{"title":"Dynamical Properties of Some Coupled Map Networks with Applications to Multi-layer Center Networks","authors":"Shujuan Guo, Xinchu Fu","doi":"10.1109/IWCFTA.2009.78","DOIUrl":"https://doi.org/10.1109/IWCFTA.2009.78","url":null,"abstract":"In this paper, the synchronization and stability of some coupled map networks (CMN) are studied. Via linear stability analysis method, the stability of the synchronized state of CMN is determined by the eigenvalues of a matrix A, and for the chaos Logistic map, the range of the coupling strength of CMN is given. These results are applied to a class of multi-layer center networks, and some specific results are induced. Finally, numerical simulations are presented to verify these results.","PeriodicalId":279256,"journal":{"name":"2009 International Workshop on Chaos-Fractals Theories and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124954875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Encryption Algorithm Based on Image Reconstruction","authors":"Hai Yu, Zhiliang Zhu, Guanrong Chen","doi":"10.1109/IWCFTA.2009.49","DOIUrl":"https://doi.org/10.1109/IWCFTA.2009.49","url":null,"abstract":"An efficient image encryption algorithm is proposed, based on image reconstruction using some adjacent pixel characteristics. Since the permutation of sub-images composing of high 4-bits of the original image has a relatively high computational complexity, in the new scheme the permutation of sub-images is performed with low 4-bits instead, which therefore has a lower computational complexity. Experiment has been carried out, showing relatively high efficiency and security of the new cryptosystem.","PeriodicalId":279256,"journal":{"name":"2009 International Workshop on Chaos-Fractals Theories and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125644327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Router-Level Internet Topology","authors":"Cheng Zhang, Yanheng Liu, Jian Wang, Min Xia","doi":"10.1109/IWCFTA.2009.76","DOIUrl":"https://doi.org/10.1109/IWCFTA.2009.76","url":null,"abstract":"Modeling Internet topology is necessary for analyzing of network characteristics for the large and even growing network size. For example, the evolution of network structure and node attributes in the network is a key issue for us to understand the network properties and to design appropriate internetworking technology. In this paper, we define “favorability degree” to quantity the attributes of a node in the network. Then, a new modeling algorithm for Internet router-level topology is proposed by considering the influence of both node static and dynamic properties. By means of simulations and power-law, the presented modeling algorithm is demonstrated to be capable of precisely modeling the Internet router-level topology.","PeriodicalId":279256,"journal":{"name":"2009 International Workshop on Chaos-Fractals Theories and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133807509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex Symbolic Dynamics of One Class of Cellular Automata Rules","authors":"Changbing Tang, F. Chen, Weifeng Jin","doi":"10.1109/IWCFTA.2009.56","DOIUrl":"https://doi.org/10.1109/IWCFTA.2009.56","url":null,"abstract":"In this paper, the dynamical behaviors of elementary cellular automata (ECA) rule 35 are studied from the viewpoint of symbolic dynamics. It is proved that rule 35, a member of Wolfram’s class II, possesses rich and complicated dynamical behaviors in its two subsystems; that is, rule 35 is topologically mixing and possesses the positive topological entropy on each subsystem. Meanwhile, the phenomena of collisions provide an intriguing and valuable bridge for proving that the union of these two subsystems is not the global attractor. Finally, it is noted that the method presented in this work is also applicable to studying the dynamics of other ECA rules, especially the 112 Bernoulli-shift rules therein.","PeriodicalId":279256,"journal":{"name":"2009 International Workshop on Chaos-Fractals Theories and Applications","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134099327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Wireless Sensor Network Node with Hyperchaos Encryption Based on FPGA","authors":"Jigang Tong, Zhenxin Zhang, Qinglin Sun, Zeng-Qiang Chen","doi":"10.1109/IWCFTA.2009.47","DOIUrl":"https://doi.org/10.1109/IWCFTA.2009.47","url":null,"abstract":"Wireless Sensor Network has been widely used and its real-time data processing capability is very limited. This paper puts forward a new solution, which is the novel wireless sensor network node design with hyperchaos encryption based on FPGA. With the wide application on Wireless Sensor Network based on ZigBee protocol, we encrypt the transported data in the network using hyperchaos by FPGA, which combines their flexibility in rapid real-time data processing with free configuration in FPGA and enhances the security of the transported data. Then we can make full use of their advantages and achieve a good design of Sensor Network node.","PeriodicalId":279256,"journal":{"name":"2009 International Workshop on Chaos-Fractals Theories and Applications","volume":"483 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131385442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamics of a Simplified Unified System","authors":"Ke-xin Sun, Xia Wang, S. Qiu","doi":"10.1109/IWCFTA.2009.58","DOIUrl":"https://doi.org/10.1109/IWCFTA.2009.58","url":null,"abstract":"A Simplified unified system with one bifurcation parameter is investigated by detailed theoretical analysis as well as dynamic simulation. Some basic dynamical properties, such as the largest Lyapunov exponent, fractal dimension, bifurcations, and routes to chaos are studied. The results show that the simplified unified system has complex dynamics with interesting characteristics.","PeriodicalId":279256,"journal":{"name":"2009 International Workshop on Chaos-Fractals Theories and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123970583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coordinating Multiple Retailers Supply Chains When Demand and Cost Are Disrupted","authors":"Qun Jiang","doi":"10.1109/IWCFTA.2009.72","DOIUrl":"https://doi.org/10.1109/IWCFTA.2009.72","url":null,"abstract":"The supply chain system consists of one supplier and multiple retailers. When demand function and cost were disrupted simultaneously, how the disruptions effect the supply chain was discussed, and the disruption management decisions of individuals were analyzed. The optimal strategies that supply chain replied to the disruptions were proposed, and an improved revenue sharing contract was presented under which the supply chain was coordinated, and the improved revenue sharing contract has anti-disruption-ability.","PeriodicalId":279256,"journal":{"name":"2009 International Workshop on Chaos-Fractals Theories and Applications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design and Implementation of Password Authentication System Based on Chaos","authors":"Nan Jiang, Ri-jing Yang, Xiang-dong Liu","doi":"10.1109/IWCFTA.2009.50","DOIUrl":"https://doi.org/10.1109/IWCFTA.2009.50","url":null,"abstract":"This paper proposed the construction algorithm of chaotic Hash function based on Hénon-like mapping, and designed one password authentication scheme on basis of chaotic scramble sort algorithm and chaotic Hash function; it also resolved the insecurity problems that can’t resist little numbers attack, the iteration times of plaintext transmission and the attack of fraud server in the scheme. It finally implemented the one time password authentication system based on chaotic scramble sort table and chaotic Hash function.","PeriodicalId":279256,"journal":{"name":"2009 International Workshop on Chaos-Fractals Theories and Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121098212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-Varying Stochastic Turbulence Model Considering Intermittency","authors":"Guoyong Yuan, Lin Xu, Yaping Liu, Shiping Yang","doi":"10.1109/IWCFTA.2009.34","DOIUrl":"https://doi.org/10.1109/IWCFTA.2009.34","url":null,"abstract":"Considering the intermittency of turbulence, the white noise as the stochastic driving term in time-varying stochastic turbulence model, which was supposed by Curtis R. Vogel [1], is replaced by a L'{e}vy random process. Phase screens can be obtained by solving the stochastic partial differential equation (PDE), and the corresponding point spread function (PSF) is also offered. These results describe that intermittency leads to the more extent distribution of PSF and more bad imaging quality.","PeriodicalId":279256,"journal":{"name":"2009 International Workshop on Chaos-Fractals Theories and Applications","volume":"25 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132273544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Complex Dynamics of 4D Hopfield-Type Neural Network with Two Parameters","authors":"Zengqiang Chen, Pengfei Chen","doi":"10.1109/IWCFTA.2009.54","DOIUrl":"https://doi.org/10.1109/IWCFTA.2009.54","url":null,"abstract":"In this paper, a novel four-dimensional (4D) autonomous continuous time Hopfield-type neural network with two parameters is investigated. Computer simulations show that the 4D Hopfield neural network has rich and funny dynamics, and it can display equilibrium, periodic attractor, chaotic attractor and quasi-periodic attractor for different parameters. Moreover, when the system is chaotic, its positive Lyapunov exponent is much larger than those of the chaotic Hopfield neural networks already reported. The complex dynamical behaviors of the system are further investigated by means of Lyapunov exponents spectrum, bifurcation analysis and phase portraits.","PeriodicalId":279256,"journal":{"name":"2009 International Workshop on Chaos-Fractals Theories and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134004258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}