期刊文献+
共找到1,055篇文章
< 1 2 53 >
每页显示 20 50 100
Periodic performance of the chaotic spread spectrum sequence on finite precision 被引量:3
1
作者 Zhu Canyan Zhang Lihua +2 位作者 Wang Yiming Liu Jiasheng Mao Lingfeng 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期672-678,共7页
It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attenti... It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attention since it is one kind of applicable spread spectrum sequences. However, there are unavoidable short cyclic problems for chaotic binary sequences in finite precision. The chaotic binary sequence generating methods are studied first. Then the short cyclic behavior of the chaotic sequences is analyzed in detail, which are generated by quantification approaches with finite word-length. At the same time, a chaotic similar function is defined for presenting the cyclic characteristics of the sequences. Based on these efforts, an improved method with scrambling control for generating chaotic binary sequences is proposed. To quantitatively describe the improvement of periodic performance of the sequences, an orthogonal estimator is also defined. Some simulating results are provided. From the theoretical deduction and the experimental results, it is concluded that the proposed method can effectively increase the period and raise the complexity of the chaotic sequences to some extent. 展开更多
关键词 chaotic binary sequence finite precision periodic performance orthogonal estimator
下载PDF
A New Images Hiding Scheme Based on Chaotic Sequences 被引量:2
2
作者 LIUNian-sheng GUODong-hui +1 位作者 WUBo-xi ParrG 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期303-306,共4页
We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive imag... We propose a data hidding technique in a still image. This technique is based on chaotic sequence in the transform domain of cover image. We use different chaotic random sequences multiplied by multiple sensitive images, respectively, to spread the spectrum of sensitive images. Multiple sensitive images are hidden in a covert image as a form of noise. The results of theoretical analysis and computer simulation show the new hiding technique have better properties with high security, imperceptibility and capacity for hidden information in comparison with the conventional scheme such as LSB (Least Significance Bit). 展开更多
关键词 information hiding chaotic sequence information security image transform
下载PDF
Hybrid chaotic sequence for QS-CDMA system with RAKE receiver 被引量:1
3
作者 饶妮妮 许晓晶 李少谦 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期278-282,共5页
A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for... A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for the performance of QS-CDMA system with RAKE receiver. The performance of the system is analyzed when the hybrid chaotic sequences are used as spreading codes in a QS-CDMA system with RAKE receiver and compared with those obtained for m-se-quences and logistic sequences. The results show that the hybrid chaotic sequences are a class of very promising spreading codes for QS-CDMA system. 展开更多
关键词 hybrid chaotic sequence QS-CDMA RAKE receiver BEP.
下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
4
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 Network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
下载PDF
Particle Swarm Optimization Algorithm Based on Chaotic Sequences and Dynamic Self-Adaptive Strategy
5
作者 Mengshan Li Liang Liu +4 位作者 Genqin Sun Keming Su Huaijin Zhang Bingsheng Chen Yan Wu 《Journal of Computer and Communications》 2017年第12期13-23,共11页
To deal with the problems of premature convergence and tending to jump into the local optimum in the traditional particle swarm optimization, a novel improved particle swarm optimization algorithm was proposed. The se... To deal with the problems of premature convergence and tending to jump into the local optimum in the traditional particle swarm optimization, a novel improved particle swarm optimization algorithm was proposed. The self-adaptive inertia weight factor was used to accelerate the converging speed, and chaotic sequences were used to tune the acceleration coefficients for the balance between exploration and exploitation. The performance of the proposed algorithm was tested on four classical multi-objective optimization functions by comparing with the non-dominated sorting genetic algorithm and multi-objective particle swarm optimization algorithm. The results verified the effectiveness of the algorithm, which improved the premature convergence problem with faster convergence rate and strong ability to jump out of local optimum. 展开更多
关键词 Particle SWARM Algorithm chaotic sequenceS SELF-ADAPTIVE STRATEGY MULTI-OBJECTIVE Optimization
下载PDF
AN ALGORITHM OF LOCAL PREDICTION FOR CHAOTIC SEQUENCES WITH VARIABLE FRAME LENGTH
6
作者 Li Jinlong Lin Jiayu 《Journal of Electronics(China)》 2012年第3期345-352,共8页
According to the issues that the predict errors of chaotic sequences rapidly accumulated in multi-step forecasting which affects the predict accuracy, we proposed a new predict algorithm based on local modeling with v... According to the issues that the predict errors of chaotic sequences rapidly accumulated in multi-step forecasting which affects the predict accuracy, we proposed a new predict algorithm based on local modeling with variable frame length and interpolation points. The core idea is that, using interpolation method to increase the available sample data, then modeling the chaos dynamics system with least square algorithm which based on the Bernstein polynomial to realize the forecasting. We use the local modeling method, looking for the optimum frame length and interpolation points in every frame to improve the predict peformance. The experimental results show that the proposed algorithm can improve the predictive ability effectively, decreasing the accumulation of iterative errors in multi-step prediction. 展开更多
关键词 chaotic sequences forecasting Local modeling Variable frame length Bernstein polynomial Linear interpolation
下载PDF
Analysis of quaternary digital chaotic sequence performance based on chaotic matrix
7
作者 李佩泽 Zhao Bing Li Wenquan 《High Technology Letters》 EI CAS 2021年第1期103-109,共7页
With good randomness and high sensitivity to initial values,chaotic sequences have been extensively used in secure communication.Real chaotic sequences are highly sensitive to initial values.It is an analog quantity i... With good randomness and high sensitivity to initial values,chaotic sequences have been extensively used in secure communication.Real chaotic sequences are highly sensitive to initial values.It is an analog quantity in the domain of attraction,which is not conducive to the transmission of digital signals.In order to improve the stability,real chaotic sequences can be quantized into digital chaotic sequences.According to the relationship between the information rate and the symbol rate,the symbol rate of binary sequence is the same as the information rate.The information rate can be doubled by quantizing a real-valued sequence into a quaternary sequence.The chaotic sequence has weak periodicity.Moreover,the periodicity of binary digital chaotic sequences is much weaker than that of quaternary chaotic sequences.Compared with the multi-dimensional chaotic map,the one-dimensional chaotic map has small key space and low security.In this paper,a new real-valued chaotic sequence is generated based on the chaotic matrix method constructed by Logistic map and Kent map.Two quantization methods are used to digitize the real-valued chaotic sequence to obtain the quaternary digital chaotic sequence.Moreover,the randomness,the time series complexity and the correlation of the new quaternary chaotic sequence are compared and studied.The simulation results demonstrate that the quaternary digital chaotic sequence obtained by the chaotic matrix has good randomness and correlation. 展开更多
关键词 chaotic matrix digital chaotic sequence RANDOMNESS
下载PDF
Method of Designing Generators of Pseudorandom Sequences for Information Protection Based on Shift Register with Non-Linear Feedback Function
8
作者 Saleh Al-Omar 《Journal of Information Security》 2014年第4期218-227,共10页
This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed met... This paper proposes an efficient, high-tech method of construction of pseudorandom binary sequences generators with a repetition period 2n?for n-bit shift register with a nonlinear feedback function. The developed method is illustrated by constructing a nonlinear function feedback shift register. It is proved that the offered method requires the realization of a memory size proportional to n2?that allows making successful use of suitable generators for practical use on the shift register of the longer word. 展开更多
关键词 PSEUDORANDOM sequenceS non-linear FEEDBACK FUNCTION Information Protection
下载PDF
Two Sequences of Operator Monotone Functions and Strictly Chaotic Order
9
作者 ZHA NG Lei JIANG Jian-fei 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2006年第4期597-607,共11页
In this paper we introduce two sequences of operator functions and their dual functions:f_k(t)=((tlog t)~k-(t-1)~k)/(log^k+1t)(k=1,2,...),gk(t)=((t-1)~k-log^k t)/(log^k+1t)(k=1,2,...)and f_k~*=(t^klog^(k+1)t)/((tlog t... In this paper we introduce two sequences of operator functions and their dual functions:f_k(t)=((tlog t)~k-(t-1)~k)/(log^k+1t)(k=1,2,...),gk(t)=((t-1)~k-log^k t)/(log^k+1t)(k=1,2,...)and f_k~*=(t^klog^(k+1)t)/((tlog t)~k-(t-1)~k)(k=1,2,...),g_k~*(t)=(t^klog^(k+1)t)/((t-1)~k-log^k t)(k=1,2,...)definedon(0,+∞). We find that they are all operator monotone functions with respect to the strictly chaotic order and some ordinary orders among positive invertible operators.Indeed,we extend the results of the operator monotone function(tlog t -t+1)/(log^2t)which is widely used in the theory of heat transfer of the heat engineering and fluid mechanics[1]. 展开更多
关键词 单调算子函数 混乱次序 正常次序 可逆转算子
下载PDF
A Class of Chaotic Sequences with Gauss Probability Distribution for Radar Mask Jamming
10
作者 Ni-Ni Rao Yu-Chuan Huang Bin Liu 《Journal of Electronic Science and Technology of China》 2007年第2期180-182,共3页
A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective.... A simple generation approach for chaotic sequences with Gauss probability distribution is proposed. Theoretical analysis and simulation based on Logistic chaotic model show that the approach is feasible and effective. The distribution characteristics of the novel chaotic sequence are comparable to that of the standard normal distribution. Its mean and variance can be changed to the desired values. The novel sequences have also good randomness. The applications for radar mask jamming are analyzed. 展开更多
关键词 chaotic sequence gauss probability distribution radar mask jamming jamming effectiveness.
下载PDF
Design of Digital Hybrid Chaotic Sequence Generator
11
作者 饶妮妮 曾东 《Journal of Electronic Science and Technology of China》 2004年第1期14-16,75,共4页
The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high... The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high speed integrated circuit hardware description language(VHDL) are described. A valid hazard canceledl method is presented. Computer simulations show that the stable digital sequence waveforms can be produced. The correlations of the digital hybrid chaotic sequences are compared with those of m-sequences. The results show that the correlations of the digital hybrid chaotic sequences are almost as good as those of m-sequences. The works in this paper explored a road for the practical applications of chaos. 展开更多
关键词 digital hybrid chaotic sequence GENERATOR VHDL code divided multiple access(CDMA)
下载PDF
Video Transmission Secrecy Improvement Based on Fractional Order Hyper Chaotic System
12
作者 S.Kayalvizhi S.Malarvizhi 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1201-1214,共14页
In the Digital World scenario,the confidentiality of information in video transmission plays an important role.Chaotic systems have been shown to be effective for video signal encryption.To improve video transmission ... In the Digital World scenario,the confidentiality of information in video transmission plays an important role.Chaotic systems have been shown to be effective for video signal encryption.To improve video transmission secrecy,compressive encryption method is proposed to accomplish compression and encryption based on fractional order hyper chaotic system that incorporates Compressive Sensing(CS),pixel level,bit level scrambling and nucleotide Sequences operations.The measurement matrix generates by the fractional order hyper chaotic system strengthens the efficiency of the encryption process.To avoid plain text attack,the CS measurement is scrambled to its pixel level,bit level scrambling decreases the similarity between the adjacent measurements and the nucleotide sequence operations are done on the scrambled bits,increasing the encryption.Two stages are comprised in the reconstruction technique,the first stage uses the intra-frame similarity and offers robust preliminary retrieval for each frame,and the second stage iteratively improves the efficiency of reconstruction by integrating inter frame Multi Hypothesis(MH)estimation and weighted residual sparsity modeling.In each iteration,the residual coefficient weights are modified using a mathematical approach based on the MH predictions,and the Split Bregman iteration algorithm is defined to resolve weighted l1 regularization.Experimental findings show that the proposed algorithm provides good compression of video coupled with an efficient encryption method that is resistant to multiple attacks. 展开更多
关键词 Fractional order hyper chaotic system compressive sensing pixel level scrambling bit level scrambling nucleotide sequences
下载PDF
混沌密码理论研究与应用新进展
13
作者 赵耿 马英杰 董有恒 《信息网络安全》 CSCD 北大核心 2024年第2期203-216,共14页
混沌密码研究主要包括混沌序列密码、混沌分组密码和混沌公钥密码。混沌序列密码具有软硬件实现简单、加解密处理速度快、没有或只有有限的错误传播等特点。混沌序列密码的设计方面研究成果极为丰硕,但其安全性分析一般停留在统计性验... 混沌密码研究主要包括混沌序列密码、混沌分组密码和混沌公钥密码。混沌序列密码具有软硬件实现简单、加解密处理速度快、没有或只有有限的错误传播等特点。混沌序列密码的设计方面研究成果极为丰硕,但其安全性分析一般停留在统计性验证分析阶段,而对可证明安全性或其他有条件安全性的证明和分析很少,因此证明混沌序列密码的安全性已成为该领域亟需填补的空白。混沌分组密码的研究颇为成熟,但其整体结构一般受限于Feistel结构、SPN结构、Lai-Massey结构及其变形结构。因此,构建突破传统结构的创新性密码架构成为混沌分组密码亟待解决的关键问题之一。混沌公钥密码的研究相对薄弱,利用混沌系统特有的密码特性和公钥密码系统相结合的混沌公钥密码算法不仅具有理论研究意义,而且具有实际应用价值。混沌系统也被广泛应用于通信传输、语音加密、图像加密和扩频通信等保密通信领域。电、光混沌系统实现简便,其计算复杂性不会随着密钥空间的增大而明显增大,能够为无线通信、物理层链路安全、应用层数据安全等不同场景提供安全保护。 展开更多
关键词 保密通信 混沌系统 混沌序列密码 混沌分组密码 混沌公钥密码
下载PDF
动作时序优化振动信号混沌吸引子特征的断路器操动状态辨识方法
14
作者 刘会兰 常庚垚 +3 位作者 赵书涛 裘实 黄伟杰 刘教民 《高电压技术》 EI CAS CSCD 北大核心 2024年第6期2635-2644,共10页
高压断路器分合闸操作过程包括掣子脱扣、弹簧释能、动静触头碰撞等动作,机械振动信号作为能量传递的表现,蕴含着丰富的运行状态信息。该文基于断路器关键动作节点的时序,提出一种动作时序优化振动信号混沌吸引子特征的断路器操动状态... 高压断路器分合闸操作过程包括掣子脱扣、弹簧释能、动静触头碰撞等动作,机械振动信号作为能量传递的表现,蕴含着丰富的运行状态信息。该文基于断路器关键动作节点的时序,提出一种动作时序优化振动信号混沌吸引子特征的断路器操动状态辨识方法。首先,由高速相机捕捉断路器操动过程主轴拐臂运动图像,利用目标跟踪算法获取动触头关键运动节点时序指标;然后,依据时序指标划分操动过程,通过对不同阶段的振动信号相空间重构,提取相空间吸引子几何和属性特征;最后,利用智能分类算法进行故障辨识,实验结果验证该方法在大幅节省时间开销的同时,有效提高了分类辨识的准确率达96.9%。该文方法在断路器状态监测和带电测试中具有广阔应用前景。 展开更多
关键词 高压断路器 动作时序 吸引子特征 混沌分析 振动信号
下载PDF
基于三维超混沌映射的图像加密及其FPGA实现
15
作者 黄丽莲 叶优欣 +3 位作者 马衍昊 李创 项建弘 窦铮 《实验技术与管理》 CAS 北大核心 2024年第4期15-24,共10页
随着信息技术的不断发展,确保信息安全已成为重要问题,而图像作为被广泛使用的多媒体工具,时常面临着泄露的风险,针对该问题提出一种基于三维超混沌映射的图像加密算法。该算法首先构造一个离散三维超混沌系统,此系统相较于传统的混沌... 随着信息技术的不断发展,确保信息安全已成为重要问题,而图像作为被广泛使用的多媒体工具,时常面临着泄露的风险,针对该问题提出一种基于三维超混沌映射的图像加密算法。该算法首先构造一个离散三维超混沌系统,此系统相较于传统的混沌系统拥有更好的混沌特性,所生成的序列具有更强的随机性。然后在此序列的基础上对图片进行置乱和扩散:在置乱阶段,通过混沌序列对原始图片的像素点进行索引排序,实现像素置乱;在扩散阶段,使用处理后的混沌序列对置乱图像的像素值进行分层异或,实现像素扩散。软件仿真和性能分析表明,该算法具有较高的安全性和较强的抗干扰能力,最后通过FPGA硬件平台完成图像加密。整个算法包括软件仿真和硬件实现两个部分,能够有效提升学生将理论和实践相结合的能力,增强学生对非线性理论的理解。 展开更多
关键词 超混沌映射 混沌序列 图像加密 FPGA实现
下载PDF
基于长度可变密钥的光学图像加密方法
16
作者 杨晓云 石峰 《激光杂志》 CAS 北大核心 2024年第2期107-112,共6页
为提升光学图像加密效果,设计了一种基于长度可变密钥的光学图像加密方法。基于混沌方程构成混沌序列均匀化普适算法,运用该算法生成均匀化伪随机序列,以此作为长度可变密钥,经空间光调制器调制后,转换此类密钥为伪随机相位掩模(PRPM),... 为提升光学图像加密效果,设计了一种基于长度可变密钥的光学图像加密方法。基于混沌方程构成混沌序列均匀化普适算法,运用该算法生成均匀化伪随机序列,以此作为长度可变密钥,经空间光调制器调制后,转换此类密钥为伪随机相位掩模(PRPM),运用两个转换后PRPM双重随机相位编码初始光学图像,并结合变形分数傅里叶变换(AFrFT),相位转换编码后光学图像,获得加密光学图像,完成光学图像加密。实验结果显示,该方法可针对不同光学图像生成敏感性与唯一性密钥,实现不同光学图像的加密处理,加密效果显著,加密光学图像的像素频数分布均匀,且解密后光学图像与初始光学图像几乎一致,整体加解密效果理想,可有效保障光学图像的安全性,而且本方法可以在最短3 s的时间内完成光学图像的加密和解密,加解密效率更高,综合效果更佳。 展开更多
关键词 长度可变密钥 光学图像加密 混沌序列 相位掩模 随机相位编码 傅里叶变换
下载PDF
基于混沌序列的电子档案上传加密方法
17
作者 许德斌 《吉首大学学报(自然科学版)》 CAS 2024年第1期19-23,29,共6页
为了提升数据的存储效率和电子档案的传输安全性,设计了一种基于混沌序列的电子档案上传加密方法(混沌序列方法).以形式化方案分解电子档案上传步骤,在交互过程中统一定义上传形式.采用Logistic映射关系表示混沌模式;给定混沌序列变化区... 为了提升数据的存储效率和电子档案的传输安全性,设计了一种基于混沌序列的电子档案上传加密方法(混沌序列方法).以形式化方案分解电子档案上传步骤,在交互过程中统一定义上传形式.采用Logistic映射关系表示混沌模式;给定混沌序列变化区间,随机生成档案加密密钥流;在保证电子档案可完整解密的前提下,设定密文置换规则,设置置换流程,根据可逆关系调整密文顺序,完成电子档案的加密上传.在光纤网络配置基础上模拟电子档案上传全过程,实验结果表明,混沌序列方法能够在10 s内生成128 bit加密密钥,且在规定时间内完成498组1.5 GB内存大小的电子档案传输. 展开更多
关键词 密文置换 电子档案 混沌序列 LOGISTIC映射
下载PDF
基于混沌序列的MIMO-OFDM雷达通信一体化波形设计
18
作者 赵忠凯 闫秋贞 《应用科技》 CAS 2024年第3期121-127,共7页
为了解决多输入多输出的正交频分复用(multiple input multiple output orthogonal frequency division multiplexing,MIMO-OFDM)雷达通信一体化信号波形由于通信信息的不确定性导致模糊函数旁瓣水平较高以及系统雷达探测能力较差的问题... 为了解决多输入多输出的正交频分复用(multiple input multiple output orthogonal frequency division multiplexing,MIMO-OFDM)雷达通信一体化信号波形由于通信信息的不确定性导致模糊函数旁瓣水平较高以及系统雷达探测能力较差的问题,提出利用混沌序列对通信信息进行直接扩频。但普通单级混沌序列具有保密性低,可用数量少,容易被破解的缺点。因此采用一种基于加权算法优化的混合型级联混沌序列对通信信息进行扩频调制,然后再通过MIMO-OFDM一体化系统进行传输。由仿真结果可知,加权后的级联混沌序列相关性和误码率性能较m序列和Gold序列更好,经此序列扩频后的一体化信号模糊函数旁瓣水平会更低,故该一体化波形雷达探测性能更佳。且混沌序列越长,信号波形雷达探测能力越好。 展开更多
关键词 达通信一体化 级联混沌序列 模糊函数 非周期相关性 扩频 MIMO-OFDM 加权算法
下载PDF
一种新的地磁信号去噪算法研究
19
作者 吴婉楠 应允翔 +5 位作者 胡志文 马隆庆 方震 胡惟 周志 朱厚林 《科技资讯》 2024年第14期22-24,共3页
地磁观测数据应用十分广泛。由地磁观测数据对各种环境因素的敏感性,严重影响了地磁数据的处理和利用。如果使用传统的噪声消除算法,难以获得良好的噪声消除效果。混沌序列可以提供一定的随机性和非线性特性,以帮助优化算法更好地搜索... 地磁观测数据应用十分广泛。由地磁观测数据对各种环境因素的敏感性,严重影响了地磁数据的处理和利用。如果使用传统的噪声消除算法,难以获得良好的噪声消除效果。混沌序列可以提供一定的随机性和非线性特性,以帮助优化算法更好地搜索最优解。地磁信号则是需要去噪的原始信号。通过使用混沌蚁群算法构建目标函数,可以对地磁信号进行优化和去噪处理。算法会根据目标函数的设定,通过模拟蚁群行为和混沌序列的引导,逐步调整信号的参数和特征,以达到减小噪声、提取有效信息的目的。 展开更多
关键词 地磁数据 噪声信号 混沌序列 混沌蚁群优化算法
下载PDF
融合混沌灰狼优化算法的K-均值聚类算法
20
作者 李金 李素 +1 位作者 王祖荣 姜缘平 《计算机仿真》 2024年第5期343-347,358,共6页
针对K-均值聚类(K-means)算法对初始聚类中心位置敏感、容易陷入局部最优的缺点,提出一种融合混沌灰狼优化算法的K-means算法。算法利用混沌系统的随机性和遍历性产生分布较均匀的Tent混沌序列来初始化灰狼种群,获得分布较均匀且多样性... 针对K-均值聚类(K-means)算法对初始聚类中心位置敏感、容易陷入局部最优的缺点,提出一种融合混沌灰狼优化算法的K-means算法。算法利用混沌系统的随机性和遍历性产生分布较均匀的Tent混沌序列来初始化灰狼种群,获得分布较均匀且多样性较高的初始解,提高了算法的全局搜索能力;在搜索全局最优聚类中心的过程中引入基于精英个体的变异操作,维持种群的多样性,提高了算法的的局部搜索能力,避免算法陷入局部最优。实验结果表明,与基本K-means、基于粒子群算法(PSO)改进的K-means、传统灰狼优化算法(GWO)改进的K-means相比,以上算法具有更优的聚类效果,更强的寻优能力。 展开更多
关键词 灰狼优化算法 混沌序列 全局最优 局部最优 变异
下载PDF
上一页 1 2 53 下一页 到第
使用帮助 返回顶部