期刊文献+

基于低频周期参数扰动统一混沌系统的分岔分析 被引量:1

Bifurcation analysis of unified chaotic system with low frequency periodic parametric perturbation
下载PDF
导出
摘要 以低频周期参数扰动下的统一混沌系统为研究对象,应用动力学基础知识,讨论了系统的平衡点的分布及其稳定性,得到了周期扰动系统的静态分岔和Hopf分岔的条件。根据Melnikov方法,计算得到了系统的同宿轨道以及系统发生同宿轨道分岔的条件。为了验证理论研究结果的正确性,采用数值模拟的方法进行了验证,结果表明理论研究结果正确。研究结果可以看做是对周期激励的Lorenz类系统和Chen类系统的总结,可以有助于混沌系统在计算机应用领域的推广和应用。 This paper selected the unified chaotic system with a periodic parametric perturbation as the study subject, and discussed the equilibrium distribution and their stabilities, and obtained the condition of the fold bifurcation and Hopf bifurcation by dynamical knowledge. This paper calculated the homoclinic orbits of the system, and gave the bifurcation condition of homoclinic orbits based on Melnikov method. Numerical simulations are done to demonstrate that the analytical result is appropriate. The study result can be considered as a summary of periodic parametric perturbated Lorenz family systems and Chen family systems, and benefit the further application in computer science.
作者 刘鹏 刘习军
出处 《计算机应用研究》 CSCD 北大核心 2017年第11期3281-3284,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(51479136) 天津市自然科学基金资助项目(13JCZDJC27100)
关键词 周期参数扰动 分岔分析 统一混沌系统 MELNIKOV方法 快慢分析法 periodic parametric perturbation bifurcation analysis unified chaotic system Melnikov method slow-fast analysis
  • 相关文献

参考文献3

二级参考文献20

  • 1Cheng Howard,Li Xiaobo.Partial encryption of compressed images and videos[J].IEEE Transcations on Signal Processing,2000,48(8): 2439-2551.
  • 2Dang P P, Chan P M.Image encrption for secure Internet multimedia applications[J].IEEE Transcations on Consumer Electronics, 2000,46(3 ) : 395-403.
  • 3Scnarmger J.Fast encryption of image data using chaotic:Kolomogorov flows[C].Proceedings of the Symposium on Electronic Imaging:Science and Technology_Storage and Retrieval for Image and Video Dtabase V,San Jose,California,1997,3022:278-289.
  • 4Yang T,Yang L B,Yang C M.Application of neural networks to unmasking chaotic secure communication[J].Phys D, 1998 : 124: 248.
  • 5Lv Jin-hu,Chen Guan-rong,Zhang Suo-chun.The compound structure of a new chaotic attractor[J].Chaos,Solitons and Fractals,2002, 14(5) :669-672.
  • 6ZHANG Jun-jie, PERDISCI R, LEE W, et al. Detecting stealthy P2P botnets using statistical traffic fingerprints [ C ]//Proc of the 41st Annual IEEE/IFIP International Conference on Dependable Systems and Networks. Piscataway :IEEE Press,2011 : 121 - 132.
  • 7SAAD S, TRAORE I, GHORBANI A, et al. Detecting P2P botnets through network behavior analysis and machine learning[ C ]//Proc of the 9th Annual International Conference on Privacy, Security and Trust. Piscataway : IEEE Press,2011 : 174-180.
  • 8KANG Jian,ZHANG Jun-yao,LI Qiang,et al. Detecting new P2P botnet with multi-chart CUSUM [ C ]//Proc of International Conference on Networks Security, Wireless Communications and Trusted Computing. Washington DC : IEEE Computer Society,2009:688-691.
  • 9GU Guo-fei, PERDISCI R, ZHANG Jun-jie, et al. BotMiner: clustering analysis of network traffic for protocol-and sturcture-independent hotnet detection[ C]//Proc of the 17th USENIX Security Symposium. Berkeley : USENIX Association ,2008 : 139-154.
  • 10MASUD M M, GAO Jing, KHAN L, et al. A multi-partition multichunk ensemble technique to classify concept-drifting data streams [ C]//Proc of the 13th Pacific-Asia Conference on Knowledge Diseovery and Data Mining. Berlin : Springer-Verlag,2009 : 363- 375.

共引文献17

同被引文献5

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部