共查询到20条相似文献,搜索用时 116 毫秒
1.
提出利用符号函数产生3涡卷混沌吸引子的方法,进行基本的混沌动力学分析,给出最大李雅普诺夫指数、功率谱、庞加莱映射,并基于李雅普诺夫稳定性理论,研究了两个3涡卷混沌吸引子的单向耦合同步的问题,给出3涡卷混沌吸引子产生及其同步的数值模拟结果. 相似文献
2.
将主动-被动同步法改进后,用于对长延迟状态下电光双稳态系统进行混沌控制和同步研究,分别采用单向驱动方法和驱动-耦合方法研究电光双稳态系统的混沌控制和同步。数值模拟表明,在适当参数条件下应用单向驱动方法,驱动系统可以将响应系统控制到各周期状态,且驱动系统的状态决定了响应系统的状态;适当选取耦合系数和驱动强度,两种方案都可以实现驱动系统与响应系统之间的混沌同步。从同步效果上来看,驱动-耦合方法所需耦合系数更小,可控的耦合系数范围比较广,同步效果更好。 相似文献
3.
耦合时滞光电反馈系统的同步研究 总被引:1,自引:1,他引:0
同步是实 现保密通信的基础,现有的基于时滞光电反馈混沌系统的同步研究主要集中在实现方面。本 文利用Lyapunov函数法,从理论研究耦合时滞光电反馈混沌系统的同步问题,包括单向耦合 和双向耦合两种形式。结果表明,耦合时滞光电反馈混沌系统能够实现鲁棒同步。对理论结 果进行了数值实验分析,结果与理论分析相一致。 相似文献
4.
5.
6.
7.
本文提出光纤混沌双向保密通信设想,通过耦合光注入半导体激光器激光混沌全光耦合反馈同步系统和光纤传输信道,建立了光纤混沌双向通信系统模型,数值实现了该系统在长距离光纤传输中的同步,详细地分析了系统同步时间随光纤传输长度的关系.证明了光纤的交叉相位调制是限制激光混沌在光纤传输中同步的主要原因,导出了系统传输的非线性相移.数值模拟了具有正弦调制信号的调制频率0.5GHz混沌模拟通信和数字信号调制速率0.4Gbit/s以及20Gbit/s的混沌数字通信以及调制速率0.05Gbit/s 混沌键控通信的应用,计算出光纤混沌数字通信速率和同步误差等关系,还特别分析了系统解码特性和调制带宽,表明系统具有非常好的保密性能和具有高速率通信的能力.光纤混沌双向保密通信是可以实现的. 相似文献
8.
9.
耦合受迫RC振子之间的混沌同步 总被引:3,自引:2,他引:1
混沌同步因其深远的应用潜力受广泛关注,本文首先介绍能产生混沌态的受迫RC振子电路,及由两个这样的电路线性耦合组成的耦合RC振子电路;然后对该耦合电路的动力学过程进行了分析描述,阐明了耦合系统的同步稳定性;数值实验表明,两个电路参数完全相同或两个电路参数略有差异,耦合系统均能实现同步,最后进行了简要讨论。 相似文献
10.
11.
一种新的混沌同步及保密通信方式 总被引:20,自引:3,他引:17
本文提出一种新的混沌同步及保密通信方式。在发送端,将信息信号与混沌载波的和经取模运算后再嵌入混沌动力系统的迭代之中以实现调制;在接收端,用一个相应的非动力学系统从接收信号中提取混沌载波并进而恢复信息信号。研究表明,该混沌同步方式具有较强的抗干扰能力并且实现容易;该保密通信系统保密性能良好。 相似文献
12.
半导体激光器混沌双向保密通信系统理论研究 总被引:4,自引:4,他引:4
提出外部光注入半导体激光器激光混沌全光耦合-反馈同步系统,进行激光器系统稳定性动力学分析并计算出最大Lyapunov指数,导出系统的同步误差扰动方程以及系统有混沌隐藏编码时的同步误差公式和解调公式,数值证明并模拟实现了系统的混沌同步,分析同步瞬态响应和噪声影响,该系统具有较强的抗干扰能力。模拟具有正弦调制信号的调制频率0.2GHz混沌模拟通信和数字信号调制速率0.2Gb/s的混沌数字通信以及调制速率0.05Gb/s混沌键控通信的应用,特别分析了系统解码特性和调制带宽,系统无论是在时域还是在频域,都具有非常好的保密性,该系统可以作为混沌双向保密通信使用。研究表明系统准许在一定范围内可以有参数失配,系统的实际应用是有可能的。 相似文献
13.
Design of a tensile-type 3-D multi-scroll chaotic system and its application in secure communication
A kind of tensile-type 3-D multi-scroll chaotic attractor based on Chua's circuit was successfully designed. The chaos generation mechanism was studied by analyzing the symmetry and invariance, the existence of the dissipation, as well as the system equilibrium and stability. Then, some basic dynamical properties, such as Lyapunov exponents, fractal dimension, chaotic dynamical behaviors of the new chaotic system were introduced, either numerically or analytically. At the same time, the chaotic circuit of this system was realized by PSPICE. Finally, based on Lyapunov theorem and unidi-rectionally coupled method, the synchronization of the chaotic system has also been investigated. With this approach, the novel system can be applied to secure communication, which can achieve the purpose of covering specific signals. The experimental results are in agreement with numerical simulation results, which verifies the availability and feasibility of this method. 相似文献
14.
15.
针对混沌直接序列扩频(Chaotic Direct Sequence Spread Spectrum,CD3S)通信技术的实现问题,提出了一种CD3S通信的软件无线电实现方案,阐述了CD3S通信系统发收机的设计方法。发射机由软件实现信息码的混沌扩频,并通过硬件平台完成发射。接收机由硬件平台完成下变频与采样,然后通过软件实现定时同步、载波同步与信息解调。信息解调由多滤波器解调算法实现。在多滤波器解调算法中,由无损卡尔曼滤波(Unscented Kalman Filter,UKF)估计混沌码、卡尔曼滤波(Kalman Filter,KF)估计信道参数和最小均方误差(Minimum Mean Square Error,MMSE)滤波估计信息码这3个滤波器交替工作,通过联合估计实现信息码的解调。实验结果表明,该方案可以实现CD3S通信。 相似文献
16.
This paper is devoted to introduce a novel complex fifth-order memristive circuit system and its applications in synchronous stability and weak signal detection. Firstly, the typical dynamical behaviors of the memristive system are discussed by chaotic phase portrait, complexity analysis, one-parameter bifurcation and Lyapunov exponent spectrum. Secondly, the adaptive control method is applied to realize the synchronization between the drive memristive system (DMS) and the response memristive system (RMS). The results indicate that the synchronization method has strong robustness and anti-interference ability. Thirdly, the weak signal detection of the novel five-dimensional memristive system is realized by using the extreme sensitivity of chaotic system to initial values. Finally, the fifth-order memristive circuit is designed by using basic electronic elements and simulated by Multisim software. And the anti-interference ability and sensitivity of the fifth-order memristive circuit are further verified by adding different weak disturbance signals at different positions of the circuit. 相似文献
17.
Hamsa A. Abdullah Hikmat N. Abdullah Waleed A. Mahmoud Al‐Jawher 《International Journal of Communication Systems》2020,33(4)
Recently, the synchronization between two matching chaotic systems to provide confident communication has gained a lot of interest. Continuously, there is a necessity to produce a novel dynamical system to be used in synchronization to implement a strong security system. In this paper, a hybrid chaotic system is suggested and verified for the potential use of secure communication through chaos synchronization. The Lyapunov exponent (LE) and zero‐one (0‐1) tests have been used to verify the performance of the suggested hybrid chaotic system, while National Institute of Standard and Technology (NIST) tests have been applied to verify the randomness properties. And the synchronization has been achieved between master and slave systems by using nonlinear control laws. The simulation outcomes demonstration that the hybrid system has chaotic performance and outstanding randomness characteristic. The statistical results gained for LE test was 0.8822, and for frequency test (FT) was 0.2028, while for the run test (RT) was 0.1924. Accordingly, the suggested hybrid system can be used to evolve functional synchronization algorithms and encryption for image, video, and voice secure communication applications. 相似文献
18.
19.
1 IntroductionSince 1 990 ,chaoticsynchronization[1~ 4] andchaoticcontrolling[5~6] havereceivedagreatdealofattention[7~1 1 ] ,andchaoticsynchronizationisaphenomenonofinterestinfieldsfromelectronicstocommunication[1 2 ] ,andfrombiophysicstoneuro science[1 3] .Ifchaoticsync… 相似文献
20.
基于Lorenz系统切换混沌同步的保密通讯 总被引:3,自引:0,他引:3
该文提出利用Lorenz系统切换混沌同步实施保密通讯的方法。构建了有一定关联的两个Lorenz混沌系统,并通过选择器在系统间随机切换;用同一种控制方法既能实现不同Lorenz系统的混沌同步,又能实现相同Lorenz系统的混沌同步;发送系统可以在Lorenz混沌系统间随机转换,传输信道中混沌调制信号也随之不断变化;接收系统将混沌调制信号解调后,即可获取有用信号。由于发送系统的可选择性,导致保密信号的多样性和随机性,因此该保密通讯方法具有更好的保密性能。 相似文献