期刊文献+
共找到70篇文章
< 1 2 4 >
每页显示 20 50 100
Cryptanalysis and improvement of a digital image encryption method with chaotic map lattices 被引量:2
1
作者 王兴元 刘林涛 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期198-202,共5页
A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recove... A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recover the plaintext by applying the chosen plaintext attack. Therefore, the proposed cryptosystem is not secure enough to be used in the image transmission system. Experimental results show the feasibility of the attack. As a result, we make some improvements to the encryption scheme, which can completely resist our chosen plaintext attack. 展开更多
关键词 CRYPTANALYSIS chosen plaintext attack image encryption chaotic map lattice
下载PDF
Processing Mechanism of Chinese Verbal Jokes:Evidence from ERP and Neural Oscillations 被引量:1
2
作者 Xue-Yan Li Hui-Li Wang +5 位作者 Pertti Saariluoma Guang-Hui Zhang Yong-Jie Zhu Chi Zhang Feng-Yu Cong Tapani Ristaniemi 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第3期260-277,共18页
The cognitive processing mechanism of humor refers to how the system of neural circuitry and pathways in the brain deals with the incongruity in a humorous manner. The past research has revealed different stages and c... The cognitive processing mechanism of humor refers to how the system of neural circuitry and pathways in the brain deals with the incongruity in a humorous manner. The past research has revealed different stages and corresponding functional brain activities involved in humor-processing in terms of time and space dimensions, highlighting the effects of the time windows of about 400 ms, 600 ms, and 900 ms. However, much less is known about humor processing in light of the frequency dimension. A total of 36 Chinese participants were recruited in this experiment, with Chinese jokes, nonjokes, and nonsensical sentences used as the stimuli. The experimental results showed that there were significant differences among conditions in the P200 effect, which signified that the incongruity detection had already been integrated and perceived at about 200 ms, prior to the semantic integration at about 400 ms. This pre-processing is specific to Chinese verbal jokes due to the simultaneous involvement of both orthographic and phonologic parts in processing Chinese characters. The analysis on the frequency dimension indicated that beta’s power particularly reflected the characteristics of different stages in Chinese verbal humor processing. Jokes’ and nonsensical sentences’ relative power changes on the beta band ranked significantly higher than that of nonjokes at about 200 ms, which suggested the existence of more difficulties in meaning construction in pre-processing the incongruities. This indicated a continuity between the analysis of event related potential (ERP) components and neural oscillations and revealed the key role of the beta frequency band in Chinese verbal joke processing. 展开更多
关键词 BETA BAND HUMOR processing P200 effect
下载PDF
Ozone oxidation of 4H-SiC and flat-band voltage stability of SiC MOS capacitors 被引量:1
3
作者 尹志鹏 尉升升 +4 位作者 白娇 谢威威 刘兆慧 秦福文 王德君 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第11期500-509,共10页
We investigate the effect of ozone(O_(3))oxidation of silicon carbide(SiC)on the flat-band voltage(Vfb)stability of SiC metal–oxide–semiconductor(MOS)capacitors.The SiC MOS capacitors are produced by O_(3)oxidation,... We investigate the effect of ozone(O_(3))oxidation of silicon carbide(SiC)on the flat-band voltage(Vfb)stability of SiC metal–oxide–semiconductor(MOS)capacitors.The SiC MOS capacitors are produced by O_(3)oxidation,and their Vfbstability under frequency variation,temperature variation,and bias temperature stress are evaluated.Secondary ion mass spectroscopy(SIMS),atomic force microscopy(AFM),and x-ray photoelectron spectroscopy(XPS)indicate that O_(3)oxidation can adjust the element distribution near SiC/SiO_(2)interface,improve SiC/SiO_(2)interface morphology,and inhibit the formation of near-interface defects,respectively.In addition,we elaborate the underlying mechanism through which O_(3)oxidation improves the Vfbstability of SiC MOS capacitors by using the measurement results and O_(3)oxidation kinetics. 展开更多
关键词 SiC MOS capacitors ozone oxidation bias temperature instability Deal-Grove model
下载PDF
Transfer characteristics of dynamic biochemical signals in non-reversing pulsatile flows in a shallow Y-shaped microfluidic channel: signal filtering and nonlinear amplitude-frequency modulation
4
作者 Zongzheng CHEN Weimo YUAN +4 位作者 A.R.AZIZ Zhengming GAO Depei ZENG Bo LIU Kairong QIN 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2017年第10期1481-1496,共16页
The transports of the dynamic biochemical signals in the non-reversing pulsatile flows in the mixing microchannel of a Y-shaped microfluidic device are ana- lyzed. The results show that the mixing micro-channel acts a... The transports of the dynamic biochemical signals in the non-reversing pulsatile flows in the mixing microchannel of a Y-shaped microfluidic device are ana- lyzed. The results show that the mixing micro-channel acts as a low-pass filter, and the biochemical signals are nonlinearly modulated by the pulsatile flows, which depend on the biochemical signal frequency, the flow signal frequency, and the biochemical signal transporting distance. It is concluded that, the transfer characteristics of the dynamic biochemical signals, which are transported in the time-varying flows, should be carefully considered for better loading biochemical signals on the cells cultured on the bottom of the microfluidic channel. 展开更多
关键词 shallow Y-shaped microfluidic channel dynamic biochemical signal non-reversing pulsatile flow nonlinear amplitude-frequency modulation Taylor-Aris disper-sion
下载PDF
Synchronization of spatiotemporal chaotic systems and application to secure communication of digital image
5
作者 王兴元 张娜 +1 位作者 任小丽 张永雷 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第2期125-132,共8页
Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems. In this paper, we use the nonlinear coupled method to implement the synchronization of two coupled ma... Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems. In this paper, we use the nonlinear coupled method to implement the synchronization of two coupled map lattices. Through the appropriate separation of the linear term from the nonlinear term of the spatiotemporal chaotic system, we set the nonlinear term as the coupling function and then we can achieve the synchronization of two coupled map lattices. After that, we implement the secure communication of digital image using this synchronization method. Then, the discrete characteristics of the nonlinear coupling spatiotemporal chaos are applied to the discrete pixel of the digital image. After the synchronization of both the communication parties, the receiver can decrypt the original image. Numerical simulations show the effectiveness and the feasibility of the proposed program. 展开更多
关键词 coupled map lattice projective synchronization digital image secure communication
下载PDF
Generalised synchronisation of spatiotemporal chaos using feedback control method and phase compression
6
作者 王兴元 张娜 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第9期239-243,共5页
Coupled map lattices are taken as examples to study the synchronisation of spatiotemporal chaotic systems. First, a generalised synchronisation of two coupled map lattices is realised through selecting an appropriate ... Coupled map lattices are taken as examples to study the synchronisation of spatiotemporal chaotic systems. First, a generalised synchronisation of two coupled map lattices is realised through selecting an appropriate feedback function and appropriate range of feedback parameter. Based on this method we use the phase compression method to extend the range of the parameter. So, we integrate the feedback control method with the phase compression method to implement the generalised synchronisation and obtain an exact range of feedback parameter. This technique is simple to implement in practice. Numerical simulations show the effectiveness and the feasibility of the proposed program. 展开更多
关键词 coupled map lattice generalised synchronisation feedback control phase compression
下载PDF
Resilient Event-Triggered Control of Connected Automated Vehicles Under Cyber Attacks 被引量:1
7
作者 Ning Zhao Xudong Zhao +1 位作者 Ning Xu Liang Zhang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第12期2300-2302,共3页
Dear Editor,This letter contributes to designing a resilient event-triggered controller for connected automated vehicles under cyber attacks,including denial-of-service(DoS)and deception attacks.To characterize the ef... Dear Editor,This letter contributes to designing a resilient event-triggered controller for connected automated vehicles under cyber attacks,including denial-of-service(DoS)and deception attacks.To characterize the effect of DoS attacks,the effective intervals of the attack are redivided based on the sampling period. 展开更多
关键词 DOS service AUTOMATED
下载PDF
Pseudo-Random Sequences Generated by a Class of One-Dimensional Smooth Map
8
作者 王兴元 秦学 谢旖欣 《Chinese Physics Letters》 SCIE CAS CSCD 2011年第8期20-23,共4页
We extend a class of a one-dimensional smooth map.We make sure that for each desired interval of the parameter the map’s Lyapunov exponent is positive.Then we propose a novel parameter perturbation method based on th... We extend a class of a one-dimensional smooth map.We make sure that for each desired interval of the parameter the map’s Lyapunov exponent is positive.Then we propose a novel parameter perturbation method based on the good property of the extended one-dimensional smooth map.We perturb the parameter𝑟in each iteration by the real number xi generated by the iteration.The auto-correlation function and NIST statistical test suite are taken to illustrate the method’s randomness finally.We provide an application of this method in image encryption.Experiments show that the pseudo-random sequences are suitable for this application. 展开更多
关键词 PARAMETER ITERATION method
下载PDF
Investigation of Relation between Solar Activity and Earthquakes with Deep Learning Method
9
作者 Leilei Li Hong Gu +2 位作者 Ryosuke Kikuyama Ryuei Nishii Pan Qin 《International Journal of Geosciences》 2021年第8期704-713,共10页
Solar activity (SA) has been hypothesized to be a trigger of earthquakes, although it is not as intuitively associated as other potential triggers such as </span><span style="font-family:Verdana;"&g... Solar activity (SA) has been hypothesized to be a trigger of earthquakes, although it is not as intuitively associated as other potential triggers such as </span><span style="font-family:Verdana;">tidal stress, rainfall, and the building of artificial water reservoirs. Here, we in</span><span style="font-family:Verdana;">ves</span><span style="font-family:Verdana;">tigate the relation between SA and global earthquake numbers (GEN) by using</span><span style="font-family:Verdana;"> a deep learning method to test the hypothesis. We use the daily data of GEN </span><span style="font-family:Verdana;">and SA (1996/01/01</span></span><span style="font-family:Verdana;">-</span><span style="font-family:Verdana;">2019/12/31) to construct a temporal convolution netw</span><span style="font-family:""><span style="font-family:Verdana;">ork (</span><span style="font-family:Verdana;">TCN). From the computational results, we confirm that the TCN captures th</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">relation between SA and earthquakes with magnitudes from 4.0 to 4.9. We als</span><span style="font-family:Verdana;">o </span><span style="font-family:Verdana;">find that the TCN achieves better fitting and prediction performance compar</span><span style="font-family:Verdana;">ed with previous work</span></span><span style="font-family:Verdana;">. 展开更多
关键词 Deep Learning EARTHQUAKES PREDICTION Solar Activities Temporal Convolution Network
下载PDF
Features of transport induced by ion-driven trapped-electron modes in tokamak plasmas
10
作者 李慧 李继全 +3 位作者 王丰 栾其斌 孙宏恩 王正汹 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第7期37-41,共5页
As an obstacle in high-performance discharge in future fusion devices,disruptions may do great damages to the reactors through causing strong electromagnetic forces,heat loads and so on.The drift waves in tokamak are ... As an obstacle in high-performance discharge in future fusion devices,disruptions may do great damages to the reactors through causing strong electromagnetic forces,heat loads and so on.The drift waves in tokamak are illustrated to play essential roles in the confinement performance as well.Depending on the plasma parameters and mode perpendicular wavelength,the mode phase velocity is either in the direction of electron diamagnetic velocity(namely,typical trapped electron mode)or in the direction of ion diamagnetic velocity(namely,the ubiquitous mode).Among them,the ubiquitous mode is directly investigated using gyro-fluid simulation associating with gyro-fluid equations for drift waves in tokamak plasmas.The ubiquitous mode is charactered by the short wavelength and propagates in ion diamagnetic direction.It is suggested that the density gradient is essential for the occurrence of the ubiquitous mode.However,the ubiquitous mode is also influenced by the temperature gradients and other plasma parameters including the magnetic shear and the fraction of trapped electrons.Furthermore,the ubiquitous mode may play essential roles in the turbulent transport.Meanwhile,the relevant parameters are scanned using a great number of electrostatic gyro-fluid simulations.The stability map is taken into consideration with the micro-instabilities contributing to the turbulent transport.The stability valley of the growth rates occurs with the assumption of the normalized temperature gradient equaling to the normalized density gradient. 展开更多
关键词 drift waves nonlinear phenomena plasma simulation
下载PDF
Screening effect of plasma flow on the resonant magnetic perturbation penetration in tokamaks based on two-fluid model
11
作者 汤炜康 栾其斌 +5 位作者 孙宏恩 魏来 路爽爽 姜帅 徐健 王正汹 《Plasma Science and Technology》 SCIE EI CAS CSCD 2023年第4期23-32,共10页
Numerical simulation on the resonant magnetic perturbation penetration is carried out by the newly-updated initial value code MDC(MHD@Dalian Code).Based on a set of two-fluid fourfield equations,the bootstrap current,... Numerical simulation on the resonant magnetic perturbation penetration is carried out by the newly-updated initial value code MDC(MHD@Dalian Code).Based on a set of two-fluid fourfield equations,the bootstrap current,parallel,and perpendicular transport effects are included appropriately.Taking into account the bootstrap current,a mode penetration-like phenomenon is found,which is essentially different from the classical tearing mode model.To reveal the influence of the plasma flow on the mode penetration process,E×B drift flow and diamagnetic drift flow are separately applied to compare their effects.Numerical results show that a sufficiently large diamagnetic drift flow can drive a strong stabilizing effect on the neoclassical tearing mode.Furthermore,an oscillation phenomenon of island width is discovered.By analyzing it in depth,it is found that this oscillation phenomenon is due to the negative feedback regulation of pressure on the magnetic island.This physical mechanism is verified again by key parameter scanning. 展开更多
关键词 TOKAMAK TWO-FLUID NTM
下载PDF
New chaotical image encryption algorithm based on Fisher–Yatess scrambling and DNA coding 被引量:8
12
作者 王兴元 张钧荐 +1 位作者 张付臣 曹光辉 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第4期121-130,共10页
Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used ... Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher–Yatess scrambling are used to scramble the plaintext,and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks. 展开更多
关键词 Fisher–Yatess SCRAMBLING CHAOTIC sequence DNA CODING image ENCRYPTION
下载PDF
Multi-label dimensionality reduction and classification with extreme learning machines 被引量:9
13
作者 Lin Feng Jing Wang +1 位作者 Shenglan Liu Yao Xiao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第3期502-513,共12页
In the need of some real applications, such as text categorization and image classification, the multi-label learning gradually becomes a hot research point in recent years. Much attention has been paid to the researc... In the need of some real applications, such as text categorization and image classification, the multi-label learning gradually becomes a hot research point in recent years. Much attention has been paid to the research of multi-label classification algorithms. Considering the fact that the high dimensionality of the multi-label datasets may cause the curse of dimensionality and wil hamper the classification process, a dimensionality reduction algorithm, named multi-label kernel discriminant analysis (MLKDA), is proposed to reduce the dimensionality of multi-label datasets. MLKDA, with the kernel trick, processes the multi-label integrally and realizes the nonlinear dimensionality reduction with the idea similar with linear discriminant analysis (LDA). In the classification process of multi-label data, the extreme learning machine (ELM) is an efficient algorithm in the premise of good accuracy. MLKDA, combined with ELM, shows a good performance in multi-label learning experiments with several datasets. The experiments on both static data and data stream show that MLKDA outperforms multi-label dimensionality reduction via dependence maximization (MDDM) and multi-label linear discriminant analysis (MLDA) in cases of balanced datasets and stronger correlation between tags, and ELM is also a good choice for multi-label classification. 展开更多
关键词 MULTI-LABEL dimensionality reduction kernel trick classification.
下载PDF
Modified projective synchronization of a fractional-order hyperchaotic system with a single driving variable 被引量:4
14
作者 王兴元 张永雷 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第10期159-165,共7页
In this paper, the modified projective synchronization (MPS) of a fractional-order hyperchaotic system is inves- tigated. We design the response system corresponding to the drive system on the basis of projective sy... In this paper, the modified projective synchronization (MPS) of a fractional-order hyperchaotic system is inves- tigated. We design the response system corresponding to the drive system on the basis of projective synchronization theory, and determine the sufficient condition for the synchronization of the drive system and the response system based on fractional-order stability theory. The MPS of a fractional-order hyperchaotic system is achieved by transmitting a single variable. This scheme reduces the information transmission in order to achieve the synchronization, and extends the applicable scope of MPS. Numerical simulations further demonstrate the feasibility and the effectiveness of the proposed scheme. 展开更多
关键词 modified projective synchronization fractional-order hyperchaotic system single drivingvariable
下载PDF
A novel pseudo-random coupled LP spatiotemporal chaos and its application in image encryption 被引量:3
15
作者 王兴元 王宇 +2 位作者 王思伟 张盈谦 武相军 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第11期419-429,共11页
In this paper, first, we investigate a novel one-dimensional logistic-PWLCM(LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-rando... In this paper, first, we investigate a novel one-dimensional logistic-PWLCM(LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-random coupling method that can accelerate the system behavior of the fully spatial chaos. Here, because the better chaotic properties include a wide range of parameter settings and better ergodicity than a logistic map, the LP is used in PCLML as f(x). The Kolmogorov–Sinai entropy density and universality and the bifurcation diagram are employed to investigate the chaotic behaviors of the proposed PCLML model. Finally, we apply the LP and PCLML chaotic systems to image encryption to improve the effectiveness and security of the encryption scheme. By combining self-generating matrix model M and dynamic substitution box(S-Box) methods, we design a new image encryption algorithm. Numerical simulations and security analysis have been carried out to demonstrate that the proposed algorithm has a high security level and can efficiently encrypt several different kinds of images into random-like images. 展开更多
关键词 logistic-PWLCM map PCLML spatiotemporal chaos matrix model M dynamic S-Box image encryption
下载PDF
A new perturbation method to the Tent map and its application 被引量:2
16
作者 王兴元 王林林 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第5期191-198,共8页
Disturbance imposed on the chaotic systems is an effective way to maintain its chaotic good encryption features. This paper proposes a new perturbation method to the Tent map. First it divides the Tent map domain into... Disturbance imposed on the chaotic systems is an effective way to maintain its chaotic good encryption features. This paper proposes a new perturbation method to the Tent map. First it divides the Tent map domain into 2N parts evenly and selects a particular part from them, then proliferates the Tent map mapping trajectory of this particular part, which can disturb the entire system disturbance. The mathematical analysis and simulated experimental results prove that the disturbed Tent map has uniform invariant distribution and can produce good cryptographic properties of pseudo-random sequence. These facts avoid the phenomenon of short-period caused by the computer's finite precision and reducing the sequence's dependence on the disturbance signal, such that effectively compensate for the digital chaotic system dynamics degradation. 展开更多
关键词 PERTURBATION TENT DEGRADATION CHAOTIC
下载PDF
Impulsive synchronisation of a class of fractional-order hyperchaotic systems 被引量:2
17
作者 王兴元 张永雷 +1 位作者 林达 张娜 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第3期88-94,共7页
In this paper, an impulsive synchronisation scheme for a class of fractional-order hyperchaotic systems is proposed. The sufficient conditions of a class of integral-order hyperchaotic systems' impulsive synchronisat... In this paper, an impulsive synchronisation scheme for a class of fractional-order hyperchaotic systems is proposed. The sufficient conditions of a class of integral-order hyperchaotic systems' impulsive synchronisation are illustrated. Furthermore, we apply the sufficient conditions to a class of fractional-order hyperchaotic systems and well achieve impulsive synchronisation of these fractional-order hyperchaotic systems, thereby extending the applicable scope of impulsive synchronisation. Numerical simulations further demonstrate the feasibility and effectiveness of the proposed scheme. 展开更多
关键词 hyperchaotic systems fractional-order hyperchaotic systems impulsive synchronization
下载PDF
Passivation of carbon dimer defects in amorphous SiO_2/4H–SiC(0001) interface:A first-principles study 被引量:2
18
作者 张轶杰 尹志鹏 +1 位作者 苏艳 王德君 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第4期376-383,共8页
An amorphous SiO2/4 H–Si C(0001) interface model with carbon dimer defects is established based on density functional theory of the first-principle plane wave pseudopotential method.The structures of carbon dimer d... An amorphous SiO2/4 H–Si C(0001) interface model with carbon dimer defects is established based on density functional theory of the first-principle plane wave pseudopotential method.The structures of carbon dimer defects after passivation by H2 and NO molecules are established,and the interface states before and after passivation are calculated by the Heyd–Scuseria–Ernzerhof(HSE06) hybrid functional scheme.Calculation results indicate that H2 can be adsorbed on the O2–C = C–O2 defect and the carbon–carbon double bond is converted into a single bond.However,H2 cannot be adsorbed on the O2–(C = C)′ –O2 defect.The NO molecules can be bonded by N and C atoms to transform the carbon–carbon double bonds,thereby passivating the two defects.This study shows that the mechanism for the passivation of Si O2/4 H–SiC(0001) interface carbon dimer defects is to convert the carbon–carbon double bonds into carbon dimers.Moreover,some intermediate structures that can be introduced into the interface state in the band gap should be avoided. 展开更多
关键词 4H-SIC interface defect density of states firstprinciple
下载PDF
Optimal control based coordinated taxiing path planning and tracking for multiple carrier aircraft on flight deck 被引量:2
19
作者 Xin-wei Wang Hai-jun Peng +3 位作者 Jie Liu Xian-zhou Dong Xu-dong Zhao Chen Lu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2022年第2期238-248,共11页
Coordinated taxiing planning for multiple aircraft on flight deck is of vital importance which can dramatically improve the dispatching efficiency.In this paper,first,the coordinated taxiing path planning problem is t... Coordinated taxiing planning for multiple aircraft on flight deck is of vital importance which can dramatically improve the dispatching efficiency.In this paper,first,the coordinated taxiing path planning problem is transformed into a centralized optimal control problem where collision-free conditions and mechanical limits are considered.Since the formulated optimal control problem is of large state space and highly nonlinear,an efficient hierarchical initialization technique based on the Dubins-curve method is proposed.Then,a model predictive controller is designed to track the obtained reference trajectory in the presence of initial state error and external disturbances.Numerical experiments demonstrate that the proposed“offline planningþonline tracking”framework can achieve efficient and robust coordinated taxiing planning and tracking even in the presence of initial state error and continuous external disturbances. 展开更多
关键词 Carrier aircraft Coordinated path planning Centralized optimal control Trajectory tracking Model predictive control
下载PDF
A novel image block cryptosystem based on a spatiotemporal chaotic system and a chaotic neural network 被引量:1
20
作者 王兴元 鲍雪梅 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期232-240,共9页
In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (... In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL), where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters. The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML), which can be easily implemented in parallel by hard- ware. A 160-bit-long binary sequence is used to generate the initial conditions of the CML. The decryption process is symmetric relative to the encryption process. Theoretical analysis and experimental results prove that the block cryptosys- tem is secure and practical, and suitable for image encryption. 展开更多
关键词 image encryption block cryptosystem chaotic neural network coupled map lattice
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部