Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 64 tok/s
Gemini 2.5 Pro 50 tok/s Pro
GPT-5 Medium 30 tok/s Pro
GPT-5 High 35 tok/s Pro
GPT-4o 77 tok/s Pro
Kimi K2 174 tok/s Pro
GPT OSS 120B 457 tok/s Pro
Claude Sonnet 4 37 tok/s Pro
2000 character limit reached

Discrete Lorenz Attractors in 3D Sinusoidal Maps (2506.10788v1)

Published 12 Jun 2025 in nlin.CD

Abstract: Discrete Lorenz attractors can be found in three-dimensional discrete maps. Discrete Lorenz attractors have similar topology to that of the continuous Lorenz attractor exhibited by the well studied 3D Lorenz system. However, the routes to the formation of discrete Lorenz attractor in 3D maps is different from that of the routes of formation of continuous Lorenz flow attractor. This paper explores the exotic dynamics of a three-dimensional sinusoidal map, highlighting the existence of discrete Lorenz attractors. Through a detailed bifurcation analysis, we discuss various formation pathways involving supercritical and subcritical Neimark-Sacker bifurcations, and homoclinic butterflies towards the formation of discrete Lorenz attractors. Using a two-parameter Lyapunov chart analysis, we systematically illustrate chaotic regions and periodic regions in the parameter space, illustrating diverse attractor topologies, including hyperchaotic and wavy chaotic structures. Furthermore, we investigate spatiotemporal patterns in a ring-star network of coupled sinusoidal maps, revealing diverse spatiotemporal patterns such as chimera states, traveling waves, and synchronization transitions, controlled by coupling strengths of ring and star networks respectively. A key contribution is the application of hyperchaotic signals to secure video encryption, where we apply YOLOv10 for object detection and CNN-based cryptographic key generation. This selective encryption approach ensures enhanced security, high computational efficiency, and robustness against differential attacks.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-Up Questions

We haven't generated follow-up questions for this paper yet.

Authors (1)