chaotic theory
Recently Published Documents


TOTAL DOCUMENTS

71
(FIVE YEARS 6)

H-INDEX

7
(FIVE YEARS 0)

2020 ◽  
Vol 2020 ◽  
pp. 1-23
Author(s):  
Zhi-fei Xi ◽  
An Xu ◽  
Ying-xin Kou ◽  
Zhan-wu Li ◽  
Ai-wu Yang

Target maneuver trajectory prediction is an important prerequisite for air combat situation awareness and threat assessment. Aiming at the problem of low prediction accuracy in traditional trajectory prediction methods, combined with the chaotic characteristics of the target maneuver trajectory time series, a target maneuver trajectory prediction model based on chaotic theory and improved genetic algorithm-Volterra neural network (IGA-VNN) model is proposed, mathematically deducing and analyzing the consistency between Volterra functional model and back propagation (BP) neural network in structure. Firstly, the C-C method is used to reconstruct the phase space of the target trajectory time series, and the maximum Lyapunov exponent of the time series of the target maneuver trajectory is calculated. It is proved that the time series of the target maneuver trajectory has chaotic characteristics, so the chaotic method can be used to predict the target trajectory time series. Then, the practicable Volterra functional model and BP neural network are combined together, learning the advantages of both and overcoming the difficulty in obtaining the high-order kernel function of the Volterra functional model. At the same time, an adaptive crossover mutation operator and a combination mutation operator based on the difference degree of gene segments are proposed to improve the traditional genetic algorithm; the improved genetic algorithm is used to optimize BP neural network, and the optimal initial weights and thresholds are obtained. Finally, the IGA-VNN model of chaotic time series is applied to the prediction of target maneuver trajectory time series, and the experimental results show that its estimated performance is obviously superior to other prediction algorithms.


2019 ◽  
Vol 11 (3) ◽  
pp. 81
Author(s):  
Ning Zhao ◽  
Yuhe Liu ◽  
Junjie Shen

A built-in sensor in a smart device, such as the accelerometer and the gyroscope, will produce an obvious nonlinear output when it receives voice signal. In this paper, based on the chaotic theory, the nonlinearity of smartphone built-in accelerometer is revealed by phase space reconstructing after we calculate several nonlinearity characteristics, such as best delay time, embedding dimension, and the attractor of accelerometer system, under the condition of voice commands inputting. The results of theoretical calculation and experiments show that this specific nonlinearity could lay a foundation for further signal extraction and analysis.


Entropy ◽  
2018 ◽  
Vol 20 (9) ◽  
pp. 693 ◽  
Author(s):  
Juan Wang ◽  
Qun Ding

According to the keyword abstract extraction function in the Natural Language Processing and Information Retrieval Sharing Platform (NLPIR), the design method of a dynamic rounds chaotic block cipher is presented in this paper, which takes into account both the security and efficiency. The cipher combines chaotic theory with the Feistel structure block cipher, and uses the randomness of chaotic sequence and the nonlinearity of chaotic S-box to dynamically generate encrypted rounds, realizing more numbers of dynamic rounds encryption for the important information marked by NLPIR, while less numbers of dynamic rounds encryption for the non-important information that is not marked. Through linear and differential cryptographic analysis, ciphertext information entropy, “0–1” balance and National Institute of Science and Technology (NIST) tests and the comparison with other traditional and lightweight block ciphers, the results indicate that the dynamic variety of encrypted rounds can achieve different levels of encryption for different information, which can achieve the purpose of enhancing the anti-attack ability and reducing the number of encrypted rounds. Therefore, the dynamic rounds chaotic block cipher can guarantee the security of information transmission and realize the lightweight of the cryptographic algorithm.


2018 ◽  
Vol 2018.55 (0) ◽  
pp. D024
Author(s):  
Naoto HIRABAYASHI ◽  
Yorinobu TOYA ◽  
Akiko SOUMA ◽  
Takashi WATANABE

Sign in / Sign up

Export Citation Format

Share Document