New Julia and Mandelbrot Sets for Jungck Ishikawa Iterates
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 5
Abstract
The generation of fractals and study of the dynamics of polynomials is one of the emerging and interesting field of research nowadays. We introduce in this paper the dynamics of polynomials z n - z + c = 0 for n 2 and applied Jungck Ishikawa Iteration to generate new Relative Superior Mandelbrot sets and Relative Superior Julia sets. In order to solve this function by Jungck –type iterative schemes, we write it in the form of Sz = Tz, where the function T, S are defined as Tz = z n + c and Sz = z. Only mathematical explanations are derived by applying Jungck Ishikawa Iteration for polynomials in the literature but in this paper we have generated Relative Mandelbrot sets and Relative Julia sets.
Authors and Affiliations
Suman Joshi , Dr. Yashwant Singh Chauhan , Dr. Ashish Negi
Securing ATM Using Graphical Password Authentication Scheme
In our day to day life ATMs are widely used and have brought so much relief to the financial world. Various problems were solved with the advent of these machines ranging from keeping the banking hall free of traffic wit...
Automatic Generation of Standard Deviation Attribute Profiles for Spectral–Spatial Classification of Remote Sensing Data
In recent years, the development of high-resolution remote sensing image extends the visual field of the terrain features. Back Propagation neural network is widely used in remote sensing image classification in recent y...
Requirement and Result of Verifying the Program Code
The verification of Java/C++ codes is critical, especially for special projects where human life will be at stake. A system is required that uses integrated reasoning to split each verification condition into a conjuncti...
Significance of Web 2.0 Technology and its Application in Academic Libraries
The objective of this paper is to provide information of web 2.0 technology in context of academic libraries. Web 2.0 technologies have seen the sudden increase of social networking sites or tools, which provide a medium...
Secured Packet Hiding Technique for Packet Jamming Attacks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. Jamming attacks can severely interfere with the normal operation of Networks and, consequently, mechani...