SlideShare a Scribd company logo
1 of 9
Download to read offline
Computer Engineering and Intelligent Systems                                                      www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.1, 2012




 An Algorithm for Generating New Mandelbrot and Julia Sets
                                              R. P. Pant1 R. K. Bisht1*
    1.   Department of Mathematics, D. S. B. Campus, Kumaun University, Nainital-263002, India
    * E-mail of the corresponding author: ravindra.bisht@yahoo.com


Abstract

The present paper is motivated from the paper of John R. Tippetts (Tippetts 1992) in which he gave an
algorithm to generate an interesting Mandelbrot set. We not only generate Julia sets using Tippetts
algorithm (Tippetts 1992), but also generate some new Julia and Mandelbrot sets by slightly modifying the
Tippetts algorithm. This approach yields a new class of algorithms to produce new and alluring fractals
with virtually infinite complexity.

Keywords: Mandelbrot set, Julia set, recursion formula, algorithm


1. Introduction

The study of complex iterated polynomials has been a very active field of research activity during the last
two decades. The study of Julia sets and Mandelbrot sets derived from polynomials is an area of abiding
interest in the field of fractal geometry (Peitgen et al 2006).

The well-known algorithm for generating Mandelbrot set from the recursion formula;
Z → Z2 + C (where Z = x + iy and C = a + ib), requires the following steps (Peitgen et al 2006):
[1] xnew = x2 – y2 + a
[2] ynew = 2xy + b
[3] x = xnew
[4] y = ynew
[5] return to step (1).

For Mandelbrot set, a point (a, b) belongs to the set if, after repeated iteration, x and y remain finite (x and y
being initially zero). In 1992, John R. Tippetts gave a simple algorithm for generating an interesting
Mandelbrot set by slightly modifying the above algorithm. He replaced ynew and xnew by y and x
respectively (Tippetts 1992) and got the following algorithm:

[1] x = x2 – y2 + a
[2] y = 2xy + b
[3] return to step (1).

Then, simply by putting value of x from step (1) to step (2), Tippetts got an explicit equation for the new
y-value:
                 ynew = 2x2 y – 2y3 + 2ay + b,

which produces a new class of fractals having virtually infinite complexity.

 In this paper we generate a new Julia set using the Tippetts algorithm (Tippetts 1992). We also generate
some new Mandelbrot and Julia sets by slightly modifying Tippetts algorithm. Like the Tippetts algorithm,

                                                        1
Computer Engineering and Intelligent Systems                                                 www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.1, 2012



the modified algorithm is also very interesting.



    2.   Main Results
The main steps required to display the Julia sets for the recursion Z → Z2 + C (where Z = x + iy and C = a
+ ib), consists the following statements (Peitgen et al 2006):

(1) xnew = x2 – y2 + a
(2) ynew = 2xy + b
(3) x = xnew
(4) y = ynew
(5) return to step (1).


For fixed C, a point x, y belongs to the set if, after repeated iteration, steps (1) and (2) remain finite.
Following Tippetts (Tippetts 1992) we can replace ynew by simply y. Further, if we also replace xnew by
x so that the steps (3) and (4) can be discarded. Now only three statements remain:

(1) x = x2 – y2 + a
(2) y = 2xy + b
(3) return to step (1).

Now, simply by putting value of x from step (1) to step (2), we get an explicit equation for the new y-value
which is same as (Tippetts 1992):
                  ynew = 2x2 y – 2y3 + 2ay + b.

The algorithm formed by the above statements is equivalent to the following:

(1) xnew = x2 – y2 + a
(2) ynew = 2x2 y – 2y3 + 2ay + b
(3) x = xnew
(4) y = ynew
(5) return to step (1).


 The corresponding Julia set for the above algorithm, contains fractal boundary. Julia set of the above
algorithm for C= -1.0+0i, is the boundary between the inner capture zone and the outer regions of fast
escape is shown in Figure1. The Julia set and its zoomed-in view for C=-0.73+0.40i are shown in Figures 2
and 3.
In the next section, we generate some new fractals containing both Julia set and Mandelbrot set, by slightly
modifying the algorithm:

(1) x = x2 – y2 + a
(2) y = 2xy + b
(3) return to step (1).


In the above algorithm by putting value of y from step (2) to step (1), we get an explicit equation for the


                                                     2
Computer Engineering and Intelligent Systems                                                      www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.1, 2012



new x-value:

           xnew = x2 – 4 x2y2 + 4bxy - b2 + a.

The newly formed algorithm is equivalent to the following statements:

(1) xnew = x2 – 4 x2y2 + 4bxy - b2 + a
(2) ynew = 2xy + b
(3) x = xnew
(4) y = ynew
(5) return to step (1).


For Mandelbrot set, a point (a, b) belongs to the set if, after repeated iteration, x and y remain finite (x and y
being initially zero) (Tippetts 1992). The corresponding Mandelbrot set for the quartic function xnew
along with ynew is shown in Figure 4 and represents the boundary between the inner capture zone (black)
and the outer regions of fast escape (yellow). Other zoomed-in views for Mandelbrot set [M-Set] are shown
in Figures 6 and 7.

Again, Julia set for fixed C= -0.1+0i, a point (x, y) belongs to the set if, after repeated iteration, steps 1 and
2 remain finite. The corresponding Julia set for the quartic function xnew along with ynew is shown in
Figure 7 and represents the boundary between the inner capture zone and the outer regions of fast escape.
Some other Julia sets for different C-values are shown in Figures 8 and 9.

3. Conclusion:
Many interesting fractals can be generated from the modified algorithm for the recursion formula Z → Z2
+ C. This approach opens up scope for obtaining new algorithms with more complex iterated functions
having fascinating fractal boundaries.


4. Generation of Julia Sets using Tippetts algorithm:




                                                        3
Computer Engineering and Intelligent Systems            www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.1, 2012




              Figure1 Julia set for C = (-1.0, 0)




             Figure 2 Julia set for C = (-0.73+0.40i)




                                                    4
Computer Engineering and Intelligent Systems                 www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.1, 2012




            Figure 3 Zoomed in-view for C = (-0.73+0.40i)




5. Generation of Mandelbrot Sets using modified algorithm:




                                                 5
Computer Engineering and Intelligent Systems           www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.1, 2012




              Figure 4 Mandelbrot set for x-new




                 Figure 5 Zoomed in view for M. Set.




                                                  6
Computer Engineering and Intelligent Systems            www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.1, 2012




          Figure 6 Zoomed in view for M. Set.


6. Generation of Julia Sets using modified algorithm:




            Figure 7 Julia set for, (C=-0.1+0 i)




                                                   7
Computer Engineering and Intelligent Systems                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.1, 2012




                  Figure 8 Julia set for, C=(0.66- 0.12 i)




                   Figure 9 Julia set for, (C=-0.73 +0.40 i)




                                                   8
Computer Engineering and Intelligent Systems                                          www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.1, 2012




References

       [1] Tippetts, John R. (1992), “A Simple Algorithm Giving an Interesting Mandelbrot Set”, The
       visual computer 8, Springer-Verlag , 200-201.
       [2] Mandelbrot B. B. (1980), “Fractal Aspects of the Iteration of z → z (1 - z) for Complex
          and z”, Ann of NY Acad Sci 357, 249-259.
       [3] Peitgen H.O., Jurgens H. & Saupe D. (2006), “Chaos and Fractals”, New Frontier of Science,
       (2nd edition), MR2031217.




                                                 9

More Related Content

What's hot

Sparse Binary Zero Sum Games (ACML2014)
Sparse Binary Zero Sum Games (ACML2014)Sparse Binary Zero Sum Games (ACML2014)
Sparse Binary Zero Sum Games (ACML2014)Jialin LIU
 
2012 mdsp pr11 ica part 2 face recognition
2012 mdsp pr11 ica part 2 face recognition2012 mdsp pr11 ica part 2 face recognition
2012 mdsp pr11 ica part 2 face recognitionnozomuhamada
 
Lecture 19: Implementation of Histogram Image Operation
Lecture 19: Implementation of Histogram Image OperationLecture 19: Implementation of Histogram Image Operation
Lecture 19: Implementation of Histogram Image OperationVARUN KUMAR
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
 
STT802project-writeup-Final (1)
STT802project-writeup-Final (1)STT802project-writeup-Final (1)
STT802project-writeup-Final (1)James P. Regan II
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationVARUN KUMAR
 
2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approachnozomuhamada
 
2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlonozomuhamada
 
Finding Neighbors in Images Represented By Quadtree
Finding Neighbors in Images Represented By QuadtreeFinding Neighbors in Images Represented By Quadtree
Finding Neighbors in Images Represented By Quadtreeiosrjce
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Marisa Paryasto
 
05210401 P R O B A B I L I T Y T H E O R Y A N D S T O C H A S T I C P R...
05210401  P R O B A B I L I T Y  T H E O R Y  A N D  S T O C H A S T I C  P R...05210401  P R O B A B I L I T Y  T H E O R Y  A N D  S T O C H A S T I C  P R...
05210401 P R O B A B I L I T Y T H E O R Y A N D S T O C H A S T I C P R...guestd436758
 
Statistical inference of generative network models - Tiago P. Peixoto
Statistical inference of generative network models - Tiago P. PeixotoStatistical inference of generative network models - Tiago P. Peixoto
Statistical inference of generative network models - Tiago P. PeixotoLake Como School of Advanced Studies
 
Supersymmetric Q-balls and boson stars in (d + 1) dimensions
Supersymmetric Q-balls and boson stars in (d + 1) dimensionsSupersymmetric Q-balls and boson stars in (d + 1) dimensions
Supersymmetric Q-balls and boson stars in (d + 1) dimensionsJurgen Riedel
 
Bresenham derivation
Bresenham derivationBresenham derivation
Bresenham derivationKumar
 
Datastructure tree
Datastructure treeDatastructure tree
Datastructure treerantd
 
Introduction to Optial Flow
Introduction to Optial FlowIntroduction to Optial Flow
Introduction to Optial FlowSylvain_Lobry
 
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKgraphhoc
 

What's hot (19)

Sparse Binary Zero Sum Games (ACML2014)
Sparse Binary Zero Sum Games (ACML2014)Sparse Binary Zero Sum Games (ACML2014)
Sparse Binary Zero Sum Games (ACML2014)
 
2012 mdsp pr11 ica part 2 face recognition
2012 mdsp pr11 ica part 2 face recognition2012 mdsp pr11 ica part 2 face recognition
2012 mdsp pr11 ica part 2 face recognition
 
Lecture 19: Implementation of Histogram Image Operation
Lecture 19: Implementation of Histogram Image OperationLecture 19: Implementation of Histogram Image Operation
Lecture 19: Implementation of Histogram Image Operation
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
STT802project-writeup-Final (1)
STT802project-writeup-Final (1)STT802project-writeup-Final (1)
STT802project-writeup-Final (1)
 
Lecture 3 image sampling and quantization
Lecture 3 image sampling and quantizationLecture 3 image sampling and quantization
Lecture 3 image sampling and quantization
 
2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach2012 mdsp pr08 nonparametric approach
2012 mdsp pr08 nonparametric approach
 
2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo2012 mdsp pr04 monte carlo
2012 mdsp pr04 monte carlo
 
Finding Neighbors in Images Represented By Quadtree
Finding Neighbors in Images Represented By QuadtreeFinding Neighbors in Images Represented By Quadtree
Finding Neighbors in Images Represented By Quadtree
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
 
05210401 P R O B A B I L I T Y T H E O R Y A N D S T O C H A S T I C P R...
05210401  P R O B A B I L I T Y  T H E O R Y  A N D  S T O C H A S T I C  P R...05210401  P R O B A B I L I T Y  T H E O R Y  A N D  S T O C H A S T I C  P R...
05210401 P R O B A B I L I T Y T H E O R Y A N D S T O C H A S T I C P R...
 
Statistical inference of generative network models - Tiago P. Peixoto
Statistical inference of generative network models - Tiago P. PeixotoStatistical inference of generative network models - Tiago P. Peixoto
Statistical inference of generative network models - Tiago P. Peixoto
 
IME 2018 - fechada
IME 2018 - fechadaIME 2018 - fechada
IME 2018 - fechada
 
Supersymmetric Q-balls and boson stars in (d + 1) dimensions
Supersymmetric Q-balls and boson stars in (d + 1) dimensionsSupersymmetric Q-balls and boson stars in (d + 1) dimensions
Supersymmetric Q-balls and boson stars in (d + 1) dimensions
 
Bresenham derivation
Bresenham derivationBresenham derivation
Bresenham derivation
 
Lecture8 xing
Lecture8 xingLecture8 xing
Lecture8 xing
 
Datastructure tree
Datastructure treeDatastructure tree
Datastructure tree
 
Introduction to Optial Flow
Introduction to Optial FlowIntroduction to Optial Flow
Introduction to Optial Flow
 
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORKMETRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
METRIC DIMENSION AND UNCERTAINTY OF TRAVERSING ROBOTS IN A NETWORK
 

Similar to An algorithm for generating new mandelbrot and julia sets

M A T H E M A T I C A L M E T H O D S J N T U M O D E L P A P E R{Www
M A T H E M A T I C A L  M E T H O D S  J N T U  M O D E L  P A P E R{WwwM A T H E M A T I C A L  M E T H O D S  J N T U  M O D E L  P A P E R{Www
M A T H E M A T I C A L M E T H O D S J N T U M O D E L P A P E R{Wwwguest3f9c6b
 
Vector-Based Back Propagation Algorithm of.pdf
Vector-Based Back Propagation Algorithm of.pdfVector-Based Back Propagation Algorithm of.pdf
Vector-Based Back Propagation Algorithm of.pdfNesrine Wagaa
 
Mm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithmsMm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithmsEellekwameowusu
 
Some fixed point and common fixed point theorems of integral
Some fixed point and common fixed point theorems of integralSome fixed point and common fixed point theorems of integral
Some fixed point and common fixed point theorems of integralAlexander Decker
 
2012 mdsp pr13 support vector machine
2012 mdsp pr13 support vector machine2012 mdsp pr13 support vector machine
2012 mdsp pr13 support vector machinenozomuhamada
 
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...Cemal Ardil
 
Complex dynamics of superior phoenix set
Complex dynamics of superior phoenix setComplex dynamics of superior phoenix set
Complex dynamics of superior phoenix setIAEME Publication
 
Paper computer
Paper computerPaper computer
Paper computerbikram ...
 
Paper computer
Paper computerPaper computer
Paper computerbikram ...
 
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...Steven Duplij (Stepan Douplii)
 
ISI MSQE Entrance Question Paper (2008)
ISI MSQE Entrance Question Paper (2008)ISI MSQE Entrance Question Paper (2008)
ISI MSQE Entrance Question Paper (2008)CrackDSE
 
Quasistatic Fracture using Nonliner-Nonlocal Elastostatics with an Analytic T...
Quasistatic Fracture using Nonliner-Nonlocal Elastostatics with an Analytic T...Quasistatic Fracture using Nonliner-Nonlocal Elastostatics with an Analytic T...
Quasistatic Fracture using Nonliner-Nonlocal Elastostatics with an Analytic T...Patrick Diehl
 
Ee693 sept2014midsem
Ee693 sept2014midsemEe693 sept2014midsem
Ee693 sept2014midsemGopi Saiteja
 
Comparison of the optimal design
Comparison of the optimal designComparison of the optimal design
Comparison of the optimal designAlexander Decker
 
Meshing for computer graphics
Meshing for computer graphicsMeshing for computer graphics
Meshing for computer graphicsBruno Levy
 
On fixed point theorem in fuzzy metric spaces
On fixed point theorem in fuzzy metric spacesOn fixed point theorem in fuzzy metric spaces
On fixed point theorem in fuzzy metric spacesAlexander Decker
 
On Continuous Approximate Solution of Ordinary Differential Equations
On Continuous Approximate Solution of Ordinary Differential EquationsOn Continuous Approximate Solution of Ordinary Differential Equations
On Continuous Approximate Solution of Ordinary Differential EquationsWaqas Tariq
 
Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodIAEME Publication
 

Similar to An algorithm for generating new mandelbrot and julia sets (20)

M A T H E M A T I C A L M E T H O D S J N T U M O D E L P A P E R{Www
M A T H E M A T I C A L  M E T H O D S  J N T U  M O D E L  P A P E R{WwwM A T H E M A T I C A L  M E T H O D S  J N T U  M O D E L  P A P E R{Www
M A T H E M A T I C A L M E T H O D S J N T U M O D E L P A P E R{Www
 
Vector-Based Back Propagation Algorithm of.pdf
Vector-Based Back Propagation Algorithm of.pdfVector-Based Back Propagation Algorithm of.pdf
Vector-Based Back Propagation Algorithm of.pdf
 
Mm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithmsMm chap08 -_lossy_compression_algorithms
Mm chap08 -_lossy_compression_algorithms
 
Some fixed point and common fixed point theorems of integral
Some fixed point and common fixed point theorems of integralSome fixed point and common fixed point theorems of integral
Some fixed point and common fixed point theorems of integral
 
2012 mdsp pr13 support vector machine
2012 mdsp pr13 support vector machine2012 mdsp pr13 support vector machine
2012 mdsp pr13 support vector machine
 
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
Neuro -fuzzy-networks-for-identification-of-mathematical-model-parameters-of-...
 
Complex dynamics of superior phoenix set
Complex dynamics of superior phoenix setComplex dynamics of superior phoenix set
Complex dynamics of superior phoenix set
 
Paper computer
Paper computerPaper computer
Paper computer
 
Paper computer
Paper computerPaper computer
Paper computer
 
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
Steven Duplij, Raimund Vogl, "Polyadic Braid Operators and Higher Braiding Ga...
 
ISI MSQE Entrance Question Paper (2008)
ISI MSQE Entrance Question Paper (2008)ISI MSQE Entrance Question Paper (2008)
ISI MSQE Entrance Question Paper (2008)
 
Quasistatic Fracture using Nonliner-Nonlocal Elastostatics with an Analytic T...
Quasistatic Fracture using Nonliner-Nonlocal Elastostatics with an Analytic T...Quasistatic Fracture using Nonliner-Nonlocal Elastostatics with an Analytic T...
Quasistatic Fracture using Nonliner-Nonlocal Elastostatics with an Analytic T...
 
Ee693 sept2014midsem
Ee693 sept2014midsemEe693 sept2014midsem
Ee693 sept2014midsem
 
Comparison of the optimal design
Comparison of the optimal designComparison of the optimal design
Comparison of the optimal design
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Meshing for computer graphics
Meshing for computer graphicsMeshing for computer graphics
Meshing for computer graphics
 
EE385_Chapter_6.pdf
EE385_Chapter_6.pdfEE385_Chapter_6.pdf
EE385_Chapter_6.pdf
 
On fixed point theorem in fuzzy metric spaces
On fixed point theorem in fuzzy metric spacesOn fixed point theorem in fuzzy metric spaces
On fixed point theorem in fuzzy metric spaces
 
On Continuous Approximate Solution of Ordinary Differential Equations
On Continuous Approximate Solution of Ordinary Differential EquationsOn Continuous Approximate Solution of Ordinary Differential Equations
On Continuous Approximate Solution of Ordinary Differential Equations
 
Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s method
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

An algorithm for generating new mandelbrot and julia sets

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.1, 2012 An Algorithm for Generating New Mandelbrot and Julia Sets R. P. Pant1 R. K. Bisht1* 1. Department of Mathematics, D. S. B. Campus, Kumaun University, Nainital-263002, India * E-mail of the corresponding author: ravindra.bisht@yahoo.com Abstract The present paper is motivated from the paper of John R. Tippetts (Tippetts 1992) in which he gave an algorithm to generate an interesting Mandelbrot set. We not only generate Julia sets using Tippetts algorithm (Tippetts 1992), but also generate some new Julia and Mandelbrot sets by slightly modifying the Tippetts algorithm. This approach yields a new class of algorithms to produce new and alluring fractals with virtually infinite complexity. Keywords: Mandelbrot set, Julia set, recursion formula, algorithm 1. Introduction The study of complex iterated polynomials has been a very active field of research activity during the last two decades. The study of Julia sets and Mandelbrot sets derived from polynomials is an area of abiding interest in the field of fractal geometry (Peitgen et al 2006). The well-known algorithm for generating Mandelbrot set from the recursion formula; Z → Z2 + C (where Z = x + iy and C = a + ib), requires the following steps (Peitgen et al 2006): [1] xnew = x2 – y2 + a [2] ynew = 2xy + b [3] x = xnew [4] y = ynew [5] return to step (1). For Mandelbrot set, a point (a, b) belongs to the set if, after repeated iteration, x and y remain finite (x and y being initially zero). In 1992, John R. Tippetts gave a simple algorithm for generating an interesting Mandelbrot set by slightly modifying the above algorithm. He replaced ynew and xnew by y and x respectively (Tippetts 1992) and got the following algorithm: [1] x = x2 – y2 + a [2] y = 2xy + b [3] return to step (1). Then, simply by putting value of x from step (1) to step (2), Tippetts got an explicit equation for the new y-value: ynew = 2x2 y – 2y3 + 2ay + b, which produces a new class of fractals having virtually infinite complexity. In this paper we generate a new Julia set using the Tippetts algorithm (Tippetts 1992). We also generate some new Mandelbrot and Julia sets by slightly modifying Tippetts algorithm. Like the Tippetts algorithm, 1
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.1, 2012 the modified algorithm is also very interesting. 2. Main Results The main steps required to display the Julia sets for the recursion Z → Z2 + C (where Z = x + iy and C = a + ib), consists the following statements (Peitgen et al 2006): (1) xnew = x2 – y2 + a (2) ynew = 2xy + b (3) x = xnew (4) y = ynew (5) return to step (1). For fixed C, a point x, y belongs to the set if, after repeated iteration, steps (1) and (2) remain finite. Following Tippetts (Tippetts 1992) we can replace ynew by simply y. Further, if we also replace xnew by x so that the steps (3) and (4) can be discarded. Now only three statements remain: (1) x = x2 – y2 + a (2) y = 2xy + b (3) return to step (1). Now, simply by putting value of x from step (1) to step (2), we get an explicit equation for the new y-value which is same as (Tippetts 1992): ynew = 2x2 y – 2y3 + 2ay + b. The algorithm formed by the above statements is equivalent to the following: (1) xnew = x2 – y2 + a (2) ynew = 2x2 y – 2y3 + 2ay + b (3) x = xnew (4) y = ynew (5) return to step (1). The corresponding Julia set for the above algorithm, contains fractal boundary. Julia set of the above algorithm for C= -1.0+0i, is the boundary between the inner capture zone and the outer regions of fast escape is shown in Figure1. The Julia set and its zoomed-in view for C=-0.73+0.40i are shown in Figures 2 and 3. In the next section, we generate some new fractals containing both Julia set and Mandelbrot set, by slightly modifying the algorithm: (1) x = x2 – y2 + a (2) y = 2xy + b (3) return to step (1). In the above algorithm by putting value of y from step (2) to step (1), we get an explicit equation for the 2
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.1, 2012 new x-value: xnew = x2 – 4 x2y2 + 4bxy - b2 + a. The newly formed algorithm is equivalent to the following statements: (1) xnew = x2 – 4 x2y2 + 4bxy - b2 + a (2) ynew = 2xy + b (3) x = xnew (4) y = ynew (5) return to step (1). For Mandelbrot set, a point (a, b) belongs to the set if, after repeated iteration, x and y remain finite (x and y being initially zero) (Tippetts 1992). The corresponding Mandelbrot set for the quartic function xnew along with ynew is shown in Figure 4 and represents the boundary between the inner capture zone (black) and the outer regions of fast escape (yellow). Other zoomed-in views for Mandelbrot set [M-Set] are shown in Figures 6 and 7. Again, Julia set for fixed C= -0.1+0i, a point (x, y) belongs to the set if, after repeated iteration, steps 1 and 2 remain finite. The corresponding Julia set for the quartic function xnew along with ynew is shown in Figure 7 and represents the boundary between the inner capture zone and the outer regions of fast escape. Some other Julia sets for different C-values are shown in Figures 8 and 9. 3. Conclusion: Many interesting fractals can be generated from the modified algorithm for the recursion formula Z → Z2 + C. This approach opens up scope for obtaining new algorithms with more complex iterated functions having fascinating fractal boundaries. 4. Generation of Julia Sets using Tippetts algorithm: 3
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.1, 2012 Figure1 Julia set for C = (-1.0, 0) Figure 2 Julia set for C = (-0.73+0.40i) 4
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.1, 2012 Figure 3 Zoomed in-view for C = (-0.73+0.40i) 5. Generation of Mandelbrot Sets using modified algorithm: 5
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.1, 2012 Figure 4 Mandelbrot set for x-new Figure 5 Zoomed in view for M. Set. 6
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.1, 2012 Figure 6 Zoomed in view for M. Set. 6. Generation of Julia Sets using modified algorithm: Figure 7 Julia set for, (C=-0.1+0 i) 7
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.1, 2012 Figure 8 Julia set for, C=(0.66- 0.12 i) Figure 9 Julia set for, (C=-0.73 +0.40 i) 8
  • 9. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.1, 2012 References [1] Tippetts, John R. (1992), “A Simple Algorithm Giving an Interesting Mandelbrot Set”, The visual computer 8, Springer-Verlag , 200-201. [2] Mandelbrot B. B. (1980), “Fractal Aspects of the Iteration of z → z (1 - z) for Complex and z”, Ann of NY Acad Sci 357, 249-259. [3] Peitgen H.O., Jurgens H. & Saupe D. (2006), “Chaos and Fractals”, New Frontier of Science, (2nd edition), MR2031217. 9