78 research outputs found

    Interactive Robot for Playing Russian Checkers

    Get PDF
    Human\u2013robot interaction in board games is a rapidly developing field of robotics. This paper presents a robot capable of playing Russian checkers designed for entertaining, training, and research purposes. Its control program is based on a novel unsupervised self-learning algorithm inspired by AlphaZero and represents the first successful attempt of using this approach in the checkers game. The main engineering challenge in mechanics is to develop a board state acquisition system non-sensitive to lighting conditions, which is achieved by rejecting computer vision and utilizing magnetic sensors instead. An original robot face is designed to endow the robot an ability to express its attributed emotional state. Testing the robot at open-air multiday exhibitions shows the robustness of the design to difficult exploitation conditions and the high interest of visitors to the robot

    Rational Approximation Method for Stiff Initial Value Problems

    Get PDF
    While purely numerical methods for solving ordinary differential equations (ODE), e.g., Runge–Kutta methods, are easy to implement, solvers that utilize analytical derivations of the right-hand side of the ODE, such as the Taylor series method, outperform them in many cases. Nevertheless, the Taylor series method is not well-suited for stiff problems since it is explicit and not A-stable. In our paper, we present a numerical-analytical method based on the rational approximation of the ODE solution, which is naturally A- and A(α)-stable. We describe the rational approximation method and consider issues of order, stability, and adaptive step control. Finally, through examples, we prove the superior performance of the rational approximation method when solving highly stiff problems, comparing it with the Taylor series and Runge–Kutta methods of the same accuracy order

    Integrate-and-Differentiate Approach to Nonlinear System Identification

    Get PDF
    In this paper, we consider a problem of parametric identification of a piece-wise linear mechanical system described by ordinary differential equations. We reconstruct the phase space of the investigated system from accelerometer data and perform parameter identification using iteratively reweighted least squares. Two key features of our study are as follows. First, we use a differentiated governing equation containing acceleration and velocity as the main independent variables instead of the conventional governing equation in velocity and position. Second, we modify the iteratively reweighted least squares method by including an auxiliary reclassification step into it. The application of this method allows us to improve the identification accuracy through the elimination of classification errors needed for parameter estimation of piece-wise linear differential equations. Simulation of the Duffing-like chaotic mechanical system and experimental study of an aluminum beam with asymmetric joint show that the proposed approach is more accurate than state-of-the-art solutions

    Audio Encryption With Computational Chaotic System Error

    Get PDF
    This paper proposes a novel method of chaos-based encryption for audio. Our method outperformed the minimal requirement of speed for real time audio transfers while maintaining its high security features. The paper exploits finite errors derived from the computation of chaotic systems. The cipher is built on the lower bound error, which is computed by means of two interval extensions of a chaotic system. It was found that the method was effective, and required little computational power in order to be completed, proving to be faster and still reliable compared to other works

    New technique to quantify chaotic dynamics based on differences between semi-implicit integration schemes

    Get PDF
    Many novel chaotic systems have recently been identified and numerically studied. Parametric chaotic sets are a valuable tool for determining and classifying oscillation regimes observed in nonlinear systems. Thus, efficient algorithms for the construction of parametric chaotic sets are of interest. This paper discusses the performance of algorithms used for plotting parametric chaotic sets, considering the chaotic Rossler, Newton-Leipnik and Marioka-Shimizu systems as examples. In this study, we compared four different approaches: calculation of largest Lyapunov exponents, statistical analysis of bifurcation diagrams, recurrence plots estimation and introduced the new analysis method based on differences between a couple of numerical models obtained by semi-implicit methods. The proposed technique allows one to distinguish the chaotic and periodic motion in nonlinear systems and does not require any additional procedures such as solutions normalization or the choice of initial divergence value which is certainly its advantage. We evaluated the performance of the algorithms with the two-stage approach. At the first stage, the required simulation time was estimated using the perceptual hash calculation. At the second stage, we examined the performance of the algorithms for plotting parametric chaotic sets with various resolutions. We explicitly demonstrated that the proposed algorithm has the best performance among all considered methods. Its implementation in the simulation and analysis software can speed up the calculations when obtaining high-resolution multi-parametric chaotic sets for complex nonlinear systems

    Adaptive Chaotic Maps in Cryptography Applications

    Get PDF
    Chaotic cryptography is a promising area for the safe and fast transmission, processing, and storage of data. However, many developed chaos-based cryptographic primitives do not meet the size and composition of the keyspace and computational complexity. Another common problem of such algorithms is dynamic degradation caused by computer simulation with finite data representation and rounding of results of arithmetic operations. The known approaches to solving these problems are not universal, and it is difficult to extend them to many chaotic systems. This chapter describes discrete maps with adaptive symmetry, making it possible to overcome several disadvantages of existing chaos-based cryptographic algorithms simultaneously. The property of adaptive symmetry allows stretching, compressing, and rotating the phase space of such maps without significantly changing the bifurcation properties. Therefore, the synthesis of one-way piecewise functions based on adaptive maps with different symmetry coefficients supposes flexible control of the keyspace size and avoidance of dynamic degradation due to the embedded technique of perturbing the chaotic trajectory

    Improving chaos-based pseudo-random generators in finite-precision arithmetic

    Get PDF
    One of the widely-used ways in chaos-based cryptography to generate pseudo-random sequences is to use the least significant bits or digits of finite-precision numbers defined by the chaotic orbits. In this study, we show that the results obtained using such an approach are very prone to rounding errors and discretization effects. Thus, it appears that the generated sequences are close to random even when parameters correspond to non-chaotic oscillations. In this study, we confirm that the actual source of pseudo-random properties of bits in a binary representation of numbers can not be chaos, but computer simulation. We propose a technique for determining the maximum number of bits that can be used as the output of a pseudo-random sequence generator including chaos-based algorithms. The considered approach involves evaluating the difference of the binary representation of two points obtained by different numerical methods of the same order of accuracy. Experimental results show that such estimation can significantly increase the performance of the existing chaos-based generators. The obtained results can be used to reconsider and improve chaos-based cryptographic algorithms

    Improving Chaotic Image Encryption Using Maps with Small Lyapunov Exponents

    Get PDF
    Chaos-based encryption is one of the promising cryptography techniques that can be used. Although chaos-based encryption provides excellent security, the finite precision of number representation in computers affects decryption accuracy negatively. In this paper, a way to mitigate some problems regarding finite precision is analyzed. We show that the use of maps with small Lyapunov exponents can improve the performance of chaotic encryption scheme, making it suitable for image encryption

    The choice between delta and shift operators for low-precision data representation

    Get PDF
    Low-precision data types for embedded applications reduce the power consumption and enhance the price-performance ratio. Inconsistence between the specified accuracy of a designed filter or controller and an imprecise data type can be overcome using the δ-operator, an alternative to the traditional discrete-time z-operator. Though in many cases it significantly increases accuracy, sometimes it shows no advantage over the shift operator. So the problem of choice between delta and shift operator arises. Therefore, a study on δ-operator applicability bounds is needed to solve this problem and provide δ-operator efficient practical use. In this paper we introduce a concept of the δ-operator applicability criterion. The discrete system implementation technique with discrete-time operator choice is given for the low-precision machine arithmetic

    A reliable chaos-based cryptography using Galois field

    Get PDF
    Chaos-based image encryption schemes have been extensively employed over the past few years. Many issues such as the dynamical degradation of digital chaotic systems and information security have been explored, and plenty of successful solutions have also been proposed. However, the impact of finite precision in different hardware and software setups has received little attention. In this work, we have shown that the finite precision error may produce distinct cipher-images on different devices. In order to overcome this problem, we introduce an efficient cryptosystem, in which the chaotic logistic map and the Galois field theory are applied. Our approach passes in the ENT test suite and in several cyberattacks. It also presents an astonishing key space of up to 24096. Benchmark images have been effectively encrypted and decrypted using dissimilar digital devices
    • …
    corecore