesting properties that have been discovered only recently due to the development of the chaos theory and the complexity theory. The first numerical explorations of the model were conducted in the early s by Strotz, McAnulty and Naines (1953). They discovered the coexistence of attractors that are well-known today, two properties of chaotic systems: the sensitive dependence on the initial conditions and the sensitive dependence on parameters. The occurrence of periodic and chaotic attractors is dependent on the value of parameters in a system. In case of certain parametric values fractal basin boundaries exist which results in enormous system sensitivity to external noise. If periodic attractors are placed in the neighborhood of the fractal basin boundaries, then even a low external noise can move the trajectory into the region in which the basin's structure is tangled. This leads to a kind of movement that resembles a chaotic movement on a strange attractor. In Goodwin's model, apart from typical chaotic behavior, there exists yet another kind of complex movements - transient chaotic behavior that is caused by the occurrence of invariant chaotic sets that are not attracting. Such sets are represented by chaotic saddles. Some of the latest observation methods of trajectories lying on invariant chaotic sets that are not attracting are straddle methods. This article provides examples of the basin boundary straddle trajectory and the saddle straddle trajectory. These cases were studied by Lorenz and Nusse (2002). I supplement the results they acquired with calculations of capacity dimension and correlation dimension.
Detection of chaotic dynamics in human gait signals from mobile devices
NASA Astrophysics Data System (ADS)
DelMarco, Stephen; Deng, Yunbin
2017-05-01
The ubiquity of mobile devices offers the opportunity to exploit device-generated signal data for biometric identification, health monitoring, and activity recognition. In particular, mobile devices contain an Inertial Measurement Unit (IMU) that produces acceleration and rotational rate information from the IMU accelerometers and gyros. These signals reflect motion properties of the human carrier. It is well-known that the complexity of bio-dynamical systems gives rise to chaotic dynamics. Knowledge of chaotic properties of these systems has shown utility, for example, in detecting abnormal medical conditions and neurological disorders. Chaotic dynamics has been found, in the lab, in bio-dynamical systems data such as electrocardiogram (heart), electroencephalogram (brain), and gait data. In this paper, we investigate the following question: can we detect chaotic dynamics in human gait as measured by IMU acceleration and gyro data from mobile phones? To detect chaotic dynamics, we perform recurrence analysis on real gyro and accelerometer signal data obtained from mobile devices. We apply the delay coordinate embedding approach from Takens' theorem to reconstruct the phase space trajectory of the multi-dimensional gait dynamical system. We use mutual information properties of the signal to estimate the appropriate delay value, and the false nearest neighbor approach to determine the phase space embedding dimension. We use a correlation dimension-based approach together with estimation of the largest Lyapunov exponent to make the chaotic dynamics detection decision. We investigate the ability to detect chaotic dynamics for the different one-dimensional IMU signals, across human subject and walking modes, and as a function of different phone locations on the human carrier.
Orientational order of motile defects in active nematics
DeCamp, Stephen J.; Redner, Gabriel S.; Baskaran, Aparna; ...
2015-08-17
The study of equilibrium liquid crystals has led to fundamental insights into the nature of ordered materials, as well as many practical applications such as display technologies. Active nematics are a fundamentally different class of liquid crystals, which are driven away from equilibrium by the autonomous motion of their constituent rodlike particles. This internally-generated activity powers the continuous creation and annihilation of topological defects, leading to complex streaming flows whose chaotic dynamics appear to destroy long-range order. Here, we study these dynamics in experimental and computational realizations of active nematics. By tracking thousands of defects over centimeter distances in microtubule-basedmore » active nematics, we identify a non-equilibrium phase characterized by system-spanning orientational order of defects. This emergent order persists over hours despite defect lifetimes of only seconds. Lastly, similar dynamical structures are observed in coarse-grained simulations, suggesting that defect-ordered phases are a generic feature of active nematics.« less
On the adaptivity and complexity embedded into differential evolution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Senkerik, Roman; Pluhacek, Michal; Jasek, Roman
2016-06-08
This research deals with the comparison of the two modern approaches for evolutionary algorithms, which are the adaptivity and complex chaotic dynamics. This paper aims on the investigations on the chaos-driven Differential Evolution (DE) concept. This paper is aimed at the embedding of discrete dissipative chaotic systems in the form of chaotic pseudo random number generators for the DE and comparing the influence to the performance with the state of the art adaptive representative jDE. This research is focused mainly on the possible disadvantages and advantages of both compared approaches. Repeated simulations for Lozi map driving chaotic systems were performedmore » on the simple benchmark functions set, which are more close to the real optimization problems. Obtained results are compared with the canonical not-chaotic and not adaptive DE. Results show that with used simple test functions, the performance of ChaosDE is better in the most cases than jDE and Canonical DE, furthermore due to the unique sequencing in CPRNG given by the hidden chaotic dynamics, thus better and faster selection of unique individuals from population, ChaosDE is faster.« less
Chaotic interactions of self-replicating RNA.
Forst, C V
1996-03-01
A general system of high-order differential equations describing complex dynamics of replicating biomolecules is given. Symmetry relations and coordinate transformations of general replication systems leading to topologically equivalent systems are derived. Three chaotic attractors observed in Lotka-Volterra equations of dimension n = 3 are shown to represent three cross-sections of one and the same chaotic regime. Also a fractal torus in a generalized three-dimensional Lotka-Volterra Model has been linked to one of the chaotic attractors. The strange attractors are studied in the equivalent four-dimensional catalytic replicator network. The fractal torus has been examined in adapted Lotka-Volterra equations. Analytic expressions are derived for the Lyapunov exponents of the flow in the replicator system. Lyapunov spectra for different pathways into chaos has been calculated. In the generalized Lotka-Volterra system a second inner rest point--coexisting with (quasi)-periodic orbits--can be observed; with an abundance of different bifurcations. Pathways from chaotic tori, via quasi-periodic tori, via limit cycles, via multi-periodic orbits--emerging out of periodic doubling bifurcations--to "simple" chaotic attractors can be found.
Feng, Cun-Fang; Xu, Xin-Jian; Wang, Sheng-Jun; Wang, Ying-Hai
2008-06-01
We study projective-anticipating, projective, and projective-lag synchronization of time-delayed chaotic systems on random networks. We relax some limitations of previous work, where projective-anticipating and projective-lag synchronization can be achieved only on two coupled chaotic systems. In this paper, we realize projective-anticipating and projective-lag synchronization on complex dynamical networks composed of a large number of interconnected components. At the same time, although previous work studied projective synchronization on complex dynamical networks, the dynamics of the nodes are coupled partially linear chaotic systems. In this paper, the dynamics of the nodes of the complex networks are time-delayed chaotic systems without the limitation of the partial linearity. Based on the Lyapunov stability theory, we suggest a generic method to achieve the projective-anticipating, projective, and projective-lag synchronization of time-delayed chaotic systems on random dynamical networks, and we find both its existence and sufficient stability conditions. The validity of the proposed method is demonstrated and verified by examining specific examples using Ikeda and Mackey-Glass systems on Erdos-Renyi networks.
Uenohara, Seiji; Mitsui, Takahito; Hirata, Yoshito; Morie, Takashi; Horio, Yoshihiko; Aihara, Kazuyuki
2013-06-01
We experimentally study strange nonchaotic attractors (SNAs) and chaotic attractors by using a nonlinear integrated circuit driven by a quasiperiodic input signal. An SNA is a geometrically strange attractor for which typical orbits have nonpositive Lyapunov exponents. It is a difficult problem to distinguish between SNAs and chaotic attractors experimentally. If a system has an SNA as a unique attractor, the system produces an identical response to a repeated quasiperiodic signal, regardless of the initial conditions, after a certain transient time. Such reproducibility of response outputs is called consistency. On the other hand, if the attractor is chaotic, the consistency is low owing to the sensitive dependence on initial conditions. In this paper, we analyze the experimental data for distinguishing between SNAs and chaotic attractors on the basis of the consistency.
Chaotic itinerancy and power-law residence time distribution in stochastic dynamical systems.
Namikawa, Jun
2005-08-01
Chaotic itinerant motion among varieties of ordered states is described by a stochastic model based on the mechanism of chaotic itinerancy. The model consists of a random walk on a half-line and a Markov chain with a transition probability matrix. The stability of attractor ruin in the model is investigated by analyzing the residence time distribution of orbits at attractor ruins. It is shown that the residence time distribution averaged over all attractor ruins can be described by the superposition of (truncated) power-law distributions if the basin of attraction for each attractor ruin has a zero measure. This result is confirmed by simulation of models exhibiting chaotic itinerancy. Chaotic itinerancy is also shown to be absent in coupled Milnor attractor systems if the transition probability among attractor ruins can be represented as a Markov chain.
Chaotic Zones around Rotating Small Bodies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lages, José; Shevchenko, Ivan I.; Shepelyansky, Dima L., E-mail: jose.lages@utinam.cnrs.fr
Small bodies of the solar system, like asteroids, trans-Neptunian objects, cometary nuclei, and planetary satellites, with diameters smaller than 1000 km usually have irregular shapes, often resembling dumb-bells or contact binaries. The spinning of such a gravitating dumb-bell creates around it a zone of chaotic orbits. We determine its extent analytically and numerically. We find that the chaotic zone swells significantly if the rotation rate is decreased; in particular, the zone swells more than twice if the rotation rate is decreased 10 times with respect to the “centrifugal breakup” threshold. We illustrate the properties of the chaotic orbital zones in examples ofmore » the global orbital dynamics about asteroid 243 Ida (which has a moon, Dactyl, orbiting near the edge of the chaotic zone) and asteroid 25143 Itokawa.« less
Literalism, perspectivism, chaotic fragmentalism and psychotherapy techniques.
Leitner, L M
1982-12-01
Literalism and chaotic fragmentalism have been advanced as two concepts to explain psychopathology while perspectivism has been used to explain psychological health (Landfield, 1980 a). It is hypothesized that, to the extent that they are therapeutic, all therapies move clients toward perspectivism and away from literalism and chaotic fragmentalism. Eight major schools of psychotherapy are discussed in terms of the principles of technique which enable them to change literalism and chaotic fragmentalism. The advantages of a unifying theory permitting diversity of techniques are discussed in relation to the ability of the clinician to be flexible yet not confused. Further, the unifying concepts of literalism, perspectivism, and chaotic fragmentalism are used to understand systematically the strengths and weaknesses of many therapeutic techniques. Finally, the implications of the differences in therapeutic techniques for changing different types of literalisms are discussed.
Attractors of relaxation discrete-time systems with chaotic dynamics on a fast time scale.
Maslennikov, Oleg V; Nekorkin, Vladimir I
2016-07-01
In this work, a new type of relaxation systems is considered. Their prominent feature is that they comprise two distinct epochs, one is slow regular motion and another is fast chaotic motion. Unlike traditionally studied slow-fast systems that have smooth manifolds of slow motions in the phase space and fast trajectories between them, in this new type one observes, apart the same geometric objects, areas of transient chaos. Alternating periods of slow regular motions and fast chaotic ones as well as transitions between them result in a specific chaotic attractor with chaos on a fast time scale. We formulate basic properties of such attractors in the framework of discrete-time systems and consider several examples. Finally, we provide an important application of such systems, the neuronal electrical activity in the form of chaotic spike-burst oscillations.
Chaotic Experiences and Low-Income Children’s Social-Emotional Development
Bobbitt, Kaeley C.; Gershoff, Elizabeth T.
2016-01-01
Development in early childhood is increasingly likely to take place in multiple contexts. Continuity and discontinuity in children’s experiences across multiple contexts have important implications for their development. This study examines the extent to which children experience chaos in their homes and in their preschool settings is linked with their social-emotional development over the course of the preschool year. Data from a large, representative sample of low-income preschool children attending Head Start was used to test a series of multi-level models. Children whose experiences of their homes were highly chaotic, regardless of the how chaotic their experiences of their classroom were, decreased in their social-emotional skills over the preschool year. Chaotic experiences in the home environment thus appear to have more influence on children’s development than do chaotic preschool experiences. PMID:28435178
640-Gbit/s fast physical random number generation using a broadband chaotic semiconductor laser
NASA Astrophysics Data System (ADS)
Zhang, Limeng; Pan, Biwei; Chen, Guangcan; Guo, Lu; Lu, Dan; Zhao, Lingjuan; Wang, Wei
2017-04-01
An ultra-fast physical random number generator is demonstrated utilizing a photonic integrated device based broadband chaotic source with a simple post data processing method. The compact chaotic source is implemented by using a monolithic integrated dual-mode amplified feedback laser (AFL) with self-injection, where a robust chaotic signal with RF frequency coverage of above 50 GHz and flatness of ±3.6 dB is generated. By using 4-least significant bits (LSBs) retaining from the 8-bit digitization of the chaotic waveform, random sequences with a bit-rate up to 640 Gbit/s (160 GS/s × 4 bits) are realized. The generated random bits have passed each of the fifteen NIST statistics tests (NIST SP800-22), indicating its randomness for practical applications.
Solving large scale traveling salesman problems by chaotic neurodynamics.
Hasegawa, Mikio; Ikeguch, Tohru; Aihara, Kazuyuki
2002-03-01
We propose a novel approach for solving large scale traveling salesman problems (TSPs) by chaotic dynamics. First, we realize the tabu search on a neural network, by utilizing the refractory effects as the tabu effects. Then, we extend it to a chaotic neural network version. We propose two types of chaotic searching methods, which are based on two different tabu searches. While the first one requires neurons of the order of n2 for an n-city TSP, the second one requires only n neurons. Moreover, an automatic parameter tuning method of our chaotic neural network is presented for easy application to various problems. Last, we show that our method with n neurons is applicable to large TSPs such as an 85,900-city problem and exhibits better performance than the conventional stochastic searches and the tabu searches.
Quantitative Measures of Chaotic Charged Particle Dynamics in the Magnetotail
NASA Astrophysics Data System (ADS)
Holland, D. L.; Martin, R. F., Jr.; Burris, C.
2017-12-01
It has long been noted that the motion of charged particles in magnetotail-like magnetic fields is chaotic, however, efforts to quantify the degree of chaos have had conflicting conclusions. In this paper we re-examine the question by focusing on quantitative measures of chaos. We first examine the percentage of orbits that enter the chaotic region of phase space and the average trapping time of those particles. We then examine the average exponential divergence rate (AEDR) of the chaotic particles between their first and last crossing of the mid-plane. We show that at resonant energies where the underlying phase space has a high degree of symmetry, only a small number of particle enter the chaotic region, but they are trapped for long periods of time and the time asymptotic value of the AEDR is very close to the average value of the AEDR. At the off-resonant energies where the phase space is highly asymmetric, the majority of the particle enter the chaotic region for fairly short periods of time and the time asymptotic value of the AEDR is much smaller than the average value. The root cause is that in the resonant case, the longest-lived orbits tend interact with the current many times and sample the entire chaotic region, whereas in the non-resonant case the longest-lived orbits only interact with the current sheet a small number of times but have very long mirrorings where the motion is nearly regular. Additionally we use an ad-hoc model where we model the current sheet as a Lorentz scattering system with each interaction with the current sheet being considered as a "collision". We find that the average kick per collision is greatest at off-resonant energies. Finally, we propose a chaos parameter as the product of the AEDR times the average chaotic particle trapping time times the percentage of orbits that are chaotic. We find that this takes on peak values at the resonant energies.
Proceedings of the 2nd Experimental Chaos Conference
NASA Astrophysics Data System (ADS)
Ditto, William; Pecora, Lou; Shlesinger, Michael; Spano, Mark; Vohra, Sandeep
1995-02-01
The Table of Contents for the full book PDF is as follows: * Introduction * Spatiotemporal Phenomena * Experimental Studies of Chaotic Mixing * Using Random Maps in the Analysis of Experimental Fluid Flows * Transition to Spatiotemporal Chaos in a Reaction-Diffusion System * Ion-Dynamical Chaos in Plasmas * Optics * Chaos in a Synchronously Driven Optical Resonator * Chaos, Patterns and Defects in Stimulated Scattering Phenomena * Test of the Normal Form for a Subcritical Bifurcation * Observation of Bifurcations and Chaos in a Driven Fiber Optic Coil * Applications -- Communications * Robustness and Signal Recovery in a Synchronized Chaotic System * Synchronizing Nonautonomous Chaotic Circuits * Synchronization of Pulse-Coupled Chaotic Oscillators * Ocean Transmission Effects on Chaotic Signals * Controlling Symbolic Dynamics for Communication * Applications -- Control * Analysis of Nonlinear Actuators Using Chaotic Waveforms * Controlling Chaos in a Quasiperiodic Electronic System * Control of Chaos in a CO2 Laser * General Research * Video-Based Analysis of Bifurcation Phenomena in Radio-Frequency-Excited Inert Gas Plasmas * Transition from Soliton to Chaotic Motion During the Impact of a Nonlinear Structure * Sonoluminescence in a Single Bubble: Periodic, Quasiperiodic and Chaotic Light Source * Quantum Chaos Experiments Using Microwave Cavities * Experiments on Quantum Chaos With and Without Time Reversibility * When Small Noise Imposed on Deterministic Dynamics Becomes Important * Biology * Chaos Control for Cardiac Arrhythmias * Irregularities in Spike Trains of Cat Retinal Ganglion Cells * Broad-Band Synchronization in Monkey Neocortex * Applicability of Correlation Dimension Calculations to Blood Pressure Signal in Rats * Tests for Deterministic Chaos in Noisy Time Series * The Crayfish Mechanoreceptor Cell: A Biological Example of Stochastic Resonance * Chemistry * Chaos During Heterogeneous Chemical Reactions * Stabilizing and Tracking Unstable Periodic Orbits and Stationary States in Chemical Systems * Recursive Proportional-Feedback and Its Use to Control Chaos in an Electrochemical System * Temperature Patterns on Catalytic Surfaces * Meteorology/Oceanography * Nonlinear Evolution of Water Waves: Hilbert's View * Fractal Properties of Isoconcentration Surfaces in a Smoke Plume * Fractal Dimensions of Remotely Sensed Atmospheric Signals * Are Ocean Surface Waves Chaotic? * Dynamical Attractor Reconstruction for a Marine Stratocumulus Cloud
Information's role in the estimation of chaotic signals
NASA Astrophysics Data System (ADS)
Drake, Daniel Fred
1998-11-01
Researchers have proposed several methods designed to recover chaotic signals from noise-corrupted observations. While the methods vary, their qualitative performance does not: in low levels of noise all methods effectively recover the underlying signal; in high levels of noise no method can recover the underlying signal to any meaningful degree of accuracy. Of the methods proposed to date, all represent sub-optimal estimators. So: Is the inability to recover the signal in high noise levels simply a consequence of estimator sub-optimality? Or is estimator failure actually a manifestation of some intrinsic property of chaos itself? These questions are answered by deriving an optimal estimator for a class of chaotic systems and noting that it, too, fails in high levels of noise. An exact, closed- form expression for the estimator is obtained for a class of chaotic systems whose signals are solutions to a set of linear (but noncausal) difference equations. The existence of this linear description circumvents the difficulties normally encountered when manipulating the nonlinear (but causal) expressions that govern. chaotic behavior. The reason why even the optimal estimator fails to recover underlying chaotic signals in high levels of noise has its roots in information theory. At such noise levels, the mutual information linking the corrupted observations to the underlying signal is essentially nil, reducing the estimator to a simple guessing strategy based solely on a priori statistics. Entropy, long the common bond between information theory and dynamical systems, is actually one aspect of a far more complete characterization of information sources: the rate distortion function. Determining the rate distortion function associated with the class of chaotic systems considered in this work provides bounds on estimator performance in high levels of noise. Finally, a slight modification of the linear description leads to a method of synthesizing on limited precision platforms ``pseudo-chaotic'' sequences that mimic true chaotic behavior to any finite degree of precision and duration. The use of such a technique in spread-spectrum communications is considered.
NASA Astrophysics Data System (ADS)
Li, Jing Xia; Xu, Hang; Liu, Li; Su, Peng Cheng; Zhang, Jian Guo
2015-05-01
We report a chaotic optical time-domain reflectometry for fiber fault location, where a chaotic probe signal is generated by driving a distributed feedback laser diode with an improved Colpitts chaotic oscillator. The results show that the unterminated fiber end, the loose connector, and the mismatch connector can be precisely located. A measurement range of approximately 91 km and a range independent resolution of 6 cm are achieved. This implementation method is easy to integrate and is cost effective, which gives it great potential for commercial applications.
NASA Astrophysics Data System (ADS)
Srivastava, R.; Srivastava, P. K.; Chattopadhyay, J.
2013-07-01
Chaotic oscillations have been observed experimentally in dual-frequency oscillator OAP - Ce+4-BrO- 3-H2SO4 in CSTR. The system shows variation of oscillating potential and frequencies when it moves from low frequency to high frequency region and vice-versa. It was observed that system bifurcate from low frequency to chaotic regime through periode-2 and period-3 on the other hand system bifurcate from chaotic regime to high frequency oscillation through period-2. It was established that the observed oscillations are chaotic in nature on the basis of next amplitude map and bifurcation sequences.
Regular transport dynamics produce chaotic travel times.
Villalobos, Jorge; Muñoz, Víctor; Rogan, José; Zarama, Roberto; Johnson, Neil F; Toledo, Benjamín; Valdivia, Juan Alejandro
2014-06-01
In the hope of making passenger travel times shorter and more reliable, many cities are introducing dedicated bus lanes (e.g., Bogota, London, Miami). Here we show that chaotic travel times are actually a natural consequence of individual bus function, and hence of public transport systems more generally, i.e., chaotic dynamics emerge even when the route is empty and straight, stops and lights are equidistant and regular, and loading times are negligible. More generally, our findings provide a novel example of chaotic dynamics emerging from a single object following Newton's laws of motion in a regularized one-dimensional system.
NASA Astrophysics Data System (ADS)
Kryanev, A. V.; Ivanov, V. V.; Romanova, A. O.; Sevastyanov, L. A.; Udumyan, D. K.
2018-03-01
This paper considers the problem of separating the trend and the chaotic component of chaotic time series in the absence of information on the characteristics of the chaotic component. Such a problem arises in nuclear physics, biomedicine, and many other applied fields. The scheme has two stages. At the first stage, smoothing linear splines with different values of smoothing parameter are used to separate the "trend component." At the second stage, the method of least squares is used to find the unknown variance σ2 of the noise component.
Fast and secure encryption-decryption method based on chaotic dynamics
Protopopescu, Vladimir A.; Santoro, Robert T.; Tolliver, Johnny S.
1995-01-01
A method and system for the secure encryption of information. The method comprises the steps of dividing a message of length L into its character components; generating m chaotic iterates from m independent chaotic maps; producing an "initial" value based upon the m chaotic iterates; transforming the "initial" value to create a pseudo-random integer; repeating the steps of generating, producing and transforming until a pseudo-random integer sequence of length L is created; and encrypting the message as ciphertext based upon the pseudo random integer sequence. A system for accomplishing the invention is also provided.
Dynamic analysis of a buckled asymmetric piezoelectric beam for energy harvesting
DOE Office of Scientific and Technical Information (OSTI.GOV)
Van Blarigan, Louis, E-mail: louis01@umail.ucsb.edu; Moehlis, Jeff
2016-03-15
A model of a buckled beam energy harvester is analyzed to determine the phenomena behind the transition between high and low power output levels. It is shown that the presence of a chaotic attractor is a sufficient condition to predict high power output, though there are relatively small areas where high output is achieved without a chaotic attractor. The chaotic attractor appears as a product of a period doubling cascade or a boundary crisis. Bifurcation diagrams provide insight into the development of the chaotic region as the input power level is varied, as well as the intermixed periodic windows.
Yau, Her-Terng; Hung, Tzu-Hsiang; Hsieh, Chia-Chun
2012-01-01
This study used the complex dynamic characteristics of chaotic systems and Bluetooth to explore the topic of wireless chaotic communication secrecy and develop a communication security system. The PID controller for chaos synchronization control was applied, and the optimum parameters of this PID controller were obtained using a Particle Swarm Optimization (PSO) algorithm. Bluetooth was used to realize wireless transmissions, and a chaotic wireless communication security system was developed in the design concept of a chaotic communication security system. The experimental results show that this scheme can be used successfully in image encryption.
Regular transport dynamics produce chaotic travel times
NASA Astrophysics Data System (ADS)
Villalobos, Jorge; Muñoz, Víctor; Rogan, José; Zarama, Roberto; Johnson, Neil F.; Toledo, Benjamín; Valdivia, Juan Alejandro
2014-06-01
In the hope of making passenger travel times shorter and more reliable, many cities are introducing dedicated bus lanes (e.g., Bogota, London, Miami). Here we show that chaotic travel times are actually a natural consequence of individual bus function, and hence of public transport systems more generally, i.e., chaotic dynamics emerge even when the route is empty and straight, stops and lights are equidistant and regular, and loading times are negligible. More generally, our findings provide a novel example of chaotic dynamics emerging from a single object following Newton's laws of motion in a regularized one-dimensional system.
Bistability and chaos in the Taylor-Green dynamo.
Yadav, Rakesh K; Verma, Mahendra K; Wahi, Pankaj
2012-03-01
Using direct numerical simulations, we study dynamo action under Taylor-Green forcing for a magnetic Prandtl number of 0.5. We observe bistability with weak- and strong-magnetic-field branches. Both the dynamo branches undergo subcritical dynamo transition. We also observe a host of dynamo states including constant, periodic, quasiperiodic, and chaotic magnetic fields. One of the chaotic states originates through a quasiperiodic route with phase locking, while the other chaotic attractor appears to follow the Newhouse-Ruelle-Takens route to chaos. We also observe intermittent transitions between quasiperiodic and chaotic states for a given Taylor-Green forcing.
Chaotic Motifs in Gene Regulatory Networks
Zhang, Zhaoyang; Ye, Weiming; Qian, Yu; Zheng, Zhigang; Huang, Xuhui; Hu, Gang
2012-01-01
Chaos should occur often in gene regulatory networks (GRNs) which have been widely described by nonlinear coupled ordinary differential equations, if their dimensions are no less than 3. It is therefore puzzling that chaos has never been reported in GRNs in nature and is also extremely rare in models of GRNs. On the other hand, the topic of motifs has attracted great attention in studying biological networks, and network motifs are suggested to be elementary building blocks that carry out some key functions in the network. In this paper, chaotic motifs (subnetworks with chaos) in GRNs are systematically investigated. The conclusion is that: (i) chaos can only appear through competitions between different oscillatory modes with rivaling intensities. Conditions required for chaotic GRNs are found to be very strict, which make chaotic GRNs extremely rare. (ii) Chaotic motifs are explored as the simplest few-node structures capable of producing chaos, and serve as the intrinsic source of chaos of random few-node GRNs. Several optimal motifs causing chaos with atypically high probability are figured out. (iii) Moreover, we discovered that a number of special oscillators can never produce chaos. These structures bring some advantages on rhythmic functions and may help us understand the robustness of diverse biological rhythms. (iv) The methods of dominant phase-advanced driving (DPAD) and DPAD time fraction are proposed to quantitatively identify chaotic motifs and to explain the origin of chaotic behaviors in GRNs. PMID:22792171
Generating Random Numbers by Means of Nonlinear Dynamic Systems
ERIC Educational Resources Information Center
Zang, Jiaqi; Hu, Haojie; Zhong, Juhua; Luo, Duanbin; Fang, Yi
2018-01-01
To introduce the randomness of a physical process to students, a chaotic pendulum experiment was opened in East China University of Science and Technology (ECUST) on the undergraduate level in the physics department. It was shown chaotic motion could be initiated through adjusting the operation of a chaotic pendulum. By using the data of the…
Chaos analysis of viscoelastic chaotic flows of polymeric fluids in a micro-channel
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lim, C. P.; Lam, Y. C., E-mail: myclam@ntu.edu.sg; BioSystems and Micromechanics
2015-07-15
Many fluids, including biological fluids such as mucus and blood, are viscoelastic. Through the introduction of chaotic flows in a micro-channel and the construction of maps of characteristic chaos parameters, differences in viscoelastic properties of these fluids can be measured. This is demonstrated by creating viscoelastic chaotic flows induced in an H-shaped micro-channel through the steady infusion of a polymeric fluid of polyethylene oxide (PEO) and another immiscible fluid (silicone oil). A protocol for chaos analysis was established and demonstrated for the analysis of the chaotic flows generated by two polymeric fluids of different molecular weight but with similar relaxationmore » times. The flows were shown to be chaotic through the computation of their correlation dimension (D{sub 2}) and the largest Lyapunov exponent (λ{sub 1}), with D{sub 2} being fractional and λ{sub 1} being positive. Contour maps of D{sub 2} and λ{sub 1} of the respective fluids in the operating space, which is defined by the combination of polymeric fluids and silicone oil flow rates, were constructed to represent the characteristic of the chaotic flows generated. It was observed that, albeit being similar, the fluids have generally distinct characteristic maps with some similar trends. The differences in the D{sub 2} and λ{sub 1} maps are indicative of the difference in the molecular weight of the polymers in the fluids because the driving force of the viscoelastic chaotic flows is of molecular origin. This approach in constructing the characteristic maps of chaos parameters can be employed as a diagnostic tool for biological fluids and, more generally, chaotic signals.« less
Orbital structure in oscillating galactic potentials
NASA Astrophysics Data System (ADS)
Terzić, Balša; Kandrup, Henry E.
2004-01-01
Subjecting a galactic potential to (possibly damped) nearly periodic, time-dependent variations can lead to large numbers of chaotic orbits experiencing systematic changes in energy, and the resulting chaotic phase mixing could play an important role in explaining such phenomena as violent relaxation. This paper focuses on the simplest case of spherically symmetric potentials subjected to strictly periodic driving with the aim of understanding precisely why orbits become chaotic and under what circumstances they will exhibit systematic changes in energy. Four unperturbed potentials V0(r) were considered, each subjected to a time dependence of the form V(r, t) =V0(r)(1 +m0 sinωt). In each case, the orbits divide clearly into regular and chaotic, distinctions which appear absolute. In particular, transitions from regularity to chaos are seemingly impossible. Over finite time intervals, chaotic orbits subdivide into what can be termed `sticky' chaotic orbits, which exhibit no large-scale secular changes in energy and remain trapped in the phase-space region where they started; and `wildly' chaotic orbits, which do exhibit systematic drifts in energy as the orbits diffuse to different phase-space regions. This latter distinction is not absolute, transitions corresponding apparently to orbits penetrating a `leaky' phase-space barrier. The three different orbit types can be identified simply in terms of the frequencies for which their Fourier spectra have the most power. An examination of the statistical properties of orbit ensembles as a function of driving frequency ω allows us to identify the specific resonances that determine orbital structure. Attention focuses also on how, for fixed amplitude m0, such quantities as the mean energy shift, the relative measure of chaotic orbits and the mean value of the largest Lyapunov exponent vary with driving frequency ω and how, for fixed ω, the same quantities depend on m0.
Kügler, Philipp; Bulelzai, M A K; Erhardt, André H
2017-04-04
Early afterdepolarizations (EADs) are pathological voltage oscillations during the repolarization phase of cardiac action potentials (APs). EADs are caused by drugs, oxidative stress or ion channel disease, and they are considered as potential precursors to cardiac arrhythmias in recent attempts to redefine the cardiac drug safety paradigm. The irregular behaviour of EADs observed in experiments has been previously attributed to chaotic EAD dynamics under periodic pacing, made possible by a homoclinic bifurcation in the fast subsystem of the deterministic AP system of differential equations. In this article we demonstrate that a homoclinic bifurcation in the fast subsystem of the action potential model is neither a necessary nor a sufficient condition for the genesis of chaotic EADs. We rather argue that a cascade of period doubling (PD) bifurcations of limit cycles in the full AP system paves the way to chaotic EAD dynamics across a variety of models including a) periodically paced and spontaneously active cardiomyocytes, b) periodically paced and non-active cardiomyocytes as well as c) unpaced and spontaneously active cardiomyocytes. Furthermore, our bifurcation analysis reveals that chaotic EAD dynamics may coexist in a stable manner with fully regular AP dynamics, where only the initial conditions decide which type of dynamics is displayed. EADs are a potential source of cardiac arrhythmias and hence are of relevance both from the viewpoint of drug cardiotoxicity testing and the treatment of cardiomyopathies. The model-independent association of chaotic EADs with period doubling cascades of limit cycles introduced in this article opens novel opportunities to study chaotic EADs by means of bifurcation control theory and inverse bifurcation analysis. Furthermore, our results may shed new light on the synchronization and propagation of chaotic EADs in homogeneous and heterogeneous multicellular and cardiac tissue preparations.
Composing chaotic music from the letter m
NASA Astrophysics Data System (ADS)
Sotiropoulos, Anastasios D.
Chaotic music is composed from a proposed iterative map depicting the letter m, relating the pitch, duration and loudness of successive steps. Each of the two curves of the letter m is based on the classical logistic map. Thus, the generating map is xn+1 = r xn(1/2 - xn) for xn between 0 and 1/2 defining the first curve, and xn+1 = r (xn - 1/2)(1 - xn) for xn between 1/2 and 1 representing the second curve. The parameter r which determines the height(s) of the letter m varies from 2 to 16, the latter value ensuring fully developed chaotic solutions for the whole letter m; r = 8 yielding full chaotic solutions only for its first curve. The m-model yields fixed points, bifurcation points and chaotic regions for each separate curve, as well as values of the parameter r greater than 8 which produce inter-fixed points, inter-bifurcation points and inter-chaotic regions from the interplay of the two curves. Based on this, music is composed from mapping the m- recurrence model solutions onto actual notes. The resulting musical score strongly depends on the sequence of notes chosen by the composer to define the musical range corresponding to the range of the chaotic mathematical solutions x from 0 to 1. Here, two musical ranges are used; one is the middle chromatic scale and the other is the seven- octaves range. At the composer's will and, for aesthetics, within the same composition, notes can be the outcome of different values of r and/or shifted in any octave. Compositions with endings of non-repeating note patterns result from values of r in the m-model that do not produce bifurcations. Scores of chaotic music composed from the m-model and the classical logistic model are presented.
Lee, Jeffrey S; Cleaver, Gerald B
2017-10-01
In this note, the Cosmic Microwave Background (CMB) Radiation is shown to be capable of functioning as a Random Bit Generator, and constitutes an effectively infinite supply of truly random one-time pad values of arbitrary length. It is further argued that the CMB power spectrum potentially conforms to the FIPS 140-2 standard. Additionally, its applicability to the generation of a (n × n) random key matrix for a Vernam cipher is established.
NASA Astrophysics Data System (ADS)
Xu, Naijun; Yang, Lingzhen; Zhang, Juan; Zhang, Xiangyuan; Wang, Juanfen; Zhang, Zhaoxia; Liu, Xianglian
2014-03-01
We propose a fault localization method for wavelength division multiplexing passive optical network (WDM-PON). A proof-of-concept experiment was demonstrated by utilizing the wavelength tunable chaotic laser generated from an erbium-doped fiber ring laser with a manual tunable fiber Bragg grating (TFBG) filter. The range of the chaotic lasing wavelength can cover the C-band. Basing on the TFBG filter, we can adjust the wavelength of the chaotic laser to match the WDM-PON channel with identical wavelength. We determined the fault location by calculating the cross-correlation between the reference and return signals. Analysis of the characteristics of the wavelength tunable chaotic laser showed that the breakpoint, the loose connector, and the mismatch connector could be precisely located. A dynamic range of approximately 23.8 dB and a spatial resolution of 4 cm, which was independent of the measuring range, were obtained.
NASA Astrophysics Data System (ADS)
Wang, Ying-Mei; Wang, Wen-Xiu; Chen, He-Sheng; Zhang, Kai; Jiang, Yu-Mei; Wang, Xu-Ming; He, Da-Ren
2002-03-01
A system concatenated by two area-preserving maps may be addressed as "quasi- dissipative," since such a system can display dissipative behaviors^1. This is due to noninvertibility induced by discontinuity in the system function. In such a system, the image set of the discontinuous border forms a chaotic quasi-attractor. At a critical control parameter value the quasi-attractor suddenly vanishes. The chaotic iterations escape, via a leaking hole, to an emergent period-8 elliptic island. The hole is the intersection of the chaotic quasi-attractor and the period-8 island. The chaotic quasi-attractor thus changes to chaotic quasi-transients. The scaling behavior that drives the quasi-crisis has been investigated numerically. It reads:
A discrete-time chaos synchronization system for electronic locking devices
NASA Astrophysics Data System (ADS)
Minero-Ramales, G.; López-Mancilla, D.; Castañeda, Carlos E.; Huerta Cuellar, G.; Chiu Z., R.; Hugo García López, J.; Jaimes Reátegui, R.; Villafaña Rauda, E.; Posadas-Castillo, C.
2016-11-01
This paper presents a novel electronic locking key based on discrete-time chaos synchronization. Two Chen chaos generators are synchronized using the Model-Matching Approach, from non-linear control theory, in order to perform the encryption/decryption of the signal to be transmitted. A model/transmitter system is designed, generating a key of chaotic pulses in discrete-time. A plant/receiver system uses the above mentioned key to unlock the mechanism. Two alternative schemes to transmit the private chaotic key are proposed. The first one utilizes two transmission channels. One channel is used to encrypt the chaotic key and the other is used to achieve output synchronization. The second alternative uses only one transmission channel for obtaining synchronization and encryption of the chaotic key. In both cases, the private chaotic key is encrypted again with chaos to solve secure communication-related problems. The results obtained via simulations contribute to enhance the electronic locking devices.
NASA Astrophysics Data System (ADS)
Tirandaz, Hamed; Karami-Mollaee, Ali
2018-06-01
Chaotic systems demonstrate complex behaviour in their state variables and their parameters, which generate some challenges and consequences. This paper presents a new synchronisation scheme based on integral sliding mode control (ISMC) method on a class of complex chaotic systems with complex unknown parameters. Synchronisation between corresponding states of a class of complex chaotic systems and also convergence of the errors of the system parameters to zero point are studied. The designed feedback control vector and complex unknown parameter vector are analytically achieved based on the Lyapunov stability theory. Moreover, the effectiveness of the proposed methodology is verified by synchronisation of the Chen complex system and the Lorenz complex systems as the leader and the follower chaotic systems, respectively. In conclusion, some numerical simulations related to the synchronisation methodology is given to illustrate the effectiveness of the theoretical discussions.
NASA Astrophysics Data System (ADS)
Akpojotor, Godfrey; Ehwerhemuepha, Louis; Amromanoh, Ogheneriobororue
2013-03-01
The presence of physical systems whose characteristics change in a seemingly erratic manner gives rise to the study of chaotic systems. The characteristics of these systems are due to their hypersensitivity to changes in initial conditions. In order to understand chaotic systems, some sort of simulation and visualization is pertinent. Consequently, in this work, we have simulated and graphically visualized chaos in a driven nonlinear pendulum as a means of introducing chaotic systems. The results obtained which highlight the hypersensitivity of the pendulum are used to discuss the effectiveness of teaching and learning the physics of chaotic system using Python. This study is one of the many studies under the African Computational Science and Engineering Tour Project (PASET) which is using Python to model, simulate and visualize concepts, laws and phenomena in Science and Engineering to compliment the teaching/learning of theory and experiment.
Attractors of relaxation discrete-time systems with chaotic dynamics on a fast time scale
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maslennikov, Oleg V.; Nekorkin, Vladimir I.
In this work, a new type of relaxation systems is considered. Their prominent feature is that they comprise two distinct epochs, one is slow regular motion and another is fast chaotic motion. Unlike traditionally studied slow-fast systems that have smooth manifolds of slow motions in the phase space and fast trajectories between them, in this new type one observes, apart the same geometric objects, areas of transient chaos. Alternating periods of slow regular motions and fast chaotic ones as well as transitions between them result in a specific chaotic attractor with chaos on a fast time scale. We formulate basicmore » properties of such attractors in the framework of discrete-time systems and consider several examples. Finally, we provide an important application of such systems, the neuronal electrical activity in the form of chaotic spike-burst oscillations.« less
A one-time pad color image cryptosystem based on SHA-3 and multiple chaotic systems
NASA Astrophysics Data System (ADS)
Wang, Xingyuan; Wang, Siwei; Zhang, Yingqian; Luo, Chao
2018-04-01
A novel image encryption algorithm is proposed that combines the SHA-3 hash function and two chaotic systems: the hyper-chaotic Lorenz and Chen systems. First, 384 bit keystream hash values are obtained by applying SHA-3 to plaintext. The sensitivity of the SHA-3 algorithm and chaotic systems ensures the effect of a one-time pad. Second, the color image is expanded into three-dimensional space. During permutation, it undergoes plane-plane displacements in the x, y and z dimensions. During diffusion, we use the adjacent pixel dataset and corresponding chaotic value to encrypt each pixel. Finally, the structure of alternating between permutation and diffusion is applied to enhance the level of security. Furthermore, we design techniques to improve the algorithm's encryption speed. Our experimental simulations show that the proposed cryptosystem achieves excellent encryption performance and can resist brute-force, statistical, and chosen-plaintext attacks.
Chaotic dynamics of controlled electric power systems
NASA Astrophysics Data System (ADS)
Kozlov, V. N.; Trosko, I. U.
2016-12-01
The conditions for appearance of chaotic dynamics of electromagnetic and electromechanical processes in energy systems described by the Park-Gorev bilinear differential equations with account for lags of coordinates and restrictions on control have been formulated. On the basis of classical equations, the parameters of synchronous generators and power lines, at which the chaotic dynamics of energy systems appears, have been found. The qualitative and quantitative characteristics of chaotic processes in energy associations of two types, based on the Hopf theorem, and methods of nonstationary linearization and decompositions are given. The properties of spectral characteristics of chaotic processes have been investigated, and the qualitative similarity of bilinear equations of power systems and Lorentz equations have been found. These results can be used for modernization of the systems of control of energy objects. The qualitative and quantitative characteristics for power energy systems as objects of control and for some laws of control with the feedback have been established.
Terminal Transient Phase of Chaotic Transients
NASA Astrophysics Data System (ADS)
Lilienkamp, Thomas; Parlitz, Ulrich
2018-03-01
Transient chaos in spatially extended systems can be characterized by the length of the transient phase, which typically grows quickly with the system size (supertransients). For a large class of these systems, the chaotic phase terminates abruptly, without any obvious precursors in commonly used observables. Here we investigate transient spatiotemporal chaos in two different models of this class. By probing the state space using perturbed trajectories we show the existence of a "terminal transient phase," which occurs prior to the abrupt collapse of chaotic dynamics. During this phase the impact of perturbations is significantly different from the earlier transient and particular patterns of (non)susceptible regions in state space occur close to the chaotic trajectories. We therefore hypothesize that even without perturbations proper precursors for the collapse of chaotic transients exist, which might be highly relevant for coping with spatiotemporal chaos in cardiac arrhythmias or brain functionality, for example.
A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps
NASA Astrophysics Data System (ADS)
Ahmad, Musheer; Khurana, Shruti; Singh, Sushmita; AlSharari, Hamed D.
2017-06-01
The chaotic maps posses high parameter sensitivity, random-like behavior and one-way computations, which favor the construction of cryptographic hash functions. In this paper, we propose to present a novel hash function scheme which uses multiple chaotic maps to generate efficient variable-sized hash functions. The message is divided into four parts, each part is processed by a different 1D chaotic map unit yielding intermediate hash code. The four codes are concatenated to two blocks, then each block is processed through 2D chaotic map unit separately. The final hash value is generated by combining the two partial hash codes. The simulation analyses such as distribution of hashes, statistical properties of confusion and diffusion, message and key sensitivity, collision resistance and flexibility are performed. The results reveal that the proposed anticipated hash scheme is simple, efficient and holds comparable capabilities when compared with some recent chaos-based hash algorithms.
Chaotic neoclassical separatrix dissipation in parametric drift-wave decay.
Kabantsev, A A; Tsidulko, Yu A; Driscoll, C F
2014-02-07
Experiments and theory characterize a parametric decay instability between plasma drift waves when the nonlinear coupling is modified by an electrostatic barrier. Novel mode coupling terms representing enhanced dissipation and mode phase shifts are caused by chaotic separatrix crossings on the wave-ruffled separatrix. Experimental determination of these coupling terms is in broad agreement with new chaotic neoclassical transport analyses.
Melnikov method approach to control of homoclinic/heteroclinic chaos by weak harmonic excitations.
Chacón, Ricardo
2006-09-15
A review on the application of Melnikov's method to control homoclinic and heteroclinic chaos in low-dimensional, non-autonomous and dissipative oscillator systems by weak harmonic excitations is presented, including diverse applications, such as chaotic escape from a potential well, chaotic solitons in Frenkel-Kontorova chains and chaotic-charged particles in the field of an electrostatic wave packet.
PSO algorithm enhanced with Lozi Chaotic Map - Tuning experiment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pluhacek, Michal; Senkerik, Roman; Zelinka, Ivan
2015-03-10
In this paper it is investigated the effect of tuning of control parameters of the Lozi Chaotic Map employed as a chaotic pseudo-random number generator for the particle swarm optimization algorithm. Three different benchmark functions are selected from the IEEE CEC 2013 competition benchmark set. The Lozi map is extensively tuned and the performance of PSO is evaluated.
Extreme multistability in a memristor-based multi-scroll hyper-chaotic system.
Yuan, Fang; Wang, Guangyi; Wang, Xiaowei
2016-07-01
In this paper, a new memristor-based multi-scroll hyper-chaotic system is designed. The proposed memristor-based system possesses multiple complex dynamic behaviors compared with other chaotic systems. Various coexisting attractors and hidden coexisting attractors are observed in this system, which means extreme multistability arises. Besides, by adjusting parameters of the system, this chaotic system can perform single-scroll attractors, double-scroll attractors, and four-scroll attractors. Basic dynamic characteristics of the system are investigated, including equilibrium points and stability, bifurcation diagrams, Lyapunov exponents, and so on. In addition, the presented system is also realized by an analog circuit to confirm the correction of the numerical simulations.
Route to broadband chaos in a chaotic laser diode subject to optical injection.
Wang, An-Bang; Wang, Yun-Cai; Wang, Juan-Fen
2009-04-15
We experimentally and numerically demonstrate a route to bandwidth-enhanced chaos that is induced by an additional optical injection for a chaotic laser diode with optical feedback. The measured and calculated optical spectra consistently reveal that the mechanism of bandwidth enhancement is the interaction between the injection and chaotic laser field via beating. The bandwidth can be maximized only when the injected light is detuned into the edge of the optical spectrum of the chaotic laser field and the beating frequency exceeds the original bandwidth. The simulated dynamics maps indicate that 20 GHz broadband chaos can be obtained by commonly used laser diodes.
Widely tunable chaotic fiber laser for WDM-PON detection
NASA Astrophysics Data System (ADS)
Zhang, Juan; Yang, Ling-zhen; Xu, Nai-jun; Wang, Juan-fen; Zhang, Zhao-xia; Liu, Xiang-lian
2014-05-01
A widely tunable high precision chaotic fiber laser is proposed and experimentally demonstrated. A tunable fiber Bragg grating (TFBG) filter is used as a tuning element to determine the turning range from 1533 nm to 1558 nm with a linewidth of 0.5 nm at any wavelength. The wide tuning range is capable of supporting 32 wavelength-division multiplexing (WDM) channels with 100 GHz channel spacing. All single wavelengths are found to be chaotic with 10 GHz bandwidth. The full width at half maximum (FWHM) of the chaotic correlation curve of the different wavelengths is on a picosecond time scale, thereby offering millimeter spatial resolution in WDM detection.
Fractional Order Spatiotemporal Chaos with Delay in Spatial Nonlinear Coupling
NASA Astrophysics Data System (ADS)
Zhang, Yingqian; Wang, Xingyuan; Liu, Liyan; Liu, Jia
We investigate the spatiotemporal dynamics with fractional order differential logistic map with delay under nonlinear chaotic maps for spatial coupling connections. Here, the coupling methods between lattices are the nonlinear chaotic map coupling of lattices. The fractional order differential logistic map with delay breaks the limits of the range of parameter μ ∈ [3.75, 4] in the classical logistic map for chaotic states. The Kolmogorov-Sinai entropy density and universality, and bifurcation diagrams are employed to investigate the chaotic behaviors of the proposed model in this paper. The proposed model can also be applied for cryptography, which is verified in a color image encryption scheme in this paper.
Detecting unstable periodic orbits in chaotic time series using synchronization
NASA Astrophysics Data System (ADS)
Olyaei, Ali Azimi; Wu, Christine; Kinsner, Witold
2017-07-01
An alternative approach of detecting unstable periodic orbits in chaotic time series is proposed using synchronization techniques. A master-slave synchronization scheme is developed, in which the chaotic system drives a system of harmonic oscillators through a proper coupling condition. The proposed scheme is designed so that the power of the coupling signal exhibits notches that drop to zero once the system approaches an unstable orbit yielding an explicit indication of the presence of a periodic motion. The results shows that the proposed approach is particularly suitable in practical situations, where the time series is short and noisy, or it is obtained from high-dimensional chaotic systems.
NASA Astrophysics Data System (ADS)
Lai, Qiang; Zhao, Xiao-Wen; Rajagopal, Karthikeyan; Xu, Guanghui; Akgul, Akif; Guleryuz, Emre
2018-01-01
This paper considers the generation of multi-butterfly chaotic attractors from a generalised Sprott C system with multiple non-hyperbolic equilibria. The system is constructed by introducing an additional variable whose derivative has a switching function to the Sprott C system. It is numerically found that the system creates two-, three-, four-, five-butterfly attractors and any other multi-butterfly attractors. First, the dynamic analyses of multi-butterfly chaotic attractors are presented. Secondly, the field programmable gate array implementation, electronic circuit realisation and random number generator are done with the multi-butterfly chaotic attractors.
Parameter estimation for chaotic systems using improved bird swarm algorithm
NASA Astrophysics Data System (ADS)
Xu, Chuangbiao; Yang, Renhuan
2017-12-01
Parameter estimation of chaotic systems is an important problem in nonlinear science and has aroused increasing interest of many research fields, which can be basically reduced to a multidimensional optimization problem. In this paper, an improved boundary bird swarm algorithm is used to estimate the parameters of chaotic systems. This algorithm can combine the good global convergence and robustness of the bird swarm algorithm and the exploitation capability of improved boundary learning strategy. Experiments are conducted on the Lorenz system and the coupling motor system. Numerical simulation results reveal the effectiveness and with desirable performance of IBBSA for parameter estimation of chaotic systems.
A novel color image encryption scheme using alternate chaotic mapping structure
NASA Astrophysics Data System (ADS)
Wang, Xingyuan; Zhao, Yuanyuan; Zhang, Huili; Guo, Kang
2016-07-01
This paper proposes an color image encryption algorithm using alternate chaotic mapping structure. Initially, we use the R, G and B components to form a matrix. Then one-dimension logistic and two-dimension logistic mapping is used to generate a chaotic matrix, then iterate two chaotic mappings alternately to permute the matrix. For every iteration, XOR operation is adopted to encrypt plain-image matrix, then make further transformation to diffuse the matrix. At last, the encrypted color image is obtained from the confused matrix. Theoretical analysis and experimental results has proved the cryptosystem is secure and practical, and it is suitable for encrypting color images.
Chaotic CDMA watermarking algorithm for digital image in FRFT domain
NASA Astrophysics Data System (ADS)
Liu, Weizhong; Yang, Wentao; Feng, Zhuoming; Zou, Xuecheng
2007-11-01
A digital image-watermarking algorithm based on fractional Fourier transform (FRFT) domain is presented by utilizing chaotic CDMA technique in this paper. As a popular and typical transmission technique, CDMA has many advantages such as privacy, anti-jamming and low power spectral density, which can provide robustness against image distortions and malicious attempts to remove or tamper with the watermark. A super-hybrid chaotic map, with good auto-correlation and cross-correlation characteristics, is adopted to produce many quasi-orthogonal codes (QOC) that can replace the periodic PN-code used in traditional CDAM system. The watermarking data is divided into a lot of segments that correspond to different chaotic QOC respectively and are modulated into the CDMA watermarking data embedded into low-frequency amplitude coefficients of FRFT domain of the cover image. During watermark detection, each chaotic QOC extracts its corresponding watermarking segment by calculating correlation coefficients between chaotic QOC and watermarked data of the detected image. The CDMA technique not only can enhance the robustness of watermark but also can compress the data of the modulated watermark. Experimental results show that the watermarking algorithm has good performances in three aspects: better imperceptibility, anti-attack robustness and security.
A novel grid multiwing chaotic system with only non-hyperbolic equilibria
NASA Astrophysics Data System (ADS)
Zhang, Sen; Zeng, Yicheng; Li, Zhijun; Wang, Mengjiao; Xiong, Le
2018-05-01
The structure of the chaotic attractor of a system is mainly determined by the nonlinear functions in system equations. By using a new saw-tooth wave function and a new stair function, a novel complex grid multiwing chaotic system which belongs to non-Shil'nikov chaotic system with non-hyperbolic equilibrium points is proposed in this paper. It is particularly interesting that the complex grid multiwing attractors are generated by increasing the number of non-hyperbolic equilibrium points, which are different from the traditional methods of realising multiwing attractors by adding the index-2 saddle-focus equilibrium points in double-wing chaotic systems. The basic dynamical properties of the new system, such as dissipativity, phase portraits, the stability of the equilibria, the time-domain waveform, power spectrum, bifurcation diagram, Lyapunov exponents, and so on, are investigated by theoretical analysis and numerical simulations. Furthermore, the corresponding electronic circuit is designed and simulated on the Multisim platform. The Multisim simulation results and the hardware experimental results are in good agreement with the numerical simulations of the same system on Matlab platform, which verify the feasibility of this new grid multiwing chaotic system.
NASA Technical Reports Server (NTRS)
Wisdom, Jack
2002-01-01
In these 18 years, the research has touched every major dynamical problem in the solar system, including: the effect of chaotic zones on the distribution of asteroids, the delivery of meteorites along chaotic pathways, the chaotic motion of Pluto, the chaotic motion of the outer planets and that of the whole solar system, the delivery of short period comets from the Kuiper belt, the tidal evolution of the Uranian arid Galilean satellites, the chaotic tumbling of Hyperion and other irregular satellites, the large chaotic variations of the obliquity of Mars, the evolution of the Earth-Moon system, and the resonant core- mantle dynamics of Earth and Venus. It has introduced new analytical and numerical tools that are in widespread use. Today, nearly every long-term integration of our solar system, its subsystems, and other solar systems uses algorithms that was invented. This research has all been primarily Supported by this sequence of PGG NASA grants. During this period published major investigations of tidal evolution of the Earth-Moon system and of the passage of the Earth and Venus through non-linear core-mantle resonances were completed. It has published a major innovation in symplectic algorithms: the symplectic corrector. A paper was completed on non-perturbative hydrostatic equilibrium.
Long, Zhili; Wang, Rui; Fang, Jiwen; Dai, Xufei; Li, Zuohua
2017-07-01
Piezoelectric actuators invariably exhibit hysteresis nonlinearities that tend to become significant under the open-loop condition and could cause oscillations and errors in nanometer-positioning tasks. Chaotic map modified particle swarm optimization (MPSO) is proposed and implemented to identify the Prandtl-Ishlinskii model for piezoelectric actuators. Hysteresis compensation is attained through application of an inverse Prandtl-Ishlinskii model, in which the parameters are formulated based on the original model with chaotic map MPSO. To strengthen the diversity and improve the searching ergodicity of the swarm, an initial method of adaptive inertia weight based on a chaotic map is proposed. To compare and prove that the swarm's convergence occurs before stochastic initialization and to attain an optimal particle swarm optimization algorithm, the parameters of a proportional-integral-derivative controller are searched using self-tuning, and the simulated results are used to verify the search effectiveness of chaotic map MPSO. The results show that chaotic map MPSO is superior to its competitors for identifying the Prandtl-Ishlinskii model and that the inverse Prandtl-Ishlinskii model can provide hysteresis compensation under different conditions in a simple and effective manner.
Cooling of a magmatic system under thermal chaotic mixing
NASA Astrophysics Data System (ADS)
Petrelli, Maurizio; El Omari, Kamal; Le Guer, Yves; Perugini, Diego
2015-04-01
The cooling of a melt undergoing chaotic advection is studied numerically for a magma with a temperature-dependent viscosity in a 2D cavity with moving boundary. Different statistical mixing and energy indicators are used to characterize the efficiency of cooling by thermal chaotic mixing. We show that different cooling rates can be obtained during the thermal mixing even of a single basaltic magmatic batch undergoing chaotic advection. This process can induce complex temperature patterns inside the magma chamber. The emergence of chaotic dynamics strongly affects the temperature field during time and greatly increases the cooling rates. This mechanism has implications for the lifetime of a magmatic body and may favor the appearance of chemical heterogeneities in igneous systems as a result of different crystallization rates. Results from this study also highlight that even a single magma batch can develop, under chaotic thermal advection, complex thermal and therefore compositional patterns resulting from different cooling rates, which can account for some natural features that, to date, have received unsatisfactory explanations. Among them, the production of magmatic enclaves showing completely different cooling histories compared with the host magma, compositional zoning in mineral phases, and the generation of large-scale compositionally zoning observed in many plutons worldwide.
Synthetic Modeling of Autonomous Learning with a Chaotic Neural Network
NASA Astrophysics Data System (ADS)
Funabashi, Masatoshi
We investigate the possible role of intermittent chaotic dynamics called chaotic itinerancy, in interaction with nonsupervised learnings that reinforce and weaken the neural connection depending on the dynamics itself. We first performed hierarchical stability analysis of the Chaotic Neural Network model (CNN) according to the structure of invariant subspaces. Irregular transition between two attractor ruins with positive maximum Lyapunov exponent was triggered by the blowout bifurcation of the attractor spaces, and was associated with riddled basins structure. We secondly modeled two autonomous learnings, Hebbian learning and spike-timing-dependent plasticity (STDP) rule, and simulated the effect on the chaotic itinerancy state of CNN. Hebbian learning increased the residence time on attractor ruins, and produced novel attractors in the minimum higher-dimensional subspace. It also augmented the neuronal synchrony and established the uniform modularity in chaotic itinerancy. STDP rule reduced the residence time on attractor ruins, and brought a wide range of periodicity in emerged attractors, possibly including strange attractors. Both learning rules selectively destroyed and preserved the specific invariant subspaces, depending on the neuron synchrony of the subspace where the orbits are situated. Computational rationale of the autonomous learning is discussed in connectionist perspective.
Improving performance of DS-CDMA systems using chaotic complex Bernoulli spreading codes
NASA Astrophysics Data System (ADS)
Farzan Sabahi, Mohammad; Dehghanfard, Ali
2014-12-01
The most important goal of spreading spectrum communication system is to protect communication signals against interference and exploitation of information by unintended listeners. In fact, low probability of detection and low probability of intercept are two important parameters to increase the performance of the system. In Direct Sequence Code Division Multiple Access (DS-CDMA) systems, these properties are achieved by multiplying the data information in spreading sequences. Chaotic sequences, with their particular properties, have numerous applications in constructing spreading codes. Using one-dimensional Bernoulli chaotic sequence as spreading code is proposed in literature previously. The main feature of this sequence is its negative auto-correlation at lag of 1, which with proper design, leads to increase in efficiency of the communication system based on these codes. On the other hand, employing the complex chaotic sequences as spreading sequence also has been discussed in several papers. In this paper, use of two-dimensional Bernoulli chaotic sequences is proposed as spreading codes. The performance of a multi-user synchronous and asynchronous DS-CDMA system will be evaluated by applying these sequences under Additive White Gaussian Noise (AWGN) and fading channel. Simulation results indicate improvement of the performance in comparison with conventional spreading codes like Gold codes as well as similar complex chaotic spreading sequences. Similar to one-dimensional Bernoulli chaotic sequences, the proposed sequences also have negative auto-correlation. Besides, construction of complex sequences with lower average cross-correlation is possible with the proposed method.
NASA Astrophysics Data System (ADS)
Yang, Ningning; Xu, Cheng; Wu, Chaojun; Jia, Rong; Liu, Chongxin
2017-12-01
Memristor is a nonlinear “missing circuit element”, that can easily achieve chaotic oscillation. Memristor-based chaotic systems have received more and more attention. Research shows that fractional-order systems are more close to real systems. As an important parameter, the order can increase the flexibility and degree of freedom of the system. In this paper, a fractional-order generalized memristor, which consists of a diode bridge and a parallel circuit with an equivalent unit circuit and a linear resistance, is proposed. Frequency and electrical characteristics of the fractional-order memristor are analyzed. A chain structure circuit is used to implement the fractional-order unit circuit. Then replacing the conventional Chua’s diode by the fractional-order generalized memristor, a fractional-order memristor-based chaotic circuit is proposed. A large amount of research work has been done to investigate the influence of the order on the dynamical behaviors of the fractional-order memristor-based chaotic circuit. Varying with the order, the system enters the chaotic state from the periodic state through the Hopf bifurcation and period-doubling bifurcation. The chaotic state of the system has two types of attractors: single-scroll and double-scroll attractor. The stability theory of fractional-order systems is used to determine the minimum order occurring Hopf bifurcation. And the influence of the initial value on the system is analyzed. Circuit simulations are designed to verify the results of theoretical analysis and numerical simulation.
Experimental chaotic quantification in bistable vortex induced vibration systems
NASA Astrophysics Data System (ADS)
Huynh, B. H.; Tjahjowidodo, T.
2017-02-01
The study of energy harvesting by means of vortex induced vibration systems has been initiated a few years ago and it is considered to be potential as a low water current energy source. The energy harvester is realized by exposing an elastically supported blunt structure under water flow. However, it is realized that the system will only perform at a limited operating range (water flow) that is attributed to the resonance phenomenon that occurs only at a frequency that corresponds to the fluid flow. An introduction of nonlinear elements seems to be a prominent solution to overcome the problem. Among many nonlinear elements, a bistable spring is known to be able to improve the harvested power by a vortex induced vibrations (VIV) based energy converter at the low velocity water flows. However, it is also observed that chaotic vibrations will occur at different operating ranges that will erratically diminish the harvested power and cause a difficulty in controlling the system that is due to the unpredictability in motions of the VIV structure. In order to design a bistable VIV energy converter with improved harvested power and minimum negative effect of chaotic vibrations, the bifurcation map of the system for varying governing parameters is highly on demand. In this study, chaotic vibrations of a VIV energy converter enhanced by a bistable stiffness element are quantified in a wide range of the governing parameters, i.e. damping and bistable gap. Chaotic vibrations of the bistable VIV energy converter are simulated by utilization of a wake oscillator model and quantified based on the calculation of the Lyapunov exponent. Ultimately, a series of experiments of the system in a water tunnel, facilitated by a computer-based force-feedback testing platform, is carried out to validate the existence of chaotic responses. The main challenge in dealing with experimental data is in distinguishing chaotic response from noise-contaminated periodic responses as noise will smear out the regularity of periodic responses. For this purpose, a surrogate data test is used in order to check the hypotheses for the presence of chaotic behavior. The analyses from the experimental results support the hypothesis from simulation that chaotic response is likely occur on the real system.
Quantized Synchronization of Chaotic Neural Networks With Scheduled Output Feedback Control.
Wan, Ying; Cao, Jinde; Wen, Guanghui
In this paper, the synchronization problem of master-slave chaotic neural networks with remote sensors, quantization process, and communication time delays is investigated. The information communication channel between the master chaotic neural network and slave chaotic neural network consists of several remote sensors, with each sensor able to access only partial knowledge of output information of the master neural network. At each sampling instants, each sensor updates its own measurement and only one sensor is scheduled to transmit its latest information to the controller's side in order to update the control inputs for the slave neural network. Thus, such communication process and control strategy are much more energy-saving comparing with the traditional point-to-point scheme. Sufficient conditions for output feedback control gain matrix, allowable length of sampling intervals, and upper bound of network-induced delays are derived to ensure the quantized synchronization of master-slave chaotic neural networks. Lastly, Chua's circuit system and 4-D Hopfield neural network are simulated to validate the effectiveness of the main results.In this paper, the synchronization problem of master-slave chaotic neural networks with remote sensors, quantization process, and communication time delays is investigated. The information communication channel between the master chaotic neural network and slave chaotic neural network consists of several remote sensors, with each sensor able to access only partial knowledge of output information of the master neural network. At each sampling instants, each sensor updates its own measurement and only one sensor is scheduled to transmit its latest information to the controller's side in order to update the control inputs for the slave neural network. Thus, such communication process and control strategy are much more energy-saving comparing with the traditional point-to-point scheme. Sufficient conditions for output feedback control gain matrix, allowable length of sampling intervals, and upper bound of network-induced delays are derived to ensure the quantized synchronization of master-slave chaotic neural networks. Lastly, Chua's circuit system and 4-D Hopfield neural network are simulated to validate the effectiveness of the main results.
Microfluidic Mixing Technology for a Universal Health Sensor
NASA Technical Reports Server (NTRS)
Chan, Eugene Y.; Bae, Candice
2009-01-01
A highly efficient means of microfluidic mixing has been created for use with the rHEALTH sensor an elliptical mixer and passive curvilinear mixing patterns. The rHEALTH sensor provides rapid, handheld, complete blood count, cell differential counts, electrolyte measurements, and other lab tests based on a reusable, flow-based microfluidic platform. These geometries allow for cleaning in a reusable manner, and also allow for complete mixing of fluid streams. The microfluidic mixing is performed by flowing two streams of fluid into an elliptical or curvilinear design that allows the combination of the flows into one channel. The mixing is accomplished by either chaotic advection around micro - fluidic loops. All components of the microfluidic chip are flow-through, meaning that cleaning solution can be introduced into the chip to flush out cells, plasma proteins, and dye. Tests were performed on multiple chip geometries to show that cleaning is efficient in any flowthrough design. The conclusion from these experiments is that the chip can indeed be flushed out with microliter volumes of solution and biological samples are cleaned readily from the chip with minimal effort. The technology can be applied in real-time health monitoring at patient s bedside or in a doctor s office, and real-time clinical intervention in acute situations. It also can be used for daily measurement of hematocrit for patients on anticoagulant drugs, or to detect acute myocardial damage outside a hospital.
Extreme multistability in a memristor-based multi-scroll hyper-chaotic system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yuan, Fang, E-mail: yf210yf@163.com; Wang, Guangyi, E-mail: wanggyi@163.com; Wang, Xiaowei
In this paper, a new memristor-based multi-scroll hyper-chaotic system is designed. The proposed memristor-based system possesses multiple complex dynamic behaviors compared with other chaotic systems. Various coexisting attractors and hidden coexisting attractors are observed in this system, which means extreme multistability arises. Besides, by adjusting parameters of the system, this chaotic system can perform single-scroll attractors, double-scroll attractors, and four-scroll attractors. Basic dynamic characteristics of the system are investigated, including equilibrium points and stability, bifurcation diagrams, Lyapunov exponents, and so on. In addition, the presented system is also realized by an analog circuit to confirm the correction of the numericalmore » simulations.« less
Frequency-locked chaotic opto-RF oscillator.
Thorette, Aurélien; Romanelli, Marco; Brunel, Marc; Vallet, Marc
2016-06-15
A driven opto-RF oscillator, consisting of a dual-frequency laser (DFL) submitted to frequency-shifted feedback, is experimentally and numerically studied in a chaotic regime. Precise control of the reinjection strength and detuning permits isolation of a parameter region of bounded-phase chaos, where the opto-RF oscillator is frequency-locked to the master oscillator, in spite of chaotic phase and intensity oscillations. Robust experimental evidence of this synchronization regime is found, and phase noise spectra allow us to compare phase-locking and bounded-phase chaos regimes. In particular, it is found that the long-term phase stability of the master oscillator is well transferred to the opto-RF oscillator, even in the chaotic regime.
Temperature crossover of decoherence rates in chaotic and regular bath dynamics.
Sanz, A S; Elran, Y; Brumer, P
2012-03-01
The effect of chaotic bath dynamics on the decoherence of a quantum system is examined for the vibrational degrees of freedom of a diatomic molecule in a realistic, constant temperature collisional bath. As an example, the specific case of I(2) in liquid xenon is examined as a function of temperature, and the results compared with an integrable xenon bath. A crossover in behavior is found: The integrable bath induces more decoherence at low bath temperatures than does the chaotic bath, whereas the opposite is the case at the higher bath temperatures. These results, verifying a conjecture due to Wilkie, shed light on the differing views of the effect of chaotic dynamics on system decoherence.
Fundamental quantitative security in quantum key generation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yuen, Horace P.
2010-12-15
We analyze the fundamental security significance of the quantitative criteria on the final generated key K in quantum key generation including the quantum criterion d, the attacker's mutual information on K, and the statistical distance between her distribution on K and the uniform distribution. For operational significance a criterion has to produce a guarantee on the attacker's probability of correctly estimating some portions of K from her measurement, in particular her maximum probability of identifying the whole K. We distinguish between the raw security of K when the attacker just gets at K before it is used in a cryptographicmore » context and its composition security when the attacker may gain further information during its actual use to help get at K. We compare both of these securities of K to those obtainable from conventional key expansion with a symmetric key cipher. It is pointed out that a common belief in the superior security of a quantum generated K is based on an incorrect interpretation of d which cannot be true, and the security significance of d is uncertain. Generally, the quantum key distribution key K has no composition security guarantee and its raw security guarantee from concrete protocols is worse than that of conventional ciphers. Furthermore, for both raw and composition security there is an exponential catch-up problem that would make it difficult to quantitatively improve the security of K in a realistic protocol. Some possible ways to deal with the situation are suggested.« less
Wang, Jun; Zhou, Bi-hua; Zhou, Shu-dao; Sheng, Zheng
2015-01-01
The paper proposes a novel function expression method to forecast chaotic time series, using an improved genetic-simulated annealing (IGSA) algorithm to establish the optimum function expression that describes the behavior of time series. In order to deal with the weakness associated with the genetic algorithm, the proposed algorithm incorporates the simulated annealing operation which has the strong local search ability into the genetic algorithm to enhance the performance of optimization; besides, the fitness function and genetic operators are also improved. Finally, the method is applied to the chaotic time series of Quadratic and Rossler maps for validation. The effect of noise in the chaotic time series is also studied numerically. The numerical results verify that the method can forecast chaotic time series with high precision and effectiveness, and the forecasting precision with certain noise is also satisfactory. It can be concluded that the IGSA algorithm is energy-efficient and superior. PMID:26000011
Entanglement as a signature of quantum chaos.
Wang, Xiaoguang; Ghose, Shohini; Sanders, Barry C; Hu, Bambi
2004-01-01
We explore the dynamics of entanglement in classically chaotic systems by considering a multiqubit system that behaves collectively as a spin system obeying the dynamics of the quantum kicked top. In the classical limit, the kicked top exhibits both regular and chaotic dynamics depending on the strength of the chaoticity parameter kappa in the Hamiltonian. We show that the entanglement of the multiqubit system, considered for both the bipartite and the pairwise entanglement, yields a signature of quantum chaos. Whereas bipartite entanglement is enhanced in the chaotic region, pairwise entanglement is suppressed. Furthermore, we define a time-averaged entangling power and show that this entangling power changes markedly as kappa moves the system from being predominantly regular to being predominantly chaotic, thus sharply identifying the edge of chaos. When this entangling power is averaged over all states, it yields a signature of global chaos. The qualitative behavior of this global entangling power is similar to that of the classical Lyapunov exponent.
NASA Astrophysics Data System (ADS)
Coronel-Escamilla, A.; Gómez-Aguilar, J. F.; Torres, L.; Escobar-Jiménez, R. F.; Valtierra-Rodríguez, M.
2017-12-01
In this paper, we propose a state-observer-based approach to synchronize variable-order fractional (VOF) chaotic systems. In particular, this work is focused on complete synchronization with a so-called unidirectional master-slave topology. The master is described by a dynamical system in state-space representation whereas the slave is described by a state observer. The slave is composed of a master copy and a correction term which in turn is constituted of an estimation error and an appropriate gain that assures the synchronization. The differential equations of the VOF chaotic system are described by the Liouville-Caputo and Atangana-Baleanu-Caputo derivatives. Numerical simulations involving the synchronization of Rössler oscillators, Chua's systems and multi-scrolls are studied. The simulations show that different chaotic behaviors can be obtained if different smooths functions defined in the interval (0 , 1 ] are used as the variable order of the fractional derivatives. Furthermore, simulations show that the VOF chaotic systems can be synchronized.
Spatiotemporal chaos in mixed linear-nonlinear two-dimensional coupled logistic map lattice
NASA Astrophysics Data System (ADS)
Zhang, Ying-Qian; He, Yi; Wang, Xing-Yuan
2018-01-01
We investigate a new spatiotemporal dynamics with mixing degrees of nonlinear chaotic maps for spatial coupling connections based on 2DCML. Here, the coupling methods are including with linear neighborhood coupling and the nonlinear chaotic map coupling of lattices, and the former 2DCML system is only a special case in the proposed system. In this paper the criteria such Kolmogorov-Sinai entropy density and universality, bifurcation diagrams, space-amplitude and snapshot pattern diagrams are provided in order to investigate the chaotic behaviors of the proposed system. Furthermore, we also investigate the parameter ranges of the proposed system which holds those features in comparisons with those of the 2DCML system and the MLNCML system. Theoretical analysis and computer simulation indicate that the proposed system contains features such as the higher percentage of lattices in chaotic behaviors for most of parameters, less periodic windows in bifurcation diagrams and the larger range of parameters for chaotic behaviors, which is more suitable for cryptography.
Chaotic dynamics and its analysis of Hindmarsh-Rose neurons by Shil’nikov approach
NASA Astrophysics Data System (ADS)
Wei, Wei; Zuo, Min
2015-08-01
In this paper, the relationship between external current stimulus and chaotic behaviors of a Hindmarsh-Rose (HR) neuron is considered. In order to find out the range of external current stimulus which will produce chaotic behaviors of an HR neuron, the Shil’nikov technique is employed. The Cardano formula is taken to obtain the threshold of the chaotic motion, and series solution to a differential equation is utilized to obtain the homoclinic orbit of HR neurons. This analysis establishes mathematically the value of external current input in generating chaotic motion of HR neurons by the Shil’nikov method. The numerical simulations are performed to support the theoretical results. Project supported by the Beijing Natural Science Foundation, China (Grant No. 4132005), the National Natural Science Foundation of China (Grant No. 61403006), the Importation and Development of High-Caliber Talents Project of Beijing Municipal Institutions, China (Grant No. YETP1449), and the Project of Scientific and Technological Innovation Platform, China (Grant No. PXM2015_014213_000063).
Xia, H M; Wan, S Y M; Shu, C; Chew, Y T
2005-07-01
We report two chaotic micromixers that exhibit fast mixing at low Reynolds numbers in this paper. Passive mixers usually use the channel geometry to stir the fluids, and many previously reported designs rely on inertial effects which are only available at moderate Re. In this paper, we propose two chaotic micromixers using two-layer crossing channels. Both numerical and experimental studies show that the mixers are very efficient for fluid manipulation at low Reynolds numbers, such as stretching and splitting, folding and recombination, through which chaotic advection can be generated and the mixing is significantly promoted. More importantly, the generation of chaotic advection does not rely on the fluid inertial forces, so the mixers work well at very low Re. The mixers are benchmarked against a three-dimensional serpentine mixer. Results show that the latter is inefficient at Re = 0.2, while the new design exhibits rapid mixing at Re = 0.2 and at Re of O(10(-2)). The new mixer design will benefit various microfluidic systems.
Chaotic behaviour of the short-term variations in ozone column observed in Arctic
NASA Astrophysics Data System (ADS)
Petkov, Boyan H.; Vitale, Vito; Mazzola, Mauro; Lanconelli, Christian; Lupi, Angelo
2015-09-01
The diurnal variations observed in the ozone column at Ny-Ålesund, Svalbard during different periods of 2009, 2010 and 2011 have been examined to test the hypothesis that they could be a result of a chaotic process. It was found that each of the attractors, reconstructed by applying the time delay technique and corresponding to any of the three time series can be embedded by 6-dimensional space. Recurrence plots, depicted to characterise the attractor features revealed structures typical for a chaotic system. In addition, the two positive Lyapunov exponents found for the three attractors, the fractal Hausdorff dimension presented by the Kaplan-Yorke estimator and the feasibility to predict the short-term ozone column variations within 10-20 h, knowing the past behaviour make the assumption about their chaotic character more realistic. The similarities of the estimated parameters in all three cases allow us to hypothesise that the three time series under study likely present one-dimensional projections of the same chaotic system taken at different time intervals.
NASA Astrophysics Data System (ADS)
Lin, Zhuosheng; Yu, Simin; Li, Chengqing; Lü, Jinhu; Wang, Qianxue
This paper proposes a chaotic secure video remote communication scheme that can perform on real WAN networks, and implements it on a smartphone hardware platform. First, a joint encryption and compression scheme is designed by embedding a chaotic encryption scheme into the MJPG-Streamer source codes. Then, multiuser smartphone communications between the sender and the receiver are implemented via WAN remote transmission. Finally, the transmitted video data are received with the given IP address and port in an Android smartphone. It should be noted that, this is the first time that chaotic video encryption schemes are implemented on such a hardware platform. The experimental results demonstrate that the technical challenges on hardware implementation of secure video communication are successfully solved, reaching a balance amongst sufficient security level, real-time processing of massive video data, and utilization of available resources in the hardware environment. The proposed scheme can serve as a good application example of chaotic secure communications for smartphone and other mobile facilities in the future.
NASA Astrophysics Data System (ADS)
Dou, Xinyu; Yin, Hongxi; Yue, Hehe; Jin, Yu; Shen, Jing; Li, Lin
2015-09-01
In this paper, a real-time online fault monitoring technique for chaos-based passive optical networks (PONs) is proposed and experimentally demonstrated. The fault monitoring is performed by the chaotic communication signal. The proof-of-concept experiments are demonstrated for two PON structures, i.e., wavelength-division-multiplexing (WDM) PON and Ethernet PON (EPON), respectively. For WDM PON, two monitoring approaches are investigated, one deploying a chaotic optical time domain reflectometry (OTDR) for each transmitter, and the other using only one tunable chaotic OTDR. The experimental results show that the faults at beyond 20 km from the OLT can be detected and located. The spatial resolution of the tunable chaotic OTDR is an order of magnitude of centimeter. Meanwhile, the monitoring process can operate in parallel with the chaotic optical secure communications. The proposed technique has benefits of real-time, online, precise fault location, and simple realization, which will significantly reduce the cost of operation, administration and maintenance (OAM) of PON.
NASA Astrophysics Data System (ADS)
Sinha, Nitish; Singh, Arun K.; Singh, Trilok N.
2018-04-01
A fundamental understanding of frictional sliding at rock surfaces is of practical importance for nucleation and propagation of earthquakes and rock slope stability. We investigate numerically the effect of different physical parameters such as inertia, viscous damping, temperature and normal stress on the chaotic behaviour of the two state variables rate and state friction (2sRSF) model. In general, a slight variation in any of inertia, viscous damping, temperature and effective normal stress reduces the chaotic behaviour of the sliding system. However, the present study has shown the appearance of chaos for the specific values of normal stress before it disappears again as the normal stress varies further. It is also observed that magnitude of system stiffness at which chaotic motion occurs, is less than the corresponding value of critical stiffness determined by using the linear stability analysis. These results explain the practical observation why chaotic nucleation of an earthquake is a rare phenomenon as reported in literature.
Wang, Jun; Zhou, Bi-hua; Zhou, Shu-dao; Sheng, Zheng
2015-01-01
The paper proposes a novel function expression method to forecast chaotic time series, using an improved genetic-simulated annealing (IGSA) algorithm to establish the optimum function expression that describes the behavior of time series. In order to deal with the weakness associated with the genetic algorithm, the proposed algorithm incorporates the simulated annealing operation which has the strong local search ability into the genetic algorithm to enhance the performance of optimization; besides, the fitness function and genetic operators are also improved. Finally, the method is applied to the chaotic time series of Quadratic and Rossler maps for validation. The effect of noise in the chaotic time series is also studied numerically. The numerical results verify that the method can forecast chaotic time series with high precision and effectiveness, and the forecasting precision with certain noise is also satisfactory. It can be concluded that the IGSA algorithm is energy-efficient and superior.
Dynamics of coherent states in regular and chaotic regimes of the non-integrable Dicke model
NASA Astrophysics Data System (ADS)
Lerma-Hernández, S.; Chávez-Carlos, J.; Bastarrachea-Magnani, M. A.; López-del-Carpio, B.; Hirsch, J. G.
2018-04-01
The quantum dynamics of initial coherent states is studied in the Dicke model and correlated with the dynamics, regular or chaotic, of their classical limit. Analytical expressions for the survival probability, i.e. the probability of finding the system in its initial state at time t, are provided in the regular regions of the model. The results for regular regimes are compared with those of the chaotic ones. It is found that initial coherent states in regular regions have a much longer equilibration time than those located in chaotic regions. The properties of the distributions for the initial coherent states in the Hamiltonian eigenbasis are also studied. It is found that for regular states the components with no negligible contribution are organized in sequences of energy levels distributed according to Gaussian functions. In the case of chaotic coherent states, the energy components do not have a simple structure and the number of participating energy levels is larger than in the regular cases.
On the relevance of chaos for halo stars in the solar neighbourhood II
NASA Astrophysics Data System (ADS)
Maffione, Nicolas P.; Gómez, Facundo A.; Cincotta, Pablo M.; Giordano, Claudia M.; Grand, Robert J. J.; Marinacci, Federico; Pakmor, Rüdiger; Simpson, Christine M.; Springel, Volker; Frenk, Carlos S.
2018-05-01
In a previous paper based on dark matter only simulations we show that, in the approximation of an analytic and static potential describing the strongly triaxial and cuspy shape of Milky Way-sized haloes, diffusion due to chaotic mixing in the neighbourhood of the Sun does not efficiently erase phase space signatures of past accretion events. In this second paper we further explore the effect of chaotic mixing using multicomponent Galactic potential models and solar neighbourhood-like volumes extracted from fully cosmological hydrodynamic simulations, thus naturally accounting for the gravitational potential associated with baryonic components, such as the bulge and disc. Despite the strong change in the global Galactic potentials with respect to those obtained in dark matter only simulations, our results confirm that a large fraction of halo particles evolving on chaotic orbits exhibit their chaotic behaviour after periods of time significantly larger than a Hubble time. In addition, significant diffusion in phase space is not observed on those particles that do exhibit chaotic behaviour within a Hubble time.
NASA Astrophysics Data System (ADS)
Chavarette, Fábio Roberto; Balthazar, José Manoel; Felix, Jorge L. P.; Rafikov, Marat
2009-05-01
This paper analyzes the non-linear dynamics, with a chaotic behavior of a particular micro-electro-mechanical system. We used a technique of the optimal linear control for reducing the irregular (chaotic) oscillatory movement of the non-linear systems to a periodic orbit. We use the mathematical model of a (MEMS) proposed by Luo and Wang.
Chaotic behavior in Malaysian stock market: A study with recurrence quantification analysis
NASA Astrophysics Data System (ADS)
Niu, Betty Voon Wan; Noorani, Mohd Salmi Md; Jaaman, Saiful Hafizah
2016-11-01
The dynamics of stock market has been questioned for decades. Its behavior appeared random yet some found it behaves as chaos. Up to 5000 daily adjusted closing data of FTSE Bursa Malaysia Kuala Lumpur Composite Index (KLSE) was investigated through recurrence plot and recurrence quantification analysis. Results were compared between stochastic system, chaotic system and deterministic system. Results show that KLSE daily adjusted closing data behaves chaotically.
Chaotic Motions in the Real Fuzzy Electronic Circuits
2012-12-30
field of secure communications, the original source should be blended with other complex signals. Chaotic signals are one of the good sources to be...Takagi-Sugeno (T-S) fuzzy chaotic systems on electronic circuit. In the research field of secure communications, the original source should be blended ...model. The overall fuzzy model of the system is achieved by fuzzy blending of the linear system models. Consider a continuous-time nonlinear dynamic
Cooling of a Magmatic System Under Thermal Chaotic Mixing
NASA Astrophysics Data System (ADS)
El Omari, Kamal; Le Guer, Yves; Perugini, Diego; Petrelli, Maurizio
2015-07-01
The cooling of a basaltic melt undergoing chaotic advection is studied numerically for a magma with a temperature-dependent viscosity in a two-dimensional (2D) cavity with moving boundary. Different statistical mixing and energy indicators are used to characterize the efficiency of cooling by thermal chaotic mixing. We show that different cooling rates can be obtained during the thermal mixing of a single basaltic magmatic batch undergoing chaotic advection. This process can induce complex temperature patterns inside the magma chamber. The emergence of chaotic dynamics strongly modulates the temperature fields over time and greatly increases the cooling rates. This mechanism has implications for the thermal lifetime of the magmatic body and may favor the appearance of chemical heterogeneities in the igneous system as a result of different crystallization rates. Results from this study also highlight that even a single magma batch can develop, under chaotic thermal advection, complex thermal and therefore compositional patterns resulting from different cooling rates, which can account for some natural features that, to date, have received unsatisfactory explanations, including the production of magmatic enclaves showing completely different cooling histories compared with the host magma, compositional zoning in mineral phases, and the generation of large-scale compositional zoning observed in many plutons worldwide.
NASA Astrophysics Data System (ADS)
Yu, Yue; Zhang, Zhengdi; Han, Xiujing
2018-03-01
In this work, we aim to demonstrate the novel routes to periodic and chaotic bursting, i.e., the different bursting dynamics via delayed pitchfork bifurcations around stable attractors, in the classical controlled Lü system. First, by computing the corresponding characteristic polynomial, we determine where some critical values about bifurcation behaviors appear in the Lü system. Moreover, the transition mechanism among different stable attractors has been introduced including homoclinic-type connections or chaotic attractors. Secondly, taking advantage of the above analytical results, we carry out a study of the mechanism for bursting dynamics in the Lü system with slowly periodic variation of certain control parameter. A distinct delayed supercritical pitchfork bifurcation behavior can be discussed when the control item passes through bifurcation points periodically. This delayed dynamical behavior may terminate at different parameter areas, which leads to different spiking modes around different stable attractors (equilibriums, limit cycles, or chaotic attractors). In particular, the chaotic attractor may appear by Shilnikov connections or chaos boundary crisis, which leads to the occurrence of impressive chaotic bursting oscillations. Our findings enrich the study of bursting dynamics and deepen the understanding of some similar sorts of delayed bursting phenomena. Finally, some numerical simulations are included to illustrate the validity of our study.
Extracting harmonic signal from a chaotic background with local linear model
NASA Astrophysics Data System (ADS)
Li, Chenlong; Su, Liyun
2017-02-01
In this paper, the problems of blind detection and estimation of harmonic signal in strong chaotic background are analyzed, and new methods by using local linear (LL) model are put forward. The LL model has been exhaustively researched and successfully applied for fitting and forecasting chaotic signal in many chaotic fields. We enlarge the modeling capacity substantially. Firstly, we can predict the short-term chaotic signal and obtain the fitting error based on the LL model. Then we detect the frequencies from the fitting error by periodogram, a property on the fitting error is proposed which has not been addressed before, and this property ensures that the detected frequencies are similar to that of harmonic signal. Secondly, we establish a two-layer LL model to estimate the determinate harmonic signal in strong chaotic background. To estimate this simply and effectively, we develop an efficient backfitting algorithm to select and optimize the parameters that are hard to be exhaustively searched for. In the method, based on sensitivity to initial value of chaos motion, the minimum fitting error criterion is used as the objective function to get the estimation of the parameters of the two-layer LL model. Simulation shows that the two-layer LL model and its estimation technique have appreciable flexibility to model the determinate harmonic signal in different chaotic backgrounds (Lorenz, Henon and Mackey-Glass (M-G) equations). Specifically, the harmonic signal can be extracted well with low SNR and the developed background algorithm satisfies the condition of convergence in repeated 3-5 times.
NASA Astrophysics Data System (ADS)
Robertson, J.; Metcalfe, G.; Wang, S.; Barnes, S. J.
2014-12-01
The concentration of bubbles, crystals or droplets into small volumes of magma is a key trigger for many interesting magmatic processes. For example, gas slugs driving Strombolian eruptions form from the coalesence of exsolved bubbles within a volcanic conduit, while Ni-Cu-PGE magmatic sulfide deposits require a concentration of dense sulfide droplets from a large volume of magma to form a massive ore body. However the physical mechanism for this clustering remains unresolved - especially since small particles in active magma flows are expected to mostly track flow streamlines rather than clustering. We have uncovered a previously unreported clustering mechanism which is applicable to magmatic flows. This mechanism involves the interaction of particles with two kinds of chaotic flow structure: (a) high-strain regions within the well-mixed chaotic zones of the flow, and (b) unmixed islands of stability within the chaotic flow, known as Kolmogorov-Arnold-Moser (KAM) regions. The first figure shows the difference between chaotic and KAM regions in a chaotic laminar pipe flow. Trapping occurs when particles are scattered from high-strain regions in the chaotic zones and become trapped in the KAM regions, leading to a rapid concentration of particles relative to their original distribution (shown in the second series of figures). Using a combination of these analogue experiments and theoretical analysis we outline the conditions under which this clustering process can occur. We examine the onset of secondary density-related instabilities and the effects of increased particle-particle interaction within the clustered particles, and highlight the impact of particle clustering on the dynamics of magma ascent and emplacement.
Secondary chaotic terrain formation in the higher outflow channels of southern circum-Chryse, Mars
Rodriguez, J.A.P.; Kargel, J.S.; Tanaka, K.L.; Crown, D.A.; Berman, D.C.; Fairen, A.G.; Baker, V.R.; Furfaro, R.; Candelaria, P.; Sasaki, S.
2011-01-01
Higher outflow channel dissection in the martian region of southern circum-Chryse appears to have extended from the Late Hesperian to the Middle Amazonian Epoch. These outflow channels were excavated within the upper 1. km of the cryolithosphere, where no liquid water is expected to have existed during these geologic epochs. In accordance with previous work, our examination of outflow channel floor morphologies suggests the upper crust excavated by the studied outflow channels consisted of a thin (a few tens of meters) layer of dry geologic materials overlying an indurated zone that extends to the bases of the investigated outflow channels (1. km in depth). We find that the floors of these outflow channels contain widespread secondary chaotic terrains (i.e., chaotic terrains produced by the destruction of channel-floor materials). These chaotic terrains occur within the full range of outflow channel dissection and tend to form clusters. Our examination of the geology of these chaotic terrains suggests that their formation did not result in the generation of floods. Nevertheless, despite their much smaller dimensions, these chaotic terrains are comprised of the same basic morphologic elements (e.g., mesas, knobs, and smooth deposits within scarp-bound depressions) as those located in the initiation zones of the outflow channels, which suggests that their formation must have involved the release of ground volatiles. We propose that these chaotic terrains developed not catastrophically but gradually and during multiple episodes of nested surface collapse. In order to explain the formation of secondary chaotic terrains within zones of outflow channel dissection, we propose that the regional Martian cryolithosphere contained widespread lenses of volatiles in liquid form. In this model, channel floor collapse and secondary chaotic terrain formation would have taken place as a consequence of instabilities arising during their exhumation by outflow channel dissection. Within relatively warm upper crustal materials in volcanic settings, or within highly saline crustal materials where cryopegs developed, lenses of volatiles in liquid form within the cryolithosphere could have formed, and/or remained stable.In addition, our numerical simulations suggest that low thermal conductivity, dry fine-grained porous geologic materials just a few tens of meters in thickness (e.g., dunes, sand sheets, some types of regolith materials), could have produced high thermal anomalies resulting in subsurface melting. The existence of a global layer of dry geologic materials overlying the cryolithosphere would suggest that widespread lenses of fluids existed (and may still exist) at shallow depths wherever these materials are fine-grained and porous. The surface ages of the investigated outflow channels and chaotic terrains span a full 500 to 700. Myr. Chaotic terrains similar in dimensions and morphology to secondary chaotic terrains are not observed conspicuously throughout the surface of Mars, suggesting that intra-cryolithospheric fluid lenses may form relatively stable systems. The existence of widespread groundwater lenses at shallow depths of burial has tremendous implications for exobiological studies and future human exploration. We find that the clear geomorphologic anomaly that the chaotic terrains and outflow channels of southern Chryse form within the Martian landscape could have been a consequence of large-scale resurfacing resulting from anomalously extensive subsurface melt in this region of the planet produced by high concentrations of salts within the regional upper crust. Crater count statistics reveal that secondary chaotic terrains and the outflow channels within which they occur have overlapping ages, suggesting that the instabilities leading to their formation rapidly dissipated, perhaps as the thickness of the cryolithosphere was reset following the disruption of the upper crustal thermal structure produced during outflow channel ex
Boundary between stable and unstable regimes of accretion. Ordered and chaotic unstable regimes
NASA Astrophysics Data System (ADS)
Blinova, A. A.; Romanova, M. M.; Lovelace, R. V. E.
2016-07-01
We present a new study of the Rayleigh-Taylor unstable regime of accretion on to rotating magnetized stars in a set of high grid resolution three-dimensional magnetohydrodynamic simulations performed in low-viscosity discs. We find that the boundary between the stable and unstable regimes is determined almost entirely by the fastness parameter ωs = Ω⋆/ΩK(rm), where Ω⋆ is the angular velocity of the star and ΩK(rm) is the angular velocity of the Keplerian disc at the disc-magnetosphere boundary r = rm. We found that accretion is unstable if ωs ≲ 0.6. Accretion through instabilities is present in stars with different magnetospheric sizes. However, only in stars with relatively small magnetospheres, rm/R⋆ ≲ 7, do the unstable tongues produce chaotic hotspots on the stellar surface and irregular light curves. At even smaller values of the fastness parameter, ωs ≲ 0.45, multiple irregular tongues merge, forming one or two ordered unstable tongues that rotate with the angular frequency of the inner disc. This transition occurs in stars with even smaller magnetospheres, rm/R⋆ ≲ 4.2. Most of our simulations were performed at a small tilt of the dipole magnetosphere, Θ = 5°, and a small viscosity parameter α = 0.02. Test simulations at higher α values show that many more cases become unstable, and the light curves become even more irregular. Test simulations at larger tilts of the dipole Θ show that instability is present, however, accretion in two funnel streams dominates if Θ ≳ 15°. The results of these simulations can be applied to accreting magnetized stars with relatively small magnetospheres: Classical T Tauri stars, accreting millisecond X-ray pulsars, and cataclysmic variables.
Adaptive feedback synchronization of a unified chaotic system
NASA Astrophysics Data System (ADS)
Lu, Junan; Wu, Xiaoqun; Han, Xiuping; Lü, Jinhu
2004-08-01
This Letter further improves and extends the work of Wang et al. [Phys. Lett. A 312 (2003) 34]. In detailed, the linear feedback synchronization and adaptive feedback synchronization with only one controller for a unified chaotic system are discussed here. It is noticed that this unified system contains the noted Lorenz and Chen systems. Two chaotic synchronization theorems are attained. Also, numerical simulations are given to show the effectiveness of these methods.
NASA Astrophysics Data System (ADS)
Rajagopal, Karthikeyan; Pham, Viet-Thanh; Tahir, Fadhil Rahma; Akgul, Akif; Abdolmohammadi, Hamid Reza; Jafari, Sajad
2018-04-01
The literature on chaos has highlighted several chaotic systems with special features. In this work, a novel chaotic jerk system with non-hyperbolic equilibrium is proposed. The dynamics of this new system is revealed through equilibrium analysis, phase portrait, bifurcation diagram and Lyapunov exponents. In addition, we investigate the time-delay effects on the proposed system. Realisation of such a system is presented to verify its feasibility.
Optical image hiding based on chaotic vibration of deformable moiré grating
NASA Astrophysics Data System (ADS)
Lu, Guangqing; Saunoriene, Loreta; Aleksiene, Sandra; Ragulskis, Minvydas
2018-03-01
Image hiding technique based on chaotic vibration of deformable moiré grating is presented in this paper. The embedded secret digital image is leaked in a form of a pattern of time-averaged moiré fringes when the deformable cover grating vibrates according to a chaotic law of motion with a predefined set of parameters. Computational experiments are used to demonstrate the features and the applicability of the proposed scheme.
A Non-Intrusive Algorithm for Sensitivity Analysis of Chaotic Flow Simulations
NASA Technical Reports Server (NTRS)
Blonigan, Patrick J.; Wang, Qiqi; Nielsen, Eric J.; Diskin, Boris
2017-01-01
We demonstrate a novel algorithm for computing the sensitivity of statistics in chaotic flow simulations to parameter perturbations. The algorithm is non-intrusive but requires exposing an interface. Based on the principle of shadowing in dynamical systems, this algorithm is designed to reduce the effect of the sampling error in computing sensitivity of statistics in chaotic simulations. We compare the effectiveness of this method to that of the conventional finite difference method.
Regular-to-Chaotic Tunneling Rates: From the Quantum to the Semiclassical Regime
NASA Astrophysics Data System (ADS)
Löck, Steffen; Bäcker, Arnd; Ketzmerick, Roland; Schlagheck, Peter
2010-03-01
We derive a prediction of dynamical tunneling rates from regular to chaotic phase-space regions combining the direct regular-to-chaotic tunneling mechanism in the quantum regime with an improved resonance-assisted tunneling theory in the semiclassical regime. We give a qualitative recipe for identifying the relevance of nonlinear resonances in a given ℏ regime. For systems with one or multiple dominant resonances we find excellent agreement to numerics.
An information hiding method based on LSB and tent chaotic map
NASA Astrophysics Data System (ADS)
Song, Jianhua; Ding, Qun
2011-06-01
In order to protect information security more effectively, a novel information hiding method based on LSB and Tent chaotic map was proposed, first the secret message is Tent chaotic encrypted, and then LSB steganography is executed for the encrypted message in the cover-image. Compared to the traditional image information hiding method, the simulation results indicate that the method greatly improved in imperceptibility and security, and acquired good results.
Wang, Jun; Zhou, Bihua; Zhou, Shudao
2016-01-01
This paper proposes an improved cuckoo search (ICS) algorithm to establish the parameters of chaotic systems. In order to improve the optimization capability of the basic cuckoo search (CS) algorithm, the orthogonal design and simulated annealing operation are incorporated in the CS algorithm to enhance the exploitation search ability. Then the proposed algorithm is used to establish parameters of the Lorenz chaotic system and Chen chaotic system under the noiseless and noise condition, respectively. The numerical results demonstrate that the algorithm can estimate parameters with high accuracy and reliability. Finally, the results are compared with the CS algorithm, genetic algorithm, and particle swarm optimization algorithm, and the compared results demonstrate the method is energy-efficient and superior. PMID:26880874
Wang, Rong; Gao, Jin-Yue
2005-09-01
In this paper we propose a new scheme to achieve chaos control and synchronization in Bragg acousto-optic bistable systems. In the scheme, we use the output of one system to drive two identical chaotic systems. Using the maximal conditional Lyapunov exponent (MCLE) as the criterion, we analyze the conditions for realizing chaos synchronization. Numerical calculation shows that the two identical systems in chaos with negative MCLEs and driven by a chaotic system can go into chaotic synchronization whether or not they were in chaos initially. The two systems can go into different periodic states from chaos following an inverse period-doubling bifurcation route as well when driven by a periodic system.
Quantifying chaotic dynamics from integrate-and-fire processes
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pavlov, A. N.; Saratov State Technical University, Politehnicheskaya Str. 77, 410054 Saratov; Pavlova, O. N.
2015-01-15
Characterizing chaotic dynamics from integrate-and-fire (IF) interspike intervals (ISIs) is relatively easy performed at high firing rates. When the firing rate is low, a correct estimation of Lyapunov exponents (LEs) describing dynamical features of complex oscillations reflected in the IF ISI sequences becomes more complicated. In this work we discuss peculiarities and limitations of quantifying chaotic dynamics from IF point processes. We consider main factors leading to underestimated LEs and demonstrate a way of improving numerical determining of LEs from IF ISI sequences. We show that estimations of the two largest LEs can be performed using around 400 mean periodsmore » of chaotic oscillations in the regime of phase-coherent chaos. Application to real data is discussed.« less
Compound synchronization of four memristor chaotic oscillator systems and secure communication.
Sun, Junwei; Shen, Yi; Yin, Quan; Xu, Chengjie
2013-03-01
In this paper, a novel kind of compound synchronization among four chaotic systems is investigated, where the drive systems have been conceptually divided into two categories: scaling drive systems and base drive systems. Firstly, a sufficient condition is obtained to ensure compound synchronization among four memristor chaotic oscillator systems based on the adaptive technique. Secondly, a secure communication scheme via adaptive compound synchronization of four memristor chaotic oscillator systems is presented. The corresponding theoretical proofs and numerical simulations are given to demonstrate the validity and feasibility of the proposed control technique. The unpredictability of scaling drive systems can additionally enhance the security of communication. The transmitted signals can be split into several parts loaded in the drive systems to improve the reliability of communication.
Space-Group Symmetries Generate Chaotic Fluid Advection in Crystalline Granular Media
NASA Astrophysics Data System (ADS)
Turuban, R.; Lester, D. R.; Le Borgne, T.; Méheust, Y.
2018-01-01
The classical connection between symmetry breaking and the onset of chaos in dynamical systems harks back to the seminal theory of Noether [Transp. Theory Statist. Phys. 1, 186 (1918), 10.1080/00411457108231446]. We study the Lagrangian kinematics of steady 3D Stokes flow through simple cubic and body-centered cubic (bcc) crystalline lattices of close-packed spheres, and uncover an important exception. While breaking of point-group symmetries is a necessary condition for chaotic mixing in both lattices, a further space-group (glide) symmetry of the bcc lattice generates a transition from globally regular to globally chaotic dynamics. This finding provides new insights into chaotic mixing in porous media and has significant implications for understanding the impact of symmetries upon generic dynamical systems.
Chaotic dynamics of a microswimmer in Poiseuille flow.
Chacón, Ricardo
2013-11-01
The chaotic dynamics of pointlike, spherical particles in cylindrical Poiseuille flow is theoretically characterized and numerically confirmed when their own intrinsic swimming velocity undergoes temporal fluctuations around an average value. Two dimensionless ratios associated with the three significant temporal scales of the problem are identified that fully determine the chaos scenario. In particular, small but finite periodic fluctuations of swimming speed result in chaotic or regular motion depending on the position and orientation of the microswimmer with respect to the flow center line. Remarkably, the spatial extension of chaotic microswimmers is found to depend crucially on the fluctuations' period and amplitude and to be highly sensitive to the Fourier spectrum of the fluctuations. This has implications for the design of artificial microswimmers.
Characterization of stickiness by means of recurrence.
Zou, Yong; Thiel, Marco; Romano, M Carmen; Kurths, Jürgen
2007-12-01
We propose recurrence plots (RPs) to characterize the stickiness of a typical area-preserving map with coexisting chaotic and regular orbits. The difference of the recurrence properties between quasiperiodic and chaotic orbits is revisited, which helps to understand the complex patterns of the corresponding RPs. Moreover, several measures from the recurrence quantification analysis are used to quantify these patterns. Among these measures, the recurrence rate, quantifying the percentage of black points in the plot, is applied to characterize the stickiness of a typical chaotic orbit. The advantage of the recurrence based method in comparison to other standard techniques is that it is possible to distinguish between quasiperiodic and chaotic orbits that are temporarily trapped in a sticky domain, from very short trajectories.
NASA Astrophysics Data System (ADS)
Zhou, Nanrun; Chen, Weiwei; Yan, Xinyu; Wang, Yunqian
2018-06-01
In order to obtain higher encryption efficiency, a bit-level quantum color image encryption scheme by exploiting quantum cross-exchange operation and a 5D hyper-chaotic system is designed. Additionally, to enhance the scrambling effect, the quantum channel swapping operation is employed to swap the gray values of corresponding pixels. The proposed color image encryption algorithm has larger key space and higher security since the 5D hyper-chaotic system has more complex dynamic behavior, better randomness and unpredictability than those based on low-dimensional hyper-chaotic systems. Simulations and theoretical analyses demonstrate that the presented bit-level quantum color image encryption scheme outperforms its classical counterparts in efficiency and security.
Regular and Chaotic Spatial Distribution of Bose-Einstein Condensed Atoms in a Ratchet Potential
NASA Astrophysics Data System (ADS)
Li, Fei; Xu, Lan; Li, Wenwu
2018-02-01
We study the regular and chaotic spatial distribution of Bose-Einstein condensed atoms with a space-dependent nonlinear interaction in a ratchet potential. There exists in the system a space-dependent atomic current that can be tuned via Feshbach resonance technique. In the presence of the space-dependent atomic current and a weak ratchet potential, the Smale-horseshoe chaos is studied and the Melnikov chaotic criterion is obtained. Numerical simulations show that the ratio between the intensities of optical potentials forming the ratchet potential, the wave vector of the laser producing the ratchet potential or the wave vector of the modulating laser can be chosen as the controlling parameters to result in or avoid chaotic spatial distributional states.
A joint asymmetric watermarking and image encryption scheme
NASA Astrophysics Data System (ADS)
Boato, G.; Conotter, V.; De Natale, F. G. B.; Fontanari, C.
2008-02-01
Here we introduce a novel watermarking paradigm designed to be both asymmetric, i.e., involving a private key for embedding and a public key for detection, and commutative with a suitable encryption scheme, allowing both to cipher watermarked data and to mark encrypted data without interphering with the detection process. In order to demonstrate the effectiveness of the above principles, we present an explicit example where the watermarking part, based on elementary linear algebra, and the encryption part, exploiting a secret random permutation, are integrated in a commutative scheme.
NASA Technical Reports Server (NTRS)
Ashrafi, S.; Roszman, L.
1991-01-01
A preliminary study of the limits to solar flux intensity prediction, and of whether the general lack of predictability in the solar flux arises from the nonlinear chaotic nature of the Sun's physical activity is presented. Statistical analysis of a chaotic signal can extract only its most gross features, and detailed physical models fail, since even the simplest equations of motion for a nonlinear system can exhibit chaotic behavior. A recent theory by Feigenbaum suggests that nonlinear systems that can be led into chaotic behavior through a sequence of period-doubling bifurcations will exhibit a universal behavior. As the control parameter is increased, the bifurcation points occur in such a way that a proper ratio of these will approach the universal Feigenbaum number. Experimental evidence supporting the applicability of the Feigenbaum scenario to solar flux data is sparse. However, given the hypothesis that the Sun's convection zones are similar to a Rayleigh-Bernard mechanism, we can learn a great deal from the remarkable agreement observed between the prediction by theory (period doubling - a universal route to chaos) and the amplitude decrease of the signal's regular subharmonics. It is shown that period-doubling-type bifurcation is a possible route to a chaotic pattern of solar flux that is distinguishable from the logarithm of its power spectral density. This conclusion is the first positive step toward a reformulation of solar flux by a nonlinear chaotic approach. The ultimate goal of this research is to be able to predict an estimate of the upper and lower bounds for solar flux within its predictable zones. Naturally, it is an important task to identify the time horizons beyond which predictability becomes incompatible with computability.
NASA Technical Reports Server (NTRS)
Ashrafi, S.; Roszman, L.
1991-01-01
Presented here is a preliminary study of the limits to solar flux intensity prediction, and of whether the general lack of predictability in the solar flux arises from the nonlinear chaotic nature of the Sun's physical activity. Statistical analysis of a chaotic signal can extract only its most gross features, and detailed physical models fail, since even the simplest equations of motion for a nonlinear system can exhibit chaotic behavior. A recent theory by Feigenbaum suggests that nonlinear systems that can be led into chaotic behavior through a sequence of period-doubling bifurcations will exhibit a universal behavior. As the control parameter is increased, the bifurcation points occur in such a way that a proper ratio of these will approach the universal Feigenbaum number. Experimental evidence supporting the applicability of the Feigenbaum scenario to solar flux data is sparse. However, given the hypothesis that the Sun's convection zones are similar to a Rayleigh-Bernard mechanism, we can learn a great deal from the remarkable agreement observed between the prediction by theory (period doubling - a universal route to chaos) and the amplitude decrease of the signal's regular subharmonics. The authors show that period-doubling-type bifurcation is a possible route to a chaotic pattern of solar flux that is distinguishable from the logarithm of its power spectral density. This conclusion is the first positive step toward a reformulation of solar flux by a nonlinear chaotic approach. The ultimate goal of this research is to be able to predict an estimate of the upper and lower bounds for solar flux within its predictable zones. Naturally, it is an important task to identify the time horizons beyond which predictability becomes incompatible with computability.
Dynamic Regimes of El Niño Southern Oscillation and Influenza Pandemic Timing
Oluwole, Olusegun Steven Ayodele
2017-01-01
El Niño southern oscillation (ENSO) dynamics has been shown to drive seasonal influenza dynamics. Severe seasonal influenza epidemics and the 2009–2010 pandemic were coincident with chaotic regime of ENSO dynamics. ENSO dynamics from 1876 to 2016 were characterized to determine if influenza pandemics are coupled to chaotic regimes. Time-varying spectra of southern oscillation index (SOI) and sea surface temperature (SST) were compared. SOI and SST were decomposed to components using the algorithm of noise-assisted multivariate empirical mode decomposition. The components were Hilbert transformed to generate instantaneous amplitudes and phases. The trajectories and attractors of components were characterized in polar coordinates and state space. Influenza pandemics were mapped to dynamic regimes of SOI and SST joint recurrence of annual components. State space geometry of El Niños lagged by influenza pandemics were characterized and compared with other El Niños. Timescales of SOI and SST components ranged from sub-annual to multidecadal. The trajectories of SOI and SST components and the joint recurrence of annual components were dissipative toward chaotic attractors. Periodic, quasi-periodic, and chaotic regimes were present in the recurrence of trajectories, but chaos–chaos transitions dominated. Influenza pandemics occurred during chaotic regimes of significantly low transitivity dimension (p < 0.0001). El Niños lagged by influenza pandemics had distinct state space geometry (p < 0.0001). Chaotic dynamics explains the aperiodic timing, and varying duration and strength of El Niños. Coupling of all influenza pandemics of the past 140 years to chaotic regimes of low transitivity indicate that ENSO dynamics drives influenza pandemic dynamics. Forecasts models from ENSO dynamics should compliment surveillance for novel influenza viruses. PMID:29218303
Symmetry breaking: a tool to unveil the topology of chaotic scattering with three degrees of freedom
NASA Astrophysics Data System (ADS)
Jung, Christof; Zapfe, W. P. Karel; Merlo, Olivier; Seligman, T. H.
2010-12-01
We shall use symmetry breaking as a tool to attack the problem of identifying the topology of chaotic scatteruing with more then two degrees of freedom. specifically we discuss the structure of the homoclinic/heteroclinic tangle and the connection between the chaotic invariant set, the scattering functions and the singularities in the cross section for a class of scattering systems with one open and two closed degrees of freedom.
Making chaotic behavior in a damped linear harmonic oscillator
NASA Astrophysics Data System (ADS)
Konishi, Keiji
2001-06-01
The present Letter proposes a simple control method which makes chaotic behavior in a damped linear harmonic oscillator. This method is a modified scheme proposed in paper by Wang and Chen (IEEE CAS-I 47 (2000) 410) which presents an anti-control method for making chaotic behavior in discrete-time linear systems. We provide a systematic procedure to design parameters and sampling period of a feedback controller. Furthermore, we show that our method works well on numerical simulations.
Synthesis of Feedback Controller for Chaotic Systems by Means of Evolutionary Techniques
NASA Astrophysics Data System (ADS)
Senkerik, Roman; Oplatkova, Zuzana; Zelinka, Ivan; Davendra, Donald; Jasek, Roman
2011-06-01
This research deals with a synthesis of control law for three selected discrete chaotic systems by means of analytic programming. The novality of the approach is that a tool for symbolic regression—analytic programming—is used for such kind of difficult problem. The paper consists of the descriptions of analytic programming as well as chaotic systems and used cost function. For experimentation, Self-Organizing Migrating Algorithm (SOMA) with analytic programming was used.
Symmetry breaking: a tool to unveil the topology of chaotic scattering with three degrees of freedom
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jung, Christof; Zapfe, W. P. Karel; Seligman, T. H.
2010-12-23
We shall use symmetry breaking as a tool to attack the problem of identifying the topology of chaotic scatteruing with more then two degrees of freedom. specifically we discuss the structure of the homoclinic/heteroclinic tangle and the connection between the chaotic invariant set, the scattering functions and the singularities in the cross section for a class of scattering systems with one open and two closed degrees of freedom.
Chaotic Brillouin optical correlation-domain analysis
NASA Astrophysics Data System (ADS)
Zhang, Jianzhong; Zhang, Mingtao; Zhang, Mingjiang; Liu, Yi; Feng, Changkun; Wang, Yahui; Wang, Yuncai
2018-04-01
We propose and experimentally demonstrate a chaotic Brillouin optical correlation-domain analysis (BOCDA) system for distributed fiber sensing. The utilization of the chaotic laser with low coherent state ensures high spatial resolution. The experimental results demonstrate a 3.92-cm spatial resolution over a 906-m measurement range. The uncertainty in the measurement of the local Brillouin frequency shift is 1.2MHz. The measurement signal-to-noise ratio is given, which is agreement with the theoretical value.
Chaotic structures of nonlinear magnetic fields. I - Theory. II - Numerical results
NASA Technical Reports Server (NTRS)
Lee, Nam C.; Parks, George K.
1992-01-01
A study of the evolutionary properties of nonlinear magnetic fields in flowing MHD plasmas is presented to illustrate that nonlinear magnetic fields may involve chaotic dynamics. It is shown how a suitable transformation of the coupled equations leads to Duffing's form, suggesting that the behavior of the general solution can also be chaotic. Numerical solutions of the nonlinear magnetic field equations that have been cast in the form of Duffing's equation are presented.
Morphological Expressions of Crater Infill Collapse: Model Simulations of Chaotic Terrains on Mars
NASA Astrophysics Data System (ADS)
Roda, Manuel; Marketos, George; Westerweel, Jan; Govers, Rob
2017-10-01
Martian chaotic terrains are characterized by deeply depressed intensively fractured areas that contain a large number of low-strain tilted blocks. Stronger deformation (e.g., higher number of fractures) is generally observed in the rims when compared to the middle regions of the terrains. The distribution and number of fractures and tilted blocks are correlated with the size of the chaotic terrains. Smaller chaotic terrains are characterized by few fractures between undeformed blocks. Larger terrains show an elevated number of fractures uniformly distributed with single blocks. We investigate whether this surface morphology may be a consequence of the collapse of the infill of a crater. We perform numerical simulations with the Discrete Element Method and we evaluate the distribution of fractures within the crater and the influence of the crater size, infill thickness, and collapsing depth on the final morphology. The comparison between model predictions and the morphology of the Martian chaotic terrains shows strong statistical similarities in terms of both number of fractures and correlation between fractures and crater diameters. No or very weak correlation is observed between fractures and the infill thickness or collapsing depth. The strong correspondence between model results and observations suggests that the collapse of an infill layer within a crater is a viable mechanism for the peculiar morphology of the Martian chaotic terrains.
Sigalov, G; Gendelman, O V; AL-Shudeifat, M A; Manevitch, L I; Vakakis, A F; Bergman, L A
2012-03-01
We show that nonlinear inertial coupling between a linear oscillator and an eccentric rotator can lead to very interesting interchanges between regular and chaotic dynamical behavior. Indeed, we show that this model demonstrates rather unusual behavior from the viewpoint of nonlinear dynamics. Specifically, at a discrete set of values of the total energy, the Hamiltonian system exhibits non-conventional nonlinear normal modes, whose shape is determined by phase locking of rotatory and oscillatory motions of the rotator at integer ratios of characteristic frequencies. Considering the weakly damped system, resonance capture of the dynamics into the vicinity of these modes brings about regular motion of the system. For energy levels far from these discrete values, the motion of the system is chaotic. Thus, the succession of resonance captures and escapes by a discrete set of the normal modes causes a sequence of transitions between regular and chaotic behavior, provided that the damping is sufficiently small. We begin from the Hamiltonian system and present a series of Poincaré sections manifesting the complex structure of the phase space of the considered system with inertial nonlinear coupling. Then an approximate analytical description is presented for the non-conventional nonlinear normal modes. We confirm the analytical results by numerical simulation and demonstrate the alternate transitions between regular and chaotic dynamics mentioned above. The origin of the chaotic behavior is also discussed.
An Extended Chaotic Maps-Based Three-Party Password-Authenticated Key Agreement with User Anonymity
Lu, Yanrong; Li, Lixiang; Zhang, Hao; Yang, Yixian
2016-01-01
User anonymity is one of the key security features of an authenticated key agreement especially for communicating messages via an insecure network. Owing to the better properties and higher performance of chaotic theory, the chaotic maps have been introduced into the security schemes, and hence numerous key agreement schemes have been put forward under chaotic-maps. Recently, Xie et al. released an enhanced scheme under Farash et al.’s scheme and claimed their improvements could withstand the security loopholes pointed out in the scheme of Farash et al., i.e., resistance to the off-line password guessing and user impersonation attacks. Nevertheless, through our careful analysis, the improvements were released by Xie et al. still could not solve the problems troubled in Farash et al‥ Besides, Xie et al.’s improvements failed to achieve the user anonymity and the session key security. With the purpose of eliminating the security risks of the scheme of Xie et al., we design an anonymous password-based three-party authenticated key agreement under chaotic maps. Both the formal analysis and the formal security verification using AVISPA are presented. Also, BAN logic is used to show the correctness of the enhancements. Furthermore, we also demonstrate that the design thwarts most of the common attacks. We also make a comparison between the recent chaotic-maps based schemes and our enhancements in terms of performance. PMID:27101305
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grebogi, C.; Yorke, J.A.
This report discusses the following topics: controlling chaotic dynamical systems; embedding of experimental data; effect of noise on critical exponents of crises; transition to chaotic scattering; and distribution of floaters on a fluid surface. (LSP)
Qi, Donglian; Liu, Meiqin; Qiu, Meikang; Zhang, Senlin
2010-08-01
This brief studies exponential H(infinity) synchronization of a class of general discrete-time chaotic neural networks with external disturbance. On the basis of the drive-response concept and H(infinity) control theory, and using Lyapunov-Krasovskii (or Lyapunov) functional, state feedback controllers are established to not only guarantee exponential stable synchronization between two general chaotic neural networks with or without time delays, but also reduce the effect of external disturbance on the synchronization error to a minimal H(infinity) norm constraint. The proposed controllers can be obtained by solving the convex optimization problems represented by linear matrix inequalities. Most discrete-time chaotic systems with or without time delays, such as Hopfield neural networks, cellular neural networks, bidirectional associative memory networks, recurrent multilayer perceptrons, Cohen-Grossberg neural networks, Chua's circuits, etc., can be transformed into this general chaotic neural network to be H(infinity) synchronization controller designed in a unified way. Finally, some illustrated examples with their simulations have been utilized to demonstrate the effectiveness of the proposed methods.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kengne, Jacques; Kenmogne, Fabien
2014-12-15
The nonlinear dynamics of fourth-order Silva-Young type chaotic oscillators with flat power spectrum recently introduced by Tamaseviciute and collaborators is considered. In this type of oscillators, a pair of semiconductor diodes in an anti-parallel connection acts as the nonlinear component necessary for generating chaotic oscillations. Based on the Shockley diode equation and an appropriate selection of the state variables, a smooth mathematical model (involving hyperbolic sine and cosine functions) is derived for a better description of both the regular and chaotic dynamics of the system. The complex behavior of the oscillator is characterized in terms of its parameters by usingmore » time series, bifurcation diagrams, Lyapunov exponents' plots, Poincaré sections, and frequency spectra. It is shown that the onset of chaos is achieved via the classical period-doubling and symmetry restoring crisis scenarios. Some PSPICE simulations of the nonlinear dynamics of the oscillator are presented in order to confirm the ability of the proposed mathematical model to accurately describe/predict both the regular and chaotic behaviors of the oscillator.« less
Is the normal heart rate ``chaotic'' due to respiration?
NASA Astrophysics Data System (ADS)
Wessel, Niels; Riedl, Maik; Kurths, Jürgen
2009-06-01
The incidence of cardiovascular diseases increases with the growth of the human population and an aging society, leading to very high expenses in the public health system. Therefore, it is challenging to develop sophisticated methods in order to improve medical diagnostics. The question whether the normal heart rate is chaotic or not is an attempt to elucidate the underlying mechanisms of cardiovascular dynamics and therefore a highly controversial topical challenge. In this contribution we demonstrate that linear and nonlinear parameters allow us to separate completely the data sets of the three groups provided for this controversial topic in nonlinear dynamics. The question whether these time series are chaotic or not cannot be answered satisfactorily without investigating the underlying mechanisms leading to them. We give an example of the dominant influence of respiration on heart beat dynamics, which shows that observed fluctuations can be mostly explained by respiratory modulations of heart rate and blood pressure (coefficient of determination: 96%). Therefore, we recommend reformulating the following initial question: "Is the normal heart rate chaotic?" We rather ask the following: "Is the normal heart rate `chaotic' due to respiration?"
NASA Astrophysics Data System (ADS)
Maiti, Soumyabrata; Chaudhury, Kaustav; DasGupta, Debabrata; Chakraborty, Suman
2013-01-01
Spatial distributions of particles carried by blood exhibit complex filamentary pattern under the combined effects of geometrical irregularities of the blood vessels and pulsating pumping by the heart. This signifies the existence of so called chaotic advection. In the present article, we argue that the understanding of such pathologically triggered chaotic advection is incomplete without giving due consideration to a major constituent of blood: abundant presence of red blood cells quantified by the hematocrit (HCT) concentration. We show that the hematocrit concentration in blood cells can alter the filamentary structures of the spatial distribution of advected particles in an intriguing manner. Our results reveal that there primarily are two major impacts of HCT concentrations towards dictating the chaotic dynamics of blood flow: changing the zone of influence of chaotic mixing and determining the enhancement of residence time of the advected particles away from the wall. This, in turn, may alter the extent of activation of platelets or other reactive biological entities, bearing immense consequence towards dictating the biophysical mechanisms behind possible life-threatening diseases originating in the circulatory system.
Chaotic behavior in Casimir oscillators: A case study for phase-change materials.
Tajik, Fatemeh; Sedighi, Mehdi; Khorrami, Mohammad; Masoudi, Amir Ali; Palasantzas, George
2017-10-01
Casimir forces between material surfaces at close proximity of less than 200 nm can lead to increased chaotic behavior of actuating devices depending on the strength of the Casimir interaction. We investigate these phenomena for phase-change materials in torsional oscillators, where the amorphous to crystalline phase transitions lead to transitions between high and low Casimir force and torque states, respectively, without material compositions. For a conservative system bifurcation curve and Poincare maps analysis show the absence of chaotic behavior but with the crystalline phase (high force-torque state) favoring more unstable behavior and stiction. However, for a nonconservative system chaotic behavior can take place introducing significant risk for stiction, which is again more pronounced for the crystalline phase. The latter illustrates the more general scenario that stronger Casimir forces and torques increase the possibility for chaotic behavior. The latter is making it impossible to predict whether stiction or stable actuation will occur on a long-term basis, and it is setting limitations in the design of micronano devices operating at short-range nanoscale separations.
Improvement and empirical research on chaos control by theory of "chaos + chaos = order".
Fulai, Wang
2012-12-01
This paper focuses on advancing the understanding of Parrondian effects and their paradoxical behavior in nonlinear dynamical systems. Some examples are given to show that a dynamics combined by more than two discrete chaotic dynamics in deterministic manners can give rise to order when combined. The chaotic maps in our study are more general than those in the current literatures as far as "chaos + chaos = order" is concerned. Some problems left over in the current literatures are solved. It is proved both theoretically and numerically that, given any m chaotic dynamics generated by the one-dimensional real Mandelbrot maps, it is no possible to get a periodic system when all the m chaotic dynamics are alternated in random manner, but for any integer m(m ≥ 2) a dynamics combined in deterministic manner by m Mandelbrot chaotic dynamics can be found to give rise to a periodic dynamics of m periods. Numerical and mathematical analysis prove that the paradoxical phenomenon of "chaos + chaos = order" also exist in the dynamics generated by non-Mandelbrot maps.
Turbulent Fluid Motion 6: Turbulence, Nonlinear Dynamics, and Deterministic Chaos
NASA Technical Reports Server (NTRS)
Deissler, Robert G.
1996-01-01
Several turbulent and nonturbulent solutions of the Navier-Stokes equations are obtained. The unaveraged equations are used numerically in conjunction with tools and concepts from nonlinear dynamics, including time series, phase portraits, Poincare sections, Liapunov exponents, power spectra, and strange attractors. Initially neighboring solutions for a low-Reynolds-number fully developed turbulence are compared. The turbulence is sustained by a nonrandom time-independent external force. The solutions, on the average, separate exponentially with time, having a positive Liapunov exponent. Thus, the turbulence is characterized as chaotic. In a search for solutions which contrast with the turbulent ones, the Reynolds number (or strength of the forcing) is reduced. Several qualitatively different flows are noted. These are, respectively, fully chaotic, complex periodic, weakly chaotic, simple periodic, and fixed-point. Of these, we classify only the fully chaotic flows as turbulent. Those flows have both a positive Liapunov exponent and Poincare sections without pattern. By contrast, the weakly chaotic flows, although having positive Liapunov exponents, have some pattern in their Poincare sections. The fixed-point and periodic flows are nonturbulent, since turbulence, as generally understood, is both time-dependent and aperiodic.
NASA Astrophysics Data System (ADS)
Gong, Lihua; Deng, Chengzhi; Pan, Shumin; Zhou, Nanrun
2018-07-01
Based on hyper-chaotic system and discrete fractional random transform, an image compression-encryption algorithm is designed. The original image is first transformed into a spectrum by the discrete cosine transform and the resulting spectrum is compressed according to the method of spectrum cutting. The random matrix of the discrete fractional random transform is controlled by a chaotic sequence originated from the high dimensional hyper-chaotic system. Then the compressed spectrum is encrypted by the discrete fractional random transform. The order of DFrRT and the parameters of the hyper-chaotic system are the main keys of this image compression and encryption algorithm. The proposed algorithm can compress and encrypt image signal, especially can encrypt multiple images once. To achieve the compression of multiple images, the images are transformed into spectra by the discrete cosine transform, and then the spectra are incised and spliced into a composite spectrum by Zigzag scanning. Simulation results demonstrate that the proposed image compression and encryption algorithm is of high security and good compression performance.
Emergent patterns in interacting neuronal sub-populations
NASA Astrophysics Data System (ADS)
Kamal, Neeraj Kumar; Sinha, Sudeshna
2015-05-01
We investigate an ensemble of coupled model neurons, consisting of groups of varying sizes and intrinsic dynamics, ranging from periodic to chaotic, where the inter-group coupling interaction is effectively like a dynamic signal from a different sub-population. We observe that the minority group can significantly influence the majority group. For instance, when a small chaotic group is coupled to a large periodic group, the chaotic group de-synchronizes. However, counter-intuitively, when a small periodic group couples strongly to a large chaotic group, it leads to complete synchronization in the majority chaotic population, which also spikes at the frequency of the small periodic group. It then appears that the small group of periodic neurons can act like a pacemaker for the whole network. Further, we report the existence of varied clustering patterns, ranging from sets of synchronized clusters to anti-phase clusters, governed by the interplay of the relative sizes and dynamics of the sub-populations. So these results have relevance in understanding how a group can influence the synchrony of another group of dynamically different elements, reminiscent of event-related synchronization/de-synchronization in complex networks.
Linking Chaotic Advection with Subsurface Biogeochemical Processes
NASA Astrophysics Data System (ADS)
Mays, D. C.; Freedman, V. L.; White, S. K.; Fang, Y.; Neupauer, R.
2017-12-01
This work investigates the extent to which groundwater flow kinematics drive subsurface biogeochemical processes. In terms of groundwater flow kinematics, we consider chaotic advection, whose essential ingredient is stretching and folding of plumes. Chaotic advection is appealing within the context of groundwater remediation because it has been shown to optimize plume spreading in the laminar flows characteristic of aquifers. In terms of subsurface biogeochemical processes, we consider an existing model for microbially-mediated reduction of relatively mobile uranium(VI) to relatively immobile uranium(IV) following injection of acetate into a floodplain aquifer beneath a former uranium mill in Rifle, Colorado. This model has been implemented in the reactive transport code eSTOMP, the massively parallel version of STOMP (Subsurface Transport Over Multiple Phases). This presentation will report preliminary numerical simulations in which the hydraulic boundary conditions in the eSTOMP model are manipulated to simulate chaotic advection resulting from engineered injection and extraction of water through a manifold of wells surrounding the plume of injected acetate. This approach provides an avenue to simulate the impact of chaotic advection within the existing framework of the eSTOMP code.
Unity and diversity in mixing: Stretching, diffusion, breakup, and aggregation in chaotic flows
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ottino, J.M.
1991-05-01
Experiments and theory have produced a reasonably good qualitative understanding of the evolution of chaotic mixing of passive tracers, especially in two-dimensional time-periodic flow fields. Such an understanding forms a fabric for the evolution of breakup, aggregation, and diffusion-controlled reactions in more complex flows. These systems can be viewed as a population of microstructures'' whose behavior is dictated by iterations of a chaotic flow; microstructures break, diffuse, and aggregate, causing the population to evolve in space and time. This paper presents simple physical models for such processes. Self-similarity is common to all the problems; examples arise in the context ofmore » the distribution of stretchings within chaotic flows, in the asymptotic evolution of diffusion-reaction processes at striation thickness scales, in the equilibrium distribution of drop sizes generated upon mixing of immiscible fluids, in the equations describing mean-field kinetics of coagulation, in the sequence of actions necessary for the destruction of islands in two-dimensional flow, and in the fractal structure of clusters produced upon aggregation in chaotic flows.« less
NASA Astrophysics Data System (ADS)
Bildirici, Melike; Sonustun, Fulya Ozaksoy; Sonustun, Bahri
2018-01-01
In the regards of chaos theory, new concepts such as complexity, determinism, quantum mechanics, relativity, multiple equilibrium, complexity, (continuously) instability, nonlinearity, heterogeneous agents, irregularity were widely questioned in economics. It is noticed that linear models are insufficient for analyzing unpredictable, irregular and noncyclical oscillations of economies, and for predicting bubbles, financial crisis, business cycles in financial markets. Therefore, economists gave great consequence to use appropriate tools for modelling non-linear dynamical structures and chaotic behaviors of the economies especially in macro and the financial economy. In this paper, we aim to model the chaotic structure of exchange rates (USD-TL and EUR-TL). To determine non-linear patterns of the selected time series, daily returns of the exchange rates were tested by BDS during the period from January 01, 2002 to May 11, 2017 which covers after the era of the 2001 financial crisis. After specifying the non-linear structure of the selected time series, it was aimed to examine the chaotic characteristic for the selected time period by Lyapunov Exponents. The findings verify the existence of the chaotic structure of the exchange rate returns in the analyzed time period.
NASA Astrophysics Data System (ADS)
Qiu, Mo; Yu, Simin; Wen, Yuqiong; Lü, Jinhu; He, Jianbin; Lin, Zhuosheng
In this paper, a novel design methodology and its FPGA hardware implementation for a universal chaotic signal generator is proposed via the Verilog HDL fixed-point algorithm and state machine control. According to continuous-time or discrete-time chaotic equations, a Verilog HDL fixed-point algorithm and its corresponding digital system are first designed. In the FPGA hardware platform, each operation step of Verilog HDL fixed-point algorithm is then controlled by a state machine. The generality of this method is that, for any given chaotic equation, it can be decomposed into four basic operation procedures, i.e. nonlinear function calculation, iterative sequence operation, iterative values right shifting and ceiling, and chaotic iterative sequences output, each of which corresponds to only a state via state machine control. Compared with the Verilog HDL floating-point algorithm, the Verilog HDL fixed-point algorithm can save the FPGA hardware resources and improve the operation efficiency. FPGA-based hardware experimental results validate the feasibility and reliability of the proposed approach.
NASA Astrophysics Data System (ADS)
Murali, K.; Sinah, Sudeshna; Ditto, William
2004-03-01
Recently there has been a new theoretical direction in harnessing the richness of spatially extended chaotic systems, namely the exploitation of coupled chaotic elements to do flexible computations [1]. The aim of this presentation is to demonstrate the use a single chaotic element to emulate different logic gates and perform different arithmetic tasks. Additionally we demonstrate that the elements can be controlled to switch easily between the different operational roles. Such a computing unit may then allow a more dynamic computer architecture and serve as ingredients of a general-purpose device more flexible than statically wired hardware. The theoretical scheme for flexible implementation of all these fundamental logical operations utilizing low dimensional chaos [1] will be reviewed along with a specific realization of the theory in a chaotic circuit [2]. Results will also be presented from experiments done on leech neurons. [1] Sinha, S., Munakata, T. and Ditto, W.L., Phys. Rev. E 65 036216 [2] "Experimental realization of the fundamental NOR Gate using a chaotic circuit," K. Murali, Sudeshna Sinha and William L. Ditto Phys. Rev. E 68, 016205 (2003).
Yuan, Fang; Wang, Guangyi; Wang, Xiaowei
2017-03-01
In this paper, smooth curve models of meminductor and memcapacitor are designed, which are generalized from a memristor. Based on these models, a new five-dimensional chaotic oscillator that contains a meminductor and memcapacitor is proposed. By dimensionality reducing, this five-dimensional system can be transformed into a three-dimensional system. The main work of this paper is to give the comparisons between the five-dimensional system and its dimensionality reduction model. To investigate dynamics behaviors of the two systems, equilibrium points and stabilities are analyzed. And the bifurcation diagrams and Lyapunov exponent spectrums are used to explore their properties. In addition, digital signal processing technologies are used to realize this chaotic oscillator, and chaotic sequences are generated by the experimental device, which can be used in encryption applications.
Maximizing the security of chaotic optical communications.
Hou, T T; Yi, L L; Yang, X L; Ke, J X; Hu, Y; Yang, Q; Zhou, P; Hu, W S
2016-10-03
The practical application of chaotic optical communications has been limited by two aspects: the difficulty in concealing the time delay - a critical security parameter in feedback chaotic systems, and the difficulty of significantly enlarging the key space without complicating the implementation. Here we propose an architecture to break the above limits. By introducing a frequency-dependent group delay module with frequency tuning resolution of 1 MHz into the chaotic feedback loop, we demonstrate excellent time delay concealment effect, and an additional huge key space of 1048 can be achieved at the same time. The effectiveness is proved by both numerical simulation and experiment. Besides, the proposed scheme is compatible with the existing commercial optical communication systems, thus pave the way for high-speed secure optical communications.
Huang, Yu; Guo, Feng; Li, Yongling; Liu, Yufeng
2015-01-01
Parameter estimation for fractional-order chaotic systems is an important issue in fractional-order chaotic control and synchronization and could be essentially formulated as a multidimensional optimization problem. A novel algorithm called quantum parallel particle swarm optimization (QPPSO) is proposed to solve the parameter estimation for fractional-order chaotic systems. The parallel characteristic of quantum computing is used in QPPSO. This characteristic increases the calculation of each generation exponentially. The behavior of particles in quantum space is restrained by the quantum evolution equation, which consists of the current rotation angle, individual optimal quantum rotation angle, and global optimal quantum rotation angle. Numerical simulation based on several typical fractional-order systems and comparisons with some typical existing algorithms show the effectiveness and efficiency of the proposed algorithm. PMID:25603158
Desktop chaotic systems: Intuition and visualization
NASA Technical Reports Server (NTRS)
Bright, Michelle M.; Melcher, Kevin J.; Qammar, Helen K.; Hartley, Tom T.
1993-01-01
This paper presents a dynamic study of the Wildwood Pendulum, a commercially available desktop system which exhibits a strange attractor. The purpose of studying this chaotic pendulum is twofold: to gain insight in the paradigmatic approach of modeling, simulating, and determining chaos in nonlinear systems; and to provide a desktop model of chaos as a visual tool. For this study, the nonlinear behavior of this chaotic pendulum is modeled, a computer simulation is performed, and an experimental performance is measured. An assessment of the pendulum in the phase plane shows the strange attractor. Through the use of a box-assisted correlation dimension methodology, the attractor dimension is determined for both the model and the experimental pendulum systems. Correlation dimension results indicate that the pendulum and the model are chaotic and their fractal dimensions are similar.
Transversal homoclinic orbits in a transiently chaotic neural network.
Chen, Shyan-Shiou; Shih, Chih-Wen
2002-09-01
We study the existence of snap-back repellers, hence the existence of transversal homoclinic orbits in a discrete-time neural network. Chaotic behaviors for the network system in the sense of Li and Yorke or Marotto can then be concluded. The result is established by analyzing the structures of the system and allocating suitable parameters in constructing the fixed points and their pre-images for the system. The investigation provides a theoretical confirmation on the scenario of transient chaos for the system. All the parameter conditions for the theory can be examined numerically. The numerical ranges for the parameters which yield chaotic dynamics and convergent dynamics provide significant information in the annealing process in solving combinatorial optimization problems using this transiently chaotic neural network. (c) 2002 American Institute of Physics.
Structure of chaotic magnetic field lines in IR-T1 tokamak due to ergodic magnetic limiter
NASA Astrophysics Data System (ADS)
Ahmadi, S.; Salar Elahi, A.; Ghorannevis, M.
2018-03-01
In this paper we have studied an Ergodic Magnetic Limiter (EML) based chaotic magnetic field for transport control in the edge plasma of IR-T1 tokamak. The resonance created by the EML causes perturbation of the equilibrium field line in tokamak and as a result, the field lines are chaotic in the vicinity of the dimerized island chains. Transport barriers are formed in the chaotic field line and actually observe in tokamak with reverse magnetic shear. We used area-preserving non-twist (and twist) Poincaré maps to describe the formation of transport barriers, which are actually features of Hamiltonian systems. This transport barrier is useful in reducing radial diffusion of the field line and thus improving the plasma confinement.
NASA Astrophysics Data System (ADS)
Itoh, Kosuke; Nakada, Tsutomu
2013-04-01
Deterministic nonlinear dynamical processes are ubiquitous in nature. Chaotic sounds generated by such processes may appear irregular and random in waveform, but these sounds are mathematically distinguished from random stochastic sounds in that they contain deterministic short-time predictability in their temporal fine structures. We show that the human brain distinguishes deterministic chaotic sounds from spectrally matched stochastic sounds in neural processing and perception. Deterministic chaotic sounds, even without being attended to, elicited greater cerebral cortical responses than the surrogate control sounds after about 150 ms in latency after sound onset. Listeners also clearly discriminated these sounds in perception. The results support the hypothesis that the human auditory system is sensitive to the subtle short-time predictability embedded in the temporal fine structure of sounds.
NASA Astrophysics Data System (ADS)
Lai, Bang-Cheng; He, Jian-Jun
2018-03-01
In this paper, we construct a novel 4D autonomous chaotic system with four cross-product nonlinear terms and five equilibria. The multiple coexisting attractors and the multiscroll attractor of the system are numerically investigated. Research results show that the system has various types of multiple attractors, including three strange attractors with a limit cycle, three limit cycles, two strange attractors with a pair of limit cycles, two coexisting strange attractors. By using the passive control theory, a controller is designed for controlling the chaos of the system. Both analytical and numerical studies verify that the designed controller can suppress chaotic motion and stabilise the system at the origin. Moreover, an electronic circuit is presented for implementing the chaotic system.
Chaotic dynamics of large-scale double-diffusive convection in a porous medium
NASA Astrophysics Data System (ADS)
Kondo, Shutaro; Gotoda, Hiroshi; Miyano, Takaya; Tokuda, Isao T.
2018-02-01
We have studied chaotic dynamics of large-scale double-diffusive convection of a viscoelastic fluid in a porous medium from the viewpoint of dynamical systems theory. A fifth-order nonlinear dynamical system modeling the double-diffusive convection is theoretically obtained by incorporating the Darcy-Brinkman equation into transport equations through a physical dimensionless parameter representing porosity. We clearly show that the chaotic convective motion becomes much more complicated with increasing porosity. The degree of dynamic instability during chaotic convective motion is quantified by two important measures: the network entropy of the degree distribution in the horizontal visibility graph and the Kaplan-Yorke dimension in terms of Lyapunov exponents. We also present an interesting on-off intermittent phenomenon in the probability distribution of time intervals exhibiting nearly complete synchronization.
Competitions hatch butterfly attractors in foreign exchange markets
NASA Astrophysics Data System (ADS)
Jin, Yu Ying
2005-03-01
Chaos in foreign exchange markets is a common issue of concern in the study of economic dynamics. In this work, we mainly investigate the competition effect on chaos in foreign exchange markets. As one of the main economic structures in the globalization process, competition between two target exchange rates with the same base currency forms a simple competitive exchange rate relation, where each exchange rate follows the chaotic model of De Grauwe (Exchange Rate Theory-Chaotic Models of Foreign Exchange Markets, Blackwell, Oxford, Cambridge, MA, 1993). The main discovery is, while each exchange rate is in its non-chaotic parameter regions, the effect of competition will “hatch” butterfly-like chaotic attractors in the competitive market. The positive Lyapunov exponent in the market explains the reason why chaos occurs.
NASA Astrophysics Data System (ADS)
Wu, Wei; Cui, Bao-Tong
2007-07-01
In this paper, a synchronization scheme for a class of chaotic neural networks with time-varying delays is presented. This class of chaotic neural networks covers several well-known neural networks, such as Hopfield neural networks, cellular neural networks, and bidirectional associative memory networks. The obtained criteria are expressed in terms of linear matrix inequalities, thus they can be efficiently verified. A comparison between our results and the previous results shows that our results are less restrictive.
Mixing by Unstirring: Hyperuniform Dispersion of Interacting Particles upon Chaotic Advection
NASA Astrophysics Data System (ADS)
Weijs, Joost H.; Bartolo, Denis
2017-07-01
We show how to achieve both fast and hyperuniform dispersions of particles in viscous fluids. To do so, we first extend the concept of critical random organization to chaotic drives. We show how palindromic sequences of chaotic advection cause microscopic particles to effectively interact at long range, thereby inhibiting critical self-organization. Based on this understanding we go around this limitation and design sequences of stirring and unstirring which simultaneously optimize the speed of particle spreading and the homogeneity of the resulting dispersions.
A note on chaotic unimodal maps and applications.
Zhou, C T; He, X T; Yu, M Y; Chew, L Y; Wang, X G
2006-09-01
Based on the word-lift technique of symbolic dynamics of one-dimensional unimodal maps, we investigate the relation between chaotic kneading sequences and linear maximum-length shift-register sequences. Theoretical and numerical evidence that the set of the maximum-length shift-register sequences is a subset of the set of the universal sequence of one-dimensional chaotic unimodal maps is given. By stabilizing unstable periodic orbits on superstable periodic orbits, we also develop techniques to control the generation of long binary sequences.
Dynamic Long-Term Anticipation of Chaotic States
DOE Office of Scientific and Technical Information (OSTI.GOV)
Voss, Henning U.
2001-07-02
Introducing a short time delay into the coupling of two synchronizing chaotic systems, it was shown recently that the driven system may anticipate the driving system in real time. Augmenting the phase space of the driven system, we accomplish anticipation times that are multiples of the coupling delay time and exceed characteristic time scales of the chaotic dynamics. The stability properties of the associated anticipatory synchronization manifold in certain cases turn out to be the same as for identically synchronizing oscillators.
Transient statistics in stabilizing periodic orbits
NASA Astrophysics Data System (ADS)
Meucci, R.; Gadomski, W.; Ciofini, M.; Arecchi, F. T.
1995-11-01
The statistics of chaotic and periodic transient time intervals preceding the stabilization of a given periodic orbit have been experimentally studied in a CO2 laser with modulated losses, subjected to a small subharmonic perturbation. As predicted by the theory, an exponential tail has been found in the probability distribution of chaotic transients. Furthermore, a fine periodic structure in the distributions of the periodic transients, resulting from the interaction of the control signal and the local structure of the chaotic attractor, has been revealed.
Recent developments in chaotic dynamics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ott, E.
1994-02-01
Before the relatively recent wide acceptance of the existence of chaotic dynamics, many physicists and engineers were under the impression that simple systems could necessarily only display simple solutions. This feeling had been unintentionally reinforced by conventional college courses which emphasize linear dynamics (partly because that is the only case with nice general solutions). More recently, physical experiments and numerical examples have abundantly demonstrated how wrong this feeling is. A brief review of chaotic dynamics is presented. Topics discussed include basic concepts, recent developments, and applications.
NASA Astrophysics Data System (ADS)
Gandomi, A. H.; Yang, X.-S.; Talatahari, S.; Alavi, A. H.
2013-01-01
A recently developed metaheuristic optimization algorithm, firefly algorithm (FA), mimics the social behavior of fireflies based on the flashing and attraction characteristics of fireflies. In the present study, we will introduce chaos into FA so as to increase its global search mobility for robust global optimization. Detailed studies are carried out on benchmark problems with different chaotic maps. Here, 12 different chaotic maps are utilized to tune the attractive movement of the fireflies in the algorithm. The results show that some chaotic FAs can clearly outperform the standard FA.
Sakai, Kenshi; Managi, Shunsuke; Vitanov, Nikolay K; Demura, Katsuhiko
2007-04-01
This paper investigates the transition of dynamics observed in an actual real agricultural economic dataset. Lyapunov spectrum analysis is conducted on the data to distinguish deterministic chaos and the limit cycle. Chaotic and periodic oscillation were identified before and after the second oil crisis, respectively. The statitonarity of the time series is investigated using recurrence plots. This shows that government intervention might reduce market instability by removing a chaotic market's long-term unpredictability.
Random Matrix Theory Approach to Chaotic Coherent Perfect Absorbers
NASA Astrophysics Data System (ADS)
Li, Huanan; Suwunnarat, Suwun; Fleischmann, Ragnar; Schanz, Holger; Kottos, Tsampikos
2017-01-01
We employ random matrix theory in order to investigate coherent perfect absorption (CPA) in lossy systems with complex internal dynamics. The loss strength γCPA and energy ECPA, for which a CPA occurs, are expressed in terms of the eigenmodes of the isolated cavity—thus carrying over the information about the chaotic nature of the target—and their coupling to a finite number of scattering channels. Our results are tested against numerical calculations using complex networks of resonators and chaotic graphs as CPA cavities.
Using chaotic artificial neural networks to model memory in the brain
NASA Astrophysics Data System (ADS)
Aram, Zainab; Jafari, Sajad; Ma, Jun; Sprott, Julien C.; Zendehrouh, Sareh; Pham, Viet-Thanh
2017-03-01
In the current study, a novel model for human memory is proposed based on the chaotic dynamics of artificial neural networks. This new model explains a biological fact about memory which is not yet explained by any other model: There are theories that the brain normally works in a chaotic mode, while during attention it shows ordered behavior. This model uses the periodic windows observed in a previously proposed model for the brain to store and then recollect the information.
Impact of hyperbolicity on chimera states in ensembles of nonlocally coupled chaotic oscillators
DOE Office of Scientific and Technical Information (OSTI.GOV)
Semenova, N.; Anishchenko, V.; Zakharova, A.
2016-06-08
In this work we analyse nonlocally coupled networks of identical chaotic oscillators. We study both time-discrete and time-continuous systems (Henon map, Lozi map, Lorenz system). We hypothesize that chimera states, in which spatial domains of coherent (synchronous) and incoherent (desynchronized) dynamics coexist, can be obtained only in networks of chaotic non-hyperbolic systems and cannot be found in networks of hyperbolic systems. This hypothesis is supported by numerical simulations for hyperbolic and non-hyperbolic cases.
Experimental Control of a Fast Chaotic Time-Delay Opto-Electronic Device
2003-01-01
chaotic sources such as the erbium-doped Þber laser. The basic idea is to use the message as a driving signal for the chaotic system. The message...47 x 3.10 Block diagram of feedback loop. Light from the interferometer is con- verted into an electrical signal by the photodiode (PD). All...a time delay of τD. Finally, the electrical signal is converted back into light by the laser diode (LD). . . . . . . . . . . . . . . . . 48 3.11 Setup
NASA Astrophysics Data System (ADS)
Wang, Qingzhi; Tan, Guanzheng; He, Yong; Wu, Min
2017-10-01
This paper considers a stability analysis issue of piecewise non-linear systems and applies it to intermittent synchronisation of chaotic systems. First, based on piecewise Lyapunov function methods, more general and less conservative stability criteria of piecewise non-linear systems in periodic and aperiodic cases are presented, respectively. Next, intermittent synchronisation conditions of chaotic systems are derived which extend existing results. Finally, Chua's circuit is taken as an example to verify the validity of our methods.
On the robustness of complex heterogeneous gene expression networks.
Gómez-Gardeñes, Jesús; Moreno, Yamir; Floría, Luis M
2005-04-01
We analyze a continuous gene expression model on the underlying topology of a complex heterogeneous network. Numerical simulations aimed at studying the chaotic and periodic dynamics of the model are performed. The results clearly indicate that there is a region in which the dynamical and structural complexity of the system avoid chaotic attractors. However, contrary to what has been reported for Random Boolean Networks, the chaotic phase cannot be completely suppressed, which has important bearings on network robustness and gene expression modeling.
A statistical study of atypical wave modes in the Earth's foreshock region
NASA Astrophysics Data System (ADS)
Hsieh, W.; Shue, J.; Lee, B.
2010-12-01
The Earth's foreshock, the region upstream the Earth’s bow shock, is filled with back-streaming particles and ultra-low frequency waves. Three different wave modes have been identified in the region, including 30-sec waves, 3-sec waves, and shocklets. Time History of Events and Macroscale Interactions during Substorms (THEMIS), a satellite mission that consists of five probes, provides multiple measuements of the Earth’s foreshock region. The method of Hilbert-Huang transform (HHT) includes the procedures of empirical mode decomposition and instantaneous frequency calculation. In this study, we use HHT to decompose intrinsic wave modes and perform a wave analysis of chaotic magnetic fields in the Earth's foreshock region. We find that some individual atypical wave modes other than 30-sec and 3-sec appear in the region. In this presentation, we will show the statistical characteristics, such as wave frequency, wave amplitude, and wave polarization of the atypical intrinsic wave modes, with respect to different locations in the foreshock region and to different solar wind conditions.
Permafrost features on Earth and Mars: Similarities, differences
NASA Technical Reports Server (NTRS)
Joens, H. P.
1985-01-01
Typical permafrost features on Earth are polygonal structures, pingos and soli-/gelifluxion features. In areas around the poles and in mountain ranges the precipitation accumulates to inland ice or ice streams. On Mars the same features were identified: polygonal features cover the larger part of the northern lowlands indicating probably an ice wedge-/sand wedge system or desiccation cracks. These features indicate the extend of large mud accumulations which seem to be related to large outflow events of the chaotic terrains. The shore line of this mud accumulation is indicated by a special set of relief types. In some areas large pingo-like hills were identified. In the vicinity of the largest martian volcano, Olympus Mons, the melting of underlying permafrost and/or ground ice led to the downslope sliding of large parts of the primary shield which formed the aureole around Olympus Mons. Glacier-like features are identified along the escarpment which separates the Southern Uplands from the Northern Lowlands.
Kimura, Shinya; Sato, Toshihiko; Ikeda, Shunya; Noda, Mitsuhiko; Nakayama, Takeo
2010-01-01
Health insurance claims (ie, receipts) record patient health care treatments and expenses and, although created for the health care payment system, are potentially useful for research. Combining different types of receipts generated for the same patient would dramatically increase the utility of these receipts. However, technical problems, including standardization of disease names and classifications, and anonymous linkage of individual receipts, must be addressed. In collaboration with health insurance societies, all information from receipts (inpatient, outpatient, and pharmacy) was collected. To standardize disease names and classifications, we developed a computer-aided post-entry standardization method using a disease name dictionary based on International Classification of Diseases (ICD)-10 classifications. We also developed an anonymous linkage system by using an encryption code generated from a combination of hash values and stream ciphers. Using different sets of the original data (data set 1: insurance certificate number, name, and sex; data set 2: insurance certificate number, date of birth, and relationship status), we compared the percentage of successful record matches obtained by using data set 1 to generate key codes with the percentage obtained when both data sets were used. The dictionary's automatic conversion of disease names successfully standardized 98.1% of approximately 2 million new receipts entered into the database. The percentage of anonymous matches was higher for the combined data sets (98.0%) than for data set 1 (88.5%). The use of standardized disease classifications and anonymous record linkage substantially contributed to the construction of a large, chronologically organized database of receipts. This database is expected to aid in epidemiologic and health services research using receipt information.
Randomly chosen chaotic maps can give rise to nearly ordered behavior
NASA Astrophysics Data System (ADS)
Boyarsky, Abraham; Góra, Paweł; Islam, Md. Shafiqul
2005-10-01
Parrondo’s paradox [J.M.R. Parrondo, G.P. Harmer, D. Abbott, New paradoxical games based on Brownian ratchets, Phys. Rev. Lett. 85 (2000), 5226-5229] (see also [O.E. Percus, J.K. Percus, Can two wrongs make a right? Coin-tossing games and Parrondo’s paradox, Math. Intelligencer 24 (3) (2002) 68-72]) states that two losing gambling games when combined one after the other (either deterministically or randomly) can result in a winning game: that is, a losing game followed by a losing game = a winning game. Inspired by this paradox, a recent study [J. Almeida, D. Peralta-Salas, M. Romera, Can two chaotic systems give rise to order? Physica D 200 (2005) 124-132] asked an analogous question in discrete time dynamical system: can two chaotic systems give rise to order, namely can they be combined into another dynamical system which does not behave chaotically? Numerical evidence is provided in [J. Almeida, D. Peralta-Salas, M. Romera, Can two chaotic systems give rise to order? Physica D 200 (2005) 124-132] that two chaotic quadratic maps, when composed with each other, create a new dynamical system which has a stable period orbit. The question of what happens in the case of random composition of maps is posed in [J. Almeida, D. Peralta-Salas, M. Romera, Can two chaotic systems give rise to order? Physica D 200 (2005) 124-132] but left unanswered. In this note we present an example of a dynamical system where, at each iteration, a map is chosen in a probabilistic manner from a collection of chaotic maps. The resulting random map is proved to have an infinite absolutely continuous invariant measure (acim) with spikes at two points. From this we show that the dynamics behaves in a nearly ordered manner. When the foregoing maps are applied one after the other, deterministically as in [O.E. Percus, J.K. Percus, Can two wrongs make a right? Coin-tossing games and Parrondo’s paradox, Math. Intelligencer 24 (3) (2002) 68-72], the resulting composed map has a periodic orbit which is stable.
Antiphase synchronization in coupled chaotic oscillators.
Liu, Weiqing; Xiao, Jinghua; Qian, Xiaolan; Yang, Junzhong
2006-05-01
Anti-phase synchronization (AS) in coupled chaotic oscillators is investigated. The necessary condition for AS is given and the stability of AS is studied. Results are demonstrated with numerical simulations and electronic circuits.
[Resilience and Spirituality Considered from Viewpoint of Existential Philosophy of Karl Jaspers].
Kato, Satoshi
2015-01-01
After publishing "General Psychopathology" in 1913, Jaspers turned his attention to serious philosophical contemplation. Using the term grenzsituation (limit situation) as a key concept, he first presented a framework to shed light on the pathology of both individuals and groups, and this led on to include the perspective of resilience. He then used three more key concepts, transzendenz (transcendence), chiffer (cipher), and unverstädliche (unintelligible) to offer a framework to focus on the possibilities of human existence. In the field of medicine, this is useful to support a spiritual approach which is discussed in palliative treatment. The philosophy developed by Jaspers can be considered as indicating a practical form of guidance for people to find self-support from a limit situation where they have lost their own support, and finally, come to a degree of mutual acceptance. Mutual acceptance is made possible at the level of ciphers, in which specific meaning remains undefined, by directing both the self and the other toward a state of "transcendence". Nowadays there is a trend for those chaplains involved in spiritual care from a specialist point of view to be trained to effectively transcend any difference in religious belief. As a basic premise, the author considers there is a need to once again return to a state before the start of individual religions, and stand on a cross-sectional ground level, an area which could be regarded as common to all religions. When conducting such a task, in the author's view, the restrained spirituality that Jaspers expounded is thought-provoking.
Jinneography: Post-Soviet passages of traumatic exemplarity.
Beigi, Khashayar
2016-04-01
While Russia has historically and geographically close ties with Islam, the second most-practiced religion in its vast territories, the collapse of the USSR changed the terms of this relationship in significant ways. One key shift is the emergence of new immigration patterns between Russia and former Soviet states. Traversing distant lands from the peripheries of the Caucasus and Central Asia to mainland Russia in search of work, migrants have come to recognize each other as fellow Muslims dispersed in a theological geography on the ruins of the universal comradeship dreamed by the Soviet utopia. I propose to study the Islamic pedagogical practice of ibra in the context of sociohistorical dynamics of education and migration between Russia and Central Asia to further locate and analyze this shift in relation to current debates on post-Soviet subjectivity. By discussing the case of a spirit possession of a Tajik national performed in Russia, I argue that the collective participation in the session pedagogically invokes, ciphers, and extends the post-Soviet terrains of history as ibra, or exemplary passage of worldly events. To do so, I first locate the Quranic concept of ibra as a pedagogical paradigm in Islamic traditions as well as an ethnographic lens in the context of educational campaigns for the Muslims of Eurasia and then apply the concept to my analysis of the possession session in order to show that in the ritualistic incarnations of ghosts, or jinns, the civil war of Tajikistan and its continuing cycle of terror is ciphered into a desire for learning, as well as a focus on approximation to the divine. © The Author(s) 2015.
A Route to Chaotic Behavior of Single Neuron Exposed to External Electromagnetic Radiation.
Feng, Peihua; Wu, Ying; Zhang, Jiazhong
2017-01-01
Non-linear behaviors of a single neuron described by Fitzhugh-Nagumo (FHN) neuron model, with external electromagnetic radiation considered, is investigated. It is discovered that with external electromagnetic radiation in form of a cosine function, the mode selection of membrane potential occurs among periodic, quasi-periodic, and chaotic motions as increasing the frequency of external transmembrane current, which is selected as a sinusoidal function. When the frequency is small or large enough, periodic, and quasi-periodic motions are captured alternatively. Otherwise, when frequency is in interval 0.778 < ω < 2.208, chaotic motion characterizes the main behavior type. The mechanism of mode transition from quasi-periodic to chaotic motion is also observed when varying the amplitude of external electromagnetic radiation. The frequency apparently plays a more important role in determining the system behavior.
A Route to Chaotic Behavior of Single Neuron Exposed to External Electromagnetic Radiation
Feng, Peihua; Wu, Ying; Zhang, Jiazhong
2017-01-01
Non-linear behaviors of a single neuron described by Fitzhugh-Nagumo (FHN) neuron model, with external electromagnetic radiation considered, is investigated. It is discovered that with external electromagnetic radiation in form of a cosine function, the mode selection of membrane potential occurs among periodic, quasi-periodic, and chaotic motions as increasing the frequency of external transmembrane current, which is selected as a sinusoidal function. When the frequency is small or large enough, periodic, and quasi-periodic motions are captured alternatively. Otherwise, when frequency is in interval 0.778 < ω < 2.208, chaotic motion characterizes the main behavior type. The mechanism of mode transition from quasi-periodic to chaotic motion is also observed when varying the amplitude of external electromagnetic radiation. The frequency apparently plays a more important role in determining the system behavior. PMID:29089882
Chaotic Dynamics of a Josephson Junction with a Ratchet Potential and Current-Modulating Damping
NASA Astrophysics Data System (ADS)
Li, Fei; Li, Wenwu; Xu, Lan
2018-06-01
The chaotic dynamics of a Josephson junction with a ratchet potential and current-modulating damping are studied. Under the first-order approximation, we construct the general solution of the first-order equation whose boundedness condition contains the famous Melnikov chaotic criterion. Based on the general solution, the incomputability and unpredictability of the system's chaotic behavior are discussed. For the case beyond perturbation conditions, the evolution of stroboscopic Poincaré sections shows that the system undergoes a quasi-periodic transition to chaos with an increasing intensity of the rf-current. Through a suitable feedback controlling strategy, the chaos can be effectively suppressed and the intensity of the controller can vary in a large range. It is also found that the current between the two separated superconductors increases monotonously in some specific parameter spaces.
NASA Astrophysics Data System (ADS)
Sun, Jun-Wei; Shen, Yi; Zhang, Guo-Dong; Wang, Yan-Feng; Cui, Guang-Zhao
2013-04-01
According to the Lyapunov stability theorem, a new general hybrid projective complete dislocated synchronization scheme with non-derivative and derivative coupling based on parameter identification is proposed under the framework of drive-response systems. Every state variable of the response system equals the summation of the hybrid drive systems in the previous hybrid synchronization. However, every state variable of the drive system equals the summation of the hybrid response systems while evolving with time in our method. Complete synchronization, hybrid dislocated synchronization, projective synchronization, non-derivative and derivative coupling, and parameter identification are included as its special item. The Lorenz chaotic system, Rössler chaotic system, memristor chaotic oscillator system, and hyperchaotic Lü system are discussed to show the effectiveness of the proposed methods.
Design and implementation of grid multi-scroll fractional-order chaotic attractors
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Liping, E-mail: lip-chenhut@126.com; Pan, Wei; Wu, Ranchao
2016-08-15
This paper proposes a novel approach for generating multi-scroll chaotic attractors in multi-directions for fractional-order (FO) systems. The stair nonlinear function series and the saturated nonlinear function are combined to extend equilibrium points with index 2 in a new FO linear system. With the help of stability theory of FO systems, stability of its equilibrium points is analyzed, and the chaotic behaviors are validated through phase portraits, Lyapunov exponents, and Poincaré section. Choosing the order 0.96 as an example, a circuit for generating 2-D grid multiscroll chaotic attractors is designed, and 2-D 9 × 9 grid FO attractors are observed at most.more » Numerical simulations and circuit experimental results show that the method is feasible and the designed circuit is correct.« less
NASA Astrophysics Data System (ADS)
Khanzadeh, Alireza; Pourgholi, Mahdi
2016-08-01
In the conventional chaos synchronization methods, the time at which two chaotic systems are synchronized, is usually unknown and depends on initial conditions. In this work based on Lyapunov stability theory a sliding mode controller with time-varying switching surfaces is proposed to achieve chaos synchronization at a pre-specified time for the first time. The proposed controller is able to synchronize chaotic systems precisely at any time when we want. Moreover, by choosing the time-varying switching surfaces in a way that the reaching phase is eliminated, the synchronization becomes robust to uncertainties and exogenous disturbances. Simulation results are presented to show the effectiveness of the proposed method of stabilizing and synchronizing chaotic systems with complete robustness to uncertainty and disturbances exactly at a pre-specified time.
Chaotic Dynamics of a Josephson Junction with a Ratchet Potential and Current-Modulating Damping
NASA Astrophysics Data System (ADS)
Li, Fei; Li, Wenwu; Xu, Lan
2018-04-01
The chaotic dynamics of a Josephson junction with a ratchet potential and current-modulating damping are studied. Under the first-order approximation, we construct the general solution of the first-order equation whose boundedness condition contains the famous Melnikov chaotic criterion. Based on the general solution, the incomputability and unpredictability of the system's chaotic behavior are discussed. For the case beyond perturbation conditions, the evolution of stroboscopic Poincaré sections shows that the system undergoes a quasi-periodic transition to chaos with an increasing intensity of the rf-current. Through a suitable feedback controlling strategy, the chaos can be effectively suppressed and the intensity of the controller can vary in a large range. It is also found that the current between the two separated superconductors increases monotonously in some specific parameter spaces.
NASA Astrophysics Data System (ADS)
Song, Rui-Zhuo; Xiao, Wen-Dong; Wei, Qing-Lai
2014-05-01
We develop an online adaptive dynamic programming (ADP) based optimal control scheme for continuous-time chaotic systems. The idea is to use the ADP algorithm to obtain the optimal control input that makes the performance index function reach an optimum. The expression of the performance index function for the chaotic system is first presented. The online ADP algorithm is presented to achieve optimal control. In the ADP structure, neural networks are used to construct a critic network and an action network, which can obtain an approximate performance index function and the control input, respectively. It is proven that the critic parameter error dynamics and the closed-loop chaotic systems are uniformly ultimately bounded exponentially. Our simulation results illustrate the performance of the established optimal control method.
Modelling and prediction for chaotic fir laser attractor using rational function neural network.
Cho, S
2001-02-01
Many real-world systems such as irregular ECG signal, volatility of currency exchange rate and heated fluid reaction exhibit highly complex nonlinear characteristic known as chaos. These chaotic systems cannot be retreated satisfactorily using linear system theory due to its high dimensionality and irregularity. This research focuses on prediction and modelling of chaotic FIR (Far InfraRed) laser system for which the underlying equations are not given. This paper proposed a method for prediction and modelling a chaotic FIR laser time series using rational function neural network. Three network architectures, TDNN (Time Delayed Neural Network), RBF (radial basis function) network and the RF (rational function) network, are also presented. Comparisons between these networks performance show the improvements introduced by the RF network in terms of a decrement in network complexity and better ability of predictability.
Amplification through chaotic synchronization in spatially extended beam-plasma systems
NASA Astrophysics Data System (ADS)
Moskalenko, Olga I.; Frolov, Nikita S.; Koronovskii, Alexey A.; Hramov, Alexander E.
2017-12-01
In this paper, we have studied the relationship between chaotic synchronization and microwave signal amplification in coupled beam-plasma systems. We have considered a 1D particle-in-cell numerical model of unidirectionally coupled beam-plasma oscillatory media being in the regime of electron pattern formation. We have shown the significant gain of microwave oscillation power in coupled beam-plasma media being in the different regimes of generation. The discovered effect has a close connection with the chaotic synchronization phenomenon, so we have observed that amplification appears after the onset of the complete time scale synchronization regime in the analyzed coupled spatially extended systems. We have also provided the numerical study of physical processes in the chain of beam-plasma systems leading to the chaotic synchronization and the amplification of microwave oscillations power, respectively.
Symmetric encryption algorithms using chaotic and non-chaotic generators: A review
Radwan, Ahmed G.; AbdElHaleem, Sherif H.; Abd-El-Hafiz, Salwa K.
2015-01-01
This paper summarizes the symmetric image encryption results of 27 different algorithms, which include substitution-only, permutation-only or both phases. The cores of these algorithms are based on several discrete chaotic maps (Arnold’s cat map and a combination of three generalized maps), one continuous chaotic system (Lorenz) and two non-chaotic generators (fractals and chess-based algorithms). Each algorithm has been analyzed by the correlation coefficients between pixels (horizontal, vertical and diagonal), differential attack measures, Mean Square Error (MSE), entropy, sensitivity analyses and the 15 standard tests of the National Institute of Standards and Technology (NIST) SP-800-22 statistical suite. The analyzed algorithms include a set of new image encryption algorithms based on non-chaotic generators, either using substitution only (using fractals) and permutation only (chess-based) or both. Moreover, two different permutation scenarios are presented where the permutation-phase has or does not have a relationship with the input image through an ON/OFF switch. Different encryption-key lengths and complexities are provided from short to long key to persist brute-force attacks. In addition, sensitivities of those different techniques to a one bit change in the input parameters of the substitution key as well as the permutation key are assessed. Finally, a comparative discussion of this work versus many recent research with respect to the used generators, type of encryption, and analyses is presented to highlight the strengths and added contribution of this paper. PMID:26966561
NASA Astrophysics Data System (ADS)
Jia, Bing
2014-03-01
A comb-shaped chaotic region has been simulated in multiple two-dimensional parameter spaces using the Hindmarsh—Rose (HR) neuron model in many recent studies, which can interpret almost all of the previously simulated bifurcation processes with chaos in neural firing patterns. In the present paper, a comb-shaped chaotic region in a two-dimensional parameter space was reproduced, which presented different processes of period-adding bifurcations with chaos with changing one parameter and fixed the other parameter at different levels. In the biological experiments, different period-adding bifurcation scenarios with chaos by decreasing the extra-cellular calcium concentration were observed from some neural pacemakers at different levels of extra-cellular 4-aminopyridine concentration and from other pacemakers at different levels of extra-cellular caesium concentration. By using the nonlinear time series analysis method, the deterministic dynamics of the experimental chaotic firings were investigated. The period-adding bifurcations with chaos observed in the experiments resembled those simulated in the comb-shaped chaotic region using the HR model. The experimental results show that period-adding bifurcations with chaos are preserved in different two-dimensional parameter spaces, which provides evidence of the existence of the comb-shaped chaotic region and a demonstration of the simulation results in different two-dimensional parameter spaces in the HR neuron model. The results also present relationships between different firing patterns in two-dimensional parameter spaces.
Qualitative models and experimental investigation of chaotic NOR gates and set/reset flip-flops
NASA Astrophysics Data System (ADS)
Rahman, Aminur; Jordan, Ian; Blackmore, Denis
2018-01-01
It has been observed through experiments and SPICE simulations that logical circuits based upon Chua's circuit exhibit complex dynamical behaviour. This behaviour can be used to design analogues of more complex logic families and some properties can be exploited for electronics applications. Some of these circuits have been modelled as systems of ordinary differential equations. However, as the number of components in newer circuits increases so does the complexity. This renders continuous dynamical systems models impractical and necessitates new modelling techniques. In recent years, some discrete dynamical models have been developed using various simplifying assumptions. To create a robust modelling framework for chaotic logical circuits, we developed both deterministic and stochastic discrete dynamical models, which exploit the natural recurrence behaviour, for two chaotic NOR gates and a chaotic set/reset flip-flop. This work presents a complete applied mathematical investigation of logical circuits. Experiments on our own designs of the above circuits are modelled and the models are rigorously analysed and simulated showing surprisingly close qualitative agreement with the experiments. Furthermore, the models are designed to accommodate dynamics of similarly designed circuits. This will allow researchers to develop ever more complex chaotic logical circuits with a simple modelling framework.
Hypothesis on the Origin of Chaotic Pulse Train in Dart Leader
NASA Astrophysics Data System (ADS)
Pu, Y.; Qie, X.; Sun, Z.; Jiang, R.; Liu, M.; Zhang, H.
2017-12-01
The origin of chaotic pulse train (CPT) during the dart leader propagation remains debatable. Based on previous observations, the `chaotic' dart leader is featured by chaotic electric fields, large charge transfer and high energetic radiation. In some cases, the cause of CPT was attributed to the concurrent branches or upward connecting leader. In this presentation, after carefully examining the simultaneous optical, electrical and VHF location data of triggered lightning in SHATLE and some results in other literature, we found the close relationship between the upper luminous leader segment and CPT. It is hypothesized that the CPT originates from the luminous corona zone around the upper leader channel beyond the leader tip. The fast, sufficient supply of negative charge from the cloud can result in a net negative charge layer around the ionized channel surface. Then new diffuse discharge can make a corona zone outside the channel and radiates in a chaotic way. The cloud charge reservoir and the speed of charge transfer, which can be indicated by the speed of the leader, are determinative to the generation of CPT. Using VHF location technique, we also estimated the speed evolution of the leader and link it with electric field change.
NASA Astrophysics Data System (ADS)
Li, Chuang; Min, Fuhong; Jin, Qiusen; Ma, Hanyuan
2017-12-01
An active charge-controlled memristive Chua's circuit is implemented, and its basic properties are analyzed. Firstly, with the system trajectory starting from an equilibrium point, the dynamic behavior of multiple coexisting attractors depending on the memristor initial value and the system parameter is studied, which shows the coexisting behaviors of point, period, chaos, and quasic-period. Secondly, with the system motion starting from a non-equilibrium point, the dynamics of extreme multistability in a wide initial value domain are easily conformed by new analytical methods. Furthermore, the simulation results indicate that some strange chaotic attractors like multi-wing type and multi-scroll type are observed when the observed signals are extended from voltage and current to power and energy, respectively. Specially, when different initial conditions are taken, the coexisting strange chaotic attractors between the power and energy signals are exhibited. Finally, the chaotic sequences of the new system are used for encrypting color image to protect image information security. The encryption performance is analyzed by statistic histogram, correlation, key spaces and key sensitivity. Simulation results show that the new memristive chaotic system has high security in color image encryption.
Qualitative models and experimental investigation of chaotic NOR gates and set/reset flip-flops.
Rahman, Aminur; Jordan, Ian; Blackmore, Denis
2018-01-01
It has been observed through experiments and SPICE simulations that logical circuits based upon Chua's circuit exhibit complex dynamical behaviour. This behaviour can be used to design analogues of more complex logic families and some properties can be exploited for electronics applications. Some of these circuits have been modelled as systems of ordinary differential equations. However, as the number of components in newer circuits increases so does the complexity. This renders continuous dynamical systems models impractical and necessitates new modelling techniques. In recent years, some discrete dynamical models have been developed using various simplifying assumptions. To create a robust modelling framework for chaotic logical circuits, we developed both deterministic and stochastic discrete dynamical models, which exploit the natural recurrence behaviour, for two chaotic NOR gates and a chaotic set/reset flip-flop. This work presents a complete applied mathematical investigation of logical circuits. Experiments on our own designs of the above circuits are modelled and the models are rigorously analysed and simulated showing surprisingly close qualitative agreement with the experiments. Furthermore, the models are designed to accommodate dynamics of similarly designed circuits. This will allow researchers to develop ever more complex chaotic logical circuits with a simple modelling framework.
NASA Astrophysics Data System (ADS)
Demirbaş, Şevki; Fidanboy, Hikmet; Kurt, Erol
2016-08-01
In this paper, detailed analyses of the chaotic behavior observed in a buck-boost converter are presented. Although this basic converter system is already known world-wide for the purpose of dc-dc conversion of the output of renewable energy systems, it indicates certain chaotic regimes where both the output amplitude and frequency change randomly. This chaotic regime can yield an unstable output over the resistive or resistive/inductive electrical loads. This study presents a detailed map for the regular and chaotic regions in terms of material parameters, such as converter capacitance C, resistive load R, and inductive load L. Thus, the stable area of operation for efficient and renewable electricity production will be ascertained for the studied converter system. We emphasize that the material parameters C, R, and L play important roles in generating energy from the solar cell; indeed, the stability increases with higher values of the converter capacitor and load inductance, whereas it decreases according to the resistive load. A number of periodic windows have been observed and the output frequency gives a broad-band spectrum of up to 50 kHz.
Inhibition of quantum transport due to 'scars' of unstable periodic orbits
NASA Technical Reports Server (NTRS)
Jensen, R. V.; Sanders, M. M.; Saraceno, M.; Sundaram, B.
1989-01-01
A new quantum mechanism for the suppression of chaotic ionization of highly excited hydrogen atoms explains the appearance of anomalously stable states in the microwave ionization experiments of Koch et al. A novel phase-space representation of the perturbed wave functions reveals that the inhibition of quantum transport is due to the selective excitation of wave functions that are highly localized near unstable periodic orbits in the chaotic classical phase space. The 'scarred' wave functions provide a new basis for the quantum description of a variety of classically chaotic systems.
Experiments of reconstructing discrete atmospheric dynamic models from data (I)
NASA Astrophysics Data System (ADS)
Lin, Zhenshan; Zhu, Yanyu; Deng, Ziwang
1995-03-01
In this paper, we give some experimental results of our study in reconstructing discrete atmospheric dynamic models from data. After a great deal of numerical experiments, we found that the logistic map, x n + 1 = 1- μx {2/n}, could be used in monthly mean temperature prediction when it was approaching the chaotic region, and its predictive results were in reverse states to the practical data. This means that the nonlinear developing behavior of the monthly mean temperature system is bifurcating back into the critical chaotic states from the chaotic ones.
Synchronization in node of complex networks consist of complex chaotic system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wei, Qiang, E-mail: qiangweibeihua@163.com; Digital Images Processing Institute of Beihua University, BeiHua University, Jilin, 132011, Jilin; Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian, 116024
2014-07-15
A new synchronization method is investigated for node of complex networks consists of complex chaotic system. When complex networks realize synchronization, different component of complex state variable synchronize up to different scaling complex function by a designed complex feedback controller. This paper change synchronization scaling function from real field to complex field for synchronization in node of complex networks with complex chaotic system. Synchronization in constant delay and time-varying coupling delay complex networks are investigated, respectively. Numerical simulations are provided to show the effectiveness of the proposed method.
Improved numerical solutions for chaotic-cancer-model
NASA Astrophysics Data System (ADS)
Yasir, Muhammad; Ahmad, Salman; Ahmed, Faizan; Aqeel, Muhammad; Akbar, Muhammad Zubair
2017-01-01
In biological sciences, dynamical system of cancer model is well known due to its sensitivity and chaoticity. Present work provides detailed computational study of cancer model by counterbalancing its sensitive dependency on initial conditions and parameter values. Cancer chaotic model is discretized into a system of nonlinear equations that are solved using the well-known Successive-Over-Relaxation (SOR) method with a proven convergence. This technique enables to solve large systems and provides more accurate approximation which is illustrated through tables, time history maps and phase portraits with detailed analysis.
Chaotic itinerancy in the oscillator neural network without Lyapunov functions.
Uchiyama, Satoki; Fujisaka, Hirokazu
2004-09-01
Chaotic itinerancy (CI), which is defined as an incessant spontaneous switching phenomenon among attractor ruins in deterministic dynamical systems without Lyapunov functions, is numerically studied in the case of an oscillator neural network model. The model is the pseudoinverse-matrix version of the previous model [S. Uchiyama and H. Fujisaka, Phys. Rev. E 65, 061912 (2002)] that was studied theoretically with the aid of statistical neurodynamics. It is found that CI in neural nets can be understood as the intermittent dynamics of weakly destabilized chaotic retrieval solutions. Copyright 2004 American Institute of Physics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rajpathak, Bhooshan, E-mail: bhooshan@ee.iitb.ac.in; Pillai, Harish K., E-mail: hp@ee.iitb.ac.in; Bandyopadhyay, Santanu, E-mail: santanu@me.iitb.ac.in
2015-10-15
In this paper, we analytically examine the unstable periodic orbits and chaotic orbits of the 1-D linear piecewise-smooth discontinuous map. We explore the existence of unstable orbits and the effect of variation in parameters on the coexistence of unstable orbits. Further, we show that this structuring is different from the well known period adding cascade structure associated with the stable periodic orbits of the same map. Further, we analytically prove the existence of chaotic orbit for this map.
Chaotic advection in a 2-D mixed convection flow
NASA Astrophysics Data System (ADS)
Tangborn, Andrew V.; Silevitch, Daniel M.; Howes, Tony
1995-06-01
Two-dimensional numerical simulations of particle advection in a channel flow with spatially periodic heating have been carried out. The velocity field is found to be periodic above a critical Rayleigh number of around 18 000 and a Reynolds number of 10. Particle motion becomes chaotic in the lower half plane almost immediately after this critical value is surpassed, as characterized by the power spectral density and Poincaré section of the flow. As the Rayleigh number is increased further, particle motion in the entire domain becomes chaotic.
Chaotic terrain of Mars - A tectonic interpretation from Mariner 6 imagery
NASA Technical Reports Server (NTRS)
Wilson, R. C.; Harp, E. L.; Picard, M. D.; Ward, S. H.
1973-01-01
Sharp et al. (1971) define chaotic terrain as an irregular jumble of topographic forms covering a certain area within Pyrrhae Regio and adjacent regions centered at about 10 deg S., 35 deg W. This area is covered by Mariner 6 television imagery. An analysis of fracture patterns in the Martian surface from high-resolution Mariner 6 imagery suggests that the lineaments observed in both the chaotic terrain and the cratered plateau areas in Pyrrhae Regio are tectonic fractures resulting from stresses within the Martian crust.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Munoz, Pablo R.; Rempel, Erico L.; Barroso, Joaquim J.
We study the chaotic dynamics of the Pierce diode, a simple spatially extended system for collisionless bounded plasmas, focusing on the concept of edge of chaos, the boundary that separates transient from asymptotic dynamics. We fully characterize an interior crisis at the end of a periodic window, thereby showing direct evidence of the collision between a chaotic attractor, a chaotic saddle, and the edge of chaos, formed by a period-3 unstable periodic orbit and its stable manifold. The edge of chaos persists after the interior crisis, when the global attractor of the system increases its size in the phase space.
ASTEROIDS: Living in the Kingdom of Chaos
NASA Astrophysics Data System (ADS)
Morbidelli, A.
2000-10-01
The existence of chaotic regions in the main asteroid belt, related with the lowest-order mean-motion and secular resonances, has long been known. However, only in the last decade have semi-analytic theories allowed a proper understanding of the chaotic behavior observed in numerical simulations which accurately incorporate the entire planetary system. The most spectacular result has been the discovery that the asteroids in some of these resonance may collide with the Sun on typical time scales of a few million year, their eccentricities being pumped to unity during their chaotic evolution. But the asteroid belt is not simply divided into violent chaotic zones and regular regions. It has been shown that the belt is criss-crossed by a large number of high-order mean-motion resonances with Jupiter or Mars, as well as by `three-body resonances' with Jupiter and Saturn. All these weak resonances cause the slow chaotic drift of the `proper' eccentricities and inclinations. The traces left by this evolution are visible, for example, in the structure of the Eos and Themis asteroid families. Weak chaos may also explain the anomalous dispersion of the eccentricities and inclinations observed in the Flora ``clan." Moreover, due to slow increases in their eccentricities, many asteroids start to cross the orbit of Mars, over a wide range of semimajor axes. The improved knowledge of the asteroid belt's chaotic structure provides, for the first time, an opportunity to build detailed quantitative models of the origin and the orbital distribution of Near-Earth Asteroids and meteorites. In turn, these models seem to imply that the semimajor axes of main-belt asteroids must also slowly evolve with time. For asteroids larger than about 20 km this is due mainly to encounters with Ceres, Pallas, and Vesta, while for smaller bodies the so-called Yarkovsky effect should dominate. Everything moves chaotically in the asteroid belt.
Chaotic dynamics in nanoscale NbO2 Mott memristors for analogue computing
NASA Astrophysics Data System (ADS)
Kumar, Suhas; Strachan, John Paul; Williams, R. Stanley
2017-08-01
At present, machine learning systems use simplified neuron models that lack the rich nonlinear phenomena observed in biological systems, which display spatio-temporal cooperative dynamics. There is evidence that neurons operate in a regime called the edge of chaos that may be central to complexity, learning efficiency, adaptability and analogue (non-Boolean) computation in brains. Neural networks have exhibited enhanced computational complexity when operated at the edge of chaos, and networks of chaotic elements have been proposed for solving combinatorial or global optimization problems. Thus, a source of controllable chaotic behaviour that can be incorporated into a neural-inspired circuit may be an essential component of future computational systems. Such chaotic elements have been simulated using elaborate transistor circuits that simulate known equations of chaos, but an experimental realization of chaotic dynamics from a single scalable electronic device has been lacking. Here we describe niobium dioxide (NbO2) Mott memristors each less than 100 nanometres across that exhibit both a nonlinear-transport-driven current-controlled negative differential resistance and a Mott-transition-driven temperature-controlled negative differential resistance. Mott materials have a temperature-dependent metal-insulator transition that acts as an electronic switch, which introduces a history-dependent resistance into the device. We incorporate these memristors into a relaxation oscillator and observe a tunable range of periodic and chaotic self-oscillations. We show that the nonlinear current transport coupled with thermal fluctuations at the nanoscale generates chaotic oscillations. Such memristors could be useful in certain types of neural-inspired computation by introducing a pseudo-random signal that prevents global synchronization and could also assist in finding a global minimum during a constrained search. We specifically demonstrate that incorporating such memristors into the hardware of a Hopfield computing network can greatly improve the efficiency and accuracy of converging to a solution for computationally difficult problems.
Chaotic trajectories in the standard map. The concept of anti-integrability
NASA Astrophysics Data System (ADS)
Aubry, Serge; Abramovici, Gilles
1990-07-01
A rigorous proof is given in the standard map (associated with a Frenkel-Kontorowa model) for the existence of chaotic trajectories with unbounded momenta for large enough coupling constant k > k0. These chaotic trajectories (with finite entropy per site) are coded by integer sequences { mi} such that the sequence bi = |m i+1 + m i-1-2m i| be bounded by some integer b. The bound k0 in k depends on b and can be lowered for coding sequences { mi} fulfilling more restrictive conditions. The obtained chaotic trajectories correspond to stationary configurations of the Frenkel-Kontorowa model with a finite (non-zero) photon gap (called gap parameter in dimensionless units). This property implies that the trajectory (or the configuration { ui}) can be uniquely continued as a uniformly continuous function of the model parameter k in some neighborhood of the initial configuration. A non-zero gap parameter implies that the Lyapunov coefficient is strictly positive (when it is defined). In addition, the existence of dilating and contracting manifolds is proven for these chaotic trajectories. “Exotic” trajectories such as ballistic trajectories are also proven to exist as a consequence of these theorems. The concept of anti-integrability emerges from these theorems. In the anti-integrable limit which can be only defined for a discrete time dynamical system, the coordinates of the trajectory at time i do not depend on the coordinates at time i - 1. Thus, at this singular limit, the existence of chaotic trajectories is trivial and the dynamical system reduces to a Bernoulli shift. It is well known that the KAM tori of symplectic dynamical originates by continuity from the invariant tori which exists in the integrible limit (under certain conditions). In a similar way, it appears that the chaotic trajectories of dynamical systems originate by continuity from those which exists at the anti-integrable limits (also under certain conditions).
NASA Astrophysics Data System (ADS)
Fakhraei, J.; Khanlo, H. M.; Ghayour, M.; Faramarzi, Kh.
In this paper, the chaotic behavior of a ground vehicle system with driver subjected to road disturbances is studied and the relationship between the nonlinear vibration of the vehicle and ride comfort is evaluated. The vehicle system is modeled as fully nonlinear with seven degrees of freedom and an additional degree of freedom for driver (8-DOF). The excitation force is the road irregularities that are assumed as road speed control bumps. The sinusoidal, consecutive half-sine and dented-rectangular waveforms are considered to simulate the road speed control bumps. The nonlinearities of the system are due to the nonlinear springs and dampers that are used in the suspension system and tires. The governing differential equations are extracted under Newton-Euler laws and solved via numerical methods. The chaotic behaviors were studied in more detail with special techniques such as bifurcation diagrams, phase plane portrait, Poincaré map and Lyapunov exponents. The ride comfort was evaluated as the RMS value of the vertical displacement of the vehicle body and driver. Firstly, the effect of amplitude (height) and frequency (vehicle’s speed) of these speed control bumps on chaotic vibrations of vehicle are studied. The obtained results show that various forms of vibrations, such as periodic, subharmonic and chaotic vibrations, can be detected in the system behavior with the change of the height and frequency of speed control bumps and present different types of strange attractors in the vehicle with and without driver. Then, the influence of nonlinear vibration on ride comfort and the relationship between chaotic vibrations of the vehicle and driving comfort are investigated. The results of analyzing the RMS diagrams reveal that the chaotic behaviors can directly affect the driving comfort and lead to the driver’s comfort being reduced. The obtained results can be used in the design of vehicle and road bumps pavement.
The Chaotic Terrains of Mercury: A History of Large-Scale Crustal Devolatilization
NASA Astrophysics Data System (ADS)
Rodriguez, J. A. P.; Domingue, D. L.; Berman, D. C.; Kargel, J. S.; Baker, V. R.; Teodoro, L. F.; Banks, M.; Leonard, G.
2018-05-01
Approximately 400 million years after the Caloris basin impact, extensive collapse formed Mercury's chaotic terrains. Collapse likely resulted from regionally elevated heat flow devolatilizing crustal materials along NE and NW extensional faults.
Shunting inhibitory cellular neural networks with chaotic external inputs
NASA Astrophysics Data System (ADS)
Akhmet, M. U.; Fen, M. O.
2013-06-01
Taking advantage of external inputs, it is shown that shunting inhibitory cellular neural networks behave chaotically. The analysis is based on the Li-Yorke definition of chaos. Appropriate illustrations which support the theoretical results are depicted.
A new class of asymptotically non-chaotic vacuum singularities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Klinger, Paul, E-mail: paul.klinger@univie.ac.at
2015-12-15
The BKL conjecture, stated in the 1960s and early 1970s by Belinski, Khalatnikov and Lifschitz, proposes a detailed description of the generic asymptotic dynamics of spacetimes as they approach a spacelike singularity. It predicts complicated chaotic behaviour in the generic case, but simpler non-chaotic one in cases with symmetry assumptions or certain kinds of matter fields. Here we construct a new class of four-dimensional vacuum spacetimes containing spacelike singularities which show non-chaotic behaviour. In contrast with previous constructions, no symmetry assumptions are made. Rather, the metric is decomposed in Iwasawa variables and conditions on the asymptotic evolution of some ofmore » them are imposed. The constructed solutions contain five free functions of all space coordinates, two of which are constrained by inequalities. We investigate continuous and discrete isometries and compare the solutions to previous constructions. Finally, we give the asymptotic behaviour of the metric components and curvature.« less
NASA Astrophysics Data System (ADS)
Rajagopal, Karthikeyan; Jafari, Sajad; Akgul, Akif; Karthikeyan, Anitha; Çiçek, Serdar; Shekofteh, Yasser
2018-05-01
In this paper, we report a novel chaotic snap oscillator with one nonlinear function. Dynamic analysis of the system shows the existence of bistability. To study the time delay effects on the proposed snap oscillator, we introduce multiple time delay in the fourth state equation. Investigation of dynamical properties of the time-delayed system shows that the snap oscillator exhibits the same multistable properties as the nondelayed system. The new multistable hyperjerk chaotic system has been tested in chaos shift keying and symmetric choc shift keying modulated communication designs for engineering applications. It has been determined that the symmetric chaos shift keying modulated communication system implemented with the new chaotic system is more successful than the chaos shift keying modulation for secure communication. Also, circuit implementation of the chaotic snap oscillator with tangent function is carried out showing its feasibility.
Chaotic reconfigurable ZCMT precoder for OFDM data encryption and PAPR reduction
NASA Astrophysics Data System (ADS)
Chen, Han; Yang, Xuelin; Hu, Weisheng
2017-12-01
A secure orthogonal frequency division multiplexing (OFDM) transmission scheme precoded by chaotic Zadoff-Chu matrix transform (ZCMT) is proposed and demonstrated. It is proved that the reconfigurable ZCMT matrices after row/column permutations can be applied as an alternative precoder for peak-to-average power ratio (PAPR) reduction. The permutations and the reconfigurable parameters in ZCMT matrix are generated by a hyper digital chaos, in which a huge key space of ∼ 10800 is created for physical-layer OFDM data encryption. An encrypted data transmission of 8.9 Gb/s optical OFDM signals is successfully demonstrated over 20 km standard single-mode fiber (SSMF) for 16-QAM. The BER performance of the encrypted signals is improved by ∼ 2 dB (BER@ 10-3), which is mainly attributed to the effective reduction of PAPR via chaotic ZCMT precoding. Moreover, the chaotic ZCMT precoding scheme requires no sideband information, thus the spectrum efficiency is enhanced during transmission.
A Wave Chaotic Study of Quantum Graphs with Microwave Networks
NASA Astrophysics Data System (ADS)
Fu, Ziyuan
Quantum graphs provide a setting to test the hypothesis that all ray-chaotic systems show universal wave chaotic properties. I study the quantum graphs with a wave chaotic approach. Here, an experimental setup consisting of a microwave coaxial cable network is used to simulate quantum graphs. Some basic features and the distributions of impedance statistics are analyzed from experimental data on an ensemble of tetrahedral networks. The random coupling model (RCM) is applied in an attempt to uncover the universal statistical properties of the system. Deviations from RCM predictions have been observed in that the statistics of diagonal and off-diagonal impedance elements are different. Waves trapped due to multiple reflections on bonds between nodes in the graph most likely cause the deviations from universal behavior in the finite-size realization of a quantum graph. In addition, I have done some investigations on the Random Coupling Model, which are useful for further research.
Nonlinear modeling of chaotic time series: Theory and applications
NASA Astrophysics Data System (ADS)
Casdagli, M.; Eubank, S.; Farmer, J. D.; Gibson, J.; Desjardins, D.; Hunter, N.; Theiler, J.
We review recent developments in the modeling and prediction of nonlinear time series. In some cases, apparent randomness in time series may be due to chaotic behavior of a nonlinear but deterministic system. In such cases, it is possible to exploit the determinism to make short term forecasts that are much more accurate than one could make from a linear stochastic model. This is done by first reconstructing a state space, and then using nonlinear function approximation methods to create a dynamical model. Nonlinear models are valuable not only as short term forecasters, but also as diagnostic tools for identifying and quantifying low-dimensional chaotic behavior. During the past few years, methods for nonlinear modeling have developed rapidly, and have already led to several applications where nonlinear models motivated by chaotic dynamics provide superior predictions to linear models. These applications include prediction of fluid flows, sunspots, mechanical vibrations, ice ages, measles epidemics, and human speech.
Kingni, Sifeu Takougang; Mbé, Jimmi Hervé Talla; Woafo, Paul
2012-09-01
In this work, we numerically study the dynamics of vertical cavity surface emitting laser (VCSEL) firstly when it is driven by Chua's oscillator, secondly in case where it is driven by a broad frequency spectral bandwidth chaotic oscillator developed by Nana et al. [Commun. Nonlinear Sci. Numer. Simul. 14, 2266 (2009)]. We demonstrated that the VCSEL generated robust chaotic dynamics compared to the ones found in VCSEL subject to a sinusoidally modulated current and therefore it is more suitable for chaos encryption techniques. The synchronization characteristics and the communication performances of unidirectional coupled VCSEL driven by the broad frequency spectral bandwidth chaotic oscillators are investigated numerically. The results show that high-quality synchronization and transmission of messages can be realized for suitable system parameters. Chaos shift keying method is successfully applied to encrypt a message at a high bitrate.
Miranda, Rodrigo A; Rempel, Erico L; Chian, Abraham C-L; Seehafer, Norbert; Toledo, Benjamin A; Muñoz, Pablo R
2013-09-01
We study a transition to hyperchaos in the two-dimensional incompressible Navier-Stokes equations with periodic boundary conditions and an external forcing term. Bifurcation diagrams are constructed by varying the Reynolds number, and a transition to hyperchaos (HC) is identified. Before the onset of HC, there is coexistence of two chaotic attractors and a hyperchaotic saddle. After the transition to HC, the two chaotic attractors merge with the hyperchaotic saddle, generating random switching between chaos and hyperchaos, which is responsible for intermittent bursts in the time series of energy and enstrophy. The chaotic mixing properties of the flow are characterized by detecting Lagrangian coherent structures. After the transition to HC, the flow displays complex Lagrangian patterns and an increase in the level of Lagrangian chaoticity during the bursty periods that can be predicted statistically by the hyperchaotic saddle prior to HC transition.
NASA Astrophysics Data System (ADS)
Chiun, Lee Chia; Mandangan, Arif; Daud, Muhamad Azlan; Hussin, Che Haziqah Che
2017-04-01
We may secure the content of text, audio, image and video during their transmission from one party to another party via an open channel such as the internet by using cryptograph. Logistic-Sine System (LSS) is a combination on two 1D chaotic maps which are Logistic Map and Sine Map. By applying the LSS into cryptography, the image encryption and decryption can be performed. This study is focusing on the performance test of the image encryption and decryption processes by using the LSS. For comparison purpose, we compare the performance of the encryption and decryption by using two different chaotic systems, which are the LSS and Logistic-Tent System (LTS). The result shows that system with LSS is less efficient than LTS in term of encryption time but both systems have similar efficiency in term of decryption time.
NASA Astrophysics Data System (ADS)
Castaño, D.; Navarro, M. C.; Herrero, H.
2016-01-01
The appearance, evolution, and disappearance of periodic and quasiperiodic dynamics of fluid flows in a cylindrical annulus locally heated from below are analyzed using nonlinear simulations. The results reveal a route of the transition from a steady axisymmetric vertical vortex to a chaotic flow. The chaotic flow regime is reached after a sequence of successive supercritical Hopf bifurcations to periodic, quasiperiodic, and chaotic flow regimes. A scenario similar to the Ruelle-Takens-Newhouse scenario is verified in this convective flow. In the transition to chaos we find the appearance of subvortices embedded in the primary axisymmetric vortex, flows where the subvortical structure strengthens and weakens, that almost disappears before reforming again, leading to a more disorganized flow to a final chaotic regime. Results are remarkable as they connect to observations describing formation, weakening, and virtual disappearance before revival of subvortices in some atmospheric swirls such as dust devils.
Experimental study of firing death in a network of chaotic FitzHugh-Nagumo neurons
NASA Astrophysics Data System (ADS)
Ciszak, Marzena; Euzzor, Stefano; Arecchi, F. Tito; Meucci, Riccardo
2013-02-01
The FitzHugh-Nagumo neurons driven by a periodic forcing undergo a period-doubling route to chaos and a transition to mixed-mode oscillations. When coupled, their dynamics tend to be synchronized. We show that the chaotically spiking neurons change their internal dynamics to subthreshold oscillations, the phenomenon referred to as firing death. These dynamical changes are observed below the critical coupling strength at which the transition to full chaotic synchronization occurs. Moreover, we find various dynamical regimes in the subthreshold oscillations, namely, regular, quasiperiodic, and chaotic states. We show numerically that these dynamical states may coexist with large-amplitude spiking regimes and that this coexistence is characterized by riddled basins of attraction. The reported results are obtained for neurons implemented in the electronic circuits as well as for the model equations. Finally, we comment on the possible scenarios where the coupling-induced firing death could play an important role in biological systems.
Controlling effect of geometrically defined local structural changes on chaotic Hamiltonian systems.
Ben Zion, Yossi; Horwitz, Lawrence
2010-04-01
An effective characterization of chaotic conservative Hamiltonian systems in terms of the curvature associated with a Riemannian metric tensor derived from the structure of the Hamiltonian has been extended to a wide class of potential models of standard form through definition of a conformal metric. The geodesic equations reproduce the Hamilton equations of the original potential model through an inverse map in the tangent space. The second covariant derivative of the geodesic deviation in this space generates a dynamical curvature, resulting in (energy-dependent) criteria for unstable behavior different from the usual Lyapunov criteria. We show here that this criterion can be constructively used to modify locally the potential of a chaotic Hamiltonian model in such a way that stable motion is achieved. Since our criterion for instability is local in coordinate space, these results provide a minimal method for achieving control of a chaotic system.
Mobayen, Saleh
2018-06-01
This paper proposes a combination of composite nonlinear feedback and integral sliding mode techniques for fast and accurate chaos synchronization of uncertain chaotic systems with Lipschitz nonlinear functions, time-varying delays and disturbances. The composite nonlinear feedback method allows accurate following of the master chaotic system and the integral sliding mode control provides invariance property which rejects the perturbations and preserves the stability of the closed-loop system. Based on the Lyapunov- Krasovskii stability theory and linear matrix inequalities, a novel sufficient condition is offered for the chaos synchronization of uncertain chaotic systems. This method not only guarantees the robustness against perturbations and time-delays, but also eliminates reaching phase and avoids chattering problem. Simulation results demonstrate that the suggested procedure leads to a great control performance. Copyright © 2018 ISA. Published by Elsevier Ltd. All rights reserved.
Chaos in the sunspot cycle - Analysis and prediction
NASA Technical Reports Server (NTRS)
Mundt, Michael D.; Maguire, W. Bruce, II; Chase, Robert R. P.
1991-01-01
The variability of solar activity over long time scales, given semiquantitatively by measurements of sunspot numbers, is examined as a nonlinear dynamical system. First, a discussion of the data set used and the techniques utilized to reduce the noise and capture the long-term dynamics inherent in the data is presented. Subsequently, an attractor is reconstructed from the data set using the method of time delays. The reconstructed attractor is then used to determine both the dimension of the underlying system and also the largest Lyapunov exponent, which together indicate that the sunspot cycle is indeed chaotic and also low dimensional. In addition, recent techniques of exploiting chaotic dynamics to provide accurate, short-term predictions are utilized in order to improve upon current forecasting methods and also to place theoretical limits on predictability extent. The results are compared to chaotic solar-dynamo models as a possible physically motivated source of this chaotic behavior.
Chimeras and clusters in networks of hyperbolic chaotic oscillators
NASA Astrophysics Data System (ADS)
Cano, A. V.; Cosenza, M. G.
2017-03-01
We show that chimera states, where differentiated subsets of synchronized and desynchronized dynamical elements coexist, can emerge in networks of hyperbolic chaotic oscillators subject to global interactions. As local dynamics we employ Lozi maps, which possess hyperbolic chaotic attractors. We consider a globally coupled system of these maps and use two statistical quantities to describe its collective behavior: the average fraction of elements belonging to clusters and the average standard deviation of state variables. Chimera states, clusters, complete synchronization, and incoherence are thus characterized on the space of parameters of the system. We find that chimera states are related to the formation of clusters in the system. In addition, we show that chimera states arise for a sufficiently long range of interactions in nonlocally coupled networks of these maps. Our results reveal that, under some circumstances, hyperbolicity does not impede the formation of chimera states in networks of coupled chaotic systems, as it had been previously hypothesized.
Liang, Tian; Wang, Ke; Lim, Christina; Wong, Elaine; Song, Tingting; Nirmalathas, Ampalavanapillai
2017-09-04
In this paper, we report a novel mechanism to simultaneously provide secure connections for multiple users in indoor optical wireless communication systems by employing the time-slot coding scheme together with chaotic phase sequence. The chaotic phase sequence is generated according to the logistic map and applied to each symbol to secure the transmission. Proof-of-concept experiments are carried out for multiple system capacities based on both 4-QAM and 16-QAM modulation formats, i.e. 1.25 Gb/s, 2 Gb/s and 2.5 Gb/s for 4-QAM, and 2.5 Gb/s, 3.33 Gb/s and 4 Gb/s for 16-QAM. Experimental results show that in all cases the added chaotic phase does not degrade the legitimate user's signal quality while the illegal user cannot detect the signal without the key.