期刊文献+
共找到34篇文章
< 1 2 >
每页显示 20 50 100
Analysis and confirmation of fixed points in logistic mapping digital-flow chaos 被引量:2
1
作者 GuobaoXu DelingZheng GengZhao 《Journal of University of Science and Technology Beijing》 CSCD 2003年第3期62-65,共4页
The fixed points in logistic mapping digital-flow chaos strange attractor arestudied in detail. When k=n in logistic equation, there exist no more than 2n fixed points, whichare deduced and proved theoretically. Three... The fixed points in logistic mapping digital-flow chaos strange attractor arestudied in detail. When k=n in logistic equation, there exist no more than 2n fixed points, whichare deduced and proved theoretically. Three corollaries about the fixed points of logistic mappingare proposed and proved respectively. These theorem and corollaries provide a theoretical basis forchoosing parameter of chaotic sequences in chaotic secure communication and chaotic digitalwatermarking. And they are testified by simulation. 展开更多
关键词 CHAOS logistic mapping fixed point strange attractor
下载PDF
Two-dimensional-lag complex logistic map with complex parameters and its encryption application
2
作者 张芳芳 武金波 +3 位作者 寇磊 马凤英 吴黎明 张雪 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期324-335,共12页
With the rapid development of internet technology,security protection of information has become more and more prominent,especially information encryption.Considering the great advantages of chaotic encryption,we propo... With the rapid development of internet technology,security protection of information has become more and more prominent,especially information encryption.Considering the great advantages of chaotic encryption,we propose a 2D-lag complex logistic map with complex parameters(2D-LCLMCP)and corresponding encryption schemes.Firstly,we present the model of the 2D-LCLMCP and analyze its chaotic properties and system stability through fixed points,Lyapunov exponent,bifurcation diagram,phase diagram,etc.Secondly,a block cipher algorithm based on the 2D-LCLMCP is proposed,the plaintext data is preprocessed using a pseudorandom sequence generated by the 2D-LCLMCP.Based on the generalized Feistel cipher structure,a round function F is constructed using dynamic S-box and DNA encoding rules as the core of the block cipher algorithm.The generalized Feistel cipher structure consists of two F functions,four XOR operations,and one permutation operation per round.The symmetric dynamic round keys that change with the plaintext are generated by the 2D-LCLMCP.Finally,experimental simulation and performance analysis tests are conducted.The results show that the block cipher algorithm has low complexit,good diffusion and a large key space.When the block length is 64 bits,only six rounds of encryption are required to provide sufficient security and robustness against cryptographic attacks. 展开更多
关键词 logistic map block ciphers chaotic system ENCRYPTION
下载PDF
Asymmetric image encryption algorithm based on a new three-dimensional improved logistic chaotic map
3
作者 叶国栋 吴惠山 +1 位作者 黄小玲 Syh-Yuan Tan 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期153-163,共11页
Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shami... Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8. 展开更多
关键词 three-dimensional improved logistic chaotic map(3D-ILM) Rivest–Shamir–Adleman(RSA)algorithm image encryption CONFUSION ENTROPY
下载PDF
Logistic数字混沌序列性能分析 被引量:6
4
作者 周悦 朱灿焰 汪一鸣 《现代电子技术》 2006年第9期69-71,共3页
混沌作为一种非线性动态系统中的现象,受到了人们的重视,研究工作者纷纷探索他在通信中的可能应用。讨论了一种广泛研究的离散时间动态系统Logistic Map所产生的数字混沌序列,通过与m序列比较,分析了其白噪声统计特性,并用计算机进行仿... 混沌作为一种非线性动态系统中的现象,受到了人们的重视,研究工作者纷纷探索他在通信中的可能应用。讨论了一种广泛研究的离散时间动态系统Logistic Map所产生的数字混沌序列,通过与m序列比较,分析了其白噪声统计特性,并用计算机进行仿真,做了相应的实验数据分析。结果表明数字混沌序列具有较理想的自相关和互相关特性,且数目极大,是CDMA系统中扩频码的优选码型。 展开更多
关键词 数字混沌序列 相关特性 logistic—Map CDMA
下载PDF
改进型Logistic-Map混沌序列分析 被引量:6
5
作者 魏金成 魏巍 《电子设计工程》 2011年第4期20-23,共4页
为了进一步提高Logistic-Map混沌序列的互相关性与自相关性,提出了一种改进型的Logistic-Map混沌序列的构造方法。通过Matlab仿真出扩频通信系统,并对改进型Logistic-Map混沌序列的相关性特性进行了分析,并与传统的Logistic-Map混沌序... 为了进一步提高Logistic-Map混沌序列的互相关性与自相关性,提出了一种改进型的Logistic-Map混沌序列的构造方法。通过Matlab仿真出扩频通信系统,并对改进型Logistic-Map混沌序列的相关性特性进行了分析,并与传统的Logistic-Map混沌序列做了比较。仿真结果表明,改进型Logistic-Map混沌序列与白噪声的统计特性一致,并且该混沌序列具有更为理想的互相关和自相关特性,更加适合作为扩频通信地址码。 展开更多
关键词 混沌序列 logistic—Map 改进型的logistic—Map MATLAB仿真
下载PDF
Prediction on Failure Pressure of Pipeline Containing Corrosion Defects Based on ISSA-BPNNModel
6
作者 Qi Zhuang Dong Liu Zhuo Chen 《Energy Engineering》 EI 2024年第3期821-834,共14页
Oil and gas pipelines are affected by many factors,such as pipe wall thinning and pipeline rupture.Accurate prediction of failure pressure of oil and gas pipelines can provide technical support for pipeline safety man... Oil and gas pipelines are affected by many factors,such as pipe wall thinning and pipeline rupture.Accurate prediction of failure pressure of oil and gas pipelines can provide technical support for pipeline safety management.Aiming at the shortcomings of the BP Neural Network(BPNN)model,such as low learning efficiency,sensitivity to initial weights,and easy falling into a local optimal state,an Improved Sparrow Search Algorithm(ISSA)is adopted to optimize the initial weights and thresholds of BPNN,and an ISSA-BPNN failure pressure prediction model for corroded pipelines is established.Taking 61 sets of pipelines blasting test data as an example,the prediction model was built and predicted by MATLAB software,and compared with the BPNN model,GA-BPNN model,and SSA-BPNN model.The results show that the MAPE of the ISSA-BPNN model is 3.4177%,and the R2 is 0.9880,both of which are superior to its comparison model.Using the ISSA-BPNN model has high prediction accuracy and stability,and can provide support for pipeline inspection and maintenance. 展开更多
关键词 Oil and gas pipeline corrosion defect failure pressure prediction sparrow search algorithm BP neural network logistic chaotic map
下载PDF
并行组合扩频通信中Logistic-Map序列的优选研究 被引量:3
7
作者 杨斌 郭黎利 +1 位作者 李北明 付江志 《舰船电子工程》 2006年第6期130-133,155,共5页
直接序列扩频通信通常选择m序列和gold码作为地址码,但对于并行组合扩频系统其地址码数量少。在分析并行组合扩频系统基础上,研究Logistic-Map混沌扩频序列优选准则。Logistic-Map混沌扩频序列应用在并行组合扩频系统中,仿真结果表明,Lo... 直接序列扩频通信通常选择m序列和gold码作为地址码,但对于并行组合扩频系统其地址码数量少。在分析并行组合扩频系统基础上,研究Logistic-Map混沌扩频序列优选准则。Logistic-Map混沌扩频序列应用在并行组合扩频系统中,仿真结果表明,Logistic-Map混沌扩频序列可以提供数量众多的适于并行组合扩频通信系统的扩频序列族。 展开更多
关键词 并行组合扩频通信 logistic—Map 混沌扩频序列
下载PDF
Hybrid Image Compression-Encryption Scheme Based on Multilayer Stacked Autoencoder and Logistic Map 被引量:1
8
作者 Neetu Gupta Ritu Vijay 《China Communications》 SCIE CSCD 2022年第1期238-252,共15页
Secure transmission of images over a communication channel, with limited data transfer capacity, possesses compression and encryption schemes. A deep learning based hybrid image compression-encryption scheme is propos... Secure transmission of images over a communication channel, with limited data transfer capacity, possesses compression and encryption schemes. A deep learning based hybrid image compression-encryption scheme is proposed by combining stacked auto-encoder with the logistic map. The proposed structure of stacked autoencoder has seven multiple layers, and back propagation algorithm is intended to extend vector portrayal of information into lower vector space. The randomly generated key is used to set initial conditions and control parameters of logistic map. Subsequently, compressed image is encrypted by substituting and scrambling of pixel sequences using key stream sequences generated from logistic map.The proposed algorithms are experimentally tested over five standard grayscale images. Compression and encryption efficiency of proposed algorithms are evaluated and analyzed based on peak signal to noise ratio(PSNR), mean square error(MSE), structural similarity index metrics(SSIM) and statistical,differential, entropy analysis respectively. Simulation results show that proposed algorithms provide high quality reconstructed images with excellent levels of security during transmission.. 展开更多
关键词 compression-encryption stacked autoencoder chaotic system back propagation algorithm logistic map
下载PDF
基于logistic map的未来几年成都市人口数量预测 被引量:1
9
作者 银航 《黑龙江科学》 2020年第24期148-149,共2页
针对近几年成都市人口的迅速增长,运用线性回归分析和数据拟合等构建了logistic map模型,确定了较准确的变化参数r,以预测未来几年成都市的人口数量。综合运用MATLAB和Excel等软件求解,研究认为变化参数r与其所在的年限呈正相关,可以结... 针对近几年成都市人口的迅速增长,运用线性回归分析和数据拟合等构建了logistic map模型,确定了较准确的变化参数r,以预测未来几年成都市的人口数量。综合运用MATLAB和Excel等软件求解,研究认为变化参数r与其所在的年限呈正相关,可以结合近10年来成都市的人口数量推测出未来几年成都市的人口数量。 展开更多
关键词 logistic map 成都市 人口数量预测
下载PDF
Bifurcation analysis of the logistic map via two periodic impulsive forces
10
作者 姜海波 李涛 +1 位作者 曾小亮 张丽萍 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第1期112-118,共7页
The complex dynamics of the logistic map via two periodic impulsive forces is investigated in this paper. The influ- ences of the system parameter and the impulsive forces on the dynamics of the system are studied res... The complex dynamics of the logistic map via two periodic impulsive forces is investigated in this paper. The influ- ences of the system parameter and the impulsive forces on the dynamics of the system are studied respectively. With the parameter varying, the system produces the phenomenon such as periodic solutions, chaotic solutions, and chaotic crisis. Furthermore, the system can evolve to chaos by a cascading of period-doubling bifurcations. The Poincar6 map of the logistic map via two periodic impulsive forces is constructed and its bifurcation is analyzed. Finally, the Floquet theory is extended to explore the bifurcation mechanism for the periodic solutions of this non-smooth map. 展开更多
关键词 logistic map IMPULSE periodic solutions bifurcation mechanism
下载PDF
Image Encryption Using Multi-Scroll Attractor and Chaotic Logistic Map
11
作者 R.Anitha B.Vijayalakshmi 《Computers, Materials & Continua》 SCIE EI 2022年第8期3447-3463,共17页
In the current scenario,data transmission over the network is a challenging task as there is a need for protecting sensitive data.Traditional encryption schemes are less sensitive and less complex thus prone to attack... In the current scenario,data transmission over the network is a challenging task as there is a need for protecting sensitive data.Traditional encryption schemes are less sensitive and less complex thus prone to attacks during transmission.It has been observed that an encryption scheme using chaotic theory is more promising due to its non-linear and unpredictable behavior.Hence,proposed a novel hybrid image encryption scheme with multi-scroll attractors and quantum chaos logistic maps(MSA-QCLM).The image data is classified as inter-bits and intra-bits which are permutated separately using multi scroll attractor&quantum logistic maps to generate random keys.To increase the encryption efficiency,a hybrid chaotic technique was performed.Experimentation is performed in a Qiskit simulation tool for various image sets.The simulation results and theoretical analysis show that the proposed method is more efficient than its classical counterpart,and its security is verified by the statistical analysis,keys sensitivity,and keyspace analysis.The Number of changing pixel rate(NPCR)&the Unified averaged changed intensity(UACI)values were observed to be 99.6%&33.4%respectively.Also,entropy oscillates from 7.9 to 7.901 for the different tested encrypted images.The proposed algorithm can resist brute force attacks well,owing to the values of information entropy near the theoretical value of 8.The proposed algorithm has also passed the NIST test(Frequency Monobit test,Run test and DFT test). 展开更多
关键词 Chiper key image encryption logistic map quantum chaos qiskit
下载PDF
Rapid iterative incremental model of the intermittent chaos of deep hole developing in coal-gas outburst 被引量:5
12
作者 Pan Yue Li Aiwu 《International Journal of Mining Science and Technology》 SCIE EI 2013年第2期289-294,共6页
In view of the occurrence of the coal and gas, outburst coal body separates in series of layer form, and tosses in a series of coal shell, and the morphological characteristics of the holes that formed in the coal lay... In view of the occurrence of the coal and gas, outburst coal body separates in series of layer form, and tosses in a series of coal shell, and the morphological characteristics of the holes that formed in the coal layers are very similar to some iterative morphological characteristics of the system state under highly nonlinear condition in chaos theory. Two kinds of morphology as well as their starting and end states are comparatively studied in this paper. The research results indicate that the outburst coal and rock system is in a chaotic state of lower nested hierarchy before outburst, and the process that lots of holes form owing to continuous outburst of a series of coal shells in a short time is in a rhythmical fast iterative stage of intermittent chaos state. And the state of the coal-gas system is in a stable equilibrium state after outburst. The behaviors of outburst occurrence, development and termination, based on the universal properties of various nonlinear mappings in describing complex problems, can be described by iterative operation in mathematics which uses the Logistic function f (x,μ)=μx(1-x) and the composite function F(3, x) = f(3)(x, μ) as kernel function. The primary equation of relative hole depth x and outburst parameter l in kernel function are given in this paper. The given results can deepen and enrich the understanding of physical essence of outburst. 展开更多
关键词 Coal-gas outburst Hole Coal shell failure Complexity Chaos logistic mappings
下载PDF
Image Encryption and Decryption Based on Chaotic Algorithm
13
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm Image Encryption and Decryption Two-Stage logistic mapping M Sequence
下载PDF
Worst-case tolerance analysis on array antenna based on chaos-genetic algorithm 被引量:2
14
作者 Hao Yuan Dan Songt +1 位作者 Qiangfeng Zhou Huaping Xu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第6期824-830,共7页
This paper studies the effect of amplitude-phase errors on the antenna performance. Via builting on a worst-case error tolerance model, a simple and practical worst error tolerance analysis based on the chaos-genetic ... This paper studies the effect of amplitude-phase errors on the antenna performance. Via builting on a worst-case error tolerance model, a simple and practical worst error tolerance analysis based on the chaos-genetic algorithm (CGA) is proposed. The proposed method utilizes chaos to optimize initial population for the genetic algorithm (GA) and introduces chaotic disturbance into the genetic mutation, thereby improving the ability of the GA to search for the global optimum. Numerical simulations demonstrate that the accuracy and stability of the worst-case analysis of the proposed approach are superior to the GA. And the proposed algorithm can be used easily for the error tolerant design of antenna arrays. 展开更多
关键词 genetic algorithm (GA) array antenna tolerance anal-ysis chaos disturbance logistic map
下载PDF
A fast image encryption algorithm based on only blocks in cipher text 被引量:2
15
作者 王兴元 王倩 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第3期165-172,共8页
In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simul- taneously. The cipher-text image is divided into blocks and each block has k x k pixels, while the... In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simul- taneously. The cipher-text image is divided into blocks and each block has k x k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed ac- cording to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks. 展开更多
关键词 image encryption shuffle and diffuse simultaneously block cipher logistic map
下载PDF
并行组合扩频系统中混沌序列优选的研究
16
作者 杨斌 郭黎利 +1 位作者 李北明 付江志 《信息技术》 2006年第8期14-16,72,共4页
在结合并行组合扩频通信基础上,研究系统中的Logistic-Map混沌扩频序列优选准则。仿真结果表明,Logistic-Map混沌扩频序列可以提供数量众多的适于并行组合扩频通信系统的扩频序列族。
关键词 并行组合扩频通信 logistic—Map 混沌扩频序列
下载PDF
A self-cited pixel summation based image encryption algorithm 被引量:1
17
作者 叶国栋 黄小玲 +1 位作者 张愉 王政霞 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第1期131-138,共8页
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make ... In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryption algorithm is immune to the known plaintext attack(KPA) and the chosen plaintext attack(CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security. 展开更多
关键词 pixel summation image encryption algorithm intertwining logistic map GRAVITY SECURITY
下载PDF
Cognitive radio resource allocation based on coupled chaotic genetic algorithm 被引量:1
18
作者 俎云霄 周杰 曾昶畅 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第11期704-711,共8页
A coupled chaotic genetic algorithm for cognitive radio resource allocation which is based on genetic algorithm and coupled Logistic map is proposed. A fitness function for cognitive radio resource allocation is provi... A coupled chaotic genetic algorithm for cognitive radio resource allocation which is based on genetic algorithm and coupled Logistic map is proposed. A fitness function for cognitive radio resource allocation is provided. Simulations are conducted for cognitive radio resource allocation by using the coupled chaotic genetic algorithm, simple genetic algorithm and dynamic allocation algorithm respectively. The simulation results show that, compared with simple genetic and dynamic allocation algorithm, coupled chaotic genetic algorithm reduces the total transmission power and bit error rate in cognitive radio system, and has faster convergence speed. 展开更多
关键词 cognitive radio chaotic genetic algorithm resource allocation coupled logistic map
下载PDF
Experiments of Reconstructing Discrete Atmospheric Dynamic Models from Data (I)
19
作者 林振山 朱焰宇 邓自旺 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 1995年第1期121-125,共5页
In this paper, we give some experimental results of our study in reconstructing discrete atmospheric dynamic models from data. After a great deal of numerical experiments, we found that the logistic map, xn +1= 1-uxn2... In this paper, we give some experimental results of our study in reconstructing discrete atmospheric dynamic models from data. After a great deal of numerical experiments, we found that the logistic map, xn +1= 1-uxn2 could be used in monthly mean temperature prediction when it was approaching the chaotic region, and its predictive results were in reverse states to the practical data. This means that the nonlinear developing behavior of the monthly mean temperature system is bifurcating back into the critical chaotic states from the chaotic ones. 展开更多
关键词 RECONSTRUCTION Discrete dynamic model CHAOS BIFURCATION logistic map
下载PDF
A Highly Secured Image Encryption Scheme using Quantum Walk and Chaos
20
作者 Muhammad Islam Kamran Muazzam A.Khan +4 位作者 Suliman A.Alsuhibany Yazeed Yasin Ghadi Arshad Jameel Arif Jawad Ahmad 《Computers, Materials & Continua》 SCIE EI 2022年第10期657-672,共16页
The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation(4G)and 5th generation(5G)etc.Research... The use of multimedia data sharing has drastically increased in the past few decades due to the revolutionary improvements in communication technologies such as the 4th generation(4G)and 5th generation(5G)etc.Researchers have proposed many image encryption algorithms based on the classical random walk and chaos theory for sharing an image in a secure way.Instead of the classical random walk,this paper proposes the quantum walk to achieve high image security.Classical random walk exhibits randomness due to the stochastic transitions between states,on the other hand,the quantum walk is more random and achieve randomness due to the superposition,and the interference of the wave functions.The proposed image encryption scheme is evaluated using extensive security metrics such as correlation coefficient,entropy,histogram,time complexity,number of pixels change rate and unified average intensity etc.All experimental results validate the proposed scheme,and it is concluded that the proposed scheme is highly secured,lightweight and computationally efficient.In the proposed scheme,the values of the correlation coefficient,entropy,mean square error(MSE),number of pixels change rate(NPCR),unified average change intensity(UACI)and contrast are 0.0069,7.9970,40.39,99.60%,33.47 and 10.4542 respectively. 展开更多
关键词 CRYPTOGRAPHY chaotic maps logistic map quantum walk SECURITY
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部