scispace - formally typeset
Search or ask a question
JournalISSN: 0218-1274

International Journal of Bifurcation and Chaos 

World Scientific
About: International Journal of Bifurcation and Chaos is an academic journal published by World Scientific. The journal publishes majorly in the area(s): Chaotic & Nonlinear system. It has an ISSN identifier of 0218-1274. Over the lifetime, 7337 publications have been published receiving 147565 citations. The journal is also known as: IJBC.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors reported the finding of a chaotic at tractor in a simple three-dimensional autonomous system, which resembles some familiar features from both the Lorenz and Rossler at tractors.
Abstract: This Letter reports the finding of a new chaotic at tractor in a simple three-dimensional autonomous system, which resembles some familiar features from both the Lorenz and Rossler at tractors.

2,443 citations

Journal ArticleDOI
TL;DR: The phenomenon of neural bursting is described, and geometric bifurcation theory is used to extend the existing classification of bursters, including many new types, and it is shown that different bursters can interact, synchronize and process information differently.
Abstract: Bifurcation mechanisms involved in the generation of action potentials (spikes) by neurons are reviewed here. We show how the type of bifurcation determines the neuro-computational properties of the cells. For example, when the rest state is near a saddle-node bifurcation, the cell can fire all-or-none spikes with an arbitrary low frequency, it has a well-defined threshold manifold, and it acts as an integrator; i.e. the higher the frequency of incoming pulses, the sooner it fires. In contrast, when the rest state is near an Andronov–Hopf bifurcation, the cell fires in a certain frequency range, its spikes are not all-or-none, it does not have a well-defined threshold manifold, it can fire in response to an inhibitory pulse, and it acts as a resonator; i.e. it responds preferentially to a certain (resonant) frequency of the input. Increasing the input frequency may actually delay or terminate its firing. We also describe the phenomenon of neural bursting, and we use geometric bifurcation theory to extend the existing classification of bursters, including many new types. We discuss how the type of burster defines its neuro-computational properties, and we show that different bursters can interact, synchronize and process information differently.

1,765 citations

Journal ArticleDOI
TL;DR: This letter reports the finding of a new chaotic attractor in a simple three-dimensional autonomous system, which connects the Lorenz attractor and Chen's attractsor and represents the transition from one to the other.
Abstract: This letter reports the finding of a new chaotic attractor in a simple three-dimensional autonomous system, which connects the Lorenz attractor and Chen's attractor and represents the transition from one to the other.

1,655 citations

Journal ArticleDOI
TL;DR: Methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes to encrypt an N×N image.
Abstract: In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes. A chaotic map is first generalized by introducing parameters and then discretized to a finite square lattice of points which represent pixels or some other data items. Although the discretized map is a permutation and thus cannot be chaotic, it shares certain properties with its continuous counterpart as long as the number of iterations remains small. The discretized map is further extended to three dimensions and composed with a simple diffusion mechanism. As a result, a symmetric block product encryption scheme is obtained. To encrypt an N×N image, the ciphering map is iteratively applied to the image. The construction of the cipher and its security is explained with the two-dimensional Baker map. It is shown that the permutations induced by the Baker map behave as typical random permutations. Computer simulations indicate that the cipher has g...

1,654 citations

Journal ArticleDOI
TL;DR: The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements.
Abstract: In recent years, a large amount of work on chaos-based cryptosystems have been published. However, many of the proposed schemes fail to explain or do not possess a number of features that are fundamentally important to all kind of cryptosystems. As a result, many proposed systems are difficult to implement in practice with a reasonable degree of security. Likewise, they are seldom accompanied by a thorough security analysis. Consequently, it is difficult for other researchers and end users to evaluate their security and performance. This work is intended to provide a common framework of basic guidelines that, if followed, could benefit every new cryptosystem. The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements. Meanwhile, several recommendations are made regarding some practical aspects of analog chaos-based secure communications, such as channel noise, limited bandwith and attenuation.

1,620 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
2023134
2022311
2021260
2020312
2019267
2018228