874 resultados para DOUBLE SCROLL


Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this work a fourth-order Chua`s circuit, capable of generating hyperchaotic oscillations in a wide range of parameters, is presented. The circuit is obtained by adding two new branches to the original topology of the Chua`s double scroll circuit. One of the added branches is a linear inductor-resistor series connection, and the other one is a nonlinear voltage-controlled current source. A theoretical analysis of the circuit equations is presented, along with numerical and experimental results.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Dynamical systems modeling tumor growth have been investigated to determine the dynamics between tumor and healthy cells. Recent theoretical investigations indicate that these interactions may lead to different dynamical outcomes, in particular to homoclinic chaos. In the present study, we analyze both topological and dynamical properties of a recently characterized chaotic attractor governing the dynamics of tumor cells interacting with healthy tissue cells and effector cells of the immune system. By using the theory of symbolic dynamics, we first characterize the topological entropy and the parameter space ordering of kneading sequences from one-dimensional iterated maps identified in the dynamics, focusing on the effects of inactivation interactions between both effector and tumor cells. The previous analyses are complemented with the computation of the spectrum of Lyapunov exponents, the fractal dimension and the predictability of the chaotic attractors. Our results show that the inactivation rate of effector cells by the tumor cells has an important effect on the dynamics of the system. The increase of effector cells inactivation involves an inverse Feigenbaum (i.e. period-halving bifurcation) scenario, which results in the stabilization of the dynamics and in an increase of dynamics predictability. Our analyses also reveal that, at low inactivation rates of effector cells, tumor cells undergo strong, chaotic fluctuations, with the dynamics being highly unpredictable. Our findings are discussed in the context of tumor cells potential viability.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Control of a chaotic system by homogeneous nonlinear driving, when a conditional Lyapunov exponent is zero, may give rise to special and interesting synchronizationlike behaviors in which the response evolves in perfect correlation with the drive. Among them, there are the amplification of the drive attractor and the shift of it to a different region of phase space. In this paper, these synchronizationlike behaviors are discussed, and demonstrated by computer simulation of the Lorentz model [E. N. Lorenz, J. Atmos. Sci. 20 130 (1963)] and the double scroll [T. Matsumoto, L. O. Chua, and M. Komuro, IEEE Trans. CAS CAS-32, 798 (1985)].

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Although literature presents several alternatives, an approach based on the electronic analogy was still not considered for the implementation of an inductor-free realization of the double scroll Chua`s circuit. This paper presents a new inductor-free configuration of the Chua`s circuit based on the electronic analogy. This proposal results in a versatile and functional inductorless implementation of the Chua`s circuit that offers new and interesting features for several applications. The analogous circuit is implemented and used to perform an experimental mapping of a large variety of attractors.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The extraordinary increase of new information technologies, the development of Internet, the electronic commerce, the e-government, mobile telephony and future cloud computing and storage, have provided great benefits in all areas of society. Besides these, there are new challenges for the protection of information, such as the loss of confidentiality and integrity of electronic documents. Cryptography plays a key role by providing the necessary tools to ensure the safety of these new media. It is imperative to intensify the research in this area, to meet the growing demand for new secure cryptographic techniques. The theory of chaotic nonlinear dynamical systems and the theory of cryptography give rise to the chaotic cryptography, which is the field of study of this thesis. The link between cryptography and chaotic systems is still subject of intense study. The combination of apparently stochastic behavior, the properties of sensitivity to initial conditions and parameters, ergodicity, mixing, and the fact that periodic points are dense, suggests that chaotic orbits resemble random sequences. This fact, and the ability to synchronize multiple chaotic systems, initially described by Pecora and Carroll, has generated an avalanche of research papers that relate cryptography and chaos. The chaotic cryptography addresses two fundamental design paradigms. In the first paradigm, chaotic cryptosystems are designed using continuous time, mainly based on chaotic synchronization techniques; they are implemented with analog circuits or by computer simulation. In the second paradigm, chaotic cryptosystems are constructed using discrete time and generally do not depend on chaos synchronization techniques. The contributions in this thesis involve three aspects about chaotic cryptography. The first one is a theoretical analysis of the geometric properties of some of the most employed chaotic attractors for the design of chaotic cryptosystems. The second one is the cryptanalysis of continuos chaotic cryptosystems and finally concludes with three new designs of cryptographically secure chaotic pseudorandom generators. The main accomplishments contained in this thesis are: v Development of a method for determining the parameters of some double scroll chaotic systems, including Lorenz system and Chua’s circuit. First, some geometrical characteristics of chaotic system have been used to reduce the search space of parameters. Next, a scheme based on the synchronization of chaotic systems was built. The geometric properties have been employed as matching criterion, to determine the values of the parameters with the desired accuracy. The method is not affected by a moderate amount of noise in the waveform. The proposed method has been applied to find security flaws in the continuous chaotic encryption systems. Based on previous results, the chaotic ciphers proposed by Wang and Bu and those proposed by Xu and Li are cryptanalyzed. We propose some solutions to improve the cryptosystems, although very limited because these systems are not suitable for use in cryptography. Development of a method for determining the parameters of the Lorenz system, when it is used in the design of two-channel cryptosystem. The method uses the geometric properties of the Lorenz system. The search space of parameters has been reduced. Next, the parameters have been accurately determined from the ciphertext. The method has been applied to cryptanalysis of an encryption scheme proposed by Jiang. In 2005, Gunay et al. proposed a chaotic encryption system based on a cellular neural network implementation of Chua’s circuit. This scheme has been cryptanalyzed. Some gaps in security design have been identified. Based on the theoretical results of digital chaotic systems and cryptanalysis of several chaotic ciphers recently proposed, a family of pseudorandom generators has been designed using finite precision. The design is based on the coupling of several piecewise linear chaotic maps. Based on the above results a new family of chaotic pseudorandom generators named Trident has been designed. These generators have been specially designed to meet the needs of real-time encryption of mobile technology. According to the above results, this thesis proposes another family of pseudorandom generators called Trifork. These generators are based on a combination of perturbed Lagged Fibonacci generators. This family of generators is cryptographically secure and suitable for use in real-time encryption. Detailed analysis shows that the proposed pseudorandom generator can provide fast encryption speed and a high level of security, at the same time. El extraordinario auge de las nuevas tecnologías de la información, el desarrollo de Internet, el comercio electrónico, la administración electrónica, la telefonía móvil y la futura computación y almacenamiento en la nube, han proporcionado grandes beneficios en todos los ámbitos de la sociedad. Junto a éstos, se presentan nuevos retos para la protección de la información, como la suplantación de personalidad y la pérdida de la confidencialidad e integridad de los documentos electrónicos. La criptografía juega un papel fundamental aportando las herramientas necesarias para garantizar la seguridad de estos nuevos medios, pero es imperativo intensificar la investigación en este ámbito para dar respuesta a la demanda creciente de nuevas técnicas criptográficas seguras. La teoría de los sistemas dinámicos no lineales junto a la criptografía dan lugar a la ((criptografía caótica)), que es el campo de estudio de esta tesis. El vínculo entre la criptografía y los sistemas caóticos continúa siendo objeto de un intenso estudio. La combinación del comportamiento aparentemente estocástico, las propiedades de sensibilidad a las condiciones iniciales y a los parámetros, la ergodicidad, la mezcla, y que los puntos periódicos sean densos asemejan las órbitas caóticas a secuencias aleatorias, lo que supone su potencial utilización en el enmascaramiento de mensajes. Este hecho, junto a la posibilidad de sincronizar varios sistemas caóticos descrita inicialmente en los trabajos de Pecora y Carroll, ha generado una avalancha de trabajos de investigación donde se plantean muchas ideas sobre la forma de realizar sistemas de comunicaciones seguros, relacionando así la criptografía y el caos. La criptografía caótica aborda dos paradigmas de diseño fundamentales. En el primero, los criptosistemas caóticos se diseñan utilizando circuitos analógicos, principalmente basados en las técnicas de sincronización caótica; en el segundo, los criptosistemas caóticos se construyen en circuitos discretos u ordenadores, y generalmente no dependen de las técnicas de sincronización del caos. Nuestra contribución en esta tesis implica tres aspectos sobre el cifrado caótico. En primer lugar, se realiza un análisis teórico de las propiedades geométricas de algunos de los sistemas caóticos más empleados en el diseño de criptosistemas caóticos vii continuos; en segundo lugar, se realiza el criptoanálisis de cifrados caóticos continuos basados en el análisis anterior; y, finalmente, se realizan tres nuevas propuestas de diseño de generadores de secuencias pseudoaleatorias criptográficamente seguros y rápidos. La primera parte de esta memoria realiza un análisis crítico acerca de la seguridad de los criptosistemas caóticos, llegando a la conclusión de que la gran mayoría de los algoritmos de cifrado caóticos continuos —ya sean realizados físicamente o programados numéricamente— tienen serios inconvenientes para proteger la confidencialidad de la información ya que son inseguros e ineficientes. Asimismo una gran parte de los criptosistemas caóticos discretos propuestos se consideran inseguros y otros no han sido atacados por lo que se considera necesario más trabajo de criptoanálisis. Esta parte concluye señalando las principales debilidades encontradas en los criptosistemas analizados y algunas recomendaciones para su mejora. En la segunda parte se diseña un método de criptoanálisis que permite la identificaci ón de los parámetros, que en general forman parte de la clave, de algoritmos de cifrado basados en sistemas caóticos de Lorenz y similares, que utilizan los esquemas de sincronización excitador-respuesta. Este método se basa en algunas características geométricas del atractor de Lorenz. El método diseñado se ha empleado para criptoanalizar eficientemente tres algoritmos de cifrado. Finalmente se realiza el criptoanálisis de otros dos esquemas de cifrado propuestos recientemente. La tercera parte de la tesis abarca el diseño de generadores de secuencias pseudoaleatorias criptográficamente seguras, basadas en aplicaciones caóticas, realizando las pruebas estadísticas, que corroboran las propiedades de aleatoriedad. Estos generadores pueden ser utilizados en el desarrollo de sistemas de cifrado en flujo y para cubrir las necesidades del cifrado en tiempo real. Una cuestión importante en el diseño de sistemas de cifrado discreto caótico es la degradación dinámica debida a la precisión finita; sin embargo, la mayoría de los diseñadores de sistemas de cifrado discreto caótico no ha considerado seriamente este aspecto. En esta tesis se hace hincapié en la importancia de esta cuestión y se contribuye a su esclarecimiento con algunas consideraciones iniciales. Ya que las cuestiones teóricas sobre la dinámica de la degradación de los sistemas caóticos digitales no ha sido totalmente resuelta, en este trabajo utilizamos algunas soluciones prácticas para evitar esta dificultad teórica. Entre las técnicas posibles, se proponen y evalúan varias soluciones, como operaciones de rotación de bits y desplazamiento de bits, que combinadas con la variación dinámica de parámetros y con la perturbación cruzada, proporcionan un excelente remedio al problema de la degradación dinámica. Además de los problemas de seguridad sobre la degradación dinámica, muchos criptosistemas se rompen debido a su diseño descuidado, no a causa de los defectos esenciales de los sistemas caóticos digitales. Este hecho se ha tomado en cuenta en esta tesis y se ha logrado el diseño de generadores pseudoaleatorios caóticos criptogr áficamente seguros.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mode-locked lasers emitting a train of femtosecond pulses called dissipative solitons are an enabling technology for metrology, high-resolution spectroscopy, fibre optic communications, nano-optics and many other fields of science and applications. Recently, the vector nature of dissipative solitons has been exploited to demonstrate mode locked lasing with both locked and rapidly evolving states of polarisation. Here, for an erbium-doped fibre laser mode locked with carbon nanotubes, we demonstrate the first experimental and theoretical evidence of a new class of slowly evolving vector solitons characterized by a double-scroll chaotic polarisation attractor substantially different from Lorenz, Rössler and Ikeda strange attractors. The underlying physics comprises a long time scale coherent coupling of two polarisation modes. The observed phenomena, apart from the fundamental interest, provide a base for advances in secure communications, trapping and manipulation of atoms and nanoparticles, control of magnetisation in data storage devices and many other areas. © 2014 CIOMP. All rights reserved.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We overview our recent results on polarisation dynamics of vector solitons in erbium doped fibre laser mode locked with carbon nanotubes. Our experimental and theoretical study revealed new families of vector solitons for fundamental and bound-state soliton operations. The observed scenario of the evolution of the states of polarisation (SOPs) on the Poincare sphere includes fast polarisation switching between two and three SOPs along with slow SOP evolution on a double scroll chaotic attractor. The underlying physics presents an interplay between effects of birefringence of the laser cavity and light induced anisotropy caused by polarisation hole burning. © 2014 IEEE.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Insight into instabilities of fiber laser regimes leading to complex self-pulsing operations is an opportunity to unlock the high power and dynamic operation tunability of lasers. Though many models have been suggested, there is no complete covering of self-pulsing complexity observed experimentally. Here, I further generalized our previous vector model of erbium-doped fiber laser and, for the first time, to the best of my knowledge, map tunability of complex vector self-pulsing on Poincare sphere (limit cycles and double scroll polarization attractors) for laser parameters, e.g., power, ellipticity of the pump wave, and in-cavity birefringence. Analysis validated by extensive numerical simulations demonstrates good correspondence to the experimental results on complex self-pulsing regimes obtained by many authors during the last 20 years.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Chronic pain has been often associated with myofascial pain syndrome (MPS), which is determined by myofascial trigger points (MTrP). New features have been tested for MTrP diagnosis. The aim of this study was to evaluate two-dimensional ultrasonography (2D US) and ultrasound elastography (UE) images and elastograms of upper trapezius MTrP during electroacupuncture (EA) and acupuncture (AC) treatment. 24 women participated, aged between 20 and 40 years (M ± SD = 27.33 ± 5.05) with a body mass index ranging from 18.03 to 27.59 kg/m2 (22.59 ± 3.11), a regular menstrual cycle, at least one active MTrP at both right (RTPz) and left trapezius (LTPz) and local or referred pain for up to six months. Subjects were randomized into EA and AC treatment groups and the control sham AC (SHAM) group. Intensity of pain was assessed by visual analogue scale; MTrP mean area and strain ratio (SR) by 2D US and UE. A significant decrease of intensity in general, RTPz, and LTPz pain was observed in the EA group (p = 0.027; p < 0.001; p = 0.005, respectively) and in general pain in the AC group (p < 0.001). Decreased MTrP area in RTPz and LTPz were observed in AC (p < 0.001) and EA groups (RTPz, p = 0.003; LTPz, p = 0.005). Post-treatment SR in RTPz and LTPz was lower than pre-treatment in both treatment groups. 2D US and UE effectively characterized MTrP and surrounding tissue, pointing to the possibility of objective confirmation of subjective EA and AC treatment effects.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Acupuncture stimulates points on the body, influencing the perception of myofascial pain or altering physiologic functions. The aim was to evaluate the effect of electroacupuncture (EAC) and acupuncture (AC) for myofascial pain of the upper trapezius and cervical range of motion, using SHAM acupuncture as control. Sixty women presenting at least one trigger point at the upper trapezius and local or referred pain for more than six months were randomized into EAC, AC, and SHAM groups. Eight sessions were scheduled and a follow-up was conducted after 28 days. The Visual Analog Scale assessed the intensity of local and general pain. A fleximeter assessed cervical movements. Data were analyzed using paired t or Wilcoxon's tests, ANOVA or Friedman or Kruskal-Wallis tests and Pearson's correlation (α=0.05). There was reduction in general pain in the EAC and AC groups after eight sessions (P<0.001). A significant decrease in pain intensity occurred for the right trapezius in all groups and for the left trapezius in the EAC and AC groups. Intergroup comparisons showed improvement in general pain in the EAC and AC groups and in local pain intensity in the EAC group (P<0.05), which showed an increase in left rotation (P=0.049). The AC group showed increases in inclination (P=0.005) sustained until follow-up and rotation to the right (P=0.032). EAC and AC were effective in reducing the pain intensity compared with SHAM. EAC was better than AC for local pain relief. These treatments can assist in increasing cervical range of motion, albeit subtly.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Adjunctive therapeutic strategies that modulate the inflammatory mediators can play a significant role in periodontal therapy. In this double-blind, placebo-controlled study, 60 subjects diagnosed as periodontitis patients were evaluated for 28 days after periodontal treatment combined with selective cyclooxygenase-2 (COX-2) inhibitor. The experimental group received scaling and root planning (SRP) combined with the Loxoprofen antiinflammatory drug (SRP+Loxoprofen). The control group received SRP combined with placebo (SRP+placebo). Plaque index (PI), probing pocket depth (PD) and bleeding on probing (BOP) were monitored with an electronic probe at baseline and after 14 and 28 days. Both groups displayed clinical improvement in PD, PI and BOP. They also showed statistically similar values (p>0.05) of PD reduction on day 14 (0.4 mm) and on day 28 (0.6 mm). At the baseline, few deeper sites (>7 mm) from SRP+Loxoprofen group were responsible and most PD reduction was observed after 14 days (p<0.05). The percentage of remaining deep pockets (>7 mm) after 14 days in the SRP+Loxoprofen group was significantly lower (p<0.05) than in the SRP+placebo group. Loxoprofen presents potential effect as an adjunct of periodontal disease treatment, but long-term clinical trials are necessary to confirm its efficacy.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The aim of this study was to evaluate the efficacy of a 0.05% clobetasol propionate ointment administered in trays to 22 patients with desquamative gingivitis in a double-blind, crossover, placebo-controlled trial. Patients received container number 1 and were instructed to apply the ointment 3 times a day for 2 weeks, and to reduce the application to once a day in the third week. Next, the patients were then instructed to discontinue the treatment for 2 weeks, and were then given container 2, used in the same way and for the same length of time as container 1. Regarding signs, 17 patients presented some improvement, while 5 experienced worsening with clobetasol propionate. With the placebo, 14 patients presented some improvement, and 8 patients presented worsening. For symptoms, there was complete improvement in 2 patients, partial improvement in 12, no response in 7, and worsening in 1 with clobetasol propionate. With the placebo, there was partial improvement in 8 patients, no response in 12 and worsening in 2. No statistically significant difference was found between clobetasol and placebo (p>0.05). Within the period designed to treat the gingival lesions of the patients, clobetasol propionate did not significantly outperform the placebo.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Through direct transmetalation reaction of Z-vinylic tellurides with nBuLi was observed the unexpected isomerization of double bonds leading to potassium E-vinyltrifluoroborates salts in low to moderate yields. Using EPR spin trapping experiments the radical species that promoted the stereoinversion of Z-vinylic organometallic species during the preparation of potassium vinyltrifluoroborate salts was identified. The experiments support the proposed mechanism, which is based on the homolytic cleavage of the TenBu bond.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We report a new STAR measurement of the longitudinal double-spin asymmetry A(LL) for inclusive jet production at midrapidity in polarized p+p collisions at a center-of-mass energy of root s = 200 GeV. The data, which cover jet transverse momenta 5 < p(T) < 30 GeV/c, are substantially more precise than previous measurements. They provide significant new constraints on the gluon spin contribution to the nucleon spin through the comparison to predictions derived from one global fit to polarized deep-inelastic scattering measurements. They provide significant new constraints on the gluon spin contribution to the nucleon spin through the comparison to predictions derived from one global fit to polarized deep-inelastic scattering measurements.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vandetanib (ZACTIMA(TM)) is a once-daily oral anticancer drug that selectively inhibits vascular endothelial growth factor receptor, epidermal growth factor receptor, and rearranged during transfection signaling. This randomized (1: 1), double-blind study evaluated vandetanib (100mg/day) or placebo in combination with docetaxel (D; 75mg/m(2) every 3 weeks) and prednisolone (P; 2 x 5 mg/day) in 86 patients with metastatic hormone-refractory prostate cancer (mHRPC). The primary assessment was prostate-specific antigen (PSA) response (confirmed reduction of >= 50% from baseline) and a greater number of patients showed a PSA response with placebo + DP (67%) versus vandetanib + DP (40%); hazard ratio = 2.23 (one-sided 80% confidence limit = 2.90; one-sided p = 0.99). More patients experienced progression events (disease progression or death from any cause) with vandetanib + DP (65%) versus placebo + DP (60%); hazard ratio = 1.13 (one-sided 80% confidence limit = 1.44; one-sided p = 0.67). The overall incidence of adverse events was similar in both groups, although more patients experienced adverse events, leading to permanent discontinuation with vandetanib + DP (28%) versus placebo + DP (12%). However, the safety and tolerability profile for vandetanib was similar to that previously reported; adverse events that occurred more frequently in the vandetanib + DP arm were hypertension (14% vs. 2%), erythematous rash (14% vs. 2%), and exfoliative rash (12% vs. 2%). In this study of patients with mHRPC, vandetanib + DP did not demonstrate any efficacy benefit, compared with placebo + DP.