Electroencephalography(EEG)is a non-invasive measurement method for brain activity.Due to its safety,high resolution,and hypersensitivity to dynamic changes in brain neural signals,EEG has aroused much interest in sci...Electroencephalography(EEG)is a non-invasive measurement method for brain activity.Due to its safety,high resolution,and hypersensitivity to dynamic changes in brain neural signals,EEG has aroused much interest in scientific research and medical felds.This article reviews the types of EEG signals,multiple EEG signal analysis methods,and the application of relevant methods in the neuroscience feld and for diagnosing neurological diseases.First,3 types of EEG signals,including time-invariant EEG,accurate event-related EEG,and random event-related EEG,are introduced.Second,5 main directions for the methods of EEG analysis,including power spectrum analysis,time-frequency analysis,connectivity analysis,source localization methods,and machine learning methods,are described in the main section,along with diferent sub-methods and effect evaluations for solving the same problem.Finally,the application scenarios of different EEG analysis methods are emphasized,and the advantages and disadvantages of similar methods are distinguished.This article is expected to assist researchers in selecting suitable EEG analysis methods based on their research objectives,provide references for subsequent research,and summarize current issues and prospects for the future.展开更多
A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recove...A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recover the plaintext by applying the chosen plaintext attack. Therefore, the proposed cryptosystem is not secure enough to be used in the image transmission system. Experimental results show the feasibility of the attack. As a result, we make some improvements to the encryption scheme, which can completely resist our chosen plaintext attack.展开更多
The cognitive processing mechanism of humor refers to how the system of neural circuitry and pathways in the brain deals with the incongruity in a humorous manner. The past research has revealed different stages and c...The cognitive processing mechanism of humor refers to how the system of neural circuitry and pathways in the brain deals with the incongruity in a humorous manner. The past research has revealed different stages and corresponding functional brain activities involved in humor-processing in terms of time and space dimensions, highlighting the effects of the time windows of about 400 ms, 600 ms, and 900 ms. However, much less is known about humor processing in light of the frequency dimension. A total of 36 Chinese participants were recruited in this experiment, with Chinese jokes, nonjokes, and nonsensical sentences used as the stimuli. The experimental results showed that there were significant differences among conditions in the P200 effect, which signified that the incongruity detection had already been integrated and perceived at about 200 ms, prior to the semantic integration at about 400 ms. This pre-processing is specific to Chinese verbal jokes due to the simultaneous involvement of both orthographic and phonologic parts in processing Chinese characters. The analysis on the frequency dimension indicated that beta’s power particularly reflected the characteristics of different stages in Chinese verbal humor processing. Jokes’ and nonsensical sentences’ relative power changes on the beta band ranked significantly higher than that of nonjokes at about 200 ms, which suggested the existence of more difficulties in meaning construction in pre-processing the incongruities. This indicated a continuity between the analysis of event related potential (ERP) components and neural oscillations and revealed the key role of the beta frequency band in Chinese verbal joke processing.展开更多
We investigate the effect of ozone(O_(3))oxidation of silicon carbide(SiC)on the flat-band voltage(Vfb)stability of SiC metal–oxide–semiconductor(MOS)capacitors.The SiC MOS capacitors are produced by O_(3)oxidation,...We investigate the effect of ozone(O_(3))oxidation of silicon carbide(SiC)on the flat-band voltage(Vfb)stability of SiC metal–oxide–semiconductor(MOS)capacitors.The SiC MOS capacitors are produced by O_(3)oxidation,and their Vfbstability under frequency variation,temperature variation,and bias temperature stress are evaluated.Secondary ion mass spectroscopy(SIMS),atomic force microscopy(AFM),and x-ray photoelectron spectroscopy(XPS)indicate that O_(3)oxidation can adjust the element distribution near SiC/SiO_(2)interface,improve SiC/SiO_(2)interface morphology,and inhibit the formation of near-interface defects,respectively.In addition,we elaborate the underlying mechanism through which O_(3)oxidation improves the Vfbstability of SiC MOS capacitors by using the measurement results and O_(3)oxidation kinetics.展开更多
Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems. In this paper, we use the nonlinear coupled method to implement the synchronization of two coupled ma...Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems. In this paper, we use the nonlinear coupled method to implement the synchronization of two coupled map lattices. Through the appropriate separation of the linear term from the nonlinear term of the spatiotemporal chaotic system, we set the nonlinear term as the coupling function and then we can achieve the synchronization of two coupled map lattices. After that, we implement the secure communication of digital image using this synchronization method. Then, the discrete characteristics of the nonlinear coupling spatiotemporal chaos are applied to the discrete pixel of the digital image. After the synchronization of both the communication parties, the receiver can decrypt the original image. Numerical simulations show the effectiveness and the feasibility of the proposed program.展开更多
Coupled map lattices are taken as examples to study the synchronisation of spatiotemporal chaotic systems. First, a generalised synchronisation of two coupled map lattices is realised through selecting an appropriate ...Coupled map lattices are taken as examples to study the synchronisation of spatiotemporal chaotic systems. First, a generalised synchronisation of two coupled map lattices is realised through selecting an appropriate feedback function and appropriate range of feedback parameter. Based on this method we use the phase compression method to extend the range of the parameter. So, we integrate the feedback control method with the phase compression method to implement the generalised synchronisation and obtain an exact range of feedback parameter. This technique is simple to implement in practice. Numerical simulations show the effectiveness and the feasibility of the proposed program.展开更多
We extend a class of a one-dimensional smooth map.We make sure that for each desired interval of the parameter the map’s Lyapunov exponent is positive.Then we propose a novel parameter perturbation method based on th...We extend a class of a one-dimensional smooth map.We make sure that for each desired interval of the parameter the map’s Lyapunov exponent is positive.Then we propose a novel parameter perturbation method based on the good property of the extended one-dimensional smooth map.We perturb the parameter𝑟in each iteration by the real number xi generated by the iteration.The auto-correlation function and NIST statistical test suite are taken to illustrate the method’s randomness finally.We provide an application of this method in image encryption.Experiments show that the pseudo-random sequences are suitable for this application.展开更多
A numerical study of the diamagnetic drift effect on the nonlinear interaction between multi-helicity neoclassical tearing modes(NTMs) is carried out using a set of four-field equations including two-fluid effects.The...A numerical study of the diamagnetic drift effect on the nonlinear interaction between multi-helicity neoclassical tearing modes(NTMs) is carried out using a set of four-field equations including two-fluid effects.The results show that,in contrast to the single-fluid case,5/3 NTM cannot be completely suppressed by 3/2 NTM with diamagnetic drift flow.Both modes exhibit oscillation and coexist in the saturated phase.To better understand the effect of the diamagnetic drift flow on multiple-helicity NTMs,the influence of typical relevant parameters is investigated.It is found that the average saturated magnetic island width increases with increasing bootstrap current fraction f_(b) but decreases with the ion skin depth δ.In addition,as the ratio of parallel to perpendicular transport coefficients χ_(‖)/χ_(⊥) increases,the average saturated magnetic island widths of the 3/2 and 5/3 NTMs increase.The underlying mechanisms behind these observations are discussed in detail.展开更多
Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used ...Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher–Yatess scrambling are used to scramble the plaintext,and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks.展开更多
In this paper, first, we investigate a novel one-dimensional logistic-PWLCM(LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-rando...In this paper, first, we investigate a novel one-dimensional logistic-PWLCM(LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-random coupling method that can accelerate the system behavior of the fully spatial chaos. Here, because the better chaotic properties include a wide range of parameter settings and better ergodicity than a logistic map, the LP is used in PCLML as f(x). The Kolmogorov–Sinai entropy density and universality and the bifurcation diagram are employed to investigate the chaotic behaviors of the proposed PCLML model. Finally, we apply the LP and PCLML chaotic systems to image encryption to improve the effectiveness and security of the encryption scheme. By combining self-generating matrix model M and dynamic substitution box(S-Box) methods, we design a new image encryption algorithm. Numerical simulations and security analysis have been carried out to demonstrate that the proposed algorithm has a high security level and can efficiently encrypt several different kinds of images into random-like images.展开更多
In this paper, the modified projective synchronization (MPS) of a fractional-order hyperchaotic system is inves- tigated. We design the response system corresponding to the drive system on the basis of projective sy...In this paper, the modified projective synchronization (MPS) of a fractional-order hyperchaotic system is inves- tigated. We design the response system corresponding to the drive system on the basis of projective synchronization theory, and determine the sufficient condition for the synchronization of the drive system and the response system based on fractional-order stability theory. The MPS of a fractional-order hyperchaotic system is achieved by transmitting a single variable. This scheme reduces the information transmission in order to achieve the synchronization, and extends the applicable scope of MPS. Numerical simulations further demonstrate the feasibility and the effectiveness of the proposed scheme.展开更多
An amorphous SiO2/4 H–Si C(0001) interface model with carbon dimer defects is established based on density functional theory of the first-principle plane wave pseudopotential method.The structures of carbon dimer d...An amorphous SiO2/4 H–Si C(0001) interface model with carbon dimer defects is established based on density functional theory of the first-principle plane wave pseudopotential method.The structures of carbon dimer defects after passivation by H2 and NO molecules are established,and the interface states before and after passivation are calculated by the Heyd–Scuseria–Ernzerhof(HSE06) hybrid functional scheme.Calculation results indicate that H2 can be adsorbed on the O2–C = C–O2 defect and the carbon–carbon double bond is converted into a single bond.However,H2 cannot be adsorbed on the O2–(C = C)′ –O2 defect.The NO molecules can be bonded by N and C atoms to transform the carbon–carbon double bonds,thereby passivating the two defects.This study shows that the mechanism for the passivation of Si O2/4 H–SiC(0001) interface carbon dimer defects is to convert the carbon–carbon double bonds into carbon dimers.Moreover,some intermediate structures that can be introduced into the interface state in the band gap should be avoided.展开更多
Disturbance imposed on the chaotic systems is an effective way to maintain its chaotic good encryption features. This paper proposes a new perturbation method to the Tent map. First it divides the Tent map domain into...Disturbance imposed on the chaotic systems is an effective way to maintain its chaotic good encryption features. This paper proposes a new perturbation method to the Tent map. First it divides the Tent map domain into 2N parts evenly and selects a particular part from them, then proliferates the Tent map mapping trajectory of this particular part, which can disturb the entire system disturbance. The mathematical analysis and simulated experimental results prove that the disturbed Tent map has uniform invariant distribution and can produce good cryptographic properties of pseudo-random sequence. These facts avoid the phenomenon of short-period caused by the computer's finite precision and reducing the sequence's dependence on the disturbance signal, such that effectively compensate for the digital chaotic system dynamics degradation.展开更多
Coordinated taxiing planning for multiple aircraft on flight deck is of vital importance which can dramatically improve the dispatching efficiency.In this paper,first,the coordinated taxiing path planning problem is t...Coordinated taxiing planning for multiple aircraft on flight deck is of vital importance which can dramatically improve the dispatching efficiency.In this paper,first,the coordinated taxiing path planning problem is transformed into a centralized optimal control problem where collision-free conditions and mechanical limits are considered.Since the formulated optimal control problem is of large state space and highly nonlinear,an efficient hierarchical initialization technique based on the Dubins-curve method is proposed.Then,a model predictive controller is designed to track the obtained reference trajectory in the presence of initial state error and external disturbances.Numerical experiments demonstrate that the proposed“offline planningþonline tracking”framework can achieve efficient and robust coordinated taxiing planning and tracking even in the presence of initial state error and continuous external disturbances.展开更多
In this paper, an impulsive synchronisation scheme for a class of fractional-order hyperchaotic systems is proposed. The sufficient conditions of a class of integral-order hyperchaotic systems' impulsive synchronisat...In this paper, an impulsive synchronisation scheme for a class of fractional-order hyperchaotic systems is proposed. The sufficient conditions of a class of integral-order hyperchaotic systems' impulsive synchronisation are illustrated. Furthermore, we apply the sufficient conditions to a class of fractional-order hyperchaotic systems and well achieve impulsive synchronisation of these fractional-order hyperchaotic systems, thereby extending the applicable scope of impulsive synchronisation. Numerical simulations further demonstrate the feasibility and effectiveness of the proposed scheme.展开更多
In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (...In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL), where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters. The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML), which can be easily implemented in parallel by hard- ware. A 160-bit-long binary sequence is used to generate the initial conditions of the CML. The decryption process is symmetric relative to the encryption process. Theoretical analysis and experimental results prove that the block cryptosys- tem is secure and practical, and suitable for image encryption.展开更多
In this paper, we present the results for the security and the possible attacks on a new symmetric key encryption algorithm based on the ergodicity property of a logistic map. After analysis, we use mathematical induc...In this paper, we present the results for the security and the possible attacks on a new symmetric key encryption algorithm based on the ergodicity property of a logistic map. After analysis, we use mathematical induction to prove that the algorithm can be attacked by a chosen plaintext attack successfully and give an example to show how to attack it. According to the cryptanalysis of the originM Mgorithm, we improve the originM Mgorithm, and make a brief cryptanalysis. Compared with the original algorithm, the improved algorithm is able to resist a chosen plaintext attack and retain a considerable number of advantages of the original algorithm such as eneryption speed, sensitive dependence on the key, strong anti-attack capability, and so on.展开更多
In this paper, we propose a new one-time one-key encryption algorithm based on the ergodicity of a skew tent chaotic map. We divide the chaotic trajectory into sub-intervals and map them to integers, and use this sche...In this paper, we propose a new one-time one-key encryption algorithm based on the ergodicity of a skew tent chaotic map. We divide the chaotic trajectory into sub-intervals and map them to integers, and use this scheme to encrypt plaintext and obtain ciphertext. In this algorithm, the plaintext information in the key is used, so different plaintexts or different total numbers of plaintext letters will encrypt different ciphertexts. Simulation results show that the performance and the security of the proposed encryption algorithm can encrypt plaintext effectively and resist various typical attacks.展开更多
The effect of phosphorus passivation on 4H-SiC(0001) silicon (Si) dangling bonds is investigated using ab initio atomistic thermodynamic calculations. Phosphorus passivation commences with chemisorption of phospho...The effect of phosphorus passivation on 4H-SiC(0001) silicon (Si) dangling bonds is investigated using ab initio atomistic thermodynamic calculations. Phosphorus passivation commences with chemisorption of phosphorus atoms at high-symmetry coordinated sites. To determine the most stable structure during the passivation process of phosphorus, a surface phase diagram of phosphorus adsorption on SiC (0001) surface is constructed over a coverage range of 1/9-1 monolayer (ML). The calculated results indicate that the 1/3 ML configuration is most energetically favorable in a reasonable environment. At this coverage, the total electron density of states demonstrates that phosphorus may effectively reduce the interface state density near the conduction band by removing 4H-SiC (0001) Si dangling bonds. It provides an atomic level insight into how phosphorus is able to reduce the near interface traps.展开更多
A cross-layer design(CLD)scheme with combination of power allocation,adaptive modulation(AM)and automatic repeat request(ARQ)is presented for space-time coded MIMO system under imperfect feedback,and the corresponding...A cross-layer design(CLD)scheme with combination of power allocation,adaptive modulation(AM)and automatic repeat request(ARQ)is presented for space-time coded MIMO system under imperfect feedback,and the corresponding system performance is investigated in a Rayleigh fading channel.Based on imperfect feedback information,a suboptimal power allocation(PA)scheme is derived to maximize the average spectral efficiency(SE)of the system.The scheme is based on a so-called compressed SNR criterion,and has a closed-form expression for positive power allocation,thus being computationally efficient.Moreover,it can improve SE of the presented CLD.Besides,due to better approximation,it obtains the performance close to the existing optimal approach which requires numerical search.Simulation results show that the proposed CLD with PA can achieve higher SE than the conventional CLD with equal power allocation scheme,and has almost the same performance as CLD with optimal PA.However,it has lower calculation complexity.展开更多
基金supported by the STI2030 Major Projects(2021ZD0204300)the National Natural Science Foundation of China(61803003,62003228).
文摘Electroencephalography(EEG)is a non-invasive measurement method for brain activity.Due to its safety,high resolution,and hypersensitivity to dynamic changes in brain neural signals,EEG has aroused much interest in scientific research and medical felds.This article reviews the types of EEG signals,multiple EEG signal analysis methods,and the application of relevant methods in the neuroscience feld and for diagnosing neurological diseases.First,3 types of EEG signals,including time-invariant EEG,accurate event-related EEG,and random event-related EEG,are introduced.Second,5 main directions for the methods of EEG analysis,including power spectrum analysis,time-frequency analysis,connectivity analysis,source localization methods,and machine learning methods,are described in the main section,along with diferent sub-methods and effect evaluations for solving the same problem.Finally,the application scenarios of different EEG analysis methods are emphasized,and the advantages and disadvantages of similar methods are distinguished.This article is expected to assist researchers in selecting suitable EEG analysis methods based on their research objectives,provide references for subsequent research,and summarize current issues and prospects for the future.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 61173183, 60973152, and 60573172)the Doctoral Program Foundation of Institution of Higher Education of China (Grant No. 20070141014)+2 种基金the Program for Excellent Talents in Universities of Liaoning Province, China (Grant No. LR2012003)the Natural Science Foundation of Liaoning Province, China (Grant No. 20082165)the Fundamental Research Funds for the Central Universities of China (Grant No. DUT12JB06)
文摘A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recover the plaintext by applying the chosen plaintext attack. Therefore, the proposed cryptosystem is not secure enough to be used in the image transmission system. Experimental results show the feasibility of the attack. As a result, we make some improvements to the encryption scheme, which can completely resist our chosen plaintext attack.
文摘The cognitive processing mechanism of humor refers to how the system of neural circuitry and pathways in the brain deals with the incongruity in a humorous manner. The past research has revealed different stages and corresponding functional brain activities involved in humor-processing in terms of time and space dimensions, highlighting the effects of the time windows of about 400 ms, 600 ms, and 900 ms. However, much less is known about humor processing in light of the frequency dimension. A total of 36 Chinese participants were recruited in this experiment, with Chinese jokes, nonjokes, and nonsensical sentences used as the stimuli. The experimental results showed that there were significant differences among conditions in the P200 effect, which signified that the incongruity detection had already been integrated and perceived at about 200 ms, prior to the semantic integration at about 400 ms. This pre-processing is specific to Chinese verbal jokes due to the simultaneous involvement of both orthographic and phonologic parts in processing Chinese characters. The analysis on the frequency dimension indicated that beta’s power particularly reflected the characteristics of different stages in Chinese verbal humor processing. Jokes’ and nonsensical sentences’ relative power changes on the beta band ranked significantly higher than that of nonjokes at about 200 ms, which suggested the existence of more difficulties in meaning construction in pre-processing the incongruities. This indicated a continuity between the analysis of event related potential (ERP) components and neural oscillations and revealed the key role of the beta frequency band in Chinese verbal joke processing.
基金Project supported by the National Natural Science Foundation of China(Grant No.61874017)。
文摘We investigate the effect of ozone(O_(3))oxidation of silicon carbide(SiC)on the flat-band voltage(Vfb)stability of SiC metal–oxide–semiconductor(MOS)capacitors.The SiC MOS capacitors are produced by O_(3)oxidation,and their Vfbstability under frequency variation,temperature variation,and bias temperature stress are evaluated.Secondary ion mass spectroscopy(SIMS),atomic force microscopy(AFM),and x-ray photoelectron spectroscopy(XPS)indicate that O_(3)oxidation can adjust the element distribution near SiC/SiO_(2)interface,improve SiC/SiO_(2)interface morphology,and inhibit the formation of near-interface defects,respectively.In addition,we elaborate the underlying mechanism through which O_(3)oxidation improves the Vfbstability of SiC MOS capacitors by using the measurement results and O_(3)oxidation kinetics.
基金supported by the National Natural Science Foundation of China (Grant Nos. 60573172 and 60973152)the Doctoral Program Foundation of Institution of Higher Education of China (Grant No. 20070141014)the Natural Science Foundation of Liaoning Province,China (Grant No. 20082165)
文摘Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems. In this paper, we use the nonlinear coupled method to implement the synchronization of two coupled map lattices. Through the appropriate separation of the linear term from the nonlinear term of the spatiotemporal chaotic system, we set the nonlinear term as the coupling function and then we can achieve the synchronization of two coupled map lattices. After that, we implement the secure communication of digital image using this synchronization method. Then, the discrete characteristics of the nonlinear coupling spatiotemporal chaos are applied to the discrete pixel of the digital image. After the synchronization of both the communication parties, the receiver can decrypt the original image. Numerical simulations show the effectiveness and the feasibility of the proposed program.
基金supported by the National Natural Science Foundation of China (Grant Nos.60573172 and 60973152)the Doctoral Program Foundation of Institution of Higher Education of China (Grant No.20070141014)the Natural Science Foundation of Liaoning Province,China (Grant No.20082165)
文摘Coupled map lattices are taken as examples to study the synchronisation of spatiotemporal chaotic systems. First, a generalised synchronisation of two coupled map lattices is realised through selecting an appropriate feedback function and appropriate range of feedback parameter. Based on this method we use the phase compression method to extend the range of the parameter. So, we integrate the feedback control method with the phase compression method to implement the generalised synchronisation and obtain an exact range of feedback parameter. This technique is simple to implement in practice. Numerical simulations show the effectiveness and the feasibility of the proposed program.
基金by the National Natural Science Foundation of China under Grant Nos 60573172 and 60973152the Superior University Doctor Subject Special Scientific Research Foundation of China(No 20070141014)the Natural Science Foundation of Liaoning Province(No 20082165).
文摘We extend a class of a one-dimensional smooth map.We make sure that for each desired interval of the parameter the map’s Lyapunov exponent is positive.Then we propose a novel parameter perturbation method based on the good property of the extended one-dimensional smooth map.We perturb the parameter𝑟in each iteration by the real number xi generated by the iteration.The auto-correlation function and NIST statistical test suite are taken to illustrate the method’s randomness finally.We provide an application of this method in image encryption.Experiments show that the pseudo-random sequences are suitable for this application.
基金Project supported by the National Key R&D Program of China (Grant No. 2022YFE03090000)the National Natural Science Foundation of China (Grant Nos. 11925501 and 12075048)the Fundament Research Funds for the Central Universities (Grant No. DUT22ZD215)。
文摘A numerical study of the diamagnetic drift effect on the nonlinear interaction between multi-helicity neoclassical tearing modes(NTMs) is carried out using a set of four-field equations including two-fluid effects.The results show that,in contrast to the single-fluid case,5/3 NTM cannot be completely suppressed by 3/2 NTM with diamagnetic drift flow.Both modes exhibit oscillation and coexist in the saturated phase.To better understand the effect of the diamagnetic drift flow on multiple-helicity NTMs,the influence of typical relevant parameters is investigated.It is found that the average saturated magnetic island width increases with increasing bootstrap current fraction f_(b) but decreases with the ion skin depth δ.In addition,as the ratio of parallel to perpendicular transport coefficients χ_(‖)/χ_(⊥) increases,the average saturated magnetic island widths of the 3/2 and 5/3 NTMs increase.The underlying mechanisms behind these observations are discussed in detail.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61173183,61672124,61370145,and 11501064)the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund,China(Grant No.MMJJ20170203)+1 种基金the China Postdoctoral Science Foundation(Grant No.2016M590850)the Scientific and Technological Research Program of Chongqing Municipal Education Commission,China(Grant No.KJ1500605)
文摘Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher–Yatess scrambling are used to scramble the plaintext,and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61672124,61370145,and 61173183)the Password Theory Project of the13th Five-Year Plan National Cryptography Development Fund,China(Grant No.MMJJ20170203)+1 种基金the Program for New Century Excellent Talents in Fujian Province Universitythe Natural Science Foundation of Fujian Province of China(Grant No.2018J01100)
文摘In this paper, first, we investigate a novel one-dimensional logistic-PWLCM(LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-random coupling method that can accelerate the system behavior of the fully spatial chaos. Here, because the better chaotic properties include a wide range of parameter settings and better ergodicity than a logistic map, the LP is used in PCLML as f(x). The Kolmogorov–Sinai entropy density and universality and the bifurcation diagram are employed to investigate the chaotic behaviors of the proposed PCLML model. Finally, we apply the LP and PCLML chaotic systems to image encryption to improve the effectiveness and security of the encryption scheme. By combining self-generating matrix model M and dynamic substitution box(S-Box) methods, we design a new image encryption algorithm. Numerical simulations and security analysis have been carried out to demonstrate that the proposed algorithm has a high security level and can efficiently encrypt several different kinds of images into random-like images.
基金supported by the National Natural Science Foundation of China (Grant Nos. 60573172 and 60973152)the Superior University Doctor Subject Special Scientific Research Foundation of China (Grant No. 20070141014)the Natural Science Foundation of Liaoning Province, China (Grant No. 20082165)
文摘In this paper, the modified projective synchronization (MPS) of a fractional-order hyperchaotic system is inves- tigated. We design the response system corresponding to the drive system on the basis of projective synchronization theory, and determine the sufficient condition for the synchronization of the drive system and the response system based on fractional-order stability theory. The MPS of a fractional-order hyperchaotic system is achieved by transmitting a single variable. This scheme reduces the information transmission in order to achieve the synchronization, and extends the applicable scope of MPS. Numerical simulations further demonstrate the feasibility and the effectiveness of the proposed scheme.
基金Project supported by the National Natural Science Foundation of China(Grant No.61474013)
文摘An amorphous SiO2/4 H–Si C(0001) interface model with carbon dimer defects is established based on density functional theory of the first-principle plane wave pseudopotential method.The structures of carbon dimer defects after passivation by H2 and NO molecules are established,and the interface states before and after passivation are calculated by the Heyd–Scuseria–Ernzerhof(HSE06) hybrid functional scheme.Calculation results indicate that H2 can be adsorbed on the O2–C = C–O2 defect and the carbon–carbon double bond is converted into a single bond.However,H2 cannot be adsorbed on the O2–(C = C)′ –O2 defect.The NO molecules can be bonded by N and C atoms to transform the carbon–carbon double bonds,thereby passivating the two defects.This study shows that the mechanism for the passivation of Si O2/4 H–SiC(0001) interface carbon dimer defects is to convert the carbon–carbon double bonds into carbon dimers.Moreover,some intermediate structures that can be introduced into the interface state in the band gap should be avoided.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 60573172 and 60973152)the Doctoral Program Foundation of Institution of Higher Education of China (Grant No. 20070141014)the Natural Science Foundation of Liaoning Province of China (Grant No. 20082165)
文摘Disturbance imposed on the chaotic systems is an effective way to maintain its chaotic good encryption features. This paper proposes a new perturbation method to the Tent map. First it divides the Tent map domain into 2N parts evenly and selects a particular part from them, then proliferates the Tent map mapping trajectory of this particular part, which can disturb the entire system disturbance. The mathematical analysis and simulated experimental results prove that the disturbed Tent map has uniform invariant distribution and can produce good cryptographic properties of pseudo-random sequence. These facts avoid the phenomenon of short-period caused by the computer's finite precision and reducing the sequence's dependence on the disturbance signal, such that effectively compensate for the digital chaotic system dynamics degradation.
文摘Coordinated taxiing planning for multiple aircraft on flight deck is of vital importance which can dramatically improve the dispatching efficiency.In this paper,first,the coordinated taxiing path planning problem is transformed into a centralized optimal control problem where collision-free conditions and mechanical limits are considered.Since the formulated optimal control problem is of large state space and highly nonlinear,an efficient hierarchical initialization technique based on the Dubins-curve method is proposed.Then,a model predictive controller is designed to track the obtained reference trajectory in the presence of initial state error and external disturbances.Numerical experiments demonstrate that the proposed“offline planningþonline tracking”framework can achieve efficient and robust coordinated taxiing planning and tracking even in the presence of initial state error and continuous external disturbances.
基金supported by the National Natural Science Foundation of China (Grant Nos. 60573172 and 60973152)the Doctoral Program Foundation of the Institution of Higher Education of China (Grant No. 20070141014)the Natural Science Foundation of Liaoning Province,China (No. 20082165)
文摘In this paper, an impulsive synchronisation scheme for a class of fractional-order hyperchaotic systems is proposed. The sufficient conditions of a class of integral-order hyperchaotic systems' impulsive synchronisation are illustrated. Furthermore, we apply the sufficient conditions to a class of fractional-order hyperchaotic systems and well achieve impulsive synchronisation of these fractional-order hyperchaotic systems, thereby extending the applicable scope of impulsive synchronisation. Numerical simulations further demonstrate the feasibility and effectiveness of the proposed scheme.
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 61173183, 60973152, and 60573172)the Doctoral Program Foundation of Institution of Higher Education of China (Grant No. 20070141014)+2 种基金the Program for Excellent Talents in Universities of Liaoning Province, China (Grant No. LR2012003)the Natural Science Foundation of Liaoning Province, China (Grant No. 20082165)the Fundamental Research Funds for the Central Universities of China (Grant No. DUT12JB06)
文摘In this paper, we propose a novel block cryptographic scheme based on a spatiotemporal chaotic system and a chaotic neural network (CNN). The employed CNN comprises a 4-neuron layer called a chaotic neuron layer (CNL), where the spatiotemporal chaotic system participates in generating its weight matrix and other parameters. The spatiotemporal chaotic system used in our scheme is the typical coupled map lattice (CML), which can be easily implemented in parallel by hard- ware. A 160-bit-long binary sequence is used to generate the initial conditions of the CML. The decryption process is symmetric relative to the encryption process. Theoretical analysis and experimental results prove that the block cryptosys- tem is secure and practical, and suitable for image encryption.
基金supported by the National Natural Science Foundation of China (Grant Nos. 61173183, 60573172, and 60973152)the Doctoral Program Foundation of Institution of Higher Education of China (Grant No. 20070141014)the Natural Science Foundation of Liaoning Province, China (Grant No. 20082165)
文摘In this paper, we present the results for the security and the possible attacks on a new symmetric key encryption algorithm based on the ergodicity property of a logistic map. After analysis, we use mathematical induction to prove that the algorithm can be attacked by a chosen plaintext attack successfully and give an example to show how to attack it. According to the cryptanalysis of the originM Mgorithm, we improve the originM Mgorithm, and make a brief cryptanalysis. Compared with the original algorithm, the improved algorithm is able to resist a chosen plaintext attack and retain a considerable number of advantages of the original algorithm such as eneryption speed, sensitive dependence on the key, strong anti-attack capability, and so on.
基金supported by the National Natural Science Foundation of China (Grant Nos.61173183,60973152,and 60573172)the Superior University Doctor Subject Special Scientific Research Foundation of China (Grant No.20070141014)the Natural Science Foundation of Liaoning Province,China (Grant No.20082165)
文摘In this paper, we propose a new one-time one-key encryption algorithm based on the ergodicity of a skew tent chaotic map. We divide the chaotic trajectory into sub-intervals and map them to integers, and use this scheme to encrypt plaintext and obtain ciphertext. In this algorithm, the plaintext information in the key is used, so different plaintexts or different total numbers of plaintext letters will encrypt different ciphertexts. Simulation results show that the performance and the security of the proposed encryption algorithm can encrypt plaintext effectively and resist various typical attacks.
基金Project supported by the National High Technology Research and Development Program of China(Grant No.2014AA052401)the National Natural Science Foundation of China(Grant No.61474013)the National Grid Science&Technology Project,China(Grant No.5455DW150006)
文摘The effect of phosphorus passivation on 4H-SiC(0001) silicon (Si) dangling bonds is investigated using ab initio atomistic thermodynamic calculations. Phosphorus passivation commences with chemisorption of phosphorus atoms at high-symmetry coordinated sites. To determine the most stable structure during the passivation process of phosphorus, a surface phase diagram of phosphorus adsorption on SiC (0001) surface is constructed over a coverage range of 1/9-1 monolayer (ML). The calculated results indicate that the 1/3 ML configuration is most energetically favorable in a reasonable environment. At this coverage, the total electron density of states demonstrates that phosphorus may effectively reduce the interface state density near the conduction band by removing 4H-SiC (0001) Si dangling bonds. It provides an atomic level insight into how phosphorus is able to reduce the near interface traps.
基金Supported by the Foundation of Huaian Industrial Projects(HAG2013064)the Foundation of Huaiyin Institute of Technology(HGB1202)the Doctoral Fund of Ministry of Education of China(20093218120021)
文摘A cross-layer design(CLD)scheme with combination of power allocation,adaptive modulation(AM)and automatic repeat request(ARQ)is presented for space-time coded MIMO system under imperfect feedback,and the corresponding system performance is investigated in a Rayleigh fading channel.Based on imperfect feedback information,a suboptimal power allocation(PA)scheme is derived to maximize the average spectral efficiency(SE)of the system.The scheme is based on a so-called compressed SNR criterion,and has a closed-form expression for positive power allocation,thus being computationally efficient.Moreover,it can improve SE of the presented CLD.Besides,due to better approximation,it obtains the performance close to the existing optimal approach which requires numerical search.Simulation results show that the proposed CLD with PA can achieve higher SE than the conventional CLD with equal power allocation scheme,and has almost the same performance as CLD with optimal PA.However,it has lower calculation complexity.