Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,242,063 papers from all fields of science
Search
Sign In
Create Free Account
Logistic map
Known as:
Feigenbaum fractal
, Logistic
, Logistic demographic model
The logistic map is a polynomial mapping (equivalently, recurrence relation) of degree 2, often cited as an archetypal example of how complex…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
40 relations
A New Kind of Science
Bifurcation diagram
Bifurcation memory
Buddhabrot
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Detecting unreliable computer simulations of recursive functions with interval extensions
E. Nepomuceno
,
S. Martins
,
Bruno C. Silva
,
G. Amaral
,
M. Perc
Applied Mathematics and Computation
2018
Corpus ID: 3725660
2018
2018
Securing images with a diffusion mechanism based on Fractional Brownian Motion
Manish Kumar
,
Sunil Kumar
,
M. K. Das
,
Rajat Budhiraja
,
Sanjeev Singh
Journal of Information Security and Applications
2018
Corpus ID: 49405787
2015
2015
Chaos-based designing of a highly nonlinear S-box using Boolean functions
Ramzi Guesmi
,
Mohamed Amine Ben Farah
,
A. Kachouri
,
M. Samet
IEEE 12th International Multi-Conference on…
2015
Corpus ID: 20535255
In this manuscript we present a novel method to design a strong substitution box having important cryptographic properties. Our…
Expand
Highly Cited
2012
Highly Cited
2012
A Security Enhanced Robust Steganography Algorithm for Data Hiding
Siddharth Singh
,
Tanveer J. Siddiqui
2012
Corpus ID: 3763548
In this paper, a new robust steganography algorithm based on discrete cosine transform (DCT), Arnold transform and chaotic system…
Expand
2011
2011
Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding
J. Bahi
,
Xiaole Fang
,
C. Guyeux
,
Qianxue Wang
arXiv.org
2011
Corpus ID: 7187161
Guaranteeing the security of information transmitted through the Internet, against passive or active attacks, is a major concern…
Expand
2010
2010
Some Properties of Logistic Maps over Integers
Takeru Miyazaki
,
Shunsuke Araki
,
S. Uehara
IEICE Transactions on Fundamentals of Electronics…
2010
Corpus ID: 34352576
The logistic map is a chaotic mapping. Although several studies have examined logistic maps over real domains with infinite…
Expand
2009
2009
A Digital Watermarking Algorithm for Color Images Based on DCT
Ting Zhang
,
Yi Du
International Conference on Information…
2009
Corpus ID: 16518709
An algorithm, which is based on the DCT domain, embedding a watermarking color image into a host color image is proposed to…
Expand
2008
2008
A Precise Chaotic Particle Swarm Optimization Algorithm based on Improved Tent Map
Yaoyao He
,
Jian-zhong Zhou
,
Chaoshun Li
,
Junjie Yang
,
Qingqing Li
Fourth International Conference on Natural…
2008
Corpus ID: 42263293
The target of this paper is to enhance the precision of existent chaotic particle swarm optimization algorithm in the nonlinear…
Expand
2003
2003
Ubiquity of metastable-to-stable crossover in weakly chaotic dynamical systems
F. Baldovin
,
L. G. Moyano
,
A. P. Majtey
,
A. Robledo
,
C. Tsallis
2003
Corpus ID: 18095020
1997
1997
Experimental evaluation of echo path modeling with chaotic coded speech
J. Elmirghani
,
S. Milner
,
R. Cryan
IEEE Transactions on Signal Processing
1997
Corpus ID: 36946736
An experimental evaluation of an echo-path modeling device is reported for chaotically-coded speech telephony circuits. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE