Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,001,114 papers from all fields of science
Search
Sign In
Create Free Account
Logistic map
Known as:
Feigenbaum fractal
, Logistic
, Logistic demographic model
The logistic map is a polynomial mapping (equivalently, recurrence relation) of degree 2, often cited as an archetypal example of how complex…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
40 relations
A New Kind of Science
Bifurcation diagram
Bifurcation memory
Buddhabrot
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Securing images with a diffusion mechanism based on Fractional Brownian Motion
Manish Kumar
,
Sunil Kumar
,
M. K. Das
,
Rajat Budhiraja
,
Sanjeev Singh
Journal of Information Security and Applications
2018
Corpus ID: 49405787
2018
2018
Detecting unreliable computer simulations of recursive functions with interval extensions
E. Nepomuceno
,
S. Martins
,
Bruno C. Silva
,
G. Amaral
,
M. Perc
Applied Mathematics and Computation
2018
Corpus ID: 3725660
2016
2016
The Zografos-Balakrishnan odd log-logistic family of distributions: Properties and Applications
G. Cordeiro
,
M. Alizadeh
,
E. Ortega
,
Luis H. Valdivieso Serrano
2016
Corpus ID: 42201174
We study some mathematical properties of a new generator of continuous distributions with two additional shape parameters called…
Expand
2015
2015
Chaos-based designing of a highly nonlinear S-box using Boolean functions
Ramzi Guesmi
,
Mohamed Amine Ben Farah
,
A. Kachouri
,
M. Samet
IEEE 12th International Multi-Conference on…
2015
Corpus ID: 20535255
In this manuscript we present a novel method to design a strong substitution box having important cryptographic properties. Our…
Expand
Highly Cited
2012
Highly Cited
2012
A Security Enhanced Robust Steganography Algorithm for Data Hiding
Siddharth Singh
,
Tanveer J. Siddiqui
2012
Corpus ID: 3763548
In this paper, a new robust steganography algorithm based on discrete cosine transform (DCT), Arnold transform and chaotic system…
Expand
2011
2011
Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding
J. Bahi
,
Xiaole Fang
,
C. Guyeux
,
Qianxue Wang
arXiv.org
2011
Corpus ID: 7187161
Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern…
Expand
2010
2010
Improving for chaotic image encryption algorithm based on logistic map
Ai-hong Zhu
,
Lian Li
The 2nd Conference on Environmental Science and…
2010
Corpus ID: 17581629
Encryption technology is an important measure to ensure the security of digital image, this paper's main purpose is to research…
Expand
2008
2008
A Precise Chaotic Particle Swarm Optimization Algorithm based on Improved Tent Map
Yaoyao He
,
Jian-zhong Zhou
,
Chaoshun Li
,
Junjie Yang
,
Qingqing Li
Fourth International Conference on Natural…
2008
Corpus ID: 42263293
The target of this paper is to enhance the precision of existent chaotic particle swarm optimization algorithm in the nonlinear…
Expand
2003
2003
Ubiquity of metastable-to-stable crossover in weakly chaotic dynamical systems
F. Baldovin
,
L. G. Moyano
,
A. P. Majtey
,
A. Robledo
,
C. Tsallis
2003
Corpus ID: 18095020
1997
1997
Experimental evaluation of echo path modeling with chaotic coded speech
J. Elmirghani
,
S. Milner
,
R. Cryan
IEEE Transactions on Signal Processing
1997
Corpus ID: 36946736
An experimental evaluation of an echo-path modeling device is reported for chaotically-coded speech telephony circuits. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE