An Algorithm for Generating New Mandelbrot and Julia Sets

Similar documents
Digital Image Processing for Camera Application in Mobile Devices Using Artificial Neural Networks

Document Image Binarization Using Post Processing Method

Selection of Web Services using Service Agent: An optimized way for the selection of Non-functional requirements

Location Based Spatial Query Processing In Wireless System

Numerical solution of Fuzzy Hybrid Differential Equation by Third order Runge Kutta Nystrom Method

Bandwidth Recycling using Variable Bit Rate

Dynamic Instruction Scheduling For Microprocessors Having Out Of Order Execution

On Demand Web Services with Quality of Service

The Fast Fourier Transform Algorithm and Its Application in Digital Image Processing

Survey on Wireless Intelligent Video Surveillance System Using Moving Object Recognition Technology

Control Theory and Informatics ISSN (print) ISSN (online) Vol 2, No.1, 2012

SQL Based Paperless Examination System

Numerical Flow Simulation using Star CCM+

Two-stage Interval Time Minimization Transportation Problem with Capacity Constraints

A Heuristic Based Multi-Objective Approach for Network Reconfiguration of Distribution Systems

Harvesting Image Databases from The Web

Modeling of Piecewise functions via Microsoft Mathematics: Toward a computerized approach for fixed point theorem

Computer Engineering and Intelligent Systems ISSN (Paper) ISSN (Online) Vol.5, No.4, 2014

A Deadlock Free Routing Algorithm for Torus Network

A Novel Method to Solve Assignment Problem in Fuzzy Environment

Mobile Ad hoc Networks Dangling issues of optimal path. strategy

A File System Level Snapshot In Ext4

A Novel Technique for Controlling CNC Systems

Information and Knowledge Management ISSN (Paper) ISSN X (Online) Vol 2, No.2, 2012

Root cause detection of call drops using feedforward neural network

Differential Evolution Biogeography Based Optimization for Linear Phase Fir Low Pass Filter Design

MSGI: MySQL Graphical Interface

A Novel Approach for Imputation of Missing Value Analysis using Canopy K-means Clustering

Video Calling Over Wi-Fi Network using Android Phones

Recursive Visual Secret Sharing Scheme using Fingerprint. Authentication

Design and Simulation of Wireless Local Area Network for Administrative Office using OPNET Network Simulator: A Practical Approach

Clustering Algorithm for Files and Data in Cloud (MMR Approach)

Algorithm for Classification

Fuzzy k-c-means Clustering Algorithm for Medical Image. Segmentation

Rainfall-runoff modelling of a watershed

A Cultivated Differential Evolution Algorithm using modified Mutation and Selection Strategy

Audio Compression Using DCT and DWT Techniques

Secure Transactions using Wireless Networks

On Mobile Cloud Computing in a Mobile Learning System

3D- Discrete Cosine Transform For Image Compression

Offering an Expert Electronic Roll Call and Teacher Assessment System Based on Mobile Phones for Higher Education

Dynamic Load Balancing By Scheduling In Computational Grid System

An FPGA based Efficient Fruit Recognition System Using Minimum Distance Classifier

Modelling of a Sequential Low-level Language Program Using Petri Nets

Computer Engineering and Intelligent Systems ISSN (Paper) ISSN (Online) Vol 3, No.2, 2012 Cyber Forensics in Cloud Computing

Gn-Dtd: Innovative Way for Normalizing XML Document

Performance study of Association Rule Mining Algorithms for Dyeing Processing System

Design of A Mobile Phone Data Backup System

Correlation between Averages Times of Random Walks On an. Irregularly Shaped Objects and the Fractal Dimensions

A Probabilistic Data Encryption scheme (PDES)

A New Technique to Fingerprint Recognition Based on Partial Window

Efficient Algorithms/Techniques on Discrete Wavelet Transformation for Video Compression: A Review

Query Optimization to Improve Performance of the Code Execution

Automated Well Test Analysis II Using Well Test Auto

Mupad Models for Splines

An Optimized Congestion Control and Error Management System for OCCEM

Face Location - A Novel Approach to Post the User global Location

Comparative Analysis of QoS-Aware Routing Protocols for Wireless Sensor Networks

Website Vulnerability to Session Fixation Attacks

Measuring Round Trip Time and File Download Time of FTP Servers

Utilizing Divisible Load Scheduling Theorem in Round Robin Algorithm for Load Balancing In Cloud Environment

Application of Light Weight Directory Access Protocol to Information Services Delivery in Nigerian Tertiary Institutions Libraries

Fixed Point Iterative Techniques An Application to Fractals

Adaptive Balanced Clustering For Wireless Sensor Network Energy Optimization

Sunil Shukla et al, Int.J.Computer Technology & Applications,Vol 4 (2), STUDY OF NEWBIE FRACTAL CONTROLLED BY LOG FUNCTION

Data Hiding in Color Images: A High Capacity Data Hiding Technique for Covert Communication Shabir A. Parah 1, Javaid A. Sheikh 2, G. M.

Design and Modeling of Tool Trajectory in C 0 Continuity Concept by Importing the IGES Neutral File

An Asynchronous Replication Model to Improve Data Available. into a Heterogeneous System

Efficient Retrieval of Web Services Using Prioritization and Clustering

Generation of 3D Fractal Images for Mandelbrot and Julia Sets

Problems faced in Communicate set up of Coordinator with GUI and Dispatcher in NCTUns network simulator

Soft Computing and Artificial Intelligence Techniques for Intrusion Detection System

An Evolutionary Approach to Optimizing Cloud Services

Enhancing Text Compression Method Using Information Source Indexing

A Real-time Filtering Method of Positioning Data with Moving Window Mechanism

Look at IPV6 Security advantages over IPV4

THE GRAPH OF FRACTAL DIMENSIONS OF JULIA SETS Bünyamin Demir 1, Yunus Özdemir2, Mustafa Saltan 3. Anadolu University Eskişehir, TURKEY

A TECHNOLOGY-ENHANCED FRACTAL/CHAOS COURSE. Taeil Yi University of Texas at Brownsville 80 Fort Brown Brownsville, TX

Proposed Multi-Mode Home Node-B Air Interface Protocol Stack Architecture

Cloud Computing on Smartphone

A Novel Technique for Secure Information Transmission in Videos Using Salt Cryptography

Comparision of Different Logic style for High Performance Wave Pipeline Circuit

DETC Modeling and Imaging Mechanical Chaos. Abstract. Introduction. The Simulation

Voice Based Smart Internet Surfing for Blind using JADE Agent and HTML5 Developing Environment

Application of Genetic Algorithm in Intrusion Detection System

COMPUTER ANALYSIS OF FRACTAL SETS

On Fractal Colouring Algorithms

Hybrid I&C Grounding in PFBR

Impact of Prepaid Energy Metering System on the Electricity Consumption in Ogbomoso South Local Government Area of Oyo State

Multi-class Multi-label Classification and Detection of Lumbar Intervertebral Disc Degeneration MR Images using Decision Tree Classifiers

A Review-Botnet Detection and Suppression in Clouds

Development of a Feature Extraction Technique for Online Character Recognition System

Computer Engineering and Intelligent Systems ISSN (Paper) ISSN (Online) Vol 3, No.6, 2012

The Real Time Hardware Design and simulation of moving message Display System Integrated with PLCC Modem

Uttarkhand Technical University, J.B.Institute of Technology, Uttarakhand Technical University, Dehradun, INDIA Dehradun, INDIA Dehradun, INDIA

A Survey of Model Used for Web User s Browsing Behavior Prediction

A Heuristic Approach for Web log mining using Bayesian. Networks

Determine The Optimal Sequence - dependent Setup Cost and / or Setup Time for Single Demand with Multiple Products Using Modified Assignment Method

S.NO Papers published by the faculty members in National/ International Journals FACTOR

A Microcontroller Framework for PC Based Electrical Appliance Control System

Transcription:

An Algorithm for Generating New Mandelbrot and Julia Sets R. P. Pant 1 R. K. Bisht 1* 1. Department of Mathematics, D. S. B. Campus, Kumaun University, Nainital-263002, India * E-mail of the corresponding author: ravindra.bisht@yahoo.com Abstract The present paper is motivated from the paper of John R. Tippetts (Tippetts 1992) in which he gave an algorithm to generate an interesting Mandelbrot set. We not only generate Julia sets using Tippetts algorithm (Tippetts 1992), but also generate some new Julia and Mandelbrot sets by slightly modifying the Tippetts algorithm. This approach yields a new class of algorithms to produce new and alluring fractals with virtually infinite complexity. Keywords: Mandelbrot set, Julia set, recursion formula, algorithm 1. Introduction The study of complex iterated polynomials has been a very active field of research activity during the last two decades. The study of Julia sets and Mandelbrot sets derived from polynomials is an area of abiding interest in the field of fractal geometry (Peitgen et al 2006). The well-known algorithm for generating Mandelbrot set from the recursion formula; Z Z 2 + C (where Z = x + iy and C = a + ib), requires the following steps (Peitgen et al 2006): [1] x new = x 2 y 2 + a [2] y new = 2xy + b [3] x = x new [4] y = y new [5] return to step (1). For Mandelbrot set, a point (a, b) belongs to the set if, after repeated iteration, x and y remain finite (x and y being initially zero). In 1992, John R. Tippetts gave a simple algorithm for generating an interesting Mandelbrot set by slightly modifying the above algorithm. He replaced y new and x new by y and x respectively (Tippetts 1992) and got the following algorithm: [1] x = x 2 y 2 + a [2] y = 2xy + b [3] return to step (1). Then, simply by putting value of x from step (1) to step (2), Tippetts got an explicit equation for the new y-value: y new = 2x 2 y 2y 3 + 2ay + b, which produces a new class of fractals having virtually infinite complexity. In this paper we generate a new Julia set using the Tippetts algorithm (Tippetts 1992). We also generate some new Mandelbrot and Julia sets by slightly modifying Tippetts algorithm. Like the Tippetts algorithm, 1

the modified algorithm is also very interesting. 2. Main Results The main steps required to display the Julia sets for the recursion Z Z 2 + C (where Z = x + iy and C = a + ib), consists the following statements (Peitgen et al 2006): (1) x new = x 2 y 2 + a (2) y new = 2xy + b (3) x = x new (4) y = y new (5) return to step (1). For fixed C, a point x, y belongs to the set if, after repeated iteration, steps (1) and (2) remain finite. Following Tippetts (Tippetts 1992) we can replace ynew by simply y. Further, if we also replace xnew by x so that the steps (3) and (4) can be discarded. Now only three statements remain: (1) x = x 2 y 2 + a (2) y = 2xy + b (3) return to step (1). Now, simply by putting value of x from step (1) to step (2), we get an explicit equation for the new y-value which is same as (Tippetts 1992): y new = 2x 2 y 2y 3 + 2ay + b. The algorithm formed by the above statements is equivalent to the following: (1) x new = x 2 y 2 + a (2) y new = 2x 2 y 2y 3 + 2ay + b (3) x = x new (4) y = y new (5) return to step (1). The corresponding Julia set for the above algorithm, contains fractal boundary. Julia set of the above algorithm for C= -1.0+0i, is the boundary between the inner capture zone and the outer regions of fast escape is shown in Figure1. The Julia set and its zoomed-in view for C=-0.73+0.40i are shown in Figures 2 and 3. In the next section, we generate some new fractals containing both Julia set and Mandelbrot set, by slightly modifying the algorithm: (1) x = x 2 y 2 + a (2) y = 2xy + b (3) return to step (1). In the above algorithm by putting value of y from step (2) to step (1), we get an explicit equation for the 2

new x-value: x new = x 2 4 x 2 y 2 + 4bxy - b 2 + a. The newly formed algorithm is equivalent to the following statements: (1) x new = x 2 4 x 2 y 2 + 4bxy - b 2 + a (2) y new = 2xy + b (3) x = x new (4) y = y new (5) return to step (1). For Mandelbrot set, a point (a, b) belongs to the set if, after repeated iteration, x and y remain finite (x and y being initially zero) (Tippetts 1992). The corresponding Mandelbrot set for the quartic function x new along with y new is shown in Figure 4 and represents the boundary between the inner capture zone (black) and the outer regions of fast escape (yellow). Other zoomed-in views for Mandelbrot set [M-Set] are shown in Figures 6 and 7. Again, Julia set for fixed C= -0.1+0i, a point (x, y) belongs to the set if, after repeated iteration, steps 1 and 2 remain finite. The corresponding Julia set for the quartic function x new along with y new is shown in Figure 7 and represents the boundary between the inner capture zone and the outer regions of fast escape. Some other Julia sets for different C-values are shown in Figures 8 and 9. 3. Conclusion: Many interesting fractals can be generated from the modified algorithm for the recursion formula Z Z 2 + C. This approach opens up scope for obtaining new algorithms with more complex iterated functions having fascinating fractal boundaries. 4. Generation of Julia Sets using Tippetts algorithm: 3

Figure1 Julia set for C = (-1.0, 0) Figure 2 Julia set for C = (-0.73+0.40i) 4

Figure 3 Zoomed in-view for C = (-0.73+0.40i) 5. Generation of Mandelbrot Sets using modified algorithm: 5

Figure 4 Mandelbrot set for x-new Figure 5 Zoomed in view for M. Set. 6

Figure 6 Zoomed in view for M. Set. 6. Generation of Julia Sets using modified algorithm: Figure 7 Julia set for, (C=-0.1+0 i) 7

Figure 8 Julia set for, C=(0.66-0.12 i) Figure 9 Julia set for, (C=-0.73 +0.40 i) 8

References [1] Tippetts, John R. (1992), A Simple Algorithm Giving an Interesting Mandelbrot Set, The visual computer 8, Springer-Verlag, 200-201. [2] Mandelbrot B. B. (1980), Fractal Aspects of the Iteration of z z (1 - z) for Complex and z, Ann of NY Acad Sci 357, 249-259. [3] Peitgen H.O., Jurgens H. & Saupe D. (2006), Chaos and Fractals, New Frontier of Science, (2 nd edition), MR2031217. 9

This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE s homepage: http:// The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. Prospective authors of IISTE journals can find the submission instruction on the following page: http:///journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library, NewJour, Google Scholar