A more general form of projective synchronization, so called linear generalized synchronization (LGS) is proposed, which includes the generalized projective synchronization (GPS) and the hybrid projective synchron...A more general form of projective synchronization, so called linear generalized synchronization (LGS) is proposed, which includes the generalized projective synchronization (GPS) and the hybrid projective synchronization (HPS) as its special cases, Based on the adaptive technique and Lyapunov stability theory, a general method for achieving the LGS between two chaotic or hyperehaotic systems with uncertain parameters in any scaling matrix is presented. Some numerical simulations are provided to show the effectiveness and feasibility of the proposed synchronization method.展开更多
A new kind of secure communication system which combines the chaotic encryption means with the conventional encryption method is discussed. With the analysis results and the experiment data, the anti-attack ability of...A new kind of secure communication system which combines the chaotic encryption means with the conventional encryption method is discussed. With the analysis results and the experiment data, the anti-attack ability of this communication system is significantly improved compared to that of the either method. At the same time, a new method of chaotic synchronization is proposed. With a small mixed discrete chaotic signal, it is quickly to synchronize the communication and a good security performance is ensured.展开更多
A new human action recognition approach was presented based on chaotic invariants and relevance vector machines(RVM).The trajectories of reference joints estimated by skeleton graph matching were adopted for represent...A new human action recognition approach was presented based on chaotic invariants and relevance vector machines(RVM).The trajectories of reference joints estimated by skeleton graph matching were adopted for representing the nonlinear dynamical system of human action.The C-C method was used for estimating delay time and embedding dimension of a phase space which was reconstructed by each trajectory.Then,some chaotic invariants representing action can be captured in the reconstructed phase space.Finally,RVM was used to recognize action.Experiments were performed on the KTH,Weizmann and Ballet human action datasets to test and evaluate the proposed method.The experiment results show that the average recognition accuracy is over91.2%,which validates its effectiveness.展开更多
A strategy for a novel concatenated chaotic communication system is presented. The transmitter system comprises chaotic turbo encoder and logistic CSK block in a serially concatenated form. Chaotic turbo code is capab...A strategy for a novel concatenated chaotic communication system is presented. The transmitter system comprises chaotic turbo encoder and logistic CSK block in a serially concatenated form. Chaotic turbo code is capable of reducing bit error rate (BER) of the chaotic system in the AWGN channel. Through the chaotic turbo encoder, the coded sequence, which has quasi-chaotic properties, will be transmitted into the logistic CSK block. Having a very sensitive dependence on initial conditions of the map, the logistic CSK block can also be taken as the chaotic authentication method. The receiver, which has logistic demodulation block and chaotic decoder, is a linear asymptotic approximation to the inverse of the transmitter system. A chaotic iterative soft-decision decoding algorithm is also developed based on conventional maximum A posteriori decoding algorithm. At last, a two-step authentication method of this chaotic system is also presented.展开更多
To seek for lower-dimensional chaotic systems that have complex topological attractor structure with simple algebraic system structure, a new chaotic system of three-dimensional autonomous ordinary differential equati...To seek for lower-dimensional chaotic systems that have complex topological attractor structure with simple algebraic system structure, a new chaotic system of three-dimensional autonomous ordinary differential equations is presented. The new system has simple algebraic structure, and can display a 2-scroll attractor with complex topological structure, which is different from the Lorenz's, Chen's and Lu¨'s attractors. By introducing a linear state feedback controller, the system can be controlled to generate a hyperchaotic attractor. The novel chaotic attractor, hyperchaotic attractor and dynamical behaviors of corresponding systems are further investigated by employing Lyapunov exponent spectrum, bifurcation diagram, Poincar′e mapping and phase portrait, etc., and then verified by simulating an experimental circuit.展开更多
A novel chaotic search method is proposed,and a hybrid algorithm combining particle swarm optimization(PSO) with this new method,called CLSPSO,is put forward to solve 14 integer and mixed integer programming problems....A novel chaotic search method is proposed,and a hybrid algorithm combining particle swarm optimization(PSO) with this new method,called CLSPSO,is put forward to solve 14 integer and mixed integer programming problems.The performances of CLSPSO are compared with those of other five hybrid algorithms combining PSO with chaotic search methods.Experimental results indicate that in terms of robustness and final convergence speed,CLSPSO is better than other five algorithms in solving many of these problems.Furthermore,CLSPSO exhibits good performance in solving two high-dimensional problems,and it finds better solutions than the known ones.A performance index(PI) is introduced to fairly compare the above six algorithms,and the obtained values of(PI) in three cases demonstrate that CLSPSO is superior to all the other five algorithms under the same conditions.展开更多
Pulse Doppler(PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially digital radio frequency memory technology, the deficiency in the anti-repeater jamming of a tradit...Pulse Doppler(PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially digital radio frequency memory technology, the deficiency in the anti-repeater jamming of a traditional PD fuze increasingly emerges. Therefore, a repeater jamming suppression method for a PD fuze based on identity(ID) recognition and chaotic encryption is proposed. Every fuze has its own ID which is encrypted with different chaotic binary sequences in every pulse period of the transmitted signal. The thumbtack-shaped ambiguity function shows a good resolution and distance cutoff characteristic. The ability of anti-repeater jamming is emphatically analyzed, and the results at different signal-to-noise ratio(SNR) show a strong anti-repeater jamming ability and range resolution that the proposed method possesses. Furthermore, the anti-repeater jamming ability is influenced by processing gain, bit error rate(BER) and correlation function. The simulation result validates the theoretical analysis, it shows the proposed method can significantly improve the anti-repeater jamming ability of a PD fuze.展开更多
By adopting the chaotic searching to improve the global searching performance of the particle swarm optimization (PSO), and using the improved PSO to optimize the key parameters of the support vector machine (SVM) for...By adopting the chaotic searching to improve the global searching performance of the particle swarm optimization (PSO), and using the improved PSO to optimize the key parameters of the support vector machine (SVM) forecasting model, an improved SVM model named CPSO-SVM model was proposed. The new model was applied to predicting the short term load, and the improved effect of the new model was proved. The simulation results of the South China Power Market’s actual data show that the new method can effectively improve the forecast accuracy by 2.23% and 3.87%, respectively, compared with the PSO-SVM and SVM methods. Compared with that of the PSO-SVM and SVM methods, the time cost of the new model is only increased by 3.15 and 4.61 s, respectively, which indicates that the CPSO-SVM model gains significant improved effects.展开更多
In order to solve reliability-redundancy allocation problems more effectively, a new hybrid algorithm named CDEPSO is proposed in this work, which combines particle swarm optimization (PSO) with differential evoluti...In order to solve reliability-redundancy allocation problems more effectively, a new hybrid algorithm named CDEPSO is proposed in this work, which combines particle swarm optimization (PSO) with differential evolution (DE) and a new chaotic local search. In the CDEPSO algorithm, DE provides its best solution to PSO if the best solution obtained by DE is better than that by PSO, while the best solution in the PSO is performed by chaotic local search. To investigate the performance of CDEPSO, four typical reliability-redundancy allocation problems were solved and the results indicate that the convergence speed and robustness of CDEPSO is better than those of PSO and CPSO (a hybrid algorithm which only combines PSO with chaotic local search). And, compared with the other six improved meta-heuristics, CDEPSO also exhibits more robust performance. In addition, a new performance was proposed to more fairly compare CDEPSO with the same six improved recta-heuristics, and CDEPSO algorithm is the best in solving these problems.展开更多
It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attenti...It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attention since it is one kind of applicable spread spectrum sequences. However, there are unavoidable short cyclic problems for chaotic binary sequences in finite precision. The chaotic binary sequence generating methods are studied first. Then the short cyclic behavior of the chaotic sequences is analyzed in detail, which are generated by quantification approaches with finite word-length. At the same time, a chaotic similar function is defined for presenting the cyclic characteristics of the sequences. Based on these efforts, an improved method with scrambling control for generating chaotic binary sequences is proposed. To quantitatively describe the improvement of periodic performance of the sequences, an orthogonal estimator is also defined. Some simulating results are provided. From the theoretical deduction and the experimental results, it is concluded that the proposed method can effectively increase the period and raise the complexity of the chaotic sequences to some extent.展开更多
Chaotic mixing is regarded as an effective method to improve the mixing effect in the laminar stirred tank.To generate chaos in flow field in stirred tank,many efforts including aperiodic movement,asystematic installa...Chaotic mixing is regarded as an effective method to improve the mixing effect in the laminar stirred tank.To generate chaos in flow field in stirred tank,many efforts including aperiodic movement,asystematic installation impeller,etc.,were made to save mixing time and energy consumption.The computational fluid dynamics of chaotic flow field and the hyperchaotic controlling method as well as macro-instability were reviewed.Multiple flow field coupling is important in the turbulent mixing region of stirred tank.The development trends of flow field coupling and hyperchaotic controlling in chaotic mixing were prospected in energy saving operation.展开更多
Two problems are proposed. The first one is the noise decontamination of chaotic carriers using a deterministic approach to reconstruct pseudo trajectories, the second is the design of communications schemes with chao...Two problems are proposed. The first one is the noise decontamination of chaotic carriers using a deterministic approach to reconstruct pseudo trajectories, the second is the design of communications schemes with chaotic carriers. After presenting our deterministic noise decontamination algorithm, conventional chaos shift keying (CSK) communication system is applied. The difference of Euclidean distance between noisy trajectory and decontaminated trajectory in phase space could be utilized to non-coherently detect the sent symbol simply and effectively. It is shown that this detection method can achieve the bit error rate performance comparable to other non-coherent systems.展开更多
Considering chaotic time series multi-step prediction, multi-step direct prediction model based on partial least squares (PLS) is proposed in this article, where PLS, the method for predicting a set of dependent var...Considering chaotic time series multi-step prediction, multi-step direct prediction model based on partial least squares (PLS) is proposed in this article, where PLS, the method for predicting a set of dependent variables forming a large set of predictors, is used to model the dynamic evolution between the space points and the corresponding future points. The model can eliminate error accumulation with the common single-step local model algorithm~ and refrain from the high multi-collinearity problem in the reconstructed state space with the increase of embedding dimension. Simulation predictions are done on the Mackey-Glass chaotic time series with the model. The satisfying prediction accuracy is obtained and the model efficiency verified. In the experiments, the number of extracted components in PLS is set with cross-validation procedure.展开更多
An adaptive chaotic gradient descending optimization algorithm for single objective optimization was presented. A local minimum judged by two rules was obtained by an improved mutative-step gradient descending method....An adaptive chaotic gradient descending optimization algorithm for single objective optimization was presented. A local minimum judged by two rules was obtained by an improved mutative-step gradient descending method. A new optimal minimum was obtained to replace the local minimum by mutative-scale chaotic search algorithm whose scales are magnified gradually from a small scale in order to escape local minima. The global optimal value was attained by repeatedly iterating. At last, a BP (back-propagation) neural network model for forecasting slag output in matte converting was established. The algorithm was used to train the weights of the BP neural network model. The simulation results with a training data set of 400 samples show that the training process can be finished within 300 steps to obtain the global optimal value, and escape local minima effectively. An optimization system for operation parameters, which includes the forecasting model, is achieved, in which the output of converter increases by 6.0%, and the amount of the treated cool materials rises by 7.8% in the matte converting process.展开更多
To evaluate the credit risk of customers in power market precisely, the new chaotic searching and fuzzy neural network (FNN) hybrid algorithm were proposed. By combining with the chaotic searching, the learning abilit...To evaluate the credit risk of customers in power market precisely, the new chaotic searching and fuzzy neural network (FNN) hybrid algorithm were proposed. By combining with the chaotic searching, the learning ability of the FNN was markedly enhanced. Customers’ actual credit flaw data of power supply enterprises were collected to carry on the real evaluation, which can be treated as example for the model. The result shows that the proposed method surpasses the traditional statistical models in regard to the precision of forecasting and has a practical value. Compared with the results of ordinary FNN and ANN, the precision of the proposed algorithm can be enhanced by 2.2% and 4.5%, respectively.展开更多
A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for...A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for the performance of QS-CDMA system with RAKE receiver. The performance of the system is analyzed when the hybrid chaotic sequences are used as spreading codes in a QS-CDMA system with RAKE receiver and compared with those obtained for m-se-quences and logistic sequences. The results show that the hybrid chaotic sequences are a class of very promising spreading codes for QS-CDMA system.展开更多
0-1 programming is a special case of the integer programming, which is commonly encountered in many optimization problems. Neural network and its general energy function are presented for 0-1 optimization problem. The...0-1 programming is a special case of the integer programming, which is commonly encountered in many optimization problems. Neural network and its general energy function are presented for 0-1 optimization problem. Then, the 0-1 optimization problems are solved by a neural network model with transient chaotic dynamics (TCNN). Numerical simulations of two typical 0-1 optimization problems show that TCNN can overcome HNN's main drawbacks that it suffers from the local minimum and can search for the global optimal solutions in to solveing 0-1 optimization problems.展开更多
A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomizat...A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks.展开更多
A laboratory leaching experiment with samples of different grades was carried out, and an analytical method of concentration of leaching solution was put forward. For each sample, respectively, by applying phase space...A laboratory leaching experiment with samples of different grades was carried out, and an analytical method of concentration of leaching solution was put forward. For each sample, respectively, by applying phase space reconstruction for time series of monitoring data, the saturated embedding dimension and the correlation dimension were obtained, and the evolution laws between neighboring points in the reconstructed phase space were revealed. With BP neural network, a prediction model of concentration of leaching solution was set up and the maximum error of which was less than 2%. The results show that there exist chaotic characteristics in leaching system, and samples of different grades have different nonlinear dynamic features; the higher the grade of sample, the smaller the correlation dimension; furthermore, the maximum Lyapunov index, energy dissipation and chaotic extent of the leaching system increase with grade of the sample; by phase space reconstruction, the subtle change features of concentration of leaching solution can be magnified and the inherent laws can be fully demonstrated. According to the laws, a prediction model of leaching cycle period has been established to provide a theoretical foundation for solution mining.展开更多
基金the National Natural Science Foundation of China (60574045 10661006).
文摘A more general form of projective synchronization, so called linear generalized synchronization (LGS) is proposed, which includes the generalized projective synchronization (GPS) and the hybrid projective synchronization (HPS) as its special cases, Based on the adaptive technique and Lyapunov stability theory, a general method for achieving the LGS between two chaotic or hyperehaotic systems with uncertain parameters in any scaling matrix is presented. Some numerical simulations are provided to show the effectiveness and feasibility of the proposed synchronization method.
文摘A new kind of secure communication system which combines the chaotic encryption means with the conventional encryption method is discussed. With the analysis results and the experiment data, the anti-attack ability of this communication system is significantly improved compared to that of the either method. At the same time, a new method of chaotic synchronization is proposed. With a small mixed discrete chaotic signal, it is quickly to synchronize the communication and a good security performance is ensured.
基金Project(50808025) supported by the National Natural Science Foundation of ChinaProject(20090162110057) supported by the Doctoral Fund of Ministry of Education,China
文摘A new human action recognition approach was presented based on chaotic invariants and relevance vector machines(RVM).The trajectories of reference joints estimated by skeleton graph matching were adopted for representing the nonlinear dynamical system of human action.The C-C method was used for estimating delay time and embedding dimension of a phase space which was reconstructed by each trajectory.Then,some chaotic invariants representing action can be captured in the reconstructed phase space.Finally,RVM was used to recognize action.Experiments were performed on the KTH,Weizmann and Ballet human action datasets to test and evaluate the proposed method.The experiment results show that the average recognition accuracy is over91.2%,which validates its effectiveness.
基金This project was supported by the National Natural Science Foundation of China (No. 60072028).
文摘A strategy for a novel concatenated chaotic communication system is presented. The transmitter system comprises chaotic turbo encoder and logistic CSK block in a serially concatenated form. Chaotic turbo code is capable of reducing bit error rate (BER) of the chaotic system in the AWGN channel. Through the chaotic turbo encoder, the coded sequence, which has quasi-chaotic properties, will be transmitted into the logistic CSK block. Having a very sensitive dependence on initial conditions of the map, the logistic CSK block can also be taken as the chaotic authentication method. The receiver, which has logistic demodulation block and chaotic decoder, is a linear asymptotic approximation to the inverse of the transmitter system. A chaotic iterative soft-decision decoding algorithm is also developed based on conventional maximum A posteriori decoding algorithm. At last, a two-step authentication method of this chaotic system is also presented.
基金supported by the National Natural Science Foundation of China (60971090)the Natural Science Foundation of Jiangsu Province (BK 2009105)
文摘To seek for lower-dimensional chaotic systems that have complex topological attractor structure with simple algebraic system structure, a new chaotic system of three-dimensional autonomous ordinary differential equations is presented. The new system has simple algebraic structure, and can display a 2-scroll attractor with complex topological structure, which is different from the Lorenz's, Chen's and Lu¨'s attractors. By introducing a linear state feedback controller, the system can be controlled to generate a hyperchaotic attractor. The novel chaotic attractor, hyperchaotic attractor and dynamical behaviors of corresponding systems are further investigated by employing Lyapunov exponent spectrum, bifurcation diagram, Poincar′e mapping and phase portrait, etc., and then verified by simulating an experimental circuit.
基金Projects(50275150,61173052) supported by the National Natural Science Foundation of ChinaProject(14FJ3112) supported by the Planned Science and Technology of Hunan Province,ChinaProject(14B033) supported by Scientific Research Fund Education Department of Hunan Province,China
文摘A novel chaotic search method is proposed,and a hybrid algorithm combining particle swarm optimization(PSO) with this new method,called CLSPSO,is put forward to solve 14 integer and mixed integer programming problems.The performances of CLSPSO are compared with those of other five hybrid algorithms combining PSO with chaotic search methods.Experimental results indicate that in terms of robustness and final convergence speed,CLSPSO is better than other five algorithms in solving many of these problems.Furthermore,CLSPSO exhibits good performance in solving two high-dimensional problems,and it finds better solutions than the known ones.A performance index(PI) is introduced to fairly compare the above six algorithms,and the obtained values of(PI) in three cases demonstrate that CLSPSO is superior to all the other five algorithms under the same conditions.
基金National Natural Science Foundation of China under Grant No. 61973037 and No. 61673066。
文摘Pulse Doppler(PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially digital radio frequency memory technology, the deficiency in the anti-repeater jamming of a traditional PD fuze increasingly emerges. Therefore, a repeater jamming suppression method for a PD fuze based on identity(ID) recognition and chaotic encryption is proposed. Every fuze has its own ID which is encrypted with different chaotic binary sequences in every pulse period of the transmitted signal. The thumbtack-shaped ambiguity function shows a good resolution and distance cutoff characteristic. The ability of anti-repeater jamming is emphatically analyzed, and the results at different signal-to-noise ratio(SNR) show a strong anti-repeater jamming ability and range resolution that the proposed method possesses. Furthermore, the anti-repeater jamming ability is influenced by processing gain, bit error rate(BER) and correlation function. The simulation result validates the theoretical analysis, it shows the proposed method can significantly improve the anti-repeater jamming ability of a PD fuze.
基金Project(70572090) supported by the National Natural Science Foundation of China
文摘By adopting the chaotic searching to improve the global searching performance of the particle swarm optimization (PSO), and using the improved PSO to optimize the key parameters of the support vector machine (SVM) forecasting model, an improved SVM model named CPSO-SVM model was proposed. The new model was applied to predicting the short term load, and the improved effect of the new model was proved. The simulation results of the South China Power Market’s actual data show that the new method can effectively improve the forecast accuracy by 2.23% and 3.87%, respectively, compared with the PSO-SVM and SVM methods. Compared with that of the PSO-SVM and SVM methods, the time cost of the new model is only increased by 3.15 and 4.61 s, respectively, which indicates that the CPSO-SVM model gains significant improved effects.
基金Project(20040533035)supported by the National Research Foundation for the Doctoral Program of Higher Education of ChinaProject(60874070)supported by the National Natural Science Foundation of China
文摘In order to solve reliability-redundancy allocation problems more effectively, a new hybrid algorithm named CDEPSO is proposed in this work, which combines particle swarm optimization (PSO) with differential evolution (DE) and a new chaotic local search. In the CDEPSO algorithm, DE provides its best solution to PSO if the best solution obtained by DE is better than that by PSO, while the best solution in the PSO is performed by chaotic local search. To investigate the performance of CDEPSO, four typical reliability-redundancy allocation problems were solved and the results indicate that the convergence speed and robustness of CDEPSO is better than those of PSO and CPSO (a hybrid algorithm which only combines PSO with chaotic local search). And, compared with the other six improved meta-heuristics, CDEPSO also exhibits more robust performance. In addition, a new performance was proposed to more fairly compare CDEPSO with the same six improved recta-heuristics, and CDEPSO algorithm is the best in solving these problems.
基金the National Natural Science Foundation of China (60572075)the Natural Science Researching Project for Jiangsu Universities (05KJD510177).
文摘It is well known that the periodic performance of spread spectrum sequence heavily affects the correlative and secure characteristics of communication systems. The chaotic binary sequence is paid more and more attention since it is one kind of applicable spread spectrum sequences. However, there are unavoidable short cyclic problems for chaotic binary sequences in finite precision. The chaotic binary sequence generating methods are studied first. Then the short cyclic behavior of the chaotic sequences is analyzed in detail, which are generated by quantification approaches with finite word-length. At the same time, a chaotic similar function is defined for presenting the cyclic characteristics of the sequences. Based on these efforts, an improved method with scrambling control for generating chaotic binary sequences is proposed. To quantitatively describe the improvement of periodic performance of the sequences, an orthogonal estimator is also defined. Some simulating results are provided. From the theoretical deduction and the experimental results, it is concluded that the proposed method can effectively increase the period and raise the complexity of the chaotic sequences to some extent.
基金supported by Natural Science Foundation of China(20806095)ScientificResearch Foundation for the Returned Overseas Chinese Scholars,State Education Ministry(教外司留20091341-2)+1 种基金China Postdoctoral Science Foundation(20080430747)National High Technology Research and Development Program of China(2008AA0312)
文摘Chaotic mixing is regarded as an effective method to improve the mixing effect in the laminar stirred tank.To generate chaos in flow field in stirred tank,many efforts including aperiodic movement,asystematic installation impeller,etc.,were made to save mixing time and energy consumption.The computational fluid dynamics of chaotic flow field and the hyperchaotic controlling method as well as macro-instability were reviewed.Multiple flow field coupling is important in the turbulent mixing region of stirred tank.The development trends of flow field coupling and hyperchaotic controlling in chaotic mixing were prospected in energy saving operation.
文摘Two problems are proposed. The first one is the noise decontamination of chaotic carriers using a deterministic approach to reconstruct pseudo trajectories, the second is the design of communications schemes with chaotic carriers. After presenting our deterministic noise decontamination algorithm, conventional chaos shift keying (CSK) communication system is applied. The difference of Euclidean distance between noisy trajectory and decontaminated trajectory in phase space could be utilized to non-coherently detect the sent symbol simply and effectively. It is shown that this detection method can achieve the bit error rate performance comparable to other non-coherent systems.
文摘Considering chaotic time series multi-step prediction, multi-step direct prediction model based on partial least squares (PLS) is proposed in this article, where PLS, the method for predicting a set of dependent variables forming a large set of predictors, is used to model the dynamic evolution between the space points and the corresponding future points. The model can eliminate error accumulation with the common single-step local model algorithm~ and refrain from the high multi-collinearity problem in the reconstructed state space with the increase of embedding dimension. Simulation predictions are done on the Mackey-Glass chaotic time series with the model. The satisfying prediction accuracy is obtained and the model efficiency verified. In the experiments, the number of extracted components in PLS is set with cross-validation procedure.
文摘An adaptive chaotic gradient descending optimization algorithm for single objective optimization was presented. A local minimum judged by two rules was obtained by an improved mutative-step gradient descending method. A new optimal minimum was obtained to replace the local minimum by mutative-scale chaotic search algorithm whose scales are magnified gradually from a small scale in order to escape local minima. The global optimal value was attained by repeatedly iterating. At last, a BP (back-propagation) neural network model for forecasting slag output in matte converting was established. The algorithm was used to train the weights of the BP neural network model. The simulation results with a training data set of 400 samples show that the training process can be finished within 300 steps to obtain the global optimal value, and escape local minima effectively. An optimization system for operation parameters, which includes the forecasting model, is achieved, in which the output of converter increases by 6.0%, and the amount of the treated cool materials rises by 7.8% in the matte converting process.
基金Project(50579101) supported by the National Natural Science Foundation of China
文摘To evaluate the credit risk of customers in power market precisely, the new chaotic searching and fuzzy neural network (FNN) hybrid algorithm were proposed. By combining with the chaotic searching, the learning ability of the FNN was markedly enhanced. Customers’ actual credit flaw data of power supply enterprises were collected to carry on the real evaluation, which can be treated as example for the model. The result shows that the proposed method surpasses the traditional statistical models in regard to the precision of forecasting and has a practical value. Compared with the results of ordinary FNN and ANN, the precision of the proposed algorithm can be enhanced by 2.2% and 4.5%, respectively.
基金This project was supported by the National Defense Key Laboratory Foundation (99JS04.8.1. DZ02 24).
文摘A class of the hybrid chaotic sequences is presented. The generator of the sequences is given and realized by the digital method. The hybrid chaotic sequences exhibit good random properties that are very important for the performance of QS-CDMA system with RAKE receiver. The performance of the system is analyzed when the hybrid chaotic sequences are used as spreading codes in a QS-CDMA system with RAKE receiver and compared with those obtained for m-se-quences and logistic sequences. The results show that the hybrid chaotic sequences are a class of very promising spreading codes for QS-CDMA system.
基金This project was supported by the National Natural Science Foundation of China (79970042).
文摘0-1 programming is a special case of the integer programming, which is commonly encountered in many optimization problems. Neural network and its general energy function are presented for 0-1 optimization problem. Then, the 0-1 optimization problems are solved by a neural network model with transient chaotic dynamics (TCNN). Numerical simulations of two typical 0-1 optimization problems show that TCNN can overcome HNN's main drawbacks that it suffers from the local minimum and can search for the global optimal solutions in to solveing 0-1 optimization problems.
文摘A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks.
基金Project(51374035)supported by the National Natural Science Foundation of ChinaProject(2012BAB08B02)supported by the National“Twelfth Five”Science and Technology,ChinaProject(NCET-13-0669)supported by New Century Excellent Talents in University of Ministry of Education of China
文摘A laboratory leaching experiment with samples of different grades was carried out, and an analytical method of concentration of leaching solution was put forward. For each sample, respectively, by applying phase space reconstruction for time series of monitoring data, the saturated embedding dimension and the correlation dimension were obtained, and the evolution laws between neighboring points in the reconstructed phase space were revealed. With BP neural network, a prediction model of concentration of leaching solution was set up and the maximum error of which was less than 2%. The results show that there exist chaotic characteristics in leaching system, and samples of different grades have different nonlinear dynamic features; the higher the grade of sample, the smaller the correlation dimension; furthermore, the maximum Lyapunov index, energy dissipation and chaotic extent of the leaching system increase with grade of the sample; by phase space reconstruction, the subtle change features of concentration of leaching solution can be magnified and the inherent laws can be fully demonstrated. According to the laws, a prediction model of leaching cycle period has been established to provide a theoretical foundation for solution mining.