Heart monitoring improves life quality.Electrocardiograms(ECGs or EKGs)detect heart irregularities.Machine learning algorithms can create a few ECG diagnosis processing methods.The first method uses raw ECG and time-s...Heart monitoring improves life quality.Electrocardiograms(ECGs or EKGs)detect heart irregularities.Machine learning algorithms can create a few ECG diagnosis processing methods.The first method uses raw ECG and time-series data.The second method classifies the ECG by patient experience.The third technique translates ECG impulses into Q waves,R waves and S waves(QRS)features using richer information.Because ECG signals vary naturally between humans and activities,we will combine the three feature selection methods to improve classification accuracy and diagnosis.Classifications using all three approaches have not been examined till now.Several researchers found that Machine Learning(ML)techniques can improve ECG classification.This study will compare popular machine learning techniques to evaluate ECG features.Four algorithms—Support Vector Machine(SVM),Decision Tree,Naive Bayes,and Neural Network—compare categorization results.SVM plus prior knowledge has the highest accuracy(99%)of the four ML methods.QRS characteristics failed to identify signals without chaos theory.With 99.8%classification accuracy,the Decision Tree technique outperformed all previous experiments.展开更多
The deficiencies of basic particle swarm optimization (bPSO) are its ubiquitous prematurity and its inability to seek the global optimal solution when optimizing complex high-dimensional functions. To overcome such ...The deficiencies of basic particle swarm optimization (bPSO) are its ubiquitous prematurity and its inability to seek the global optimal solution when optimizing complex high-dimensional functions. To overcome such deficiencies, the chaos-PSO (COSPSO) algorithm was established by introducing the chaos optimization mechanism and a global particle stagnation-disturbance strategy into bPSO. In the improved algorithm, chaotic movement was adopted for the particles' initial movement trajectories to replace the former stochastic movement, and the chaos factor was used to guide the particles' path. When the global particles were stagnant, the disturbance strategy was used to keep the particles in motion. Five benchmark optimizations were introduced to test COSPSO, and they proved that COSPSO can remarkably improve efficiency in optimizing complex functions. Finally, a case study of COSPSO in calculating design flood hydrographs demonstrated the applicability of the improved algorithm.展开更多
Based on the evolution of geological dynamics and spatial chaos theory, we proposed the advanced prediction an advanced prediction method of a gas desorption index of drill cuttings to predict coal and gas outbursts. ...Based on the evolution of geological dynamics and spatial chaos theory, we proposed the advanced prediction an advanced prediction method of a gas desorption index of drill cuttings to predict coal and gas outbursts. We investigated and verified the prediction method by a spatial series data of a gas desorption index of drill cuttings obtained from the 113112 coal roadway at the Shitai Mine. Our experimental results show that the spatial distribution of the gas desorption index of drill cuttings has some chaotic charac- teristics, which implies that the risk of coal and gas outbursts can be predicted by spatial chaos theory. We also found that a proper amount of sample data needs to be chosen in order to ensure the accuracy and practical maneuverability of prediction. The relative prediction error is small when the prediction pace is chosen carefully. In our experiments, it turned out that the optimum number of sample points is 80 and the optimum prediction pace 30. The corresponding advanced prediction pace basically meets the requirements of engineering applications.展开更多
In this paper, controlling chaos when chaotic ferroresonant oscillations occur in a voltage transformer with nonlin- ear core loss model is performed. The effect of a parallel metal oxide surge arrester on the ferrore...In this paper, controlling chaos when chaotic ferroresonant oscillations occur in a voltage transformer with nonlin- ear core loss model is performed. The effect of a parallel metal oxide surge arrester on the ferroresonance oscillations of voltage transformers is studied. The metal oxide arrester (MOA) is found to be effective in reducing ferroresonance chaotic oscillations. Also the multiple scales method is used to analyze the chaotic behavior and different types of fixed points in ferroresonance of voltage transformers considering core loss. This phenomenon has nonlinear chaotic dynamics and includes sub-harmonic, quasi-periodic, and also chaotic oscillations. In this paper, the chaotic behavior and various ferroresonant oscillation modes of the voltage transformer is studied. This phenomenon consists of different types of bifur- cations such as period doubling bifurcation (PDB), saddle node bifurcation (SNB), Hopf bifurcation (HB), and chaos. The dynamic analysis of ferroresonant circuit is based on bifurcation theory. The bifurcation and phase plane diagrams are il- lustrated using a continuous method and linear and nonlinear models of core loss. To analyze ferroresonance phenomenon, the Lyapunov exponents are calculated via the multiple scales method to obtain Feigenbaum numbers. The bifurcation diagrams illustrate the variation of the control parameter. Therefore, the chaos is created and increased in the system.展开更多
Chaos is a similar and random process which is very sensitive to initial value in deterministic system. It is a performance of nonlinear dynamical system with built-in randomness. Combined with the advantages and disa...Chaos is a similar and random process which is very sensitive to initial value in deterministic system. It is a performance of nonlinear dynamical system with built-in randomness. Combined with the advantages and disadvantages of the present chaos encryption model, the paper proposes a chaotic stream cipher model based on chaos theory, which not only overcomes finite precision effect, but also improves the randomness of chaotic system and output sequence. The Sequence cycle theory generated by the algorithm can reach more than 10600 at least, which completely satisfies the actual application requirements of stream cipher system.展开更多
Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For examp...Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.展开更多
The security of digital images transmitted via the Internet or other public media is of the utmost importance.Image encryption is a method of keeping an image secure while it travels across a non-secure communication ...The security of digital images transmitted via the Internet or other public media is of the utmost importance.Image encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized entities.This study provides an approach to color image encryption that could find practical use in various contexts.The proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and compression-friendly.The unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s performance.Following a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.展开更多
As for the drop of particle diversity and the slow convergent speed of particle in the late evolution period when particle swarm optimization(PSO) is applied to solve high-dimensional multi-modal functions,a hybrid ...As for the drop of particle diversity and the slow convergent speed of particle in the late evolution period when particle swarm optimization(PSO) is applied to solve high-dimensional multi-modal functions,a hybrid optimization algorithm based on the cat mapping,the cloud model and PSO is proposed.While the PSO algorithm evolves a certain of generations,this algorithm applies the cat mapping to implement global disturbance of the poorer individuals,and employs the cloud model to execute local search of the better individuals;accordingly,the obtained best individuals form a new swarm.For this new swarm,the evolution operation is maintained with the PSO algorithm,using the parameter of pop distr to balance the global and local search capacity of the algorithm,as well as,adopting the parameter of mix gen to control mixing times of the algorithm.The comparative analysis is carried out on the basis of 4 functions and other algorithms.It indicates that this algorithm shows faster convergent speed and better solving precision for solving functions particularly those high-dimensional multi-modal functions.Finally,the suggested values are proposed for parameters pop distr and mix gen applied to different dimension functions via the comparative analysis of parameters.展开更多
In order to prevent standard genetic algorithm (SGA) from being premature, chaos is introduced into GA, thus forming chaotic anneal genetic algorithm (CAGA). Chaos ergodicity is used to initialize the population, and ...In order to prevent standard genetic algorithm (SGA) from being premature, chaos is introduced into GA, thus forming chaotic anneal genetic algorithm (CAGA). Chaos ergodicity is used to initialize the population, and chaotic anneal mutation operator is used as the substitute for the mutation operator in SGA. CAGA is a unified framework of the existing chaotic mutation methods. To validate the proposed algorithm, three algorithms, i. e. Baum-Welch, SGA and CAGA, are compared on training hidden Markov model (HMM) to recognize the hand gestures. Experiments on twenty-six alphabetical gestures show the CAGA validity.展开更多
To achieve the goal of image content authentication and copyright protection simultaneously, this paper presents a novel image dual watermarking method based on chaotic map. Firstly, the host image was split into many...To achieve the goal of image content authentication and copyright protection simultaneously, this paper presents a novel image dual watermarking method based on chaotic map. Firstly, the host image was split into many nonoverlapping small blocks, and the block-wise discrete cosine transform (DCT) is computed. Secondly, the robust watermarks, shuffled by the chaotic sequences, are embedded in the DC coefficients of blocks to achieve the goal of copyright protection. The semi-fragile watermarks, generated by chaotic map, are embedded in the AC coefficients of blocks to obtain the aim of image authentication. Both of them can be extracted without the original image. Simulation results demonstrate the effectiveness of our algorithm in terms of robustness and fragility.展开更多
In this paper, we discuss feedback control of a class of delay chaotic maps. Our aim is to drive the chaotic maps to its initially unstable fixed points by using linear and nonlinear state feedback control. The contro...In this paper, we discuss feedback control of a class of delay chaotic maps. Our aim is to drive the chaotic maps to its initially unstable fixed points by using linear and nonlinear state feedback control. The control is achieved by using small, bounded perturbations. Some numerical simulations are given to demonstrate the effectiveness of the proposed control method.展开更多
In tracking test, discharge is a complicated process and comparative tracking index (CTI) has wide varia-tion. To evaluate tracking resistance, the chaos analysis of discharge current is presented based on the trackin...In tracking test, discharge is a complicated process and comparative tracking index (CTI) has wide varia-tion. To evaluate tracking resistance, the chaos analysis of discharge current is presented based on the tracking test of phenolic resin in accordance with IEC60112. According to the characteristics of statistical self-similarity and complexity of discharge current, the largest Lyapunov exponent is calculated, and the 2-dimensional attractor of discharge current is reconstructed. Moreover, the attractors of discharge current and recurrence plots of different discharge states are reconstructed. The results indicate that the chaos attractors have different characteristics in evo-lutionary tracks, the topological structure and grain direction of recurrence plots show significant differences. The chaos attractor can describe the tracking process, the recurrence plot can identify the tracking state clearly, while its arithmetic is simple.展开更多
By using a series of canonical transformations (Birkhoff's series), an approximate integral of a conservative compound pendulum is evaluated. Level lines of this approximate integral are compared with the numerica...By using a series of canonical transformations (Birkhoff's series), an approximate integral of a conservative compound pendulum is evaluated. Level lines of this approximate integral are compared with the numerical simulation results. It is seen clearly that with a raised energy level, the nearly integrable system becomes non-integrable, i.e. the regular motion pattern changes to the chaotic one. Experiments with such a pendulum device display the behavior mentioned above.展开更多
It was shown in Wu's works that the combination of the relative researches of pansystems methodology and the researches on bifurcation, catastrophe, chaos and stability in nonlinear mechanics was put forward and t...It was shown in Wu's works that the combination of the relative researches of pansystems methodology and the researches on bifurcation, catastrophe, chaos and stability in nonlinear mechanics was put forward and the concepts were redefined from the point of view of pansystems methodology. In this paper, the logic conservation law of these nonlinear mechanics phenomena was studied under the framework of pansystems methodology.展开更多
This paper discusses the dynamic behavior of the Kelvin-Stuart cat's eye flow under periodic perturbations. By means of the Melnikov method the conditions to have bifurcations to subharmonics of even order for the...This paper discusses the dynamic behavior of the Kelvin-Stuart cat's eye flow under periodic perturbations. By means of the Melnikov method the conditions to have bifurcations to subharmonics of even order for the oscillating orbits and to have bifurcations to subharmonics of any order for the rotating orbits are given, and further, the coexistence phenomena of the chaotic motions and periodic solutions are presented.展开更多
In this study, possible low dimensional chaotic behavior of Sakarya river flow rates is investigated via nonlinear time series techniques. To reveal the chaotic dynamics, the maximal positive Lyapunov exponent is calc...In this study, possible low dimensional chaotic behavior of Sakarya river flow rates is investigated via nonlinear time series techniques. To reveal the chaotic dynamics, the maximal positive Lyapunov exponent is calculated from the reconstructed phase space, which is obtained using the phase space reconstruction method. The method reconstructs a phase space from the scalar time series, which depicts the real system’s invariants Positive values, because the Lyapunov exponent values calculated using the appropriate software program indicate possibility of chaotic behavior. Analyzed data involve the monthly average flow rates of eleven main branches of Sakarya River through the years 1960-2000.展开更多
This study aimed to reconsider some concepts of the psychoanalytic theory on group mind. Group psychology is concerned with the individual man as a member of a race, nation, caste, profession, or an institution, or as...This study aimed to reconsider some concepts of the psychoanalytic theory on group mind. Group psychology is concerned with the individual man as a member of a race, nation, caste, profession, or an institution, or as a component of a crowd of people that has been organized into a group at some particular time, for some specific purpose. Group psychology embraces an immense number of separate issues and offers investigators with countless problems, which have hitherto not even been properly distinguished from one another. Reflections presented in this paper were particularly inspired by Freud’s work on Group psychology and analysis of the ego and approaches to the chaos theory, especially, the fact that groups emerge as systems that exhibit unstable, aperiodic and highly complex behavior, with a tendency to self-organization.展开更多
The generation method of the key stream and the structure of the algorithm determine the security of the cryptosystem.The classical chaotic map has simple dynamic behavior and few control parameters,so it is not suita...The generation method of the key stream and the structure of the algorithm determine the security of the cryptosystem.The classical chaotic map has simple dynamic behavior and few control parameters,so it is not suitable for modern cryptography.In this paper,we design a new 2D hyperchaotic system called 2D simple structure and complex dynamic behavior map(2D-SSCDB).The 2D-SSCDB has a simple structure but has complex dynamic behavior.The Lyapunov exponent verifies that the 2D-SSCDB has hyperchaotic behavior,and the parameter space in the hyperchaotic state is extensive and continuous.Trajectory analysis and some randomness tests verify that the 2D-SSCDB can generate random sequences with good performance.Next,to verify the excellent performance of the 2D-SSCDB,we use the 2D-SSCDB to generate a keystream for color image encryption.In the encryption algorithm,the encryption algorithm scrambles and diffuses simultaneously,increasing the cryptographic system’s security.The horizontal correlation,vertical correlation,and diagonal correlation of ciphertext are−0.0004,−0.0004 and 0.0007,respectively.The average information entropy of the ciphertext is 7.9993.In addition,the designed encryption algorithm reduces the correlation between the three channels of the color image.Security analysis shows that the color image encryption algorithm designed using 2DSSCDB has good security,can resist standard attack methods,and has high efficiency.展开更多
With the rapid development of 5G technology,it has become fast and easy for people to transmit information on the Internet.Digital images can express information more intuitively,so transmitting information through im...With the rapid development of 5G technology,it has become fast and easy for people to transmit information on the Internet.Digital images can express information more intuitively,so transmitting information through images has excellent applications.This paper uses a new chaotic system called 1D-Sin-Logistic-Map(1D-SLM).1D-SLM has two control parameters,which can provide larger parameter space,and the parameter space in the chaotic state is continuous.Through Lyapunov exponent analysis(LE),bifurcation diagrams analysis,spectral entropy analysis(SE),and 0-1 test,it is verified that 1D-SLM has complex dynamic behavior and is very suitable for cryptography.Compared with other 1D chaotic systems,the 1D-SLM has a larger Lyapunov exponent(LE)and spectral entropy(SE).For color image encryption algorithms,only relying on chaotic mapping is not enough to ensure security.So combined with 1D-SLM,we design a color image encryption algorithm,which is implemented by plane expansion,which reduces the correlation between the three channels of color images.The experimental results show that the proposed cross-plane color image encryption algorithm is safe and resistant to common attack methods.展开更多
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work through Large Groups(Grant Number RGP.2/246/44),B.B.,and https://www.kku.edu.sa/en.
文摘Heart monitoring improves life quality.Electrocardiograms(ECGs or EKGs)detect heart irregularities.Machine learning algorithms can create a few ECG diagnosis processing methods.The first method uses raw ECG and time-series data.The second method classifies the ECG by patient experience.The third technique translates ECG impulses into Q waves,R waves and S waves(QRS)features using richer information.Because ECG signals vary naturally between humans and activities,we will combine the three feature selection methods to improve classification accuracy and diagnosis.Classifications using all three approaches have not been examined till now.Several researchers found that Machine Learning(ML)techniques can improve ECG classification.This study will compare popular machine learning techniques to evaluate ECG features.Four algorithms—Support Vector Machine(SVM),Decision Tree,Naive Bayes,and Neural Network—compare categorization results.SVM plus prior knowledge has the highest accuracy(99%)of the four ML methods.QRS characteristics failed to identify signals without chaos theory.With 99.8%classification accuracy,the Decision Tree technique outperformed all previous experiments.
基金supported by the National Basic Research Program of China (973 Program) (Grant No.2006CB403402)
文摘The deficiencies of basic particle swarm optimization (bPSO) are its ubiquitous prematurity and its inability to seek the global optimal solution when optimizing complex high-dimensional functions. To overcome such deficiencies, the chaos-PSO (COSPSO) algorithm was established by introducing the chaos optimization mechanism and a global particle stagnation-disturbance strategy into bPSO. In the improved algorithm, chaotic movement was adopted for the particles' initial movement trajectories to replace the former stochastic movement, and the chaos factor was used to guide the particles' path. When the global particles were stagnant, the disturbance strategy was used to keep the particles in motion. Five benchmark optimizations were introduced to test COSPSO, and they proved that COSPSO can remarkably improve efficiency in optimizing complex functions. Finally, a case study of COSPSO in calculating design flood hydrographs demonstrated the applicability of the improved algorithm.
基金Financial support for this work, provided by the National Basic Research Program of China (No.2011CB201204)the National Youth Science Foundation Program (No.50904068)+1 种基金the Heilongjiang Science & Technology Scientific Research Foundation Program for the Eighth Introduction of Talent (No.06-26)the National Engineering Research Center for Coal Gas Control
文摘Based on the evolution of geological dynamics and spatial chaos theory, we proposed the advanced prediction an advanced prediction method of a gas desorption index of drill cuttings to predict coal and gas outbursts. We investigated and verified the prediction method by a spatial series data of a gas desorption index of drill cuttings obtained from the 113112 coal roadway at the Shitai Mine. Our experimental results show that the spatial distribution of the gas desorption index of drill cuttings has some chaotic charac- teristics, which implies that the risk of coal and gas outbursts can be predicted by spatial chaos theory. We also found that a proper amount of sample data needs to be chosen in order to ensure the accuracy and practical maneuverability of prediction. The relative prediction error is small when the prediction pace is chosen carefully. In our experiments, it turned out that the optimum number of sample points is 80 and the optimum prediction pace 30. The corresponding advanced prediction pace basically meets the requirements of engineering applications.
文摘In this paper, controlling chaos when chaotic ferroresonant oscillations occur in a voltage transformer with nonlin- ear core loss model is performed. The effect of a parallel metal oxide surge arrester on the ferroresonance oscillations of voltage transformers is studied. The metal oxide arrester (MOA) is found to be effective in reducing ferroresonance chaotic oscillations. Also the multiple scales method is used to analyze the chaotic behavior and different types of fixed points in ferroresonance of voltage transformers considering core loss. This phenomenon has nonlinear chaotic dynamics and includes sub-harmonic, quasi-periodic, and also chaotic oscillations. In this paper, the chaotic behavior and various ferroresonant oscillation modes of the voltage transformer is studied. This phenomenon consists of different types of bifur- cations such as period doubling bifurcation (PDB), saddle node bifurcation (SNB), Hopf bifurcation (HB), and chaos. The dynamic analysis of ferroresonant circuit is based on bifurcation theory. The bifurcation and phase plane diagrams are il- lustrated using a continuous method and linear and nonlinear models of core loss. To analyze ferroresonance phenomenon, the Lyapunov exponents are calculated via the multiple scales method to obtain Feigenbaum numbers. The bifurcation diagrams illustrate the variation of the control parameter. Therefore, the chaos is created and increased in the system.
文摘Chaos is a similar and random process which is very sensitive to initial value in deterministic system. It is a performance of nonlinear dynamical system with built-in randomness. Combined with the advantages and disadvantages of the present chaos encryption model, the paper proposes a chaotic stream cipher model based on chaos theory, which not only overcomes finite precision effect, but also improves the randomness of chaotic system and output sequence. The Sequence cycle theory generated by the algorithm can reach more than 10600 at least, which completely satisfies the actual application requirements of stream cipher system.
文摘Replacement and substitution encryption are two basic types of encryption historically. The classical encryption algorithm has been compromised now, but they still can play special role for modem cryptnlogy. For example, in digital image encryption system, substitution can disrupt the original order of the images and eliminate the correlation of image information which not only can realize security of images, but also can resist intentional attack and destruction of clipping and noise. And transposition transformation is introduced into the design of block ciphers. The substitution has the feature of high efficiency and resistance, which makes it meet the specific requirements of encryption. So substitution cypher can be applied to modern encryption system.
基金funded by Deanship of Scientific Research at King Khalid University under Grant Number R.G.P.2/86/43.
文摘The security of digital images transmitted via the Internet or other public media is of the utmost importance.Image encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized entities.This study provides an approach to color image encryption that could find practical use in various contexts.The proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and compression-friendly.The unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s performance.Following a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
基金supported by the Specialized Research Fund for the Doctoral Program of Higher Education(20114307120032)the National Natural Science Foundation of China(71201167)
文摘As for the drop of particle diversity and the slow convergent speed of particle in the late evolution period when particle swarm optimization(PSO) is applied to solve high-dimensional multi-modal functions,a hybrid optimization algorithm based on the cat mapping,the cloud model and PSO is proposed.While the PSO algorithm evolves a certain of generations,this algorithm applies the cat mapping to implement global disturbance of the poorer individuals,and employs the cloud model to execute local search of the better individuals;accordingly,the obtained best individuals form a new swarm.For this new swarm,the evolution operation is maintained with the PSO algorithm,using the parameter of pop distr to balance the global and local search capacity of the algorithm,as well as,adopting the parameter of mix gen to control mixing times of the algorithm.The comparative analysis is carried out on the basis of 4 functions and other algorithms.It indicates that this algorithm shows faster convergent speed and better solving precision for solving functions particularly those high-dimensional multi-modal functions.Finally,the suggested values are proposed for parameters pop distr and mix gen applied to different dimension functions via the comparative analysis of parameters.
文摘In order to prevent standard genetic algorithm (SGA) from being premature, chaos is introduced into GA, thus forming chaotic anneal genetic algorithm (CAGA). Chaos ergodicity is used to initialize the population, and chaotic anneal mutation operator is used as the substitute for the mutation operator in SGA. CAGA is a unified framework of the existing chaotic mutation methods. To validate the proposed algorithm, three algorithms, i. e. Baum-Welch, SGA and CAGA, are compared on training hidden Markov model (HMM) to recognize the hand gestures. Experiments on twenty-six alphabetical gestures show the CAGA validity.
基金Supported by the National Natural Science Foun-dation of China (60573127)
文摘To achieve the goal of image content authentication and copyright protection simultaneously, this paper presents a novel image dual watermarking method based on chaotic map. Firstly, the host image was split into many nonoverlapping small blocks, and the block-wise discrete cosine transform (DCT) is computed. Secondly, the robust watermarks, shuffled by the chaotic sequences, are embedded in the DC coefficients of blocks to achieve the goal of copyright protection. The semi-fragile watermarks, generated by chaotic map, are embedded in the AC coefficients of blocks to obtain the aim of image authentication. Both of them can be extracted without the original image. Simulation results demonstrate the effectiveness of our algorithm in terms of robustness and fragility.
基金supported by National Natural Science Foundation of China(11271139)Guangdong Natural Science Foundation(2014A030313256,S2013040016144)+1 种基金Science and Technology Projects of Guangdong Province(2013B010101009)Tianhe Science and Technology Foundation of Guangzhou(201301YG027)
基金the National Natural Science Foundation of China.
文摘In this paper, we discuss feedback control of a class of delay chaotic maps. Our aim is to drive the chaotic maps to its initially unstable fixed points by using linear and nonlinear state feedback control. The control is achieved by using small, bounded perturbations. Some numerical simulations are given to demonstrate the effectiveness of the proposed control method.
基金Supported by National Natural Science Foundation of China (No.50777048).
文摘In tracking test, discharge is a complicated process and comparative tracking index (CTI) has wide varia-tion. To evaluate tracking resistance, the chaos analysis of discharge current is presented based on the tracking test of phenolic resin in accordance with IEC60112. According to the characteristics of statistical self-similarity and complexity of discharge current, the largest Lyapunov exponent is calculated, and the 2-dimensional attractor of discharge current is reconstructed. Moreover, the attractors of discharge current and recurrence plots of different discharge states are reconstructed. The results indicate that the chaos attractors have different characteristics in evo-lutionary tracks, the topological structure and grain direction of recurrence plots show significant differences. The chaos attractor can describe the tracking process, the recurrence plot can identify the tracking state clearly, while its arithmetic is simple.
文摘By using a series of canonical transformations (Birkhoff's series), an approximate integral of a conservative compound pendulum is evaluated. Level lines of this approximate integral are compared with the numerical simulation results. It is seen clearly that with a raised energy level, the nearly integrable system becomes non-integrable, i.e. the regular motion pattern changes to the chaotic one. Experiments with such a pendulum device display the behavior mentioned above.
文摘It was shown in Wu's works that the combination of the relative researches of pansystems methodology and the researches on bifurcation, catastrophe, chaos and stability in nonlinear mechanics was put forward and the concepts were redefined from the point of view of pansystems methodology. In this paper, the logic conservation law of these nonlinear mechanics phenomena was studied under the framework of pansystems methodology.
文摘This paper discusses the dynamic behavior of the Kelvin-Stuart cat's eye flow under periodic perturbations. By means of the Melnikov method the conditions to have bifurcations to subharmonics of even order for the oscillating orbits and to have bifurcations to subharmonics of any order for the rotating orbits are given, and further, the coexistence phenomena of the chaotic motions and periodic solutions are presented.
文摘In this study, possible low dimensional chaotic behavior of Sakarya river flow rates is investigated via nonlinear time series techniques. To reveal the chaotic dynamics, the maximal positive Lyapunov exponent is calculated from the reconstructed phase space, which is obtained using the phase space reconstruction method. The method reconstructs a phase space from the scalar time series, which depicts the real system’s invariants Positive values, because the Lyapunov exponent values calculated using the appropriate software program indicate possibility of chaotic behavior. Analyzed data involve the monthly average flow rates of eleven main branches of Sakarya River through the years 1960-2000.
文摘This study aimed to reconsider some concepts of the psychoanalytic theory on group mind. Group psychology is concerned with the individual man as a member of a race, nation, caste, profession, or an institution, or as a component of a crowd of people that has been organized into a group at some particular time, for some specific purpose. Group psychology embraces an immense number of separate issues and offers investigators with countless problems, which have hitherto not even been properly distinguished from one another. Reflections presented in this paper were particularly inspired by Freud’s work on Group psychology and analysis of the ego and approaches to the chaos theory, especially, the fact that groups emerge as systems that exhibit unstable, aperiodic and highly complex behavior, with a tendency to self-organization.
基金Funds for New Generation Information Technology of the Industry-University-Research Innovation Foundation of China University(No.2020ITA03022).
文摘The generation method of the key stream and the structure of the algorithm determine the security of the cryptosystem.The classical chaotic map has simple dynamic behavior and few control parameters,so it is not suitable for modern cryptography.In this paper,we design a new 2D hyperchaotic system called 2D simple structure and complex dynamic behavior map(2D-SSCDB).The 2D-SSCDB has a simple structure but has complex dynamic behavior.The Lyapunov exponent verifies that the 2D-SSCDB has hyperchaotic behavior,and the parameter space in the hyperchaotic state is extensive and continuous.Trajectory analysis and some randomness tests verify that the 2D-SSCDB can generate random sequences with good performance.Next,to verify the excellent performance of the 2D-SSCDB,we use the 2D-SSCDB to generate a keystream for color image encryption.In the encryption algorithm,the encryption algorithm scrambles and diffuses simultaneously,increasing the cryptographic system’s security.The horizontal correlation,vertical correlation,and diagonal correlation of ciphertext are−0.0004,−0.0004 and 0.0007,respectively.The average information entropy of the ciphertext is 7.9993.In addition,the designed encryption algorithm reduces the correlation between the three channels of the color image.Security analysis shows that the color image encryption algorithm designed using 2DSSCDB has good security,can resist standard attack methods,and has high efficiency.
基金This research was supported by the National Natural Science Foundation of China(61802212).
文摘With the rapid development of 5G technology,it has become fast and easy for people to transmit information on the Internet.Digital images can express information more intuitively,so transmitting information through images has excellent applications.This paper uses a new chaotic system called 1D-Sin-Logistic-Map(1D-SLM).1D-SLM has two control parameters,which can provide larger parameter space,and the parameter space in the chaotic state is continuous.Through Lyapunov exponent analysis(LE),bifurcation diagrams analysis,spectral entropy analysis(SE),and 0-1 test,it is verified that 1D-SLM has complex dynamic behavior and is very suitable for cryptography.Compared with other 1D chaotic systems,the 1D-SLM has a larger Lyapunov exponent(LE)and spectral entropy(SE).For color image encryption algorithms,only relying on chaotic mapping is not enough to ensure security.So combined with 1D-SLM,we design a color image encryption algorithm,which is implemented by plane expansion,which reduces the correlation between the three channels of color images.The experimental results show that the proposed cross-plane color image encryption algorithm is safe and resistant to common attack methods.