Displaying 421 – 440 of 712

Showing per page

On a shadowing lemma in metric spaces

Tibor Žáčik (1992)

Mathematica Bohemica

In the present paper conditions are studied, under which a pseudo-orbit of a continuous map f : M M , where M is a metric space, is shadowed, in a more general sense, by an accurate orbit of the map f .

On almost specification and average shadowing properties

Marcin Kulczycki, Dominik Kwietniak, Piotr Oprocha (2014)

Fundamenta Mathematicae

We study relations between the almost specification property, the asymptotic average shadowing property and the average shadowing property for dynamical systems on compact metric spaces. We show implications between these properties and relate them to other important notions such as shadowing, transitivity, invariant measures, etc. We provide examples showing that compactness is a necessary condition for these implications to hold. As a consequence, we also obtain a proof that limit shadowing in...

On cusps and flat tops

Neil Dobbs (2014)

Annales de l’institut Fourier

Non-invertible Pesin theory is developed for a class of piecewise smooth interval maps which may have unbounded derivative, but satisfy a property analogous to C 1 + ϵ . The critical points are not required to verify a non-flatness condition, so the results are applicable to C 1 + ϵ maps with flat critical points. If the critical points are too flat, then no absolutely continuous invariant probability measure can exist. This generalises a result of Benedicks and Misiurewicz.

On the anti–synchronization detection for the generalized Lorenz system and its applications to secure encryption

Volodymyr Lynnyk, Sergej Čelikovský (2010)

Kybernetika

In this paper, a modified version of the Chaos Shift Keying (CSK) scheme for secure encryption and decryption of data will be discussed. The classical CSK method determines the correct value of binary signal through checking which initially unsynchronized system is getting synchronized. On the contrary, the new anti-synchronization CSK (ACSK) scheme determines the wrong value of binary signal through checking which already synchronized system is loosing synchronization. The ACSK scheme is implemented...

Currently displaying 421 – 440 of 712