SlideShare a Scribd company logo
1 of 59
Download to read offline
Chaotic Communication
Ph.D. Course_Broadband Communications
Lect#10
hikmat.abdullah@coie-nahrain.edu.iq
 Chaos is aperiodic time-asymptotic behavior in a
deterministic system which exhibits sensitive
dependence on initial conditions
 All systems can be basically divided into three types:
Deterministic, Stochastic or Chaotic
 The secret key includes the initial condition 𝒙𝟎 and
the control parameter p within the interval (0; 4]
 The attractor branches into two, then four, then eight
and so on, until chaos emerges for 3.56996 <= p
 If the initial condition is changed, the sequence
always converge to the same cycle period, but with
a different rate.
𝒙𝒏+1 = 𝒑𝒙𝒏 1 − 𝒙𝒏
Auto-correlation characteristics Cross-correlation characteristics
Power spectral density characteristics
Possible Chaos oscillator
• Easy to generate
• Low power
• Broadband spectrum
• Low multipath interference
• Noise-like appearance
• Good auto and cross correlation properties
• Self-synchronization property
• Chaotic signal can be used for providing security at physical level
• In recent experiments, digital messages were successfully sent at Gbps speeds
over 115 km of commercial optical fiber system using chaotic communication
with a BER of one in ten million. The BER was said to be limited by the
equipment rather than the technique itself
FIXED POINT
LIMIT CYCLE
Chaotic attractor is also known as a strange attractor,
a type of attractor (i.e., an attracting set of states) in a
complex dynamical system's phase space that shows
sensitivity to initial conditions
An attractor is informally described as strange if it has
non-integer dimension or if the dynamics on it are chaotic.
The term was coined by David Ruelle and Floris Takens
An attractor that is represented by a
particular point in phase space,
sometimes called an equilibrium
point. As a point it corresponds to a
very limited range of possible
behaviors of the system.
A limit cycle is a periodic orbit of
the system that is isolated.
- Based on Differential Equations
- Examples of Chaotic Flows are
Lorenz system
Rӧssler system
Chen’s system
Chua system
Lü system
Lorenz system
Sensitivity to Initial Conditions
/Rӧssler/system
Time series and strange attracter of Rӧssler
chaotic flow are shown below when the values
𝑞1 = 0.2, 𝑞2 =0.2 and 𝑞3 = 5.7
- Based on Difference Equations
- Examples of Chaotic Maps are
Logistic map
Henon map
Tent map
Baker map
Arnold cat map
Standard map
Sensitivity to parameter perturbation
Tent Map
Arnold Cat Map
A=3
If more than one Lyapunov exponents are positive then the system is called
Hyperchaotic
0-1 Test
- One of the powerful testing of chaotic systems is 0-1 test which is presented
by Gottwald and Melbourne .
- The input numbers are the generated key from the system in time domain
and the output from the system is a number between 0 to1.
- The 0-1 test is exceeded the use of Lyapunov exponent in two points which
are:
1) There is no need for phase space reconstruction of the chaotic system. So,
it is applied directly on the generated key from the system.
2) It could be applied on the generated key even the system is continuous,
discrete, exponential data, maps, integer or fractional order system
This algorithm of the 0-1 test could be represented as follows:
 First generation
1.Additive chaos masking
2.Chaotic shift keying
 Second generation
1.Chaotic parameter modulation
 Third generation
1.Chaotic cryptosystem
 Forth generation
1.impulsive synchronization based cscs
 The additive
chaos masking
scheme
The chaotic shift keying schemes
Chaos On/Off Keying COOK
Chaotic Shift Keying CSK
C
B
Binary data
source
(0 & 5) Volts
Rate=100 kbps
Unipolar to
bipolar
converter
Chaotic
generator1
Chaotic
generator2
CSK
modulator
Transmitted
signal
HW
(a) What are the output data at point C, if the input data are 1001
(b) Generate 8 chaotic samples from the two chaotic generators shown assuming the first
generator is logistic map with p=3.8 and the second is cubic map with A=3. Assume
x0=0.2 for both generators.
(c) Find the output of CSK modulator using the generated chaotic samples in (b) and input
data at point C. Assume for each input data bit, two chaotic samples are produced.
(d) What is the chaotic carrier frequency?
(e) Draw a block diagram for the receiver.
 Differential Chaotic shift keying (DCSK) using correlation to demodulate
was proposed to solve the problem of synchronization.
 To enhanced the noise performance of DCSK, FM-DCSK scheme was
proposed where frequency modulation is utilized to achieve constant
energy per bit for the chaotic carrier.
Differential Chaotic Shift Keying DCSK
T T T T T T
T/2 T/2 T/2 T/2 T/2 T/2 T/2 T/2 T/2 T/2 T/2 T/2
R R R R R R
c(t) x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x
d(t)
+1 -1 +1 +1 -1 +1
DCSK x x x x x x x x x -x-x-x x x x x x x x x x x x x x x x -x-x-x x x x x x x
DCSK-
T/2
x x x x x x x x x -x-x-x x x x x x x x x x x x x x x x -x-x-x x x x
det. d(t) +1 -1 +1 +1 -1 +1
 Quadrature Chaos shift keying (QCSK) which can transmit 2 bits in a sample
function was designed to improve the speed of chaos shift keying. The FM-QCSK
is proposed to enhance the noise performance.




















T
t
T
T
t
c
b
T
t
c
a
E
T
t
t
c
E
t
S
y
i
x
i
b
x
b
QCSK
FM
<
2
)
2
(
)
2
(
2
<
0
)
(
)
(
  






 )
(
1
),
(
1
)
(
),
( t
y
E
t
x
E
t
c
t
c
C
b
b
y
x
  

T T
y
x dt
t
c
dt
t
c
0 0
2
2
1
)
(
)
(
 
T
y
x dt
t
c
t
c
0
0
)
(
)
(
)
(
)
(
)
( t
b
t
a
t
m i
i
i 

HW
Consider the transmitter shown in Fig.1
i. Find the average power at point A.
ii. Show the first 12 generated chaotic samples at point B. Show the output
samples at point C assuming the generated data at point A are 101. Draw a
block diagram for the demodulator identifying the threshold value of the
detector.
The chaotic parameter modulation.
Initial Condition Modulation ICM
chaotic cryptosystem
Logistic Map
Permutation Matrix P
for an 8-bit grey scale image A (M×N matrix) is represented as a linear array
of size 1×MN.
each value in P (represents the pixel location of image A) is calculated for an
initial value x0 and parameter μ using : P(i) = int(108X(i)) mod MN +1
Example
Computer Experiment
the secret key is
{0.12345678, 3.99995}
Histogram
performance
Sensitivity Analysis
the plain image is encrypted
by using the secret keys
{0.12345678, 3.99995}
the secret keys
{0.12345678, 3.99995},
{0.12345678001, 3.99995} and
{0.12345677999, 3.99995}
are used to decrypt the cipher image
Chaos based
Stegonography
system
 The impulse synchronization
Conditional Lyapunov Exponents and the
Pecora-Carroll Chaotic Synchronization
- The necessary and sufficient condition, for master-slave synchronization
to occur, is that the non-driven slave subsystem must be asymptotically
stable
- Lyapunov’s direct method is one of the most powerful tools in the
nonlinear system stability analysis. However,
- In order for the master-slave system to synchronize, all the CLEs of the
non-driven slave subsystem must be negative
Pecora-Carroll master-slave system
divided into subsystems
Example: Synchronization of the simplest piecewise linear chaotic flow
It exhibits chaotic behaviour with the
parameter value A = 0.6 . Its dynamics are
shown below
Let the difference among the non-driving master subsystem and the non-
driven slave subsystem be denoted by ‘*’. When x drives this difference is
given by
Differentiating both sides of equation 3.2.2 it should be noted that
3.2.2
Then:
The conditional Lyapunov exponents are defined as the real parts of the
eigenvalues of the matrix B
Let the eigenvalues of matrix B of equation 3.2.5 be denoted by λ1 and λ2. Then
the two CLEs are determined by taking the real parts of the eigenvalues of the
matrix B:
Therefore, as both CLEs are negative, theoretically the master-slave
system of must synchronize. The numerical simulation, confirming the
theoretical result of the equation is shown in next Figures
Synchronization of the master-slave simplest piecewise linear chaotic
signals, with the x signal driving.
Chaos for Error Correcting Coding
a denotes a position of the top of the skew tent map
To transmit 1-bit information, N chaotic signals are generated
The received signals block is given by
The receiver calculates the shortest
distance (D) between the Rx signals and
the chaotic map in the Nd-dimensional
space using Nd successive Rx signals
We decided the symbol
is decoded as “1”
We decided the symbol
is decoded as “0”
K = 16, 32, 64.
a = 0.05.
skew tent map
the chaotic sequence length
N = 4 and 8
3 dB improvement over
traditional method!
The short sequences is
more suited for error
correcting codes
Chaos for Multiple Access Communications
Gram Schmidt Ortho-normalization
Chaotic Communication for mobile applica
Chaotic Communication for mobile applica
Chaotic Communication for mobile applica

More Related Content

Similar to Chaotic Communication for mobile applica

Ecet 345 Success Begins / snaptutorial.com
Ecet 345  Success Begins / snaptutorial.comEcet 345  Success Begins / snaptutorial.com
Ecet 345 Success Begins / snaptutorial.comWilliamsTaylorzl
 
Secure Communication and Implementation for a Chaotic Autonomous System
Secure Communication and Implementation for a Chaotic Autonomous SystemSecure Communication and Implementation for a Chaotic Autonomous System
Secure Communication and Implementation for a Chaotic Autonomous SystemNooria Sukmaningtyas
 
Balancing Robot Kalman Filter Design – Estimation Theory Project
Balancing Robot Kalman Filter Design – Estimation Theory ProjectBalancing Robot Kalman Filter Design – Estimation Theory Project
Balancing Robot Kalman Filter Design – Estimation Theory ProjectSurya Chandra
 
Experimental realisation of Shor's quantum factoring algorithm using qubit r...
 Experimental realisation of Shor's quantum factoring algorithm using qubit r... Experimental realisation of Shor's quantum factoring algorithm using qubit r...
Experimental realisation of Shor's quantum factoring algorithm using qubit r...XequeMateShannon
 
17.pmsm speed sensor less direct torque control based on ekf
17.pmsm speed sensor less direct torque control based on ekf17.pmsm speed sensor less direct torque control based on ekf
17.pmsm speed sensor less direct torque control based on ekfMouli Reddy
 
POWER SYSTEM SIMULATION - 2 LAB MANUAL (ELECTRICAL ENGINEERING - POWER SYSTEMS)
POWER SYSTEM SIMULATION - 2 LAB MANUAL (ELECTRICAL ENGINEERING - POWER SYSTEMS) POWER SYSTEM SIMULATION - 2 LAB MANUAL (ELECTRICAL ENGINEERING - POWER SYSTEMS)
POWER SYSTEM SIMULATION - 2 LAB MANUAL (ELECTRICAL ENGINEERING - POWER SYSTEMS) Mathankumar S
 
lecture1 (9).ppt
lecture1 (9).pptlecture1 (9).ppt
lecture1 (9).pptHebaEng
 
Transfer Function Cse ppt
Transfer Function Cse pptTransfer Function Cse ppt
Transfer Function Cse pptsanjaytron
 
Other RLC resonant circuits and Bode Plots 2024.pptx
Other RLC resonant circuits and Bode Plots 2024.pptxOther RLC resonant circuits and Bode Plots 2024.pptx
Other RLC resonant circuits and Bode Plots 2024.pptxDrOmarShAlyozbaky
 
Modeling Of Transfer Function Characteristic of Rlc-Circuit
Modeling Of Transfer Function Characteristic of Rlc-Circuit Modeling Of Transfer Function Characteristic of Rlc-Circuit
Modeling Of Transfer Function Characteristic of Rlc-Circuit IOSR Journals
 

Similar to Chaotic Communication for mobile applica (20)

Ecet 345 Success Begins / snaptutorial.com
Ecet 345  Success Begins / snaptutorial.comEcet 345  Success Begins / snaptutorial.com
Ecet 345 Success Begins / snaptutorial.com
 
Secure Communication and Implementation for a Chaotic Autonomous System
Secure Communication and Implementation for a Chaotic Autonomous SystemSecure Communication and Implementation for a Chaotic Autonomous System
Secure Communication and Implementation for a Chaotic Autonomous System
 
Notch filter
Notch filterNotch filter
Notch filter
 
Balancing Robot Kalman Filter Design – Estimation Theory Project
Balancing Robot Kalman Filter Design – Estimation Theory ProjectBalancing Robot Kalman Filter Design – Estimation Theory Project
Balancing Robot Kalman Filter Design – Estimation Theory Project
 
solver (1)
solver (1)solver (1)
solver (1)
 
ACS 22LIE12 lab Manul.docx
ACS 22LIE12 lab Manul.docxACS 22LIE12 lab Manul.docx
ACS 22LIE12 lab Manul.docx
 
P73
P73P73
P73
 
Assignment2 control
Assignment2 controlAssignment2 control
Assignment2 control
 
Experimental realisation of Shor's quantum factoring algorithm using qubit r...
 Experimental realisation of Shor's quantum factoring algorithm using qubit r... Experimental realisation of Shor's quantum factoring algorithm using qubit r...
Experimental realisation of Shor's quantum factoring algorithm using qubit r...
 
17.pmsm speed sensor less direct torque control based on ekf
17.pmsm speed sensor less direct torque control based on ekf17.pmsm speed sensor less direct torque control based on ekf
17.pmsm speed sensor less direct torque control based on ekf
 
POWER SYSTEM SIMULATION - 2 LAB MANUAL (ELECTRICAL ENGINEERING - POWER SYSTEMS)
POWER SYSTEM SIMULATION - 2 LAB MANUAL (ELECTRICAL ENGINEERING - POWER SYSTEMS) POWER SYSTEM SIMULATION - 2 LAB MANUAL (ELECTRICAL ENGINEERING - POWER SYSTEMS)
POWER SYSTEM SIMULATION - 2 LAB MANUAL (ELECTRICAL ENGINEERING - POWER SYSTEMS)
 
lecture1 (9).ppt
lecture1 (9).pptlecture1 (9).ppt
lecture1 (9).ppt
 
Transfer Function Cse ppt
Transfer Function Cse pptTransfer Function Cse ppt
Transfer Function Cse ppt
 
Low Power VLSI Desgin
Low Power VLSI DesginLow Power VLSI Desgin
Low Power VLSI Desgin
 
Other RLC resonant circuits and Bode Plots 2024.pptx
Other RLC resonant circuits and Bode Plots 2024.pptxOther RLC resonant circuits and Bode Plots 2024.pptx
Other RLC resonant circuits and Bode Plots 2024.pptx
 
Muri
MuriMuri
Muri
 
Control assignment#2
Control assignment#2Control assignment#2
Control assignment#2
 
E017122733
E017122733E017122733
E017122733
 
Modeling Of Transfer Function Characteristic of Rlc-Circuit
Modeling Of Transfer Function Characteristic of Rlc-Circuit Modeling Of Transfer Function Characteristic of Rlc-Circuit
Modeling Of Transfer Function Characteristic of Rlc-Circuit
 
PG Project
PG ProjectPG Project
PG Project
 

More from YaseenMo

Statistical Method Examples for regrissi
Statistical Method Examples for regrissiStatistical Method Examples for regrissi
Statistical Method Examples for regrissiYaseenMo
 
advance coding techniques - probability
advance coding techniques -  probabilityadvance coding techniques -  probability
advance coding techniques - probabilityYaseenMo
 
big data analysis concepts by dr. lahe
big data analysis  concepts  by dr. lahebig data analysis  concepts  by dr. lahe
big data analysis concepts by dr. laheYaseenMo
 
ISM-OFDM and FBMC for communication envi
ISM-OFDM and FBMC for communication enviISM-OFDM and FBMC for communication envi
ISM-OFDM and FBMC for communication enviYaseenMo
 
New generation video coding OVERVIEW.pptx
New generation video coding OVERVIEW.pptxNew generation video coding OVERVIEW.pptx
New generation video coding OVERVIEW.pptxYaseenMo
 
Lect#1_Introduction to Broadband Comm.pdf
Lect#1_Introduction to  Broadband Comm.pdfLect#1_Introduction to  Broadband Comm.pdf
Lect#1_Introduction to Broadband Comm.pdfYaseenMo
 

More from YaseenMo (6)

Statistical Method Examples for regrissi
Statistical Method Examples for regrissiStatistical Method Examples for regrissi
Statistical Method Examples for regrissi
 
advance coding techniques - probability
advance coding techniques -  probabilityadvance coding techniques -  probability
advance coding techniques - probability
 
big data analysis concepts by dr. lahe
big data analysis  concepts  by dr. lahebig data analysis  concepts  by dr. lahe
big data analysis concepts by dr. lahe
 
ISM-OFDM and FBMC for communication envi
ISM-OFDM and FBMC for communication enviISM-OFDM and FBMC for communication envi
ISM-OFDM and FBMC for communication envi
 
New generation video coding OVERVIEW.pptx
New generation video coding OVERVIEW.pptxNew generation video coding OVERVIEW.pptx
New generation video coding OVERVIEW.pptx
 
Lect#1_Introduction to Broadband Comm.pdf
Lect#1_Introduction to  Broadband Comm.pdfLect#1_Introduction to  Broadband Comm.pdf
Lect#1_Introduction to Broadband Comm.pdf
 

Chaotic Communication for mobile applica

  • 1. Chaotic Communication Ph.D. Course_Broadband Communications Lect#10 hikmat.abdullah@coie-nahrain.edu.iq
  • 2.  Chaos is aperiodic time-asymptotic behavior in a deterministic system which exhibits sensitive dependence on initial conditions  All systems can be basically divided into three types: Deterministic, Stochastic or Chaotic
  • 3.  The secret key includes the initial condition 𝒙𝟎 and the control parameter p within the interval (0; 4]  The attractor branches into two, then four, then eight and so on, until chaos emerges for 3.56996 <= p  If the initial condition is changed, the sequence always converge to the same cycle period, but with a different rate. 𝒙𝒏+1 = 𝒑𝒙𝒏 1 − 𝒙𝒏
  • 4. Auto-correlation characteristics Cross-correlation characteristics Power spectral density characteristics Possible Chaos oscillator
  • 5. • Easy to generate • Low power • Broadband spectrum • Low multipath interference • Noise-like appearance • Good auto and cross correlation properties • Self-synchronization property • Chaotic signal can be used for providing security at physical level • In recent experiments, digital messages were successfully sent at Gbps speeds over 115 km of commercial optical fiber system using chaotic communication with a BER of one in ten million. The BER was said to be limited by the equipment rather than the technique itself
  • 6. FIXED POINT LIMIT CYCLE Chaotic attractor is also known as a strange attractor, a type of attractor (i.e., an attracting set of states) in a complex dynamical system's phase space that shows sensitivity to initial conditions An attractor is informally described as strange if it has non-integer dimension or if the dynamics on it are chaotic. The term was coined by David Ruelle and Floris Takens
  • 7. An attractor that is represented by a particular point in phase space, sometimes called an equilibrium point. As a point it corresponds to a very limited range of possible behaviors of the system. A limit cycle is a periodic orbit of the system that is isolated.
  • 8.
  • 9. - Based on Differential Equations - Examples of Chaotic Flows are Lorenz system Rӧssler system Chen’s system Chua system Lü system
  • 11.
  • 13. /Rӧssler/system Time series and strange attracter of Rӧssler chaotic flow are shown below when the values 𝑞1 = 0.2, 𝑞2 =0.2 and 𝑞3 = 5.7
  • 14. - Based on Difference Equations - Examples of Chaotic Maps are Logistic map Henon map Tent map Baker map Arnold cat map Standard map
  • 15.
  • 16. Sensitivity to parameter perturbation
  • 19.
  • 20.
  • 21.
  • 22. If more than one Lyapunov exponents are positive then the system is called Hyperchaotic
  • 23. 0-1 Test - One of the powerful testing of chaotic systems is 0-1 test which is presented by Gottwald and Melbourne . - The input numbers are the generated key from the system in time domain and the output from the system is a number between 0 to1. - The 0-1 test is exceeded the use of Lyapunov exponent in two points which are: 1) There is no need for phase space reconstruction of the chaotic system. So, it is applied directly on the generated key from the system. 2) It could be applied on the generated key even the system is continuous, discrete, exponential data, maps, integer or fractional order system
  • 24. This algorithm of the 0-1 test could be represented as follows:
  • 25.
  • 26.  First generation 1.Additive chaos masking 2.Chaotic shift keying  Second generation 1.Chaotic parameter modulation  Third generation 1.Chaotic cryptosystem  Forth generation 1.impulsive synchronization based cscs
  • 27.  The additive chaos masking scheme
  • 28. The chaotic shift keying schemes Chaos On/Off Keying COOK
  • 30. C B Binary data source (0 & 5) Volts Rate=100 kbps Unipolar to bipolar converter Chaotic generator1 Chaotic generator2 CSK modulator Transmitted signal HW (a) What are the output data at point C, if the input data are 1001 (b) Generate 8 chaotic samples from the two chaotic generators shown assuming the first generator is logistic map with p=3.8 and the second is cubic map with A=3. Assume x0=0.2 for both generators. (c) Find the output of CSK modulator using the generated chaotic samples in (b) and input data at point C. Assume for each input data bit, two chaotic samples are produced. (d) What is the chaotic carrier frequency? (e) Draw a block diagram for the receiver.
  • 31.  Differential Chaotic shift keying (DCSK) using correlation to demodulate was proposed to solve the problem of synchronization.  To enhanced the noise performance of DCSK, FM-DCSK scheme was proposed where frequency modulation is utilized to achieve constant energy per bit for the chaotic carrier. Differential Chaotic Shift Keying DCSK
  • 32. T T T T T T T/2 T/2 T/2 T/2 T/2 T/2 T/2 T/2 T/2 T/2 T/2 T/2 R R R R R R c(t) x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x d(t) +1 -1 +1 +1 -1 +1 DCSK x x x x x x x x x -x-x-x x x x x x x x x x x x x x x x -x-x-x x x x x x x DCSK- T/2 x x x x x x x x x -x-x-x x x x x x x x x x x x x x x x -x-x-x x x x det. d(t) +1 -1 +1 +1 -1 +1
  • 33.
  • 34.  Quadrature Chaos shift keying (QCSK) which can transmit 2 bits in a sample function was designed to improve the speed of chaos shift keying. The FM-QCSK is proposed to enhance the noise performance.                     T t T T t c b T t c a E T t t c E t S y i x i b x b QCSK FM < 2 ) 2 ( ) 2 ( 2 < 0 ) ( ) (           ) ( 1 ), ( 1 ) ( ), ( t y E t x E t c t c C b b y x     T T y x dt t c dt t c 0 0 2 2 1 ) ( ) (   T y x dt t c t c 0 0 ) ( ) ( ) ( ) ( ) ( t b t a t m i i i  
  • 35. HW Consider the transmitter shown in Fig.1 i. Find the average power at point A. ii. Show the first 12 generated chaotic samples at point B. Show the output samples at point C assuming the generated data at point A are 101. Draw a block diagram for the demodulator identifying the threshold value of the detector.
  • 39. Logistic Map Permutation Matrix P for an 8-bit grey scale image A (M×N matrix) is represented as a linear array of size 1×MN. each value in P (represents the pixel location of image A) is calculated for an initial value x0 and parameter μ using : P(i) = int(108X(i)) mod MN +1 Example
  • 40. Computer Experiment the secret key is {0.12345678, 3.99995} Histogram performance
  • 41. Sensitivity Analysis the plain image is encrypted by using the secret keys {0.12345678, 3.99995} the secret keys {0.12345678, 3.99995}, {0.12345678001, 3.99995} and {0.12345677999, 3.99995} are used to decrypt the cipher image
  • 43.  The impulse synchronization
  • 44. Conditional Lyapunov Exponents and the Pecora-Carroll Chaotic Synchronization - The necessary and sufficient condition, for master-slave synchronization to occur, is that the non-driven slave subsystem must be asymptotically stable - Lyapunov’s direct method is one of the most powerful tools in the nonlinear system stability analysis. However, - In order for the master-slave system to synchronize, all the CLEs of the non-driven slave subsystem must be negative
  • 46. Example: Synchronization of the simplest piecewise linear chaotic flow It exhibits chaotic behaviour with the parameter value A = 0.6 . Its dynamics are shown below
  • 47.
  • 48. Let the difference among the non-driving master subsystem and the non- driven slave subsystem be denoted by ‘*’. When x drives this difference is given by Differentiating both sides of equation 3.2.2 it should be noted that 3.2.2 Then: The conditional Lyapunov exponents are defined as the real parts of the eigenvalues of the matrix B
  • 49. Let the eigenvalues of matrix B of equation 3.2.5 be denoted by λ1 and λ2. Then the two CLEs are determined by taking the real parts of the eigenvalues of the matrix B: Therefore, as both CLEs are negative, theoretically the master-slave system of must synchronize. The numerical simulation, confirming the theoretical result of the equation is shown in next Figures
  • 50. Synchronization of the master-slave simplest piecewise linear chaotic signals, with the x signal driving.
  • 51. Chaos for Error Correcting Coding a denotes a position of the top of the skew tent map
  • 52. To transmit 1-bit information, N chaotic signals are generated The received signals block is given by The receiver calculates the shortest distance (D) between the Rx signals and the chaotic map in the Nd-dimensional space using Nd successive Rx signals We decided the symbol is decoded as “1” We decided the symbol is decoded as “0”
  • 53.
  • 54. K = 16, 32, 64. a = 0.05. skew tent map the chaotic sequence length N = 4 and 8 3 dB improvement over traditional method! The short sequences is more suited for error correcting codes
  • 55. Chaos for Multiple Access Communications