共查询到20条相似文献,搜索用时 359 毫秒
1.
2.
3.
替代数据法作为检验时间序列非线性和混沌的统计方法获得了广泛的应用.由于原替代数据法的零假设为线性高斯过程,可能把线性非高斯过程,特别是非最小相位过程误判为非线性.为了解决这一问题,提出并详细推导了基于功率谱等价的非最小相位序列求逆方法;结合基于高阶累积量的非最小相位自回归滑动平均模型辨识方法,提出了检验序列是否为线性非高斯过程的替代数据生成新算法.仿真算例表明,上述方法成功地克服了原替代数据法的不足.
关键词:
替代数据
非线性检验
非最小相位
功率谱等价 相似文献
4.
5.
利用替代数据法检验了摇摆条件下自然循环系统不规则复合型脉动的混沌特性, 并在此基础上进行混沌预测. 关联维数、最大Lyapunov指数等几何不变量计算结果表明不规则复合型脉动具有混沌特性, 但是由于计算结果受实验时间序列长度的限制和噪声的影响, 可能会出现错误的判断结果. 为了避免出现误判, 在提取流量脉动的非线性特征的同时, 需要用替代数据法进一步检验混沌特性是否来自于确定性的非线性系统. 本文用迭代的幅度调节Fourier 算法进行混沌检验, 在此基础上用加权一阶局域法进行混沌脉动的预测. 计算结果表明: 不规则复合型脉动是来自于确定性系统的混沌脉动, 加权一阶局域法对流量脉动进行混沌预测效果较好, 并提出动态预测方法.
关键词:
混沌时间序列
替代数据法
实时预测
两相流动不稳定性 相似文献
6.
根据实际超声换能系统的振动测试,提出了热超声键合换能系统动力学特性的非线性检验方法,利用基于相空间重构的替代数据法,通过对换能杆末端的实测数据进行正确替代,并用非线性动力学的理论来检验其是否具有非线性.通过实验对超声换能杆末端轴向、俯仰、横向的振动时间序列的关联维数进行了准确的计算,从而清晰地描述了上述三个方向的动力学特性.所提出的方法有利于更好地认识超声键合换能系统,为建立更加合理的非线性动力学模型奠定良好的理论基础,有很好的应用价值.
关键词:
超声键合
时间序列
相位随机化
替代数据 相似文献
7.
8.
9.
10.
11.
针对混沌系统参数辨识问题, 在基本群智能算法粒子群优化算法的基础上, 提出量子粒子群算法, 测试函数证明了算法具有良好的全局优化能力. 进而将其应用于混沌系统参数辨识问题, 将参数辨识问题转化为多维函数空间上的优化问题. 通过对平衡板热对流典型混沌系统Lorenz系统进行研究, 并与基本算法和遗传算法比较. 仿真实验证明, 算法的有效性, 对混沌理论的发展有着非常重要的意义.
关键词:
量子粒子群算法
混沌系统
系统辨识 相似文献
12.
To determine whether a given deterministic nonlinear dynamic system is chaotic or periodic,a novel test approach named zero-one (0-1) test has been proposed recently.In this approach,the regular and chaotic motions can be decided by calculating the parameter K approaching asymptotically to zero or one.In this study,we focus on the 0-1 test algorithm and illustrate the selection of parameters of this algorithm by numerical experiments.To validate the reliability and the universality of this algorithm,it is applied to typical nonlinear dynamic systems,including fractional-order dynamic system. 相似文献
13.
To improve the complexity of chaotic signals,in this paper we first put forward a new three-dimensional quadratic fractional-order multi-scroll hidden chaotic system,then we use the Adomian decomposition algorithm to solve the proposed fractional-order chaotic system and obtain the chaotic phase diagrams of different orders,as well as the Lyaponov exponent spectrum,bifurcation diagram,and SE complexity of the 0.99-order system.In the process of analyzing the system,we find that the system possesses the dynamic behaviors of hidden attractors and hidden bifurcations.Next,we also propose a method of using the Lyapunov exponents to describe the basins of attraction of the chaotic system in the matlab environment for the first time,and obtain the basins of attraction under different order conditions.Finally,we construct an analog circuit system of the fractional-order chaotic system by using an equivalent circuit module of the fractional-order integral operators,thus realizing the 0.9-order multi-scroll hidden chaotic attractors. 相似文献
14.
针对目前大数据环境中存在的数据安全问题,提出一种基于Hadoop大数据平台和无简并高维离散超混沌系统的加密算法.算法采用流密码对称加密方式,在Hadoop平台上读取存储于HDFS(Hadoop distributed file system)的大数据,进行分片处理和MapReduce编程后,用Map函数实现数据并行加密和解密,通过Reduce函数实现数据的合并操作并存储于HDFS.该算法具有较好的执行效率.与正李氏指数发生简并的低维混沌系统相比,无简并高维离散超混沌加密算法能提高系统安全性能,李氏指数均为正并且足够大,具有更好的统计特性,可通过严格的TESTU01测试,并行加密的密文之间互相关性很小.密钥参数众多使得估计或辨识难度增大.在密文闭环反馈条件下,具有抵御已知明文攻击和选择明文攻击的能力. 相似文献
15.
针对一类连续时间异结构混沌系统, 利用自抗扰控制很强的鲁棒性, 提出了一种异结构混沌系统反同步的自抗扰控制策略.针对所设计的自抗扰控制器参数较多, 难以整定的问题, 提出了应用混沌粒子群优化算法对控制器进行参数寻优设计. 以Lorenz系统和Chua系统两个异结构混沌系统为例进行仿真验证, 由仿真结果可知, 该方法可以实现异结构混沌系统较快的反同步控制, 且具有很强的抗干扰能力.
关键词:
异结构混沌系统反同步
自抗扰控制器
混沌粒子群优化算法
参数寻优 相似文献
16.
In this paper we investigate the dynamics of a test particle in
the gravitational field with a quadrupole. By constructing
Poincaré sections for different values of the parameters and
initial conditions, we find a chaotic evolution. From these
Poincaré sections, we further confirm that the chaotic
evolution of the test particle originates from the quadrupole. 相似文献
17.
Modified projective synchronization with complex scaling factors of uncertain real chaos and complex chaos 下载免费PDF全文
To increase the variety and security of communication, we present the definitions of modified projective synchronization with complex scaling factors (CMPS) of real chaotic systems and complex chaotic systems, where complex scaling factors establish a link between real chaos and complex chaos. Considering all situations of unknown parameters and pseudo-gradient condition, we design adaptive CMPS schemes based on the speed-gradient method for the real drive chaotic system and complex response chaotic system and for the complex drive chaotic system and the real response chaotic system, respectively. The convergence factors and dynamical control strength are added to regulate the convergence speed and increase robustness. Numerical simulations verify the feasibility and effectiveness of the presented schemes. 相似文献
18.
《Chinese Journal of Physics (Taipei)》2018,56(5):2381-2394
A new three-dimensional autonomous chaotic system is proposed. This new system can generate single-scroll, double-scroll, three-scroll and four-scroll attractors under different system parameters. Particularly, it can generate a four-scroll chaotic attractor composed of a large Chua-like attractor and a small Lorenz-like attractor. And the system can also generate a nested three-scroll attractor and the multi-double-scroll chaotic attractor. In addition, the system possesses the chaotic state transition, and the number of scrolls will change in the state transition process. The formation mechanism of the composite four-scroll chaotic attractor is analyzed in detail. The dynamic analysis methods include time series, 0–1 test chart, phase diagram, bifurcation diagram and Lyapunov exponents are used to describe some basic dynamics behaviors of the proposed system. 相似文献
19.
20.
Xiaopeng Yan 《中国物理 B》2022,31(8):80504-080504
We present a new cosine chaotic mapping proved by chaos theory test and analysis such that the system has good cryptography properties, wide chaos range, simple structure, and good sensitivity to initial value, and the mapping can meet the needs of chaotic image encryption. Based on the cosine chaotic system, we propose a new encryption method. First, according to the cyclic characteristics of the mapping, the cyclic information wave is simulated. Second, the quasi-Doppler effect is used to synchronously scramble and diffuse the image to obfuscate the original pixel. Finally, the XOR diffusion of image pixels is carried out by information wave to further enhance the encryption effect. Simulation experiment and security analysis show that the algorithm has good security, can resist the common attack mode, and has good efficiency. 相似文献