Journal•ISSN: 0218-1274
International Journal of Bifurcation and Chaos
World Scientific
About: International Journal of Bifurcation and Chaos is an academic journal published by World Scientific. The journal publishes majorly in the area(s): Chaotic & Nonlinear system. It has an ISSN identifier of 0218-1274. Over the lifetime, 7337 publications have been published receiving 147565 citations. The journal is also known as: IJBC.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this paper, the authors reported the finding of a chaotic at tractor in a simple three-dimensional autonomous system, which resembles some familiar features from both the Lorenz and Rossler at tractors.
Abstract: This Letter reports the finding of a new chaotic at tractor in a simple three-dimensional autonomous system, which resembles some familiar features from both the Lorenz and Rossler at tractors.
2,443 citations
••
TL;DR: The phenomenon of neural bursting is described, and geometric bifurcation theory is used to extend the existing classification of bursters, including many new types, and it is shown that different bursters can interact, synchronize and process information differently.
Abstract: Bifurcation mechanisms involved in the generation of action potentials (spikes) by neurons are reviewed here. We show how the type of bifurcation determines the neuro-computational properties of the cells. For example, when the rest state is near a saddle-node bifurcation, the cell can fire all-or-none spikes with an arbitrary low frequency, it has a well-defined threshold manifold, and it acts as an integrator; i.e. the higher the frequency of incoming pulses, the sooner it fires. In contrast, when the rest state is near an Andronov–Hopf bifurcation, the cell fires in a certain frequency range, its spikes are not all-or-none, it does not have a well-defined threshold manifold, it can fire in response to an inhibitory pulse, and it acts as a resonator; i.e. it responds preferentially to a certain (resonant) frequency of the input. Increasing the input frequency may actually delay or terminate its firing. We also describe the phenomenon of neural bursting, and we use geometric bifurcation theory to extend the existing classification of bursters, including many new types. We discuss how the type of burster defines its neuro-computational properties, and we show that different bursters can interact, synchronize and process information differently.
1,765 citations
••
TL;DR: This letter reports the finding of a new chaotic attractor in a simple three-dimensional autonomous system, which connects the Lorenz attractor and Chen's attractsor and represents the transition from one to the other.
Abstract: This letter reports the finding of a new chaotic attractor in a simple three-dimensional autonomous system, which connects the Lorenz attractor and Chen's attractor and represents the transition from one to the other.
1,655 citations
••
TL;DR: Methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes to encrypt an N×N image.
Abstract: In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes. A chaotic map is first generalized by introducing parameters and then discretized to a finite square lattice of points which represent pixels or some other data items. Although the discretized map is a permutation and thus cannot be chaotic, it shares certain properties with its continuous counterpart as long as the number of iterations remains small. The discretized map is further extended to three dimensions and composed with a simple diffusion mechanism. As a result, a symmetric block product encryption scheme is obtained. To encrypt an N×N image, the ciphering map is iteratively applied to the image. The construction of the cipher and its security is explained with the two-dimensional Baker map. It is shown that the permutations induced by the Baker map behave as typical random permutations. Computer simulations indicate that the cipher has g...
1,654 citations
••
TL;DR: The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements.
Abstract: In recent years, a large amount of work on chaos-based cryptosystems have been published. However, many of the proposed schemes fail to explain or do not possess a number of features that are fundamentally important to all kind of cryptosystems. As a result, many proposed systems are difficult to implement in practice with a reasonable degree of security. Likewise, they are seldom accompanied by a thorough security analysis. Consequently, it is difficult for other researchers and end users to evaluate their security and performance. This work is intended to provide a common framework of basic guidelines that, if followed, could benefit every new cryptosystem. The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements. Meanwhile, several recommendations are made regarding some practical aspects of analog chaos-based secure communications, such as channel noise, limited bandwith and attenuation.
1,620 citations