期刊文献+
共找到11,386篇文章
< 1 2 250 >
每页显示 20 50 100
逆极限空间上诱导映射的Li-Yorke τ-混沌 被引量:3
1
作者 顾荣宝 《安徽大学学报(自然科学版)》 CAS 1997年第2期1-6,共6页
本文否定地回答了文献〔1〕中的问题。
关键词 逆极限空间 诱导映射 li-yorke 浑沌 度量空间
下载PDF
广义符号动力系统上的Li-Yorke混沌集 被引量:2
2
作者 李文波 刘磊 《商丘师范学院学报》 CAS 2008年第6期38-40,共3页
构造了一组广义符号动力系统中的Li-Yorke混沌集,从混沌集的角度描述了广义符号动力系统的动力性状,同时讨论了有限符号动力系统和广义符号动力系统中混沌集的关系.
关键词 广义符号动力系统 广义转移自映射 li-yorke混沌集 集合序列
下载PDF
拓扑传递系统中的Li-Yorke混沌集 被引量:2
3
作者 关鹏 赵衍美 《西南民族大学学报(自然科学版)》 CAS 2010年第5期709-713,共5页
研究了拓扑传递系统的一些性质,讨论了拓扑传递系统(X,f)和自映射f:X→X具有拓扑传递性的关系,进而给出拓扑传递系统中Li-Yorke混沌集可全由非游荡点组成的一个充分条件,进一步补充了Li-York定理.
关键词 拓扑传递系统 拓扑传递性 li-yorke混沌集 非游荡点
下载PDF
半群作用Li-Yorke对的存在性 被引量:1
4
作者 苏郇立 《纯粹数学与应用数学》 CSCD 2010年第4期608-614,共7页
设X为紧度量空间,T为半群,本文研究了动力系统(X,T)上Li-Yorke对的存在性问题,证明了当(X,T)拓扑可迁且包含周期点时,在(X,T)上存在无限scrambled集.另外,列举了一些不包含Li-Yorke对的动力系统.
关键词 li-yorke 邻近 渐近 scrambled集
下载PDF
Li-Yorke混沌映射下周期点集的性质 被引量:8
5
作者 赵勇 《四川师范学院学报(自然科学版)》 1999年第1期25-30,共6页
研究了线段[0,1]上LiYorke混沌映射下周期点集的性质,所得结果表明了LiYorke混沌映射周期点集不为闭集。
关键词 li-yorke混沌 周期点集 浑沌映射 动力系统
下载PDF
变参数离散Li-Yorke混沌系统及其渐近周期点的存在
6
作者 朱熙 花秀娟 《吉首大学学报(自然科学版)》 CAS 2009年第1期23-26,共4页
运用分析的方法,得到了变参数离散广义Devaney混沌系统在Li-Yorke意义下也是混沌的,且构造出了一些新的变参数离散混沌系统.进一步探讨了渐近周期点在该系统下的存在性,扩展了离散混沌系统的研究范围.
关键词 变参数 li-yorke混沌 DEVANEY混沌 渐近周期点
下载PDF
双重逆极限空间上移位映射的Li-Yorke τ混沌
7
作者 罗飞 《周口师范学院学报》 CAS 2015年第5期17-19,共3页
主要研究了非空紧致度量空间上连续映射f:X→X,g:X→X的双重逆极限空间上移位映射σfσg:←lim(X,fg)←←lim(X,fg)的一些性质;如果f,g为满射,则移位映射σfσg是Li-Yorkeτ意义下混沌当且仅当fg是Li-Yorkeτ意义下混沌.
关键词 双重逆极限 移位映射 li-yorkeτ意义下混沌
下载PDF
关于Li-Yorke敏感的几点注记
8
作者 曾眺英 《嘉应学院学报》 2015年第11期15-17,共3页
探讨了拓扑动力系统在对轨道时间集和历经集附加某些限定条件下的Li-Yorke敏感性问题,给出了有关此类敏感性的几个基本性质.
关键词 系统(x f) li-yorke敏感 Furstenberg族
下载PDF
广义符号动力系统中的Li-Yorke混沌集和ω-混沌集 被引量:1
9
作者 刘龙生 康云莲 赵俊玲 《广西师范大学学报(自然科学版)》 CAS 北大核心 2014年第2期75-81,共7页
本文在广义符号动力系统Σ(Z^+)中构造一个传递的、不变的、不可数的Li-Yorke混沌集,且这个混沌集D(?)Σ(Z^+)\(?)Σ(N),还构造了一个不可数的ω-混沌集,且这个混沌集S'(?)Σ(Z^+)\(?)Σ(N)。说明了广义符号动力系统的混沌性状不是... 本文在广义符号动力系统Σ(Z^+)中构造一个传递的、不变的、不可数的Li-Yorke混沌集,且这个混沌集D(?)Σ(Z^+)\(?)Σ(N),还构造了一个不可数的ω-混沌集,且这个混沌集S'(?)Σ(Z^+)\(?)Σ(N)。说明了广义符号动力系统的混沌性状不是集中在有限个符号的动力系统中,在有限个符号动系统(?)Σ(N)的外部仍然具有较强的混沌性状。 展开更多
关键词 li-yorke混沌集 ω-混沌集 不变集 传递点
下载PDF
时空混沌与Li-Yorke敏感 被引量:3
10
作者 刘延涛 刘恒 《大连民族学院学报》 CAS 2008年第5期435-436,共2页
运用构造的方法,在区间映射中找到了一个简洁明了的时空混沌而不是Li-Yorke敏感的例子,从而证明了在区间上时空混沌不蕴涵Li-Yorke敏感。
关键词 区间映射 敏感性 时空混沌 li-yorke敏感
下载PDF
关于Li-Yorke δ-混沌与按序列分布δ-混沌的等价性 被引量:1
11
作者 李健 谭枫 《华南师范大学学报(自然科学版)》 CAS 北大核心 2010年第3期34-38,共5页
关注Li-Yorke混沌和按序列分布混沌的关系,指出全体按序列Q分布δ-攀援偶对构成的集合为乘积空间中的一个Gδ集.证明了:(1)Li-Yorke δ-混沌等价于按序列分布δ-混沌;(2)一致混乱集是按某序列分布攀援集;(3)一类传递系统蕴含了按序列分... 关注Li-Yorke混沌和按序列分布混沌的关系,指出全体按序列Q分布δ-攀援偶对构成的集合为乘积空间中的一个Gδ集.证明了:(1)Li-Yorke δ-混沌等价于按序列分布δ-混沌;(2)一致混乱集是按某序列分布攀援集;(3)一类传递系统蕴含了按序列分布混沌. 展开更多
关键词 li-yorke混沌 按序列分布混沌 传递系统
下载PDF
Feldman-Katok度量下Li-Yorke混沌和Proximal对
12
作者 高昆梅 张瑞丰 《大学数学》 2023年第3期9-13,共5页
通过Feldman-Katok引入了FK Li-Yorke混沌和FK Proximal对,并且研究它们之间的关系.证明如果一个拓扑动力系统是FK敏感的,并且含有一个由传递点和周期点组成的FK Proximal对,则它是FK Li-Yorke混沌的.
关键词 Feldman-Katok度量 FK li-yorke混沌 FK Proximal对
下载PDF
单峰映射中Devaney混沌,Li-Yorke混沌,pp(f)之间的关系
13
作者 张会萍 《山西师大学报(自然科学版)》 1998年第2期23-25,共3页
本文给出了单峰映射中各种混沌之间的关系。
关键词 单峰映射 湍流 混沌 DEVANEY混沌 li-yorke混沌
下载PDF
Chaotic CS Encryption:An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing
14
作者 Mingliang Sun Jie Yuan +1 位作者 Xiaoyong Li Dongxiao Liu 《Computers, Materials & Continua》 SCIE EI 2024年第5期2625-2646,共22页
Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgori... Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiencyof image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSEcan fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks,such as differential attacks, and exhibit robustness. First, we use a sparse trans-form to sparse the plaintext imageand then use theArnold transformto perturb the image pixels. After that,we elaborate aChebyshev Toeplitz chaoticsensing matrix for CCSE. By using this Toeplitz matrix, the perturbed image is compressed and sampled to reducethe transmission bandwidth and the amount of data. Finally, a bilateral diffusion operator and a chaotic encryptionoperator are used to perturb and expand the image pixels to change the pixel position and value of the compressedimage, and ultimately obtain an encrypted image. Experimental results show that our method can be resistant tovarious attacks, such as the statistical attack and noise attack, and can outperform its current competitors. 展开更多
关键词 Image encryption chaotic system compressive sensing arnold transform
下载PDF
Double quantum images encryption scheme based on chaotic system
15
作者 蒋社想 李杨 +1 位作者 石锦 张茹 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期305-320,共16页
This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaoti... This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities. 展开更多
关键词 double quantum images encryption chaotic system pixel scrambling XOR operation
下载PDF
Sliding-mode-based preassigned-time control of a class of memristor chaotic systems
16
作者 Jinrong Fan Qiang Lai +1 位作者 Qiming Wang Leimin Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第11期161-166,共6页
This paper addresses the preassigned-time chaos control problem of memristor chaotic systems with time delays.Since the introduction of memristor,the presented models are nonlinear systems with chaotic dynamics.First,... This paper addresses the preassigned-time chaos control problem of memristor chaotic systems with time delays.Since the introduction of memristor,the presented models are nonlinear systems with chaotic dynamics.First,the TS fuzzy method is adopted to describe the chaotic systems.Then,a sliding-model-based control approach is proposed to achieve the preassigned-time stabilization of the presented models,where the upper bound of stabilization time can be arbitrarily specified in advance.Finally,simulation results demonstrate the validity of presented control approach and theoretic results. 展开更多
关键词 memristor chaotic system TS fuzzy method preassigned-time stabilization sliding-mode control
下载PDF
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
17
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
CNN-LSTM based incremental attention mechanism enabled phase-space reconstruction for chaotic time series prediction
18
作者 Xiao-Qian Lu Jun Tian +2 位作者 Qiang Liao Zheng-Wu Xu Lu Gan 《Journal of Electronic Science and Technology》 EI CAS CSCD 2024年第2期77-90,共14页
To improve the prediction accuracy of chaotic time series and reconstruct a more reasonable phase space structure of the prediction network,we propose a convolutional neural network-long short-term memory(CNN-LSTM)pre... To improve the prediction accuracy of chaotic time series and reconstruct a more reasonable phase space structure of the prediction network,we propose a convolutional neural network-long short-term memory(CNN-LSTM)prediction model based on the incremental attention mechanism.Firstly,a traversal search is conducted through the traversal layer for finite parameters in the phase space.Then,an incremental attention layer is utilized for parameter judgment based on the dimension weight criteria(DWC).The phase space parameters that best meet DWC are selected and fed into the input layer.Finally,the constructed CNN-LSTM network extracts spatio-temporal features and provides the final prediction results.The model is verified using Logistic,Lorenz,and sunspot chaotic time series,and the performance is compared from the two dimensions of prediction accuracy and network phase space structure.Additionally,the CNN-LSTM network based on incremental attention is compared with long short-term memory(LSTM),convolutional neural network(CNN),recurrent neural network(RNN),and support vector regression(SVR)for prediction accuracy.The experiment results indicate that the proposed composite network model possesses enhanced capability in extracting temporal features and achieves higher prediction accuracy.Also,the algorithm to estimate the phase space parameter is compared with the traditional CAO,false nearest neighbor,and C-C,three typical methods for determining the chaotic phase space parameters.The experiments reveal that the phase space parameter estimation algorithm based on the incremental attention mechanism is superior in prediction accuracy compared with the traditional phase space reconstruction method in five networks,including CNN-LSTM,LSTM,CNN,RNN,and SVR. 展开更多
关键词 chaotic time series Incremental attention mechanism Phase-space reconstruction
下载PDF
Theoretical and experimental investigation of the resonance responses and chaotic dynamics of a bistable laminated composite shell in the dynamic snap-through mode
19
作者 Meiqi WU Pengyu LV +3 位作者 Hongyuan LI Jiale YAN Huiling DUAN Wei ZHANG 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2024年第4期581-602,共22页
The dynamic model of a bistable laminated composite shell simply supported by four corners is further developed to investigate the resonance responses and chaotic behaviors.The existence of the 1:1 resonance relations... The dynamic model of a bistable laminated composite shell simply supported by four corners is further developed to investigate the resonance responses and chaotic behaviors.The existence of the 1:1 resonance relationship between two order vibration modes of the system is verified.The resonance response of this class of bistable structures in the dynamic snap-through mode is investigated,and the four-dimensional(4D)nonlinear modulation equations are derived based on the 1:1 internal resonance relationship by means of the multiple scales method.The Hopf bifurcation and instability interval of the amplitude frequency and force amplitude curves are analyzed.The discussion focuses on investigating the effects of key parameters,e.g.,excitation amplitude,damping coefficient,and detuning parameters,on the resonance responses.The numerical simulations show that the foundation excitation and the degree of coupling between the vibration modes exert a substantial effect on the chaotic dynamics of the system.Furthermore,the significant motions under particular excitation conditions are visualized by bifurcation diagrams,time histories,phase portraits,three-dimensional(3D)phase portraits,and Poincare maps.Finally,the vibration experiment is carried out to study the amplitude frequency responses and bifurcation characteristics for the bistable laminated composite shell,yielding results that are qualitatively consistent with the theoretical results. 展开更多
关键词 bistable laminated composite shell dynamic snap-through mode Hopf bifurcation chaotic dynamics vibration experiment
下载PDF
A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm
20
作者 苏静明 方士辉 +1 位作者 洪炎 温言 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期233-243,共11页
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con... A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc. 展开更多
关键词 color image encryption discrete cosine transform two-dimensional(2D)coupled chaotic system diagonal scrambling
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部