This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key "evolving" role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.
This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key "evolving" role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.
Mathematical modelling is ubiquitous. Almost every book in exact science touches on mathematical models of a certain class of phenomena, on more or less speci?c approaches to construction and investigation of models, on their applications, etc. As many textbooks with similar titles, Part I of our book is devoted to general qu- tions of modelling. Part II re?ects our professional interests as physicists who spent much time to investigations in the ?eld of non-linear dynamics and mathematical modelling from discrete sequences of experimental measurements (time series). The latter direction of research is known for a long time as “system identi?cation” in the framework of mathematical statistics and automatic control theory. It has its roots in the problem of approximating experimental data points on a plane with a smooth curve. Currently, researchers aim at the description of complex behaviour (irregular, chaotic, non-stationary and noise-corrupted signals which are typical of real-world objects and phenomena) with relatively simple non-linear differential or difference model equations rather than with cumbersome explicit functions of time. In the second half of the twentieth century, it has become clear that such equations of a s- ?ciently low order can exhibit non-trivial solutions that promise suf?ciently simple modelling of complex processes; according to the concepts of non-linear dynamics, chaotic regimes can be demonstrated already by a third-order non-linear ordinary differential equation, while complex behaviour in a linear model can be induced either by random in?uence (noise) or by a very high order of equations.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.