共查询到17条相似文献,搜索用时 46 毫秒
1.
2.
针对通信的安全可靠问题,探讨了利用混沌进行保密通信的可行性。根据Pecora和Carroll提出的驱动一响应同步方法,分析了蔡氏混沌电路的同步原理,设计了混沌掩盖通信的实验电路,给出了元件参数和波形。实验结果表明:当f≥8kHz时,输入方渡信号被掩盖传输,实现了混沌保密通信。 相似文献
3.
蔡氏电路混沌系统的自适应反馈控制 总被引:2,自引:0,他引:2
针对一类简单的三维自治系统一蔡氏电路(Chau’s circuit)混沌系统,提出了一种反馈控制方法和一种自适应反馈控制方法。对于两种控制方法都利用Lyapunov原理证明了闭环系统的渐进稳定性,将提出的控制方法用于蔡氏电路混沌系统稳定于其不动点的控制。仿真结果表明,控制方法是有效的,自适应技术提高了系统的控制性能。 相似文献
4.
5.
孙振武 《上海电机学院学报》2013,(Z1):28-32
根据系统的稳定性理论,设计了实现超混沌完全同步的状态观测器。利用混沌之间的同步,构建了实现保密通信的技术路线。信号经过加密并被混沌掩盖后,发射给接收端。采用4阶Runge-Kutta方法,对提出的保密通信系统进行了数值仿真。仿真结果显示,超混沌系统和其同步接收器之间在5s内已实现了完全同步,在信道内传递的加密信号中,原始信号完全被混沌所掩盖,仿真结果证实了设计方案的有效性。 相似文献
6.
孙振武 《上海电机学院学报》2013,(1):28-32
根据系统的稳定性理论,设计了实现超混沌完全同步的状态观测器。利用混沌之间的同步,构建了实现保密通信的技术路线。信号经过加密并被混沌掩盖后,发射给接收端。采用4阶Runge—Kutta方法,对提出的保密通信系统进行了数值仿真。仿真结果显示,超混沌系统和其同步接收器之间在5S内已实现了完全同步,在信道内传递的加密信号中,原始信号完全被混沌所掩盖,仿真结果证实了设计方案的有效性。 相似文献
7.
基于虚拟仪器技术的蔡氏混沌信号发生器设计 总被引:1,自引:0,他引:1
混沌是由非线性系统产生的.蔡氏电路是一个最典型的三阶自治混沌电路.文中结合蔡氏电路模型,利用美国NI公司的虚拟仪器软件LabVIEW的数学处理功能编写混沌信号生成程序,并由数据采集卡输出混沌信号,具有易实现,参数易调节,高可靠性等优点. 相似文献
8.
9.
混沌及混沌电路的研究 总被引:4,自引:0,他引:4
本文给出了混沌的定义和常用的判定混沌方法 ,然后提出了用频变负电阻 (FDNR)实现混沌振荡器的新电路 ,该电路结构简单 ,仅用一个接地的频变负电阻作为有源器件 ,用二极管提供必要的非线性 ,最后文中给出了PSpice仿真验证了结果。 相似文献
10.
一类永磁同步电动机混沌模型与霍夫分叉 总被引:25,自引:5,他引:25
从基于d-q轴永磁同步电动机模型出发,应用时间尺度变换和线性仿射变换,建立了一个适用于永磁同步电动机混沌运动分析的模型,在研究永磁同步电动机同步速附近运动条件下,得到一个三阶的非线性自治方程。利用该方程,根据李雅普诺夫稳定性分析理论,针对不同外部输入电压状况对其出现霍夫分叉的条件及稳定性进行了分析,研究表明,当均匀气隙永磁同步电动机参数确定情况下,在一定输入电压范围内,它将在同步速附近产生不稳定的霍夫分叉运动,并进入混沌状态和产生奇怪吸引子,计算机仿真展现了这一过程。 相似文献
11.
Jing Wang Wenxin Yu Junnian Wang Yanming Zhao Jing Zhang Dan Jiang 《International Journal of Circuit Theory and Applications》2019,47(5):702-717
In the paper, a novel six-dimensional hyperchaotic system is proposed for secure communication. A detailed analysis of some relevant features, such as equilibrium stability, dissipation, bifurcation, and Lyapunov exponents. The results show that there are hyperchaos, chaos, quasi-periodic, and periodic dynamic behaviors for our constructed hyperchaotic system. Then the six-dimensional hyperchaotic system is simulated and implemented, which verified its physical realizability. The six-dimensional hyperchaotic system is applied to complete the signal encryption and decryption circuit design, then the circuit is tested. The results indicate that the proposed hyperchaotic system can play an important role in some key areas such as communication security and complex systems. 相似文献
12.
Kazuhiko Nakamura Teruyuki Miyajima Kazuo Yamanaka 《Electrical Engineering in Japan》2008,163(3):47-56
We propose use of a constant‐envelope pulse for the purpose of improving noise‐rejection property in chaotic synchronization‐based communication systems. In a conventional system where discrete‐time chaotic signals are transmitted through the pulse amplitude modulation, the correlator output variance increases as the spreading factor decreases, while the synchronization error increases as the spreading factor increases. Therefore, it is difficult to control the bit error rate only by adjusting the spreading factor. In the proposed system, use of pulse width modulation keeps the envelope of transmitted signals constant, which leads to the correlator output with zero variance. The synchronization error is kept small because the spreading factor can be set to be one without increasing the correlator output variance. We have a result of computer simulation showing that the proposed system achieves a bit error performance better than the conventional system. In addition, a new blind adaptive algorithm is proposed which suppresses intersymbol interference. © 2008 Wiley Periodicals, Inc. Electr Eng Jpn, 163(3): 47– 56, 2008; Published online in Wiley InterScience ( www. interscience.wiley.com ). DOI 10.1002/eej.20318 相似文献
13.
Xiao‐Song Yang Qingdu Li Guanrong Chen 《International Journal of Circuit Theory and Applications》2003,31(6):637-640
A very simple 4D system with a twin‐star hyperchaotic attractor is presented in this letter. Computer simulation is given to visualize the attractor, and a simple circuitry is designed for system implementation. Copyright © 2003 John Wiley & Sons, Ltd. 相似文献
14.
利用Buck变换器的输出电压时间序列可以进行变换器的混沌吸引子重构,其中延迟量可以通过时间序列的自相关函数来确定,而重构维数也可根据混沌吸引子的关联维来确定,仿真和特征参数计算均表明Buck变换器的重构混沌吸引子与原混沌吸引子拓扑等价,具有相同的动力学性质和几何性质,另外,构建了一个延迟重构实验电路,得到的实验波形也验证了上述结果。 相似文献
15.
利用Buck变换器的输出电压时间序列可以进行变换器的混沌吸引子重构,其中延迟量可以通过时间序列的自相关函数来确定,而重构维数也可根据混沌吸引子的关联维来确定,仿真和特征参数计算均表明Buck变换器的重构混沌吸引子与原混沌吸引子拓扑等价,具有相同的动力学性质和几何性质,另外,构建了一个延迟重构实验电路,得到的实验波形也验证了上述结果。 相似文献
16.
17.
Zheng Yan Wang Ruchuan Mu Hong Wang Haiyan 《Frontiers of Electrical and Electronic Engineering in China》2007,2(2):176-181
As a new technology, mobile agent (MA) shows a wide application in the field of network technology. However, security has
been one of the crucial problems in its application. A new protection model based on a trusted element is presented in this
paper. The trusted element, which differs from the traditional trusted hardware such as a smart card or a co-processor, offers
a third party service based on an encrypted circuit construction. The procedure of constructing an encrypted circuit is introduced
and the method of using the trusted service to protect the MA is also described. An application example is given to show how
to use the new model at the end of the paper.
Translated from Acta Electronica Sinica, 2006, 34(8): 1 410–1 414 [译自: 电子学报] 相似文献