首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
This paper describes an efficient method to predict the nonlinear steady-state response of a complex structure with multi-scattered friction contacts. The contact friction force is equivalent to additional stiffness and damping based on optimal approximation theory, and as a consequence, the computation is simplified greatly by the linearization for a nonlinear system. In order to obtain accurate pressure distribution on the contact interfaces, the dynamic contact normal pressure is obtained by the equivalent static analysis which is validated for most engineering cases. Considering the complex procedure to determine the transformation between two different contact states, the differential forms of friction force are given to solve the tangential force accurately under the complex movement of interfaces. The approaches developed in this paper are particularly suitable to solve the dynamic response of large-scale structures with local contact nonlinearities. The entire procedure to calculate the steady-state response of a finite element model with a large number of degrees of freedom is demonstrated taking the blades with underplatform dampers as an example. The method is proved to be accurate and efficient; in particular, it does not suffer convergence problem in the allowable range of precision error, which exhibits remarkable potential engineering application values.  相似文献   

2.
A new pseudo-random number generator based on CML and chaotic iteration   总被引:1,自引:0,他引:1  
In this paper, we propose a new algorithm of generating pseudorandom number generator (PRNG), which we call (couple map lattice based on discrete chaotic iteration (CMLDCI)) that combine the couple map lattice (CML) and chaotic iteration. And we can prove that this method can be written in a form of chaos map, which is under the sense of Devaney chaos. In addition, we test the new algorithm in NIST 800-22 statistical test suits and we use it in image encryption.  相似文献   

3.
Nonlinear Dynamics - We investigate tunneling behavior between two bright solitons in a Bose–Einstein condensate with attractive contact interactions between atoms. The explicit tunneling...  相似文献   

4.
5.
Nonlinear Dynamics - Nonlinear dynamic systems and chaotic systems have been quite exhaustively researched in the domain of cryptography. However, the possibility of using fractional chaotic...  相似文献   

6.
The experimental realization of a chaotic secure communication system is introduced herein taking advantage of Arduino’s open source integrated development environment along with its preset functions that reduce development time and complexity. The system uses multi-directional multi-scroll chaotic oscillators that are based on piecewise-linear functions. Experimental results are given for chaos generators in 1-direction (1-D), 2-D and 3-D of up to 20, \(20\times 20\) and \(20\times 20\times 20\) scrolls, respectively. Using two chaos generators, a chaotic secure communication system is implemented in a master–slave topology by applying generalized Hamiltonian forms and observer approach. Finally, we detail experimental results for the synchronization of \(6\times 6\) and \(20\times 20\) scroll attractors, which are used for transmitting a monochromatic image through the Arduino-based chaotic secure communication system.  相似文献   

7.
Li  Bo  Liao  Xiaofeng  Jiang  Yan 《Nonlinear dynamics》2019,95(3):1781-1805
Nonlinear Dynamics - Based on an improved random number generator which is designed mainly by Gauss error function and digital discarding technology, a multi-rounds image encryption algorithm is...  相似文献   

8.
Zhao  Xinxin  Zang  Hongyan  Wei  Xinyuan 《Nonlinear dynamics》2022,110(1):821-839

Chaotic maps with good chaotic performance have been extensively designed in cryptography recently. This paper gives an nth-order polynomial chaotic map by using topological conjugation with piecewise linear chaos map. The range of chaotic parameters of this nth-order polynomial chaotic map is large and continuous. And the larger n is, the greater the Lyapunov exponent is and the more complex the dynamic characteristic of the nth-order polynomial chaotic map. The above characteristics of the nth-order polynomial chaotic map avoid the disadvantages of one-dimensional chaotic systems in secure application to some extent. Furthermore, the nth-order polynomial chaotic map is proved to be an extension of the Chebyshev polynomial map, which enriches chaotic map. The numerical simulation of dynamic behaviors for an 8th-order polynomial map satisfying the chaotic condition is carried out, and the numerical simulation results show the correctness of the related conclusion. This paper proposed the pseudorandom number generator according to the 8th-order polynomial chaotic map constructed in this paper. Using the performance analysis of the proposed pseudorandom number generator, the analysis result shows that the pseudorandom number generator according to the 8th-order polynomial chaotic map can efficiently generate pseudorandom sequences with higher performance through the randomness analysis with NIST SP800-22 and TestU01, security analysis and efficiency analysis. Compared with the other pseudorandom number generators based on chaotic systems in recent references, this paper performs a comprehensive performance analysis of the pseudorandom number generator according to the 8th-order polynomial chaotic map, which indicates the potential of its application in cryptography.

  相似文献   

9.
In this paper, we present a chaotic image encryption algorithm in which the key stream is generated by nonlinear Chebyshev function. The novel method of designing pseudorandom chaotic sequence is carried out with the created secret keys depending on with each other. We then make multiple permutation of pixels to decrease the strong correlation between adjacent pixels in original plain image. Further, a two-dimensional Chebyshev function is considered to avoid known-plaintext and chosen-plaintext attacks in diffusion process, i.e., even with a one-bit change in original plain image, the encrypted image would become different greatly. Simulation results are given to show that the proposed method can offer us an efficient way of encrypting image.  相似文献   

10.
In the chaotic Lorenz system, Chen system and Rössler system, their equilibria are unstable and the number of the equilibria are no more than three. This paper shows how to construct some simple chaotic systems that can have any preassigned number of equilibria. First, a chaotic system with no equilibrium is presented and discussed. Then a methodology is presented by adding symmetry to a new chaotic system with only one stable equilibrium, to show that chaotic systems with any preassigned number of equilibria can be generated. By adjusting the only parameter in these systems, one can further control the stability of their equilibria. This result reveals an intrinsic relationship of the global dynamical behaviors with the number and stability of the equilibria of a chaotic system.  相似文献   

11.
This paper is concerned with the stabilization problem of uncertain chaotic systems with input nonlinearity. The slope parameters of this nonlinearity are unmeasured. A new sliding function is designed, then an adaptive sliding mode controller is established such that the trajectory of the system converges to the sliding surface in a finite time and finite-time reachability is theoretically proved. Using a virtual state feedback control technique, sufficient condition for the asymptotic stability of sliding mode dynamics is derived via linear matrix inequality (LMI). Then the results can be extended to uncertain chaotic systems with disturbances and adaptive sliding mode H controllers are designed. Finally, a simulation example is presented to show the validity and advantage of the proposed method.  相似文献   

12.
Gao  Shigen  Dong  Hairong  Ning  Bin 《Nonlinear dynamics》2015,80(1-2):375-385
Nonlinear Dynamics - This paper is concerned with the neural adaptive control design problem of a class of chaotic systems with uncertain dynamics, input and output saturation. To attenuate the...  相似文献   

13.
In this paper, the global exponential stabilization for the chaotic brushless DC motor (BLDCM) is considered. Based on Lyapunov-like Theorem with differential and integral inequalities, a single and linear feedback control is proposed to realize the global stabilization of BLDCM with exponential convergence rate. The guaranteed exponential convergence rate can be also correctly estimated. Computer simulation results show that the proposed method is effective.  相似文献   

14.
The contribution of this work is to study the control of unknown chaotic systems with input saturation, and the backstepping-based an adaptive fuzzy neural controller (AFNC) is proposed. In many practical dynamic systems, physical input saturation on hardware dictates that the magnitude of the control signal is always constrained. Saturation is a potential problem for actuators of control systems. It often severely limits system performance, giving rise to undesirable inaccuracy or leading instability. To deal with saturation, we construct a new system with the same order as that of the plant. With the error between the control input and saturation input as the input of the constructed system, a number of signals are generated to compensate the effect of saturation. Finally, simulation results show that the AFNC can achieve favorable tracking performances.  相似文献   

15.
Recently, biometric-based remote user authentication schemes along with passwords have drawn considerable attention in research. In 2011, Das proposed an improvement on an efficient biometric-based remote user authentication scheme using smart cards and claimed his scheme could resist various attacks. However, there are some weaknesses in Das’s scheme such as the privileged insider attack and the off-line password guessing attack. Besides, Das’s scheme also cannot provide user anonymity. To overcome these weaknesses, we shall propose a secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps. The proposed scheme not only can resist the above-mentioned attacks, but also provide user anonymity.  相似文献   

16.
Nonlinear Dynamics - Recently, the time delay has considerable attention in the existence of chaos in the nonlinear dynamical systems. In this paper, we therefore develop a new cascade-coupled...  相似文献   

17.
To guarantee secure communication, many maps-based key agreement protocols have been proposed. Due to inherent tamper-resistance, most of them are based on smart cards. Unfortunately, the cost of cards and readers makes these protocols costly. In the real world, common storage devices, such as universal serial bus (USB) thumb drives, portable HDDs, mobile phones, and laptop or desktop PCs, are widely used, and they are much cheaper or more convenient for storing user authentication information. These devices do not provide tamper-resistance; it is a challenge to design a secure authentication protocol using these kinds of memory devices. In this paper, we will propose a maps-based key agreement protocol without using smart cards. According to our analysis, the proposed protocol guarantees mutual authentication, and also resists different attacks. Therefore, our protocol is suitable even for practical applications.  相似文献   

18.
Existence of unknown time-delay in the systems is a drastic restriction that it can menace the stability criteria and even deteriorate the performance system. This undesired case would be more intensified if that the uncertain input nonlinearity effects are also considered. To handle the input nonlinearities effects (results in dead-zone and/or hysteresis phenomena) and also unknown time-delay in the chaotic systems, this paper presents an observer-based Model Reference Adaptive Control (MRAC) scheme for a class of unknown time-delay chaotic systems with disturbances. This new method is a delay-independent variable-structure control method which is integrated with an observer system. The main task of the proposed approach is to accomplish a perfect tracking procedure such that unknown parameters are adapted via output estimation error. Furthermore, stability of the closed-loop system is achieved by means of the Lyapunov stability theory. Finally, the proposed methods are applied to some famous chaotic systems to verify the effectiveness of the proposed methods.  相似文献   

19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号