首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
刘乐柱  张季谦  许贵霞  梁立嗣  汪茂胜 《物理学报》2014,63(1):10501-010501
本文提出一种混沌保密通信方法,即混沌系统的部分序列用于混沌系统参数辨识其他序列用于通信保密.利用混沌蚁群优化算法对部分序列混沌系统进行参数辨识,以达到了解混沌系统全部信息的目的.在参数辨识过程中引入参数空间和蚁群空间,通过空间变换函数使参数空间与蚁群空间之间相互变换.文中使用Lorenz系统进行数值试验,其结果验证混沌系统部分序列参数辨识及混沌保密通信的可行性.  相似文献   

2.
混沌伪随机序列复杂度分析的符号动力学方法   总被引:6,自引:0,他引:6       下载免费PDF全文
肖方红  阎桂荣  韩宇航 《物理学报》2004,53(9):2876-2881
通过将混沌伪随机序列看成一个符号序列,提出了用符号动力学的 方法来分析混沌伪随机序列的复杂度.以Logistic映射和耦合映射格子系统产生的混沌伪随 机序列为例,说明了该方法的应用,并将计算结果与近似熵ApEn法的计算结果作了比较.结 果表明,该方法可以有效地判断出不同的混沌伪随机序列的复杂程度,而且比近似熵法更为 优越. 关键词: 混沌 伪随机序列 符号动力学 熵  相似文献   

3.
一种混沌伪随机序列复杂度分析法   总被引:20,自引:3,他引:17       下载免费PDF全文
蔡觉平  李赞  宋文涛 《物理学报》2003,52(8):1871-1876
分析了已有的序列线性复杂度分析方法,提出了用近似熵算法计算混沌运动的测度熵,作为衡量混沌伪随机序列复杂度的标准.理论研究表明,利用较短的观察序列,该方法能够准确地反映混沌系统和混沌伪随机序列复杂度的大小,可以作为判断利用混沌系统产生的伪随机序列的复杂度准则.实验结果表明该方法的有效性和理论结果的正确性. 关键词: 混沌 伪随机序列 熵  相似文献   

4.
张雪锋  范九伦 《物理学报》2010,59(4):2289-2297
结合线性反馈移位寄存器(LFSR)和混沌理论各自的优点,采用循环迭代结构,给出一种将LFSR和混沌理论相结合的伪随机序列生成方法.首先根据LFSR的计算结果产生相应的选择函数,通过选择函数确定当前迭代计算使用的混沌系统,应用选择的混沌系统进行迭代计算产生相应的混沌序列;然后把生成的混沌序列进行数制转换,在将得到的二进制序列作为产生的伪随机序列输出的同时将其作为反馈值与LFSR的反馈值进行相应的运算,运算结果作为LFSR的最终反馈值,实现对LFSR生成序列的随机扰动.该方法既可生成二值伪随机序列,也可生成实值伪随机序列.通过实验对生成的伪随机序列进行了分析,结果表明,产生的序列具有良好的随机性和安全性. 关键词: 线性反馈移位寄存器 混沌系统 伪随机序列 随机性  相似文献   

5.
张雪锋  范九伦 《中国物理 B》2010,19(4):2298-2304
结合线性反馈移位寄存器(LFSR)和混沌理论各自的优点,采用循环迭代结构,给出一种将LFSR和混沌理论相结合的伪随机序列生成方法.首先根据LFSR的计算结果产生相应的选择函数,通过选择函数确定当前迭代计算使用的混沌系统,应用选择的混沌系统进行迭代计算产生相应的混沌序列;然后把生成的混沌序列进行数制转换,在将得到的二进制序列作为产生的伪随机序列输出的同时将其作为反馈值与LFSR的反馈值进行相应的运算,运算结果作为LFSR的最终反馈值,实现对LFSR生成序列的随机扰动.该方法既可生成二值伪随机序列,也可生成实值伪随机序列.通过实验对生成的伪随机序列进行了分析,结果表明,产生的序列具有良好的随机性和安全性.  相似文献   

6.
孙克辉  贺少波  盛利元 《物理学报》2011,60(2):20505-020505
为了分析混沌序列的复杂度,文中采用强度统计复杂度算法分别对离散混沌系统(TD-ERCS)和连续混沌系统(简化Lorenz系统)进行复杂度分析,计算了混沌序列随参数变化的复杂度,分析了连续混沌系统产生的伪随机序列分别进行m序列和混沌伪随机序列扰动后的复杂度.研究表明,强度统计复杂度算法是一种有效的复杂度分析方法,离散混沌序列复杂度大于连续混沌序列复杂度,但对连续混沌系统的伪随机序列进行m序列和混沌伪随机序列扰动后可大大增加复杂度,为混沌序列在信息加密中的应用提供了理论依据. 关键词: 强度统计复杂度算法 TD-ERCS系统 简化Lorenz系统 序列扰动  相似文献   

7.
混沌的可加性   总被引:26,自引:1,他引:26       下载免费PDF全文
甘建超  肖先赐 《物理学报》2003,52(5):1085-1090
从理论上推导了由几个混沌时间序列构成的新序列的动力学特性,提出了可加性的概念.计 算机仿真结果说明,新的时间序列具有分维吸引子,对初始值很敏感,两条邻近轨道随着时 间的增加呈现指数分离,具有短期可预测性,因此新序列也是混沌序列,即混沌具有可加性 .混沌时间序列的可加性理论不仅具有重要的理论意义,而且具有重要的应用价值,它是研 究多跳频电台的跳频码的理论基础. 关键词: 混沌时间序列 吸引子 分维 可加性  相似文献   

8.
基于极端学习机的多变量混沌时间序列预测   总被引:4,自引:0,他引:4       下载免费PDF全文
王新迎  韩敏 《物理学报》2012,61(8):80507-080507
针对多变量混沌时间序列预测问题, 提出了一种基于输入变量选择和极端学习机的预测模型. 其基本思想是 对多变量混沌时间序列进行相空间重构后, 采用互信息方法选择与预测输出统计相关最高的重构输入变量, 借助极端学习机的通用逼近能力建立多变量混沌时间序列的预测模型. 为进一步提高预测精度, 采用模型选择算法选择具有最小期望风险的极端学习机预测模型. 基于Lorenz, Rössler多变量混沌时间序列及Rössler超混沌时间序列的仿 真结果证明所提方法的有效性.  相似文献   

9.
基于模糊边界模块化神经网络的混沌时间序列预测   总被引:3,自引:0,他引:3       下载免费PDF全文
马千里  郑启伦  彭宏  覃姜维 《物理学报》2009,58(3):1410-1419
提出一种模糊边界模块化神经网络(FBMNN)的混沌时间序列预测方法,该方法先对混沌时间序列观测点重构的相空间进行模块化划分,划分点的选取由遗传算法自动寻优.然后定义一个模糊隶属度函数,在划分边界一侧按照一定的模糊隶属度设定模糊边界带,通过模糊化处理,解决了各模块划分点附近预测结果的跳跃问题.最后每一模块,及其模糊边界的样本点都对应一个递归神经网络进行训练,通过预测合成模块输出结果.该方法对三个混沌时间序列基准数据集Mackey-Glass,Lorenz,Henon进行实验,结果表明该方法有效地提高了混沌时间序列预测效果. 关键词: 模糊边界 模块化神经网络 混沌时间序列 预测  相似文献   

10.
王继志  王美琴  王英龙 《物理学报》2008,57(5):2737-2742
指出了一类基于混沌映射构造带密钥单向hash函数算法的碰撞问题,并对其产生的机理进行了初步分析,给出了数字化混沌序列非奇异的定义,证明了数字化混沌序列非奇异的充要条件,并分析了变参数离散混沌动力系统数字化后序列的周期性.分析结果表明这类算法产生碰撞的原因是其对混沌映射的数字化导致混沌序列的奇异性,因此必须谨慎选择混沌映射的数字化方法以保证混沌序列的非奇异性. 关键词: 混沌 带密钥散列函数 碰撞 非奇异性  相似文献   

11.
Sequence optimization and appropriate sequence selection is still an unmet need in magnetic resonance fingerprinting (MRF). The main challenge in MRF sequence design is the lack of an appropriate measure of the sequence's encoding capability. To find such a measure, three different candidates for judging the encoding capability have been investigated: local and global dot-product-based measures judging dictionary entry similarity as well as a Monte Carlo method that evaluates the noise propagation properties of an MRF sequence. Consistency of these measures for different sequence lengths as well as the capability to predict actual sequence performance in both phantom and in vivo measurements was analyzed. While the dot-product-based measures yielded inconsistent results for different sequence lengths, the Monte Carlo method was in a good agreement with phantom experiments. In particular, the Monte Carlo method could accurately predict the performance of different flip angle patterns in actual measurements. The proposed Monte Carlo method provides an appropriate measure of MRF sequence encoding capability and may be used for sequence optimization.  相似文献   

12.
《Physica A》2006,371(2):157-170
We study the effects of an external periodic perturbation on a Poisson rate process, with special attention to the perturbation-induced sojourn-time patterns. We show that these patterns correspond to turning a memory-less sequence into a sequence with memory. The memory effects are stronger the slower the perturbation. The adoption of a de-trending technique, applied with no caution, might generate the impression that no fluctuation–periodicity correlation exists. We find that this is due to the fact that the perturbation-induced memory is a global property and that the result of a local in time analysis would not find any memory effect, insofar as the process under study is locally a Poisson process. We find that an efficient way to detect this memory effect is to analyze the moduli of the de-trended sequence. We turn the sequence to analyze into a diffusion process, and we evaluate the Shannon entropy of the resulting diffusion process. We find that both the original sequence and the suitably processed de-trended sequence yield the same dependence of entropy on time, namely, an initial scaling larger than ordinary scaling, and a sequel of weak oscillations, which are a clear signature of the external perturbation, in both cases. This is a clear indication of the fluctuation–periodicity correlation.  相似文献   

13.
本文提出一个回波序列,它由四个90和一个45脉冲构成,具有较宽的激发带宽和较短的激发时间,可用于氘核NMR固体线型的测量之中,数值计算结果表明该回波序列的激发带宽几乎比传统的四极回波宽一倍。2D-PMMA粉末样品的实验结果证实了本文设计的回波序列的优越性。  相似文献   

14.
15.
In order to obtain long-time reverberation, an innovative experiment is operated, using a sequence of explosions with a interval time. The relationship between reverberation generated by single explosion and a sequence of explosions is discussed. The data are obtained from the experiment, then analyzed with method of wavelet transform, conclusion is obtained that power generated by sequence of explosions with different interval time spreads uniformly at low frequency range, unequally at high frequency range.  相似文献   

16.
The band structures of Fibonacci sequence composed of single-negative materials are studied with a transfer matrix method. A new type of omnidirectional single-negative gaps is found in the Fibonacci sequence. In contrast to the Bragg gaps, such an omnidirectional single-negative gap is insensitive to the incident angles and polarization, and is invariant upon the change of the ratio of the thicknesses of two media. It is found that omnidirectional single-negative gap exists in the other Fibonacci sequence, and it is rather stable and independence of the structure sequence.  相似文献   

17.
Here we report a modified pulsed gradient spin-echo (PGSTE) pulse sequence to measure diffusion coefficients. This approach incorporates WATERGATE combined with isotopic filtering into a standard PGSTE experiment. Doing this eliminates much of the disadvantages from the combination of diffusion encoding and heteronuclear selection intervals and allows for facile modification of the diffusion pulse sequence with flexibility of the time period between RF pulses. The new diffusion pulse sequence is demonstrated using an 15N-labeled peptide and an 15N-labeled protein in a mixture with a protein of similar size.  相似文献   

18.
Deutsch's octave illusion occurs when two tones that are spaced an octave apart are repeatedly presented in alternation; the sequence is presented to both ears simultaneously but offset by one tone, so that two dichotic chords are repeatedly presented in alternation. The most common illusory percept consists of an intermittent high tone in one ear alternating with an intermittent low tone in the other ear. The aim of this study was to investigate whether, once the illusory percept has emerged, the illusion will persist when the original sequence is followed by another sequence consisting of the repeated presentation of one of the two dichotic chords. Forty nai?ve subjects were tested with stimuli consisting first of a priming sequence containing dichotic octaves alternating between ears followed immediately by a test sequence consisting of a single dichotic octave presented repeatedly. The durations of the priming and test sequences were manipulated. The findings showed that the illusory percept is maintained after the switch from alternation to repetition and that the relative length of the priming and test sequences has a negligible influence on the persistence of the illusory percept.  相似文献   

19.
The versatility of using a stochastic pulse sequence to elucidate peaks with a wide range of shifts, peak widths, and T(1) relaxation times is demonstrated. A stochastic sequence is combined with high speed magic angle spinning (MAS) to obtain the broad and largely shifted peak associated with (31)P in LiNiPO(4). A stochastic sequence is also used to obtain a spectrum of 85% H(3)PO(4), which has a much longer T(1) value. The signal-to-noise was comparable for spectra of 85% H(3)PO(4) obtained with either a stochastic sequence or an optimized Ernst angle experiment. Experimental parameters for the stochastic experiment are set depending only on the ringdown of the probe and not on any inherent qualities of the sample. A stochastic sequence, therefore, combined with MAS provides a useful strategy for finding peaks with unknown T(1) relaxation constants, peak widths, and shifts.  相似文献   

20.
杨群亭  高铁杠 《中国物理 B》2008,17(7):2388-2393
The design of an efficient one-way hash function with good performance is a hot spot in modern cryptography researches. In this paper, a hash function construction method based on cell neural network with hyper-chaos characteristics is proposed. First, the chaos sequence is gotten by iterating cellular neural network with Runge Kutta algorithm, and then the chaos sequence is iterated with the message. The hash code is obtained through the corre- sponding transform of the latter chaos sequence. Simulation and analysis demonstrate that the new method has the merit of convenience, high sensitivity to initial values, good hash performance, especially the strong stability.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号