Optimization algorithms play a pivotal role in enhancing the performance and efficiency of systems across various scientific and engineering disciplines.To enhance the performance and alleviate the limitations of the ...Optimization algorithms play a pivotal role in enhancing the performance and efficiency of systems across various scientific and engineering disciplines.To enhance the performance and alleviate the limitations of the Northern Goshawk Optimization(NGO)algorithm,particularly its tendency towards premature convergence and entrapment in local optima during function optimization processes,this study introduces an advanced Improved Northern Goshawk Optimization(INGO)algorithm.This algorithm incorporates a multifaceted enhancement strategy to boost operational efficiency.Initially,a tent chaotic map is employed in the initialization phase to generate a diverse initial population,providing high-quality feasible solutions.Subsequently,after the first phase of the NGO’s iterative process,a whale fall strategy is introduced to prevent premature convergence into local optima.This is followed by the integration of T-distributionmutation strategies and the State Transition Algorithm(STA)after the second phase of the NGO,achieving a balanced synergy between the algorithm’s exploitation and exploration.This research evaluates the performance of INGO using 23 benchmark functions alongside the IEEE CEC 2017 benchmark functions,accompanied by a statistical analysis of the results.The experimental outcomes demonstrate INGO’s superior achievements in function optimization tasks.Furthermore,its applicability in solving engineering design problems was verified through simulations on Unmanned Aerial Vehicle(UAV)trajectory planning issues,establishing INGO’s capability in addressing complex optimization challenges.展开更多
A novel algorithm is proposed to solve the poor per- formance problem of the Tent chaos-based frequency modulation (FM) signal for range-Doppler imaging, which takes it into complex multi-segment system by increasin...A novel algorithm is proposed to solve the poor per- formance problem of the Tent chaos-based frequency modulation (FM) signal for range-Doppler imaging, which takes it into complex multi-segment system by increasing its segments. The simulation results show that the effectiveness of the proposed algorithm, as well as the performance of the improved Tent FM signal is obvious in a multipath or noise propagation environment.展开更多
Perturbation imposed on a chaos system is an effective way to maintain its chaotic features. A novel parameter perturbation method for the tent map based on the Lyapunov exponent is proposed in this paper. The pseudo-...Perturbation imposed on a chaos system is an effective way to maintain its chaotic features. A novel parameter perturbation method for the tent map based on the Lyapunov exponent is proposed in this paper. The pseudo-random sequence generated by the tent map is sent to another chaos function - the Chebyshev map for the post processing. If the output value of the Chebyshev map falls into a certain range, it will be sent back to replace the parameter of the tent map. As a result, the parameter of the tent map keeps changing dynamically. The statistical analysis and experimental results prove that the disturbed tent map has a highly random distribution and achieves good cryptographic properties of a pseudo-random sequence. As a result, it weakens the phenomenon of strong correlation caused by the finite precision and effectively compensates for the digital chaos system dynamics degradation.展开更多
Discrete-time chaotic circuit implementations of a tent map and a Bernoulli map using switched-current (SI) techniques are presented. The two circuits can be constructed with 16 MOSFET's and 2 capacitors. The simul...Discrete-time chaotic circuit implementations of a tent map and a Bernoulli map using switched-current (SI) techniques are presented. The two circuits can be constructed with 16 MOSFET's and 2 capacitors. The simulations and experiments built with commercially available IC's for the circuits have demonstrated the validity of the circuit designs. The experiment results also indicate that the proposed circuits are integrable by a standard CMOS technology. The implementations are useful for studies and applications of chaos.展开更多
A new algorithm for a novel hash function, based on chaotic tent map with changeable parameter, is proposed and analyzed. The one dimensional and piecewise tent map with changeable parameters decided by the position i...A new algorithm for a novel hash function, based on chaotic tent map with changeable parameter, is proposed and analyzed. The one dimensional and piecewise tent map with changeable parameters decided by the position index of blocked messages is chosen, and blocked massages translated into ASCII code values are employed as the iteration time of the chaotic tent map. The final 128-bit hash value is generated by logical XOR operation on intermediate hash values. Theoretical analysis and computer simulation indicate that the proposed algorithm can satisfy the performance requirements of hash function.展开更多
As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts o...As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques.展开更多
TheHoney Badger Algorithm(HBA)is a novelmeta-heuristic algorithm proposed recently inspired by the foraging behavior of honey badgers.The dynamic search behavior of honey badgers with sniffing and wandering is divided...TheHoney Badger Algorithm(HBA)is a novelmeta-heuristic algorithm proposed recently inspired by the foraging behavior of honey badgers.The dynamic search behavior of honey badgers with sniffing and wandering is divided into exploration and exploitation in HBA,which has been applied in photovoltaic systems and optimization problems effectively.However,HBA tends to suffer from the local optimum and low convergence.To alleviate these challenges,an improved HBA(IHBA)through fusing multi-strategies is presented in the paper.It introduces Tent chaotic mapping and composite mutation factors to HBA,meanwhile,the random control parameter is improved,moreover,a diversified updating strategy of position is put forward to enhance the advantage between exploration and exploitation.IHBA is compared with 7 meta-heuristic algorithms in 10 benchmark functions and 5 engineering problems.The Wilcoxon Rank-sum Test,Friedman Test and Mann-WhitneyU Test are conducted after emulation.The results indicate the competitiveness and merits of the IHBA,which has better solution quality and convergence traits.The source code is currently available from:https://github.com/zhaotao789/IHBA.展开更多
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process...A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.展开更多
A rational approximation method of the fractional-order derivative and integral operators is proposed. The turning fre- quency points are fixed in each frequency interval in the standard Oustaloup approximation. In th...A rational approximation method of the fractional-order derivative and integral operators is proposed. The turning fre- quency points are fixed in each frequency interval in the standard Oustaloup approximation. In the improved Oustaloup method, the turning frequency points are determined by the adaptive chaotic particle swarm optimization (PSO). The average velocity is proposed to reduce the iterations of the PSO. The chaotic search scheme is combined to reduce the opportunity of the premature phenomenon. Two fitness functions are given to minimize the zero-pole and amplitude-phase frequency errors for the underlying optimization problems. Some numerical examples are compared to demonstrate the effectiveness and accuracy of this proposed rational approximation method.展开更多
In order to better identify the parameters of the fractional-order system,a modified particle swarm optimization(MPSO)algorithm based on an improved Tent mapping is proposed.The MPSO algorithm is validated with eight ...In order to better identify the parameters of the fractional-order system,a modified particle swarm optimization(MPSO)algorithm based on an improved Tent mapping is proposed.The MPSO algorithm is validated with eight classical test functions,and compared with the POS algorithm with adaptive time varying accelerators(ACPSO),the genetic algorithm(GA),a d the improved PSO algorithm with passive congregation(IPSO).Based on the systems with known model structures a d unknown model structures,the proposed algorithm is adopted to identify two typical fractional-order models.The results of parameter identification show that the application of average value of position information is beneficial to making f 11 use of the information exchange among individuals and speeds up the global searching speed.By introducing the uniformity and ergodicity of Tent mapping,the MPSO avoids the extreme v^ue of position information,so as not to fall into the local optimal value.In brief the MPSOalgorithm is an effective a d useful method with a fast convergence rate and high accuracy.展开更多
Nonlinear resistivity inversion requires efficient artificial neural network(ANN)model for better inversion results.An evolutionary BP neural network(BPNN)approach based on differential evolution(DE)algorithm was pres...Nonlinear resistivity inversion requires efficient artificial neural network(ANN)model for better inversion results.An evolutionary BP neural network(BPNN)approach based on differential evolution(DE)algorithm was presented,which was able to improve global search ability for resistivity tomography 2-D nonlinear inversion.In the proposed method,Tent equation was applied to obtain automatic parameter settings in DE and the restricted parameter Fcrit was used to enhance the ability of converging to global optimum.An implementation of proposed DE-BPNN was given,the network had one hidden layer with 52 nodes and it was trained on 36 datasets and tested on another 4 synthetic datasets.Two abnormity models were used to verify the feasibility and effectiveness of the proposed method,the results show that the proposed DE-BP algorithm has better performance than BP,conventional DE-BP and other chaotic DE-BP methods in stability and accuracy,and higher imaging quality than least square inversion.展开更多
Image hashing is a useful multimedia technology for many applications,such as image authentication,image retrieval,image copy detection and image forensics.In this paper,we propose a robust image hashing based on rand...Image hashing is a useful multimedia technology for many applications,such as image authentication,image retrieval,image copy detection and image forensics.In this paper,we propose a robust image hashing based on random Gabor filtering and discrete wavelet transform(DWT).Specifically,robust and secure image features are first extracted from the normalized image by Gabor filtering and a chaotic map called Skew tent map,and then are compressed via a single-level 2-D DWT.Image hash is finally obtained by concatenating DWT coefficients in the LL sub-band.Many experiments with open image datasets are carried out and the results illustrate that our hashing is robust,discriminative and secure.Receiver operating characteristic(ROC)curve comparisons show that our hashing is better than some popular image hashing algorithms in classification performance between robustness and discrimination.展开更多
A multi spectral image compression and encryption algorithm that combines Karhunen-Loeve(KL) transform,tensor decomposition and chaos is proposed for solving the security problem of multi-spectral image compression an...A multi spectral image compression and encryption algorithm that combines Karhunen-Loeve(KL) transform,tensor decomposition and chaos is proposed for solving the security problem of multi-spectral image compression and transmission.Firstly,in order to eliminate residual spatial redundancy and most of the spectral redundancy,the image is performed by KL transform.Secondly,to further eliminate spatial redundancy and reduce block effects in the compression process,two-dimensional discrete 9/7 wavelet transform is performed,and then Arnold transform and encryption processing on the transformed coefficients are performed.Subsequently,the tensor is decomposed to keep its intrinsic structure intact and eliminate residual space redundancy.Finally,differential pulse filters are used to encode the coefficients,and Tent mapping is used to implement confusion diffusion encryption on the code stream.The experimental results show that the method has high signal-to-noise ratio,fast calculation speed,and large key space,and it is sensitive to keys and plaintexts with a positive effect in spectrum assurance at the same time.展开更多
Let f : I → I be a continuous map. If P (n, f) = {x ∈I; fn (x) = x} is a finite set for each n ∈ N, then there exits an anticentered map topologically conjugate to f, which partially answers a question of Koly...Let f : I → I be a continuous map. If P (n, f) = {x ∈I; fn (x) = x} is a finite set for each n ∈ N, then there exits an anticentered map topologically conjugate to f, which partially answers a question of Kolyada and Snoha. Specially, there exits an anticentered map topologically conjugate to the standard tent map.展开更多
Existing solutions for collaborative trajectory planning using multiple UAVs suffer from issues such as low accuracy,instability,and slow convergence.To address the aforementioned issues,this paper introduces a new me...Existing solutions for collaborative trajectory planning using multiple UAVs suffer from issues such as low accuracy,instability,and slow convergence.To address the aforementioned issues,this paper introduces a new method for multiple unmanned aerial vehicle(UAV)3D terrain cooperative trajectory planning based on the cuck0o search golden jackal optimization(CS-GJO)algorithm.A model for single UAV trajectory planning and a model for multi-UAV collaborative trajectory planning have been developed,and the problem of solving the models is restructured into an optimization problem.Building upon the original golden jackal optimization,the use of tent chaotic mapping aids in the generation of the golden jackal's inital population,thereby promoting population diversity.Subsequently,the position update strategy of the cuckoo search algorithm is combined for purpose of update the position information of individual golden jackals,effectively preventing the algorithm from getting stuck in local minima.Finally,the corresponding nonlinear control parameter were developed.The new parameters expedite the decrease in the convergence factor during the pre-exploration stage,resulting in an improved overall search speed of the algorithm.Moreover,they attenuate the decrease in the convergence factor during the post-exploration stage,thereby enhancing the algorithm's global search.The experimental results demonstrate that the CS-GJO algorithm efficiently and accurately accomplishes multi-UAV cooperative trajectory planning in a 3D environment.Compared with other comparative algorithms,the CS-GJO algorithm also has better stability,higher optimization accuracy,and faster convergence speed.展开更多
To improve the global convergence speed of social cognitive optimization (SCO) algorithm, a hybrid social cognitive optimization (HSCO) algorithm based on elitist strategy and chaotic optimization is proposed to s...To improve the global convergence speed of social cognitive optimization (SCO) algorithm, a hybrid social cognitive optimization (HSCO) algorithm based on elitist strategy and chaotic optimization is proposed to solve constrained nonlinear programming problems (NLPs). The proposed algorithm partitions learning agents into three groups in proportion: elite learning agents, chaotic learning agents and common learning agents. The common learning agents work in the search way of traditional SCO, chaotic learning agents search via chaotic search (CS) algorithm based on tent map which helps to avoid the premature convergence, elite learning agents search via elitist selection which helps to improve the global searching performance. Additionally, a chaotic search process is incorporated into local searching operation so as to enhance the local searching efficiency in the neighboring areas of the feasible solutions. Simulation results on a set of benchmark problems show that the proposed algorithm has high optimization efficiency, good global performance, and stable optimization outcomes for constrained NLPs.展开更多
基金supported by theKey Research and Development Project of Hubei Province(No.2023BAB094)the Key Project of Science and Technology Research Program of Hubei Educational Committee(No.D20211402)the Open Foundation of HubeiKey Laboratory for High-Efficiency Utilization of Solar Energy and Operation Control of Energy Storage System(No.HBSEES202309).
文摘Optimization algorithms play a pivotal role in enhancing the performance and efficiency of systems across various scientific and engineering disciplines.To enhance the performance and alleviate the limitations of the Northern Goshawk Optimization(NGO)algorithm,particularly its tendency towards premature convergence and entrapment in local optima during function optimization processes,this study introduces an advanced Improved Northern Goshawk Optimization(INGO)algorithm.This algorithm incorporates a multifaceted enhancement strategy to boost operational efficiency.Initially,a tent chaotic map is employed in the initialization phase to generate a diverse initial population,providing high-quality feasible solutions.Subsequently,after the first phase of the NGO’s iterative process,a whale fall strategy is introduced to prevent premature convergence into local optima.This is followed by the integration of T-distributionmutation strategies and the State Transition Algorithm(STA)after the second phase of the NGO,achieving a balanced synergy between the algorithm’s exploitation and exploration.This research evaluates the performance of INGO using 23 benchmark functions alongside the IEEE CEC 2017 benchmark functions,accompanied by a statistical analysis of the results.The experimental outcomes demonstrate INGO’s superior achievements in function optimization tasks.Furthermore,its applicability in solving engineering design problems was verified through simulations on Unmanned Aerial Vehicle(UAV)trajectory planning issues,establishing INGO’s capability in addressing complex optimization challenges.
基金supported by the National Natural Science Foundation of China (610320106110117211076006)
文摘A novel algorithm is proposed to solve the poor per- formance problem of the Tent chaos-based frequency modulation (FM) signal for range-Doppler imaging, which takes it into complex multi-segment system by increasing its segments. The simulation results show that the effectiveness of the proposed algorithm, as well as the performance of the improved Tent FM signal is obvious in a multipath or noise propagation environment.
基金Project supported by the Guangxi Provincial Natural Science Foundation,China(Grant No.2014GXNSFBA118271)the Research Project of Guangxi University,China(Grant No.ZD2014022)+4 种基金the Fund from Guangxi Provincial Key Laboratory of Multi-source Information Mining&Security,China(Grant No.MIMS14-04)the Fund from the Guangxi Provincial Key Laboratory of Wireless Wideband Communication&Signal Processing,China(Grant No.GXKL0614205)the Education Development Foundation and the Doctoral Research Foundation of Guangxi Normal Universitythe State Scholarship Fund of China Scholarship Council(Grant No.[2014]3012)the Innovation Project of Guangxi Graduate Education,China(Grant No.YCSZ2015102)
文摘Perturbation imposed on a chaos system is an effective way to maintain its chaotic features. A novel parameter perturbation method for the tent map based on the Lyapunov exponent is proposed in this paper. The pseudo-random sequence generated by the tent map is sent to another chaos function - the Chebyshev map for the post processing. If the output value of the Chebyshev map falls into a certain range, it will be sent back to replace the parameter of the tent map. As a result, the parameter of the tent map keeps changing dynamically. The statistical analysis and experimental results prove that the disturbed tent map has a highly random distribution and achieves good cryptographic properties of a pseudo-random sequence. As a result, it weakens the phenomenon of strong correlation caused by the finite precision and effectively compensates for the digital chaos system dynamics degradation.
基金Supported by the National Natural Science Foundation of China (No.60372004) and Natural Science Foundation of Guangdong Province (No.20820)
文摘Discrete-time chaotic circuit implementations of a tent map and a Bernoulli map using switched-current (SI) techniques are presented. The two circuits can be constructed with 16 MOSFET's and 2 capacitors. The simulations and experiments built with commercially available IC's for the circuits have demonstrated the validity of the circuit designs. The experiment results also indicate that the proposed circuits are integrable by a standard CMOS technology. The implementations are useful for studies and applications of chaos.
基金Supported by the National Natural Science Foundation of China (No. 61173178, 61003247, 61070246) and the Fundamental Research Funds for the Central University (No. COJER1018002,cdjerl018003).
文摘A new algorithm for a novel hash function, based on chaotic tent map with changeable parameter, is proposed and analyzed. The one dimensional and piecewise tent map with changeable parameters decided by the position index of blocked messages is chosen, and blocked massages translated into ASCII code values are employed as the iteration time of the chaotic tent map. The final 128-bit hash value is generated by logical XOR operation on intermediate hash values. Theoretical analysis and computer simulation indicate that the proposed algorithm can satisfy the performance requirements of hash function.
文摘As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques.
基金supported by National Science Foundation of China(Grant No.52075152)Xining Big Data Service Administration.
文摘TheHoney Badger Algorithm(HBA)is a novelmeta-heuristic algorithm proposed recently inspired by the foraging behavior of honey badgers.The dynamic search behavior of honey badgers with sniffing and wandering is divided into exploration and exploitation in HBA,which has been applied in photovoltaic systems and optimization problems effectively.However,HBA tends to suffer from the local optimum and low convergence.To alleviate these challenges,an improved HBA(IHBA)through fusing multi-strategies is presented in the paper.It introduces Tent chaotic mapping and composite mutation factors to HBA,meanwhile,the random control parameter is improved,moreover,a diversified updating strategy of position is put forward to enhance the advantage between exploration and exploitation.IHBA is compared with 7 meta-heuristic algorithms in 10 benchmark functions and 5 engineering problems.The Wilcoxon Rank-sum Test,Friedman Test and Mann-WhitneyU Test are conducted after emulation.The results indicate the competitiveness and merits of the IHBA,which has better solution quality and convergence traits.The source code is currently available from:https://github.com/zhaotao789/IHBA.
基金Acknowledgements This work was supported by the National Natural Science Foundation of China under Grants No. 61073187 and No. 61161006 the Hunan Provincial Natural Science Foundation of China under Grant No. 10JJ6093 and the Hunan Provincial Science and Technology Program under Ccant No. 2010GK2003.
文摘A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications.
基金supported by the National Natural Science Foundation of China (10872030)
文摘A rational approximation method of the fractional-order derivative and integral operators is proposed. The turning fre- quency points are fixed in each frequency interval in the standard Oustaloup approximation. In the improved Oustaloup method, the turning frequency points are determined by the adaptive chaotic particle swarm optimization (PSO). The average velocity is proposed to reduce the iterations of the PSO. The chaotic search scheme is combined to reduce the opportunity of the premature phenomenon. Two fitness functions are given to minimize the zero-pole and amplitude-phase frequency errors for the underlying optimization problems. Some numerical examples are compared to demonstrate the effectiveness and accuracy of this proposed rational approximation method.
基金The National Natural Science Foundation of China(No.61374153,61473138,61374133)the Natural Science Foundation of Jiangsu Province(No.BK20151130)+1 种基金Six Talent Peaks Project in Jiangsu Province(No.2015-DZXX-011)China Scholarship Council Fund(No.201606845005)
文摘In order to better identify the parameters of the fractional-order system,a modified particle swarm optimization(MPSO)algorithm based on an improved Tent mapping is proposed.The MPSO algorithm is validated with eight classical test functions,and compared with the POS algorithm with adaptive time varying accelerators(ACPSO),the genetic algorithm(GA),a d the improved PSO algorithm with passive congregation(IPSO).Based on the systems with known model structures a d unknown model structures,the proposed algorithm is adopted to identify two typical fractional-order models.The results of parameter identification show that the application of average value of position information is beneficial to making f 11 use of the information exchange among individuals and speeds up the global searching speed.By introducing the uniformity and ergodicity of Tent mapping,the MPSO avoids the extreme v^ue of position information,so as not to fall into the local optimal value.In brief the MPSOalgorithm is an effective a d useful method with a fast convergence rate and high accuracy.
基金Project(20120162110015)supported by the Research Fund for the Doctoral Program of Higher Education,ChinaProject(41004053)supported by the National Natural Science Foundation of ChinaProject(12c0241)supported by Scientific Research Fund of Hunan Provincial Education Department,China
文摘Nonlinear resistivity inversion requires efficient artificial neural network(ANN)model for better inversion results.An evolutionary BP neural network(BPNN)approach based on differential evolution(DE)algorithm was presented,which was able to improve global search ability for resistivity tomography 2-D nonlinear inversion.In the proposed method,Tent equation was applied to obtain automatic parameter settings in DE and the restricted parameter Fcrit was used to enhance the ability of converging to global optimum.An implementation of proposed DE-BPNN was given,the network had one hidden layer with 52 nodes and it was trained on 36 datasets and tested on another 4 synthetic datasets.Two abnormity models were used to verify the feasibility and effectiveness of the proposed method,the results show that the proposed DE-BP algorithm has better performance than BP,conventional DE-BP and other chaotic DE-BP methods in stability and accuracy,and higher imaging quality than least square inversion.
基金This work is partially supported by the National Natural Science Foundation of China(Nos.61562007,61762017,61702332)National Key R&D Plan of China(2018YFB1003701)+3 种基金Guangxi“Bagui Scholar”Teams for Innovation and Research,the Guangxi Natural Science Foundation(Nos.2017GXNSFAA198222,2015GXNSFDA139040)the Project of Guangxi Science and Technology(Nos.GuiKeAD17195062)the Project of the Guangxi Key Lab of Multi-source Information Mining&Security(Nos.16-A-02-02,15-A-02-02)the Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing,and the Innovation Project of Guangxi Graduate Education(No.XYCSZ 2018076).
文摘Image hashing is a useful multimedia technology for many applications,such as image authentication,image retrieval,image copy detection and image forensics.In this paper,we propose a robust image hashing based on random Gabor filtering and discrete wavelet transform(DWT).Specifically,robust and secure image features are first extracted from the normalized image by Gabor filtering and a chaotic map called Skew tent map,and then are compressed via a single-level 2-D DWT.Image hash is finally obtained by concatenating DWT coefficients in the LL sub-band.Many experiments with open image datasets are carried out and the results illustrate that our hashing is robust,discriminative and secure.Receiver operating characteristic(ROC)curve comparisons show that our hashing is better than some popular image hashing algorithms in classification performance between robustness and discrimination.
基金Supported by the National Natural Science Foundation of China(No.61801455)。
文摘A multi spectral image compression and encryption algorithm that combines Karhunen-Loeve(KL) transform,tensor decomposition and chaos is proposed for solving the security problem of multi-spectral image compression and transmission.Firstly,in order to eliminate residual spatial redundancy and most of the spectral redundancy,the image is performed by KL transform.Secondly,to further eliminate spatial redundancy and reduce block effects in the compression process,two-dimensional discrete 9/7 wavelet transform is performed,and then Arnold transform and encryption processing on the transformed coefficients are performed.Subsequently,the tensor is decomposed to keep its intrinsic structure intact and eliminate residual space redundancy.Finally,differential pulse filters are used to encode the coefficients,and Tent mapping is used to implement confusion diffusion encryption on the code stream.The experimental results show that the method has high signal-to-noise ratio,fast calculation speed,and large key space,and it is sensitive to keys and plaintexts with a positive effect in spectrum assurance at the same time.
基金The Undergraduates Innovating Experimentation Project (2010C31048) of Jilin University
文摘Let f : I → I be a continuous map. If P (n, f) = {x ∈I; fn (x) = x} is a finite set for each n ∈ N, then there exits an anticentered map topologically conjugate to f, which partially answers a question of Kolyada and Snoha. Specially, there exits an anticentered map topologically conjugate to the standard tent map.
基金supported by the Key Research and Development Program of Henan Province (No.241111222900)Natural Science Foundation of Henan (No.242300421716)+2 种基金Key Science and Technology Program of Henan Province (Nos.242102220044 and 242102210034)National Natural Science Foundation of China (No.62103379)Maker Space Incubation Project (No.2023ZCKJ102).
文摘Existing solutions for collaborative trajectory planning using multiple UAVs suffer from issues such as low accuracy,instability,and slow convergence.To address the aforementioned issues,this paper introduces a new method for multiple unmanned aerial vehicle(UAV)3D terrain cooperative trajectory planning based on the cuck0o search golden jackal optimization(CS-GJO)algorithm.A model for single UAV trajectory planning and a model for multi-UAV collaborative trajectory planning have been developed,and the problem of solving the models is restructured into an optimization problem.Building upon the original golden jackal optimization,the use of tent chaotic mapping aids in the generation of the golden jackal's inital population,thereby promoting population diversity.Subsequently,the position update strategy of the cuckoo search algorithm is combined for purpose of update the position information of individual golden jackals,effectively preventing the algorithm from getting stuck in local minima.Finally,the corresponding nonlinear control parameter were developed.The new parameters expedite the decrease in the convergence factor during the pre-exploration stage,resulting in an improved overall search speed of the algorithm.Moreover,they attenuate the decrease in the convergence factor during the post-exploration stage,thereby enhancing the algorithm's global search.The experimental results demonstrate that the CS-GJO algorithm efficiently and accurately accomplishes multi-UAV cooperative trajectory planning in a 3D environment.Compared with other comparative algorithms,the CS-GJO algorithm also has better stability,higher optimization accuracy,and faster convergence speed.
基金supported by the National Basic Research Program of China (2011CB311802)the National Natural Science Foundation of China (611721701, 61050003, 61105064)+2 种基金the Natural Science Foundation of Shaanxi Province (2011JM8007)the Open Science Foundation of Education Ministry Key Laboratory (IPIU012011007)the Scientific Research Program of Shaanxi Provincial Education Department (12JK0732, 11JK1037)
文摘To improve the global convergence speed of social cognitive optimization (SCO) algorithm, a hybrid social cognitive optimization (HSCO) algorithm based on elitist strategy and chaotic optimization is proposed to solve constrained nonlinear programming problems (NLPs). The proposed algorithm partitions learning agents into three groups in proportion: elite learning agents, chaotic learning agents and common learning agents. The common learning agents work in the search way of traditional SCO, chaotic learning agents search via chaotic search (CS) algorithm based on tent map which helps to avoid the premature convergence, elite learning agents search via elitist selection which helps to improve the global searching performance. Additionally, a chaotic search process is incorporated into local searching operation so as to enhance the local searching efficiency in the neighboring areas of the feasible solutions. Simulation results on a set of benchmark problems show that the proposed algorithm has high optimization efficiency, good global performance, and stable optimization outcomes for constrained NLPs.