scholarly journals The isomorphism class of the shift map

2020 ◽  
Vol 283 ◽  
pp. 107343
Author(s):  
Will Brian
Keyword(s):  
2021 ◽  
Vol 12 (1) ◽  
Author(s):  
Yi-Jen Sun ◽  
Fan Bai ◽  
An-Chi Luo ◽  
Xiang-Yu Zhuang ◽  
Tsai-Shun Lin ◽  
...  

AbstractThe dynamic assembly of the cell wall is key to the maintenance of cell shape during bacterial growth. Here, we present a method for the analysis of Escherichia coli cell wall growth at high spatial and temporal resolution, which is achieved by tracing the movement of fluorescently labeled cell wall-anchored flagellar motors. Using this method, we clearly identify the active and inert zones of cell wall growth during bacterial elongation. Within the active zone, the insertion of newly synthesized peptidoglycan occurs homogeneously in the axial direction without twisting of the cell body. Based on the measured parameters, we formulate a Bernoulli shift map model to predict the partitioning of cell wall-anchored proteins following cell division.


Author(s):  
Viet Dac Ngo ◽  
Theo Hofman ◽  
Maarten Steinbuch ◽  
Alex Serrarens

2022 ◽  
Vol 2022 ◽  
pp. 1-6
Author(s):  
Zhan jiang Ji

According to the definition of sequence shadowing property and regularly recurrent point in the inverse limit space, we introduce the concept of sequence shadowing property and regularly recurrent point in the double inverse limit space and study their dynamical properties. The following results are obtained: (1) Regularly recurrent point sets of the double shift map σ f ∘ σ g are equal to the double inverse limit space of the double self-map f ∘ g in the regularly recurrent point sets. (2) The double self-map f ∘ g has sequence shadowing property if and only if the double shift map σ f ∘ σ g has sequence shadowing property. Thus, the conclusions of sequence shadowing property and regularly recurrent point are generalized to the double inverse limit space.


2021 ◽  
Author(s):  
Nisar Ahmad ◽  
Muhammad Usman Younus ◽  
Muhammad Rizwan Anjum ◽  
Gulshan Saleem ◽  
Zaheer Ahmed Gondal ◽  
...  

Abstract Digital data must be compressed and encrypted to maintain confidentiality and efficient bandwidth usage. These two parameters are essential for information processing in most communication systems. Image compression and encryption may result in reduced restoration quality and degraded performance. This study attempts to provide a compression and encryption scheme for digital data named as Secure-JPEG. This scheme is built on the JPEG compression format, the most widely used lossy compression scheme. It extends the standard JPEG compression algorithm to encrypt data during compression. Secure-JPEG scheme provides encryption along with the process of compression, and it could be altered easily to provide lossless compression. On the other hand, the lossless compression provides less compression ratio and is suitable only in specific scenarios. The paper address the problem of security lacks due to the use of a simple random number generator which can not be cryptographically secure. The improved security characteristics are provided through Generalized Bernoulli Shift Map, which has a chaotic system with demonstrated security. The algorithm's security is tested by several cryptographic tests and the chaotic system’s behavior is also analyzed.


1996 ◽  
Vol 39 (2) ◽  
pp. 186-198 ◽  
Author(s):  
Karlheinz Gröchenig ◽  
Andrew Haas

AbstractThis paper continues our investigation of backward continued fractions, associated with the generalized Renyi maps on [0,1). We first show that the dynamics of the shift map on a specific class of shift invariant spaces of nonnegative integer sequences exactly models the maps Tu for u € (0,4). In the second part we construct a new family of explicit invariant measures for certain values of the parameter u.


2018 ◽  
Vol 5 (11) ◽  
pp. 23898-23907
Author(s):  
Vikram Mali ◽  
Ashok Mache ◽  
Rakesh Mulik ◽  
Sushil Ramdasi

Sign in / Sign up

Export Citation Format

Share Document