• Title/Summary/Keyword: Strong chaos

Search Result 19, Processing Time 0.021 seconds

Chaotic and Instability Effects in Brillouin-Active Fiber-Ring Sensor (광섬유링센서에서 유도되는 브루앤파의 혼돈 및 비안정화 현상)

  • Kim, Yong K.;Kim, Jin-Su
    • The Transactions of the Korean Institute of Electrical Engineers C
    • /
    • v.53 no.6
    • /
    • pp.337-341
    • /
    • 2004
  • In this paper the effect of chaos induced instability in Brillouin-active fiber-ring sensor is described. The inherent optical feedback by the backscattered Stokes wave in optical fiber leads to instabilities in the form of optical chaos. The paradigm of optical chaos in fiber serves as a test for fundamental study of chaos and its suppression and exploitation in practical application in communication and sensing. At weak power, the nature of the Brillouin instability can occur at before threshold. At strong power, the temporal evolution above threshold is periodic and at higher intensity can become chaotic. The threshold for the Brillouin instability in fiber-ring sensor is much lower than the threshold of the normal Brillouin instability process.

A Novel Design of CDSK Receiver for Improving the BER Performance (BER 성능 향상을 위해 제안하는 새로운 CDSK 수신기)

  • Lee, Jun-Hyun;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.8
    • /
    • pp.638-643
    • /
    • 2013
  • Chaos communication system has a sensitive characteristic to initial conditions, because completely another signal is generated when initial condition of chaos equation is changed subtly. Also, chaos communication systems have the characteristics of non-periodic, non-predictability, the broadband signal, such as ease of implementation. Due to these characteristics, security of chaos communication system generally is evaluated better than other systems. However, BER(Bit Error Rate) performance is evaluated worse than other digital system, because existing chaos communication system's transmitter and receiver are strong influence by interference signal and noise. So, research to improve the BER performance of the chaotic communication system is performed continuously. In this paper, We will propose a new CDSK(Correlation Delay Shift Keying) receiver for BER performance improvement. After we compare to the performance of existing CDSK receiver and proposed CDSK receiver, BER performance of proposed CDSK receiver evaluate. Also, when using the new CDSK receiver, we evaluate the BER performance according to the spreading factors and find an optimum spreading factor. If chaos communication system use a new CDSK receiver, BER performance is improved than existing CDSK receiver. Also, if spreading factor's value is increased, BER performance is improved, because it is not nearly affected by interference signal and noise.

THE SET OF RECURRENT POINTS OF A CONTINUOUS SELF-MAP ON AN INTERVAL AND STRONG CHAOS

  • Wang, Lidong;Liao, Gongfu;Chu, Zhenyan;Duan, Xiaodong
    • Journal of applied mathematics & informatics
    • /
    • v.14 no.1_2
    • /
    • pp.277-288
    • /
    • 2004
  • In this paper, we discuss a continuous self-map of an interval and the existence of an uncountable strongly chaotic set. It is proved that if a continuous self-map of an interval has positive topological entropy, then it has an uncountable strongly chaotic set in which each point is recurrent, but is not almost periodic.

BER Performance Evaluation of Boss Map According to Delay Time in CDSK Modulation Scheme and Chaos Transceiver (CDSK 변조 방식과 카오스 송수신기의 지연시간에 따른 Boss Map의 BER 성능 평가)

  • Lee, Jun-Hyun;Keum, Hong-Sik;Lee, Dong-Hyung;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.365-371
    • /
    • 2014
  • Chaos communication system is possible to improve the system security by using chaos signal. Further, it is possible to reduce the possibility of eavesdropping, and have strong characteristics from interference signal and jamming signal. However, BER(Bit Error Rate) performance of chaos system is worse than digital communication system. By this reason, researches in order to improve the BER performance of chaos communication system are being actively studied. In previous studies, we proposed a novel chaos map for BER performance improvement, and called it 'Boss map'. Also, we proposed a novel chaos transceiver for BER performance improvement. However, BER performance is evaluated differently according to delay time in transceiver. Therefore, in order to use Boss map effectively, we should find the optimal delay time in proposed chaos transceiver. In this paper, when Boss map is used, we evaluate BER performance of CDSK(Correlation Delay Shift Keying) system and novel chaos transceiver according to delay time. After evaluation of BER performance according to delay time, we find a delay time that is possible to have best BER performance in CDSK system and novel chaos transceiver.

Analyses of Encryption Method for Chaos Communication Using Optical Injection Locked Semiconductor Lasers (반도체 레이저의 광 주입을 이용한 혼동 통신망의 암호화 기법 분석)

  • Kim Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.811-815
    • /
    • 2005
  • We theoretically studied synchronization of chaotic oscillation in semiconductor lasers with chaotic light injection feed-back induced chaotic light generated from a master semiconductor laser was injected into a solitary slave semiconductor laser. The slave laser subsequently exhibited synchronized chaotic output for a wide parameter range with strong injection and frequency detuning within the injection locking scheme. We also analytically examined chaos synchronization based on a linear stability analysis from the view point of synchronization based on a linear stability analysis from the view point of modulation response of injection locked semiconductor lasers to chaotic light signal.

A study of the nonlinear dynamic instability of hybrid cable dome structures

  • Kim, Seung-Deog;Kim, Hyung-Seok;Kang, Moon-Myung
    • Structural Engineering and Mechanics
    • /
    • v.15 no.6
    • /
    • pp.653-668
    • /
    • 2003
  • Many papers which deal with the dynamic instability of shell-like structures under the STEP load have been published. But, there have been few papers related to the dynamic instability of hybrid cable domes. In this study, the dynamic instability of hybrid cable domes considering geometric nonlinearity is investigated by a numerical method. The characteristic structural behaviour of a cable dome shows a strong nonlinearity, so we determine the shape of a cable dome by applying initial stress and examine the indirect buckling mechanism under dynamic external forces. The dynamic critical loads are determined by the numerical integration of the nonlinear equation of motion, and the indirect buckling is examined by using the phase plane to investigate the occurrence of chaos.

Study of Transient Control of Nonlinear Dynamically Induced Instabilities in Brillouin-Active Fiber (브릴루앙 산란에서 유발되는 비선형적인 불안정 현상에 대한 제어연구)

  • Kim, Yong-K.;Kim, Jin-Su;Park, Jae-Wan
    • Proceedings of the KIEE Conference
    • /
    • 2004.11a
    • /
    • pp.141-143
    • /
    • 2004
  • In this present the transient control of SBS chaos induced instability in Brillouin-active fiber systems is described. The inherent optical feedback by the backscattered Stokes wave in optical fiber systems leads to instabilities in the form of optical chaos. At weak power, the nature of the Brillouin instability can occur at before threshold. At strong power, the temporal evolution above threshold is periodic and at higher intensity can become chaotic. Multistable periodic states, makes transition to logic 'on' or 'off'. It can make theoretically potential large memory capacity.

  • PDF

Chaotic Behavior of 2-Dimensional Airfoil in Incompressible Flow (비압축성 유동장내 2차원 익형의 혼돈거동)

  • 정성원;이동기;이상환
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.19 no.2
    • /
    • pp.495-508
    • /
    • 1995
  • The self-excited vibrations of airfoil is related to the classical flutter problems, and it has been studied as a system with linear stiffness and small damping. However, since the actual aircraft wing and the many mechanical elements of airfoil type have various design variables and parameters, some of these could have strong nonlinearities, and the nonlinearities could be unexpectedly strong as the parameters vary. This abrupt chaotic behavior undergoes ordered routes, and the behaviors after these routes are uncontrollable and unexpectable since it is extremely sensitive to initial conditions. In order to study the chaotic behavior of the system, three parameters are considered, i.e., free-stream velocity, elastic distance and zero-lift angle. If the chaotic parameter region can be identified from the mathematically modeled nonlinear differential equation system, the designs which avoid chaotic regions could be suggested. In this study, by using recently developed dynamically system methods, and chaotic regions on the parameter plane will be found and the safe design variables will be suggested.

An Image Encryption Scheme Based on Concatenated Torus Automorphisms

  • Mao, Qian;Chang, Chin-Chen;Wu, Hsiao-Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1492-1511
    • /
    • 2013
  • A novel, chaotic map that is based on concatenated torus automorphisms is proposed in this paper. As we know, cat map, which is based on torus automorphism, is highly chaotic and is often used to encrypt information. But cat map is periodic, which decreases the security of the cryptosystem. In this paper, we propose a novel chaotic map that concatenates several torus automorphisms. The concatenated mechanism provides stronger chaos and larger key space for the cryptosystem. It is proven that the period of the concatenated torus automorphisms is the total sum of each one's period. By this means, the period of the novel automorphism is increased extremely. Based on the novel, concatenated torus automorphisms, two application schemes in image encryption are proposed, i.e., 2D and 3D concatenated chaotic maps. In these schemes, both the scrambling matrices and the iteration numbers act as secret keys. Security analysis shows that the proposed, concatenated, chaotic maps have strong chaos and they are very sensitive to the secret keys. By means of concatenating several torus automorphisms, the key space of the proposed cryptosystem can be expanded to $2^{135}$. The diffusion function in the proposed scheme changes the gray values of the transferred pixels, which makes the periodicity of the concatenated torus automorphisms disappeared. Therefore, the proposed cryptosystem has high security and they can resist the brute-force attacks and the differential attacks efficiently. The diffusing speed of the proposed scheme is higher, and the computational complexity is lower, compared with the existing methods.

The fast image encryption algorithm based on substitution and diffusion

  • Zhang, Yong;Jia, Xiaoyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4487-4511
    • /
    • 2018
  • A fast image encryption system based on substitution and diffusion was proposed, which includes one covering process, one substitution process and two diffusion processes. At first, Chen's chaotic system together with an external 256-bit long secret key was used to generate the key streams for image encryption, in which the initial values of Chen's chaotic system were regarded as the public key. Then the plain image was masked by the covering process. After that the resulting image was substituted with the disturbed S-Box of AES. Finally, the substituted image was diffused twice with the add-modulo operations as the core to obtain the cipher image. Simulation analysis and comparison results with AES and some existing image cryptosystems show that the proposed image cryptosystem possesses the merits of fast encryption/decryption speed, good statistical characteristics, strong sensitivity and etc., and can be used as a candidate system of network security communication.