Reduction of the synchronization time in random logistic maps

2020 ◽  
Vol 102 (6) ◽  
Author(s):  
Kaito Sano ◽  
Takahito Mitsui ◽  
Takuma Akimoto
IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Apostolos Karalis ◽  
Dimitrios Zorbas ◽  
Christos Douligeris

2016 ◽  
Vol 93 ◽  
pp. 17-36 ◽  
Author(s):  
Liujiang Kang ◽  
Xiaoning Zhu ◽  
Huijun Sun ◽  
Jakob Puchinger ◽  
Mario Ruthmair ◽  
...  

Author(s):  
V. Bakış ◽  
H. Bakış ◽  
Z. Eker

AbstractPhysical dimensions and evolutionary status of the A-type twin binary GSC 4019 3345 are presented. Located at a distance of ~1.1 kpc from the Sun, the system was found to have two components with identical masses (M1,2 = 1.92 M⊙), radii (R1,2 = 1.76 R⊙), and luminosities (log L1,2 = 1.1 L⊙) revolving in a circular orbit. Modeling the components with theoretical evolutionary tracks and isochrones implies a young age (t = 280 Myr) for the system, which is bigger than the synchronization time scale but smaller than the circularization time scale. Nevertheless, synthetic spectrum models revealed components’ rotation velocity of Vrot12 = 70 km s−1, that is about three times higher than their synchronization velocity. No evidence is found for an age difference between the components.


2019 ◽  
Vol 2019 ◽  
pp. 1-10
Author(s):  
Édgar Salguero Dorokhin ◽  
Walter Fuertes ◽  
Edison Lascano

When establishing a cryptographic key between two users, the asymmetric cryptography scheme is generally used to send it through an insecure channel. However, given that the algorithms that use this scheme, such as RSA, have already been compromised, it is imperative to research for new methods of establishing a cryptographic key that provide security when they are sent. To solve this problem, a new branch known as neural cryptography was born, using a modified artificial neural network called Tree Parity Machine or TPM. Its purpose is to establish a private key through an insecure channel. This article proposes the analysis of an optimal structure of a TPM network that allows generating and establishing a private cryptographic key of 512-bit length between two authorized parties. To achieve this, the combinations that make possible to generate a key of that length were determined. In more than 15 million simulations that were executed, we measured synchronization times, the number of steps required, and the number of times in which an attacking TPM network manages to imitate the behaviour of the two networks. The simulations resulted in the optimal combination, minimizing the synchronization time and prioritizing security against the attacking network. Finally, the model was validated by applying a heuristic rule.


2004 ◽  
Vol 14 (01) ◽  
pp. 171-181 ◽  
Author(s):  
R. YAMAPI ◽  
J. B. CHABI OROU ◽  
P. WOAFO

We consider in this paper the problem of stability and duration of the synchronization process between two electromechanical devices, both in their regular and chaotic states. Stability boundaries are derived through Floquet theory. The influence of the precision on the synchronization time is also analyzed using numerical simulation of the equations of motion.


Sign in / Sign up

Export Citation Format

Share Document