This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
Let
From [1, 2], we know that there are the so-called Markov perfect equilibria (MPE henceforth) processes, where the two players move alternatively such that each of them chooses the best reply to the previous action of another player. This occurs if the phase point
Probably, the first paper which gives the concept of chaos in a mathematically rigorous way is that of Li and Yorke [3]. Since then many different rigorous notions of chaos have been proposed. Each of these concepts tries to describe some kind of unpredictability in the evolution of the system. The notion of Li–Yorke sensitivity (LY-sensitivity) was presented for the first time by Akin and Kolyada in [4]. Moreover, they introduced the notion of spatiotemporal chaos. A very important generalization is distributional chaos, proposed by Schweizer and Smítal [5], mainly because it is equivalent to positive topological entropy and some other concepts of chaos when restricted to some spaces (see [5, 6]). It is noted that this equivalence does not transfer to higher dimensions, e.g., positive topological entropy does not imply distributional chaos in the case of triangular maps of the unit square [7] (the same happens when the dimension is zero [8]). In [9], Wang et al. introduced the concept of distributional chaos in a sequence and showed that it is equivalent to Li–Yorke chaos (LY-chaos) for continuous maps of the interval. During the last years, many researchers paid attention to the chaotic behavior of Cournot maps (see [1, 2, 10–17]).
From [18], we know that if
Let
For chaotic maps, there have been many applications. Since Li and Yorke [3] introduced the term of chaos in 1975, chaotic dynamical systems were highly discussed and investigated in the literature (see [18, 25, 26] and the references therein) as they are very good examples of problems coming from the theory of topological dynamics and model and many phenomena from biology, physics, chemistry, engineering, and social sciences. Recently, some new 1D and 2D chaotic systems with complex chaos performance have been developed (see [27–35] and the references therein).
Motivated by [13, 15, 22, 23], we will deal with the dynamical properties of cyclic permutation maps:
We obtain the following results:
(1)
(2)
(3)
If
(4)
If
(5)
(6)
If
(7)
If
(8)
If
(9)
(10)
Our results extend some existing ones on two-dimensional dynamical systems. Also, it is shown that the topological entropy
The interest of studying continuous cyclic permutation maps is as follows. Firstly, they are
2. Preliminaries
Let
A dynamical system
(1)
Transitive if for every pair of nonempty open sets
(2)
Mixing if for every pair of nonempty open sets
(3)
Sensitive if there is an
(4)
Chaotic in the sense of Ruelle–Takens (or RT-chaotic, for short) (see [39]) if it is both transitive and sensitive.
(5)
Chaotic in the sense of Li–Yorke (or LY-chaotic, for short) if there is an uncountable set
where
(6)
Chaotic in the sense of Devaney (or D-chaotic, for short) if
A subset
Recall that
Let
For any continuous map
3. Main Results
3.1. Relation between Some Chaotic Properties of a Continuous Cyclic Permutation Map and the Corresponding Properties of Every Coordinate Map
It is known in the frame of general topological spaces (and for general cyclic permutations) that if
We need the following two lemmas.
Lemma 1.
For a continuous cyclic permutation map,
If it is topologically transitive, then every coordinate map of
Proof.
As the proof of the result in Lemma 1 is similar for any
One can easily prove that
Now, we show that if
As
By the continuity of
Similarly, one can prove
By the similar argument, we obtain that if
By the above argument and the transitivity of
This means that
However, it is not true that the transitivity of
Example 1.
Let
We note that the following lemma holds in the general setting of topological spaces: to this end, consult Lemma 7 in [23]. So, the proof of Lemma 2 is omitted here.
Lemma 2.
For a topologically transitive cyclic permutation map,
Theorem 1.
For a cyclic permutation map,
The following hold:
(1)
(2)
(3)
If
(4)
If
(5)
If
then
(6)
If
Then,
(7)
If
where
(8)
If
Proof.
By Propositions 3.1 and 3.2 in [15], the definition, hypothesis, and
One can easily verify that statement (1) is true. By [41], the definition, and
As
Next, we show that statement (3) is also true. Suppose that
Finally, by the proof of Lemma 2.1 in [13], Lemma 1 in [43], the definitions, and hypothesis, statements (5), (6), (7), and (8) are true.
Theorem 2.
For a cyclic permutation map,
(1)
(2)
If
Proof 3.
(1)
If
which means that
(2)
Suppose that
3.2. Chaos on MPE Set for a Permutation Map
For a permutation map,
Let
Theorem 3.
For a permutation map,
(1)
If
(2)
If
(3)
(4)
Proof 4.
As the proof of the result in Theorem 3 is similar for any
Fix
Fix
(1)
Suppose that
(2)
Suppose that
This means that
Similarly, the condition can be proved for any
(3)
Clearly,
As
(4)
Obviously, by the definition, if
Then,
Since
As
Consequently,
3.3. The Topological Entropy and Sensitivity of a Continuous Cyclic Permutation Map
For the properties
Moreover, the topological entropy of this kind of maps has been already computed in [45]. However, for completeness, we give Theorem 4 and its proof here.
Theorem 4.
For a continuous cyclic permutation map,
Proof.
As
For the sensitive properties of product maps or semiflows, we refer the reader to [43, 46]. However, for completeness, we give Theorem.5 and its proof here.
Theorem 5.
For a continuous cyclic permutation map,
Proof.
As
3.4. Discussion on Applications
It is clear that a continuous cyclic permutation map defined by
When
From [31], we know that one can find continuous cyclic permutation maps in age-structured population models, as in [24], where it is analyzed as the Leslie model:
Because the chaotic maps have the excellent properties of unpredictability, ergodicity, and sensitivity to their parameters and initial values, they are widely used in security applications. In [35], Zhou et al. introduced a simple and effective chaotic system by a combination of two existing one-dimension (1D) chaotic maps which are called seed maps. By simulations and performance evaluations, it was shown that the proposed system can produce lots of 1D chaotic maps having larger chaotic ranges and better chaotic behaviors compared with their seed maps. To explore its applications in multimedia security, a novel image encryption algorithm is presented. By using a same set of security keys, this algorithm can generate a completely different encrypted image each time when it is used to the same original image. By experiments and security analysis it was shown that the algorithm has excellent performance in image encryption and various attacks. In [27], Hua et al. introduced a new two-dimensional Sine Logistic modulation map (2D-SLMM) which is given by the Logistic and Sine maps. When it is compared with existing chaotic maps, we can find that it has the better chaotic range, better ergodicity, hyperchaotic property, and relatively low implementation cost. Also, to investigate its applications, they proposed a chaotic magic transform (CMT) to efficiently change the image pixel positions. Combining 2D-SLMM with CMT, they further introduced a new image encryption algorithm. Simulation results and security analysis show that this algorithm can present images with low time complexity and a high security level as well as to resist various attacks. In [32], Wu et al. Noonan introduced a number of Sudoku-associated matrix element representations besides the conventional representation by matrix row-column pair. Particularly, they are representations via Sudoku matrix row-digit pair, digit-row pair, column-digit pair, digit-column pair, block-digit pair, and digit-block pair. So, one can secretly represent matrix elements by a Sudoku matrix and develop new Sudoku associated 2D parametric bijections. To show the effectiveness and randomness of thes bijections, they introduced a simple and effective Sudoku Associated Image Scrambler by 2D Sudoku-associated bijections for image scrambling without bandwidth expansion. By simulations and comparisons, it was demonstrated that the proposed method can outperform some state-of-the-art methods. In [28], Hua and Zhou gave a two-dimensional Logistic-adjusted-Sine map (2D-LASM). By performance evaluations, it was shown that this map has better ergodicity and unpredictability, and a wider chaotic range than many the existing chaotic maps. By this map, they further designed a 2D-LASM-based image encryption scheme (LAS-IES). The principle of diffusion and confusion are strictly finished, and a mechanism of adding random values to plain image is established to enhance the security level of cipher image. By simulation results and security analysis, it was shown that the LAS-IES can efficiently encrypt different kinds of images into random-like ones which have strong ability of resisting various security attacks. In [29], Hua et al. gave a sine-transform-based chaotic system (STBCS) which generates one-dimensional (1-D) chaotic maps. This chaotic system performs a sine transform to the combination of the outputs of the two existing chaotic maps (seed maps). Users have the flexibility to pick any existing 1D chaotic maps as seed maps in STBCS to generate lots of new chaotic maps. The complex chaotic behavior of STBCS is verified by using the principle of Lypunov exponent. To show the usability and effectiveness of STBCS, they presented three new chaotic maps as examples. By theoretical analysis, it was shown that these chaotic maps have complex dynamics properties and robust chaos. Performance evaluations show that they have better chaotic ranges, better complexity, and unpredictability, compared with chaotic maps generated by other methods and the corresponding seed maps. Also, to explain the simplicity of STBCS in hardware implementation, they simulated the three new chaotic maps by the field-programmable gate array (FPGA). In [30], Hua et al. presented a two-dimensional (2D) sine chaotification system (2D-SCS). Such a system can not only significantly enhance the complexity of 2D chaotic maps but also greatly extend their chaotic ranges. As examples, they applied 2D-SCS to two existing 2D chaotic maps to get two enhanced chaotic maps. By performance evaluations, it was shown that these two enhanced chaotic maps have robust chaotic behaviors in much larger chaotic ranges than the existing 2D chaotic maps. Also, a microcontroller-based experiment platform was designed to implement these enhanced chaotic maps in hardware devices. Furthermore, to discuss the application of 2D-SCS, these two enhanced chaotic maps are used to design a pseudorandom number generator. By experiment results, one can see that these enhanced chaotic maps are able to produce better random sequences than the existing 2D and several state-of-the-art one-dimensional (1D) chaotic maps. In [31], Hua et al. Zhou gave a two-dimensional (2D) modular chaotification system (2D-MCS) to improve the chaos complexity of any 2D chaotic map. Since the modular operation is a bounded transform, the chaotic maps which are improved by 2D-MCS can generate chaotic behaviors in wide parameter ranges while the existing chaotic maps cannot. Three improved chaotic maps were given as typical examples to verify the effectiveness of 2D-MCS. The chaotic properties of one example of 2D-MCS are mathematically analyzed by using Lyapunov exponent. By performance evaluations, it was shown that these improved chaotic maps have continuous and large chaotic ranges, and their outputs are distributed more uniformly than the outputs of the existing 2D chaotic maps. To explain the application of 2D-MCS, they applied the improved chaotic maps of 2D-MCS to secure communication. By the simulation results, it was shown that these improved chaotic maps exhibit better performance than a few existing and newly developed chaotic maps in terms of resisting different channel noise.
In the future, we will further discuss and explore some properties and applications of continuous cyclic permutation maps [48].
Authors’ Contributions
All authors contributed equally to this work. All authors read and approved the final manuscript.
Acknowledgments
This work was supported by the National Natural Science Foundation of China (no. 11501391), Opening Project of Artificial Intelligence Key Laboratory of Sichuan Province (2018RZJ03), Opening Project of Bridge Non-destruction Detecting and Engineering Computing Key Laboratory of Sichuan Province (2018QZJ03), and Scientific Research Project of Sichuan University of Science and Engineering (2020RC24).
[1] T. Puu, I. Sushko, Oligopoly Dynamics: Models and Tools, 2002.
[2] R.-A. Dana, L. Montrucchio, "Dynamic complexity in duopoly games," Journal of Economic Theory, vol. 40 no. 1, pp. 40-56, DOI: 10.1016/0022-0531(86)90006-2, 1986.
[3] T.-Y. Li, J. A. Yorke, "Period three implies chaos," The American Mathematical Monthly, vol. 82 no. 10, pp. 985-992, DOI: 10.2307/2318254, 1975.
[4] E. Akin, S. Kolyada, "Li-yorke sensitivity," Nonlinearity, vol. 16 no. 4, pp. 1421-1433, DOI: 10.1088/0951-7715/16/4/313, 2003.
[5] B. Schweizer, J. Smítal, "Measures of chaos and a spectral decomposition of dynamical systems on the interval," Transactions of the American Mathematical Society, vol. 344 no. 2, pp. 737-754, DOI: 10.1090/s0002-9947-1994-1227094-x, 1994.
[6] P. Oprocha, P. Wilczyński, "Shift spaces and distributional chaos," Chaos, Solitons & Fractals, vol. 31 no. 2, pp. 347-355, DOI: 10.1016/j.chaos.2005.09.069, 2007.
[7] J. Smítal, M. Štefánková, "Distributional chaos for triangular maps," Chaos, Solitons & Fractals, vol. 21 no. 5, pp. 1125-1128, DOI: 10.1016/j.chaos.2003.12.105, 2004.
[8] R. Pikula, "On some notions of chaos in dimension zero," Colloquium Mathematicum, vol. 107, pp. 167-177, DOI: 10.4064/cm107-2-1, 2007.
[9] L. Wang, G. Huang, S. Huan, "Distributional chaos in a sequence," Nonlinear Analysis: Theory, Methods & Applications, vol. 67 no. 7, pp. 2131-2136, DOI: 10.1016/j.na.2006.09.005, 2007.
[10] G. I. Bischi, C. Mammana, L. Gardini, "Multistability and cyclic attractors in duopoly games," Chaos, Solitons and Fractals, vol. 11, pp. 543-564, DOI: 10.1016/s0960-0779(98)00130-1, 2000.
[11] J. S. Canovas, "Chaos in duopoly games," Advanced Nonlinear Studies, vol. 7, pp. 97-104, 2000.
[12] J. S. Canovas, M. Ruiz Marin, G. Soler, "Distributional chaos of duopoly games," Advanced Nonlinear Studies, vol. 1, pp. 79-87, 2001.
[13] J. S. Cánovas, M. Ruı́z Marı́n, "Chaos on mpe-sets of duopoly games," Chaos, Solitons & Fractals, vol. 19 no. 1, pp. 179-183, DOI: 10.1016/s0960-0779(03)00156-5, 2004.
[14] M. Kopel, "Simple and complex adjustment dynamics in cournot duopoly models," Chaos, Solitons & Fractals, vol. 7 no. 12, pp. 2031-2048, DOI: 10.1016/s0960-0779(96)00070-7, 1996.
[15] T. Lu, P. Zhu, "Further discussion on chaos in duopoly games," Chaos, Solitons & Fractals, vol. 52, pp. 45-48, DOI: 10.1016/j.chaos.2013.03.012, 2013.
[16] T. Puu, "Chaos in duopoly pricing," Chaos, Solitons and Fractals, vol. 1 no. 6, pp. 73-81, DOI: 10.1016/0960-0779(91)90045-b, 1991.
[17] D. Rand, "Exotic phenomena in games and duopoly models," Journal of Mathematical Economics, vol. 5 no. 2, pp. 173-184, DOI: 10.1016/0304-4068(78)90022-8, 1978.
[18] J. Banks, J. Brooks, G. Cairns, G. Davis, P. Stacey, "On devaney’s definition of chaos," The American Mathematical Monthly, vol. 99 no. 4, pp. 332-334, DOI: 10.1080/00029890.1992.11995856, 1992.
[19] W. Huang, X. Ye, "Devaney’s chaos or 2-scattering implies li-yorke’s chaos," Topology and Its Applications, vol. 117 no. 3, pp. 259-272, DOI: 10.1016/s0166-8641(01)00025-6, 2002.
[20] F. Blanchard, E. Glasner, S. Kolyada, A. Maass, "On li-yorke pairs," Journal Für Die Reine und Angewandte Mathematik, vol. 547, pp. 51-68, DOI: 10.1515/crll.2002.053, 2002.
[21] J. Smital, "Chaotic functions with zero topological entropy," Transactions of the American Mathematical Society, vol. 297 no. 1, pp. 269-282, DOI: 10.2307/2000468, 1986.
[22] A. Linero Bas, G. Soler López, "A note on the dynamics of cyclically permuted direct product maps," Topology and Its Applications, vol. 203, pp. 147-158, DOI: 10.1016/j.topol.2015.12.083, 2016.
[23] A. Linero Bas, G. Soler López, "A splitting result on transitivity for a class of n-dimensional maps," Nonlinear Dynamics, vol. 84 no. 1, pp. 163-169, DOI: 10.1007/s11071-015-2311-y, 2016.
[24] J. E. Franke, A.-A. Yakubu, "Attenuant cycles in periodically forced discrete-time age-structured population models," Journal of Mathematical Analysis and Applications, vol. 316 no. 1, pp. 69-86, DOI: 10.1016/j.jmaa.2005.04.061, 2006.
[25] R. L. Adler, A. G. Konheim, M. H. McAndrew, "Topological entropy," Transactions of the American Mathematical Society, vol. 114 no. 2, pp. 309-319, DOI: 10.1090/s0002-9947-1965-0175106-9, 1965.
[26] L. S. Block, W. A. Coppel, "Dynamics in one dimension," Lecture Notes in Mathematics, vol. 1513, 1992.
[27] Z. Hua, Y. Zhou, C.-M. Pun, C. L. P. Chen, "2D sine logistic modulation map for image encryption," Information Sciences, vol. 297, pp. 80-94, DOI: 10.1016/j.ins.2014.11.018, 2015.
[28] Z. Hua, Y. Zhou, "Image encryption using 2D logistic-adjusted-sine map," Information Sciences, vol. 339, pp. 237-253, DOI: 10.1016/j.ins.2016.01.017, 2016.
[29] Z. Hua, B. Zhou, Y. Zhou, "Sine-transform-based chaotic system with FPGA implementation," IEEE Transactions on Industrial Electronics, vol. 65 no. 3, pp. 2557-2566, DOI: 10.1109/tie.2017.2736515, 2018.
[30] Z. Hua, Y. Zhou, B. Bao, "Two-dimensional sine chaotification system with hardware implementation," IEEE Transactions on Industrial Informatics, vol. 16 no. 2, pp. 887-897, DOI: 10.1109/tii.2019.2923553, 2020.
[31] Z. Hua, Y. Zhang, Y. Zhou, "Two-dimensional modular chaotification system for improving chaos complexity," IEEE Transactions on Signal Processing, vol. 68, pp. 1937-1949, DOI: 10.1109/tsp.2020.2979596, 2020.
[32] Y. Wu, Y. Zhou, S. Agaian, J. P. Noonan, "2D sudoku associated bijections for image scrambling," Information Sciences, vol. 327, pp. 91-109, DOI: 10.1016/j.ins.2015.08.013, 2016.
[33] X. Wu, X. Ma, G. Chen, T. Lu, "A note on the sensitivity of semiflows," Topology and its Applications, vol. 271,DOI: 10.1016/j.topol.2019.107046, 2020.
[34] X. Wu, S. Liang, X. Ma, T. Lu, S. A. Ahmadi, "The mean sensitivity and mean equicontinuity in uniform spaces," International Journal of Bifurcation and Chaos, vol. 30 no. 8,DOI: 10.1142/s0218127420501229, 2020.
[35] Y. Zhou, L. Bao, C. L. P. Chen, "A new 1D chaotic system for image encryption," Signal Processing, vol. 97, pp. 172-182, DOI: 10.1016/j.sigpro.2013.10.034, 2014.
[36] F. Balibrea, A. Linero, "On the periodic structure of antitriangular maps on the unit square," Annales Mathematicae Silesianae, vol. 13, pp. 39-49, 1999.
[37] J. S. Cánovas, A. Linero, "Topological dynamic classification of duopoly games," Chaos, Solitons & Fractals, vol. 12 no. 7, pp. 1259-1266, DOI: 10.1016/s0960-0779(00)00098-9, 2001.
[38] J. S. Cánovas, D. López Medina, "Topological entropy of cournot-puu duopoly," Discrete Dynamics in Nature and Society, vol. 2010,DOI: 10.1155/2010/506940, 2010.
[39] D. Ruelle, F. Takens, "On the nature of turbulence," Communications in Mathematical Physics, vol. 20 no. 3, pp. 167-192, DOI: 10.1007/bf01646553, 1971.
[40] R. Bowen, "Entropy for group endomorphisms and homogeneous spaces," Transactions of the American Mathematical Society, vol. 153, pp. 401-414, DOI: 10.1090/s0002-9947-1971-0274707-x, 1971.
[41] P. Walters, "An introduction to ergodic theory," Graduate Texts in Mathematics, 1982.
[42] R. Li, H. Wang, Y. Zhao, "Kato’s chaos in duopoly games," Chaos, Solitons & Fractals, vol. 84, pp. 69-72, DOI: 10.1016/j.chaos.2016.01.006, 2016.
[43] N. Degirmenci, S. Kocak, "Chaos in product maps," Turkish Journal of Mathematics, vol. 34, pp. 593-600, DOI: 10.3906/mat-0807-51, 2010.
[44] S. Kolyada, L. Snoha, "Topological entropy of nonautonomous dynamical systems," Random Compute Dynamic, vol. 4, pp. 205-233, 1996.
[45] F. Balibrea, J. S. C. Pena, V. Jimenez Lopez, "Some invariants for σ -permutation maps," Annales Mathematicae Silesianae, vol. 13, pp. 51-60, 1999.
[46] R. Li, X. Zhou, "A note on chaos in product maps," Turkish Journal of Mathematics, vol. 37, pp. 665-675, DOI: 10.3906/mat-1206-24, 2013.
[47] R. Li, Y. Shi, "Stronger forms of sensitivity for measure-preserving maps and semiflows on probability spaces," Abstract and Applied Analysis, vol. 2014,DOI: 10.1155/2014/769523, 2014.
[48] F. Balibrea, A. Linero, J. S. Cánovas, "On ω -limit sets of antitriangular maps," Topology and Its Applications, vol. 137 no. 1–3, pp. 13-19, DOI: 10.1016/s0166-8641(03)00195-0, 2004.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2020 Risong Li and Tianxiu Lu. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/
Abstract
In this paper, we study some chaotic properties of
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details
; Lu, Tianxiu 2
1 School of Mathematics and Computer Science, Guangdong Ocean University, Zhanjiang 524025, China; Bridge Non-destruction Detecting and Engineering Computing Key Laboratory of Sichuan Province, Zigong 643000, China
2 College of Mathematics and Statistics, Sichuan University of Science and Engineering, Zigong 643000, China; Artificial Intelligence Key Laboratory of Sichuan Province, Zigong 643000, China





