首页 > 最新文献

Chaos Solitons & Fractals最新文献

英文 中文
Chaos and regularities in cavity assisted two-channel nonlinear coupler 空腔辅助双通道非线性耦合器中的混沌与规律性
IF 5.3 1区 数学 Q1 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-23 DOI: 10.1016/j.chaos.2024.115650
Firoz Chogle , Seba Sara Varghese , Abdel-Baset M.A. Ibrahim , Awadhesh Prasad , Hichem Eleuch
This paper presents a study of the dynamical behavior in a cavity-assisted two-channel Kerr nonlinear directional coupler. Applying a deterministic periodic laser pump to a two-channel coupled system led to a range of dynamic behaviors, encompassing periodicity, quasiperiodicity, chaoticity and hyperchaoticity. This is confirmed by the exploration of the Lyapunov exponents, Poincaré sections and bifurcation diagrams for resonance and low cavity detuning. For low cavity detuning, chaos arises when the laser pump’s amplitude is large. This is due to higher interactions between photons and the cavity, resulting in more photons inside and higher nonlinearity. On the other hand, the reduced interactions in high cavity detuning displayed regular behavior which is explained qualitatively.
本文研究了腔体辅助双通道克尔非线性定向耦合器的动态行为。将确定性周期激光泵浦应用于双通道耦合系统会产生一系列动态行为,包括周期性、准周期性、混沌性和超混沌性。对共振和低腔失谐的 Lyapunov 指数、Poincaré 截面和分岔图的研究证实了这一点。对于低腔失谐,当激光泵浦的振幅较大时就会出现混乱。这是由于光子与腔体之间的相互作用增强,导致腔内光子增多,非线性增强。另一方面,在高腔失谐情况下,相互作用的减少显示出有规律的行为,这一点可以得到定性的解释。
{"title":"Chaos and regularities in cavity assisted two-channel nonlinear coupler","authors":"Firoz Chogle ,&nbsp;Seba Sara Varghese ,&nbsp;Abdel-Baset M.A. Ibrahim ,&nbsp;Awadhesh Prasad ,&nbsp;Hichem Eleuch","doi":"10.1016/j.chaos.2024.115650","DOIUrl":"10.1016/j.chaos.2024.115650","url":null,"abstract":"<div><div>This paper presents a study of the dynamical behavior in a cavity-assisted two-channel Kerr nonlinear directional coupler. Applying a deterministic periodic laser pump to a two-channel coupled system led to a range of dynamic behaviors, encompassing periodicity, quasiperiodicity, chaoticity and hyperchaoticity. This is confirmed by the exploration of the Lyapunov exponents, Poincaré sections and bifurcation diagrams for resonance and low cavity detuning. For low cavity detuning, chaos arises when the laser pump’s amplitude is large. This is due to higher interactions between photons and the cavity, resulting in more photons inside and higher nonlinearity. On the other hand, the reduced interactions in high cavity detuning displayed regular behavior which is explained qualitatively.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115650"},"PeriodicalIF":5.3,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of hybrid strategies of complex network attack and defense games 复杂网络攻防博弈混合策略的应用
IF 5.3 1区 数学 Q1 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-23 DOI: 10.1016/j.chaos.2024.115662
Zhe Li, Jin Liu, Jiaqi Ren, Yibo Dong, Weili Li
Critical infrastructure networks serve as the backbone of modern society’s operations, and the application of game theory to safeguard these networks against deliberate attacks under resource constraints is of paramount importance. Regrettably, the existing body of research on hybrid attack and defense strategies for nodes and edges is notably scarce, despite the ubiquity of such strategies in practical contexts. Current understanding regarding the establishment of a cost constraint model within the framework of hybrid attack and defense strategies, the strategic inclinations of both adversarial and defensive parties under varying cost constraint coefficients, and the influence of resource allocation ratios on equilibrium outcomes remains limited. Consequently, this study constructs a game-theoretic model for the engagement of critical infrastructure networks under non-uniform cost constraints, incorporating hybrid attack and defense strategies for nodes and edges, and conducts an equilibrium analysis across a range of cost constraint coefficients and resource allocation ratios. The findings reveal that when resource availability is limited, both attackers and defenders are inclined towards a strategy of concentrated resource allocation; in contrast, under most circumstances, defenders exhibit a preference for an equitable distribution of resources.
关键基础设施网络是现代社会运行的支柱,应用博弈论来保护这些网络免受资源限制下的蓄意攻击至关重要。令人遗憾的是,尽管节点和边缘的混合攻击和防御策略在实际环境中无处不在,但现有的相关研究却十分匮乏。目前,人们对在混合攻防策略框架内建立成本约束模型、不同成本约束系数下敌对双方和防御方的策略倾向以及资源分配比率对均衡结果的影响等方面的了解仍然有限。因此,本研究构建了非均匀成本约束下关键基础设施网络交战的博弈论模型,纳入了节点和边的混合攻防策略,并对一系列成本约束系数和资源分配比率进行了均衡分析。研究结果表明,当资源可用性有限时,攻击方和防御方都倾向于集中分配资源的策略;相反,在大多数情况下,防御方都表现出公平分配资源的偏好。
{"title":"Application of hybrid strategies of complex network attack and defense games","authors":"Zhe Li,&nbsp;Jin Liu,&nbsp;Jiaqi Ren,&nbsp;Yibo Dong,&nbsp;Weili Li","doi":"10.1016/j.chaos.2024.115662","DOIUrl":"10.1016/j.chaos.2024.115662","url":null,"abstract":"<div><div>Critical infrastructure networks serve as the backbone of modern society’s operations, and the application of game theory to safeguard these networks against deliberate attacks under resource constraints is of paramount importance. Regrettably, the existing body of research on hybrid attack and defense strategies for nodes and edges is notably scarce, despite the ubiquity of such strategies in practical contexts. Current understanding regarding the establishment of a cost constraint model within the framework of hybrid attack and defense strategies, the strategic inclinations of both adversarial and defensive parties under varying cost constraint coefficients, and the influence of resource allocation ratios on equilibrium outcomes remains limited. Consequently, this study constructs a game-theoretic model for the engagement of critical infrastructure networks under non-uniform cost constraints, incorporating hybrid attack and defense strategies for nodes and edges, and conducts an equilibrium analysis across a range of cost constraint coefficients and resource allocation ratios. The findings reveal that when resource availability is limited, both attackers and defenders are inclined towards a strategy of concentrated resource allocation; in contrast, under most circumstances, defenders exhibit a preference for an equitable distribution of resources.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115662"},"PeriodicalIF":5.3,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Particle swarm optimization with historical return decay enhances cooperation in public goods games with investment risks 带有历史收益衰减的粒子群优化技术可增强具有投资风险的公共产品博弈中的合作
IF 5.3 1区 数学 Q1 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-23 DOI: 10.1016/j.chaos.2024.115665
Hongwei Kang , Xin Li , Yong Shen, Xingping Sun, Qingyi Chen
In the realm of spatial public goods games, heterogeneous investment has emerged as a potent mechanism to enhance cooperative behavior. Savvy investors dynamically adjust their investment levels to optimize returns based on environmental conditions and personal circumstances. This study delves into the evolution of cooperation within a spatial public goods game framework, characterized by heterogeneous investment and associated risks, conducted on a square lattice. We introduce the investors (I) with heterogeneous investment, who updates his investment amount according to the current environment of the game and his own historical experience. We introduce a particle swarm optimization algorithm with decaying historical returns to fine-tune the investment levels of investors. Furthermore, a risk mechanism inspired by the ultimatum game is integrated into the model. This paper investigates the impact of the risk threshold θ on cooperative behavior and examines the influence of the risk decay factor α on cooperation. Additionally, it analyzes the investment behavior of investors in scenarios where two types of investors coexist. Finally, this study explores the effects of the historical best payoff decay factor β and the self-learning rate c1 on cooperative behavior. This research contributes to a nuanced understanding of heterogeneous investment behaviors in public goods games under specified risk mechanisms, providing novel insights into the intricate dynamics of cooperation in complex systems.
在空间公共产品博弈领域,异质投资已成为加强合作行为的有效机制。精明的投资者会根据环境条件和个人情况动态调整投资水平,以优化收益。本研究深入探讨了空间公共物品博弈框架下的合作演化,该博弈以异质投资和相关风险为特征,在正方形网格上进行。我们引入了异质投资的投资者(I),他根据当前博弈环境和自己的历史经验更新自己的投资额。我们引入了一种粒子群优化算法,利用衰减历史收益来微调投资者的投资水平。此外,受最后通牒博弈启发的风险机制也被整合到了模型中。本文研究了风险阈值 θ 对合作行为的影响,并探讨了风险衰减因子 α 对合作的影响。此外,本文还分析了在两类投资者并存的情况下投资者的投资行为。最后,本研究探讨了历史最佳回报衰减因子 β 和自学率 c1 对合作行为的影响。这项研究有助于深入理解特定风险机制下公共物品博弈中的异质投资行为,为复杂系统中错综复杂的合作动态提供了新的见解。
{"title":"Particle swarm optimization with historical return decay enhances cooperation in public goods games with investment risks","authors":"Hongwei Kang ,&nbsp;Xin Li ,&nbsp;Yong Shen,&nbsp;Xingping Sun,&nbsp;Qingyi Chen","doi":"10.1016/j.chaos.2024.115665","DOIUrl":"10.1016/j.chaos.2024.115665","url":null,"abstract":"<div><div>In the realm of spatial public goods games, heterogeneous investment has emerged as a potent mechanism to enhance cooperative behavior. Savvy investors dynamically adjust their investment levels to optimize returns based on environmental conditions and personal circumstances. This study delves into the evolution of cooperation within a spatial public goods game framework, characterized by heterogeneous investment and associated risks, conducted on a square lattice. We introduce the investors (I) with heterogeneous investment, who updates his investment amount according to the current environment of the game and his own historical experience. We introduce a particle swarm optimization algorithm with decaying historical returns to fine-tune the investment levels of investors. Furthermore, a risk mechanism inspired by the ultimatum game is integrated into the model. This paper investigates the impact of the risk threshold <span><math><mi>θ</mi></math></span> on cooperative behavior and examines the influence of the risk decay factor <span><math><mi>α</mi></math></span> on cooperation. Additionally, it analyzes the investment behavior of investors in scenarios where two types of investors coexist. Finally, this study explores the effects of the historical best payoff decay factor <span><math><mi>β</mi></math></span> and the self-learning rate <span><math><msub><mrow><mi>c</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> on cooperative behavior. This research contributes to a nuanced understanding of heterogeneous investment behaviors in public goods games under specified risk mechanisms, providing novel insights into the intricate dynamics of cooperation in complex systems.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115665"},"PeriodicalIF":5.3,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identifying influential nodes in social networks via improved Laplacian centrality 通过改进的拉普拉斯中心性识别社交网络中的有影响力节点
IF 5.3 1区 数学 Q1 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-23 DOI: 10.1016/j.chaos.2024.115675
Xiaoyu Zhu , Rongxia Hao
Identifying influential nodes in social networks has significant applications in terms of social analysis and information dissemination. How to capture the crucial features of influential nodes without increasing the computational complexity is an urgent issue to be solved in the context of big data. Laplacian centrality (LC) measures nodal influence by computing nodes' degree, making it extremely low complexity. However, there is still significant room for improvement. Consequently, we propose the improved Laplacian centrality (ILC) to identify influential nodes based on the concept of self-consistent. Identifying results on 9 real networks prove that ILC is superior to LC and other 6 classical measures in terms of ranking accuracy, top-k nodes identification and discrimination capability. Moreover, the computational complexity of ILC has not significantly increased compared to LC, and remains the linear order of magnitude O(m). Additionally, ILC has excellent robustness and universality such that there is no need to adjust parameters according to different network structures.
识别社交网络中的有影响力节点在社会分析和信息传播方面有着重要的应用。如何在不增加计算复杂度的情况下捕捉有影响力节点的关键特征,是大数据背景下亟待解决的问题。拉普拉斯中心度(Laplacian centrality,LC)通过计算节点的度数来衡量节点的影响力,因此复杂度极低。然而,该方法仍有很大的改进空间。因此,我们提出了改进的拉普拉斯中心度(ILC),基于自洽概念来识别有影响力的节点。9 个真实网络的识别结果证明,ILC 在排序准确性、前 k 节点识别和判别能力方面都优于 LC 和其他 6 种经典度量方法。此外,与 LC 相比,ILC 的计算复杂度并没有显著增加,仍然是线性数量级 O(m)。此外,ILC 还具有出色的鲁棒性和通用性,无需根据不同的网络结构调整参数。
{"title":"Identifying influential nodes in social networks via improved Laplacian centrality","authors":"Xiaoyu Zhu ,&nbsp;Rongxia Hao","doi":"10.1016/j.chaos.2024.115675","DOIUrl":"10.1016/j.chaos.2024.115675","url":null,"abstract":"<div><div>Identifying influential nodes in social networks has significant applications in terms of social analysis and information dissemination. How to capture the crucial features of influential nodes without increasing the computational complexity is an urgent issue to be solved in the context of big data. Laplacian centrality (LC) measures nodal influence by computing nodes' degree, making it extremely low complexity. However, there is still significant room for improvement. Consequently, we propose the improved Laplacian centrality (ILC) to identify influential nodes based on the concept of self-consistent. Identifying results on 9 real networks prove that ILC is superior to LC and other 6 classical measures in terms of ranking accuracy, top-k nodes identification and discrimination capability. Moreover, the computational complexity of ILC has not significantly increased compared to LC, and remains the linear order of magnitude O(m). Additionally, ILC has excellent robustness and universality such that there is no need to adjust parameters according to different network structures.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115675"},"PeriodicalIF":5.3,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving resilience of cyber physical power networks against Time Synchronization Attacks (TSAs) using deep learning and spline interpolation with real-time validation 利用深度学习和带实时验证的样条插值提高网络物理电力网络抵御时间同步攻击(TSA)的能力
IF 5.3 1区 数学 Q1 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-22 DOI: 10.1016/j.chaos.2024.115647
Soma Bhattacharya, Ebha Koley, Subhojit Ghosh
The integration of high-speed communication networks and synchrophasors into smart grids has significantly improved real-time monitoring and control accuracy. However, the increased reliance on communication infrastructure has also heightened the vulnerability of the power networks to cyber intrusions. Synchronized phasor data and GPS time-stamping used by Phasor Measurement Units (PMUs), make them prime targets for cyber intrusions. Among the different types of intrusions in smart grids, Time Synchronization Attacks (TSA), because of their impact and easier execution, are widely employed by intruders to disrupt grid operations. Such attacks aim at spoofing GPS signals, thereby altering voltage and current phasor information across the network. The same leads to malfunction of the operations executed at the control center. The present work aims to develop a secured and resilient mechanism against TSAs in smart grids. In this regard, a two-stage mechanism based on deep learning and spline interpolation is proposed. The first stage employs an LSTM-based classifier to detect TSAs in the cyber layer. Post-TSA detection, the second stage uses spline interpolation to filter out malicious data. The filtering allows for the restoration of the actual pre-TSA data acquired from PMUs. The proposed TSA detection and correction scheme has been validated extensively across various TSA scenarios on IEEE 9, 14, and 57 bus systems. Majority of the reported works of TSA detection have been validated using offline numerical simulations, which have limitations in replicating practical TSA dynamics. To address the same, the proposed scheme has been validated using a real-time testbed comprising of a digital simulator, real PMU, GPS receiver, and a data acquisition module with a communication interface.
将高速通信网络和同步传感器集成到智能电网中,大大提高了实时监测和控制精度。然而,对通信基础设施的依赖性增加也加剧了电力网络面对网络入侵的脆弱性。相位测量单元 (PMU) 使用的同步相位数据和 GPS 时间戳使其成为网络入侵的主要目标。在智能电网的各种入侵类型中,时间同步攻击(TSA)因其影响大、执行容易而被入侵者广泛用来破坏电网运行。此类攻击旨在欺骗 GPS 信号,从而改变整个网络的电压和电流相位信息。这同样会导致控制中心执行的操作出现故障。本研究旨在开发一种针对智能电网中的 TSA 的安全且有弹性的机制。为此,我们提出了一种基于深度学习和样条插值的两阶段机制。第一阶段采用基于 LSTM 的分类器来检测网络层中的 TSA。检测出 TSA 后,第二阶段使用样条插值法过滤恶意数据。通过过滤,可以恢复从 PMU 获取的 TSA 前的实际数据。提议的 TSA 检测和校正方案已在 IEEE 9、14 和 57 总线系统的各种 TSA 场景中得到广泛验证。大多数 TSA 检测报告都是通过离线数值模拟进行验证的,这在复制实际 TSA 动态方面存在局限性。为了解决这一问题,我们使用实时测试平台对所提出的方案进行了验证,该测试平台由数字模拟器、真实 PMU、GPS 接收器和带通信接口的数据采集模块组成。
{"title":"Improving resilience of cyber physical power networks against Time Synchronization Attacks (TSAs) using deep learning and spline interpolation with real-time validation","authors":"Soma Bhattacharya,&nbsp;Ebha Koley,&nbsp;Subhojit Ghosh","doi":"10.1016/j.chaos.2024.115647","DOIUrl":"10.1016/j.chaos.2024.115647","url":null,"abstract":"<div><div>The integration of high-speed communication networks and synchrophasors into smart grids has significantly improved real-time monitoring and control accuracy. However, the increased reliance on communication infrastructure has also heightened the vulnerability of the power networks to cyber intrusions. Synchronized phasor data and GPS time-stamping used by Phasor Measurement Units (PMUs), make them prime targets for cyber intrusions. Among the different types of intrusions in smart grids, Time Synchronization Attacks (TSA), because of their impact and easier execution, are widely employed by intruders to disrupt grid operations. Such attacks aim at spoofing GPS signals, thereby altering voltage and current phasor information across the network. The same leads to malfunction of the operations executed at the control center. The present work aims to develop a secured and resilient mechanism against TSAs in smart grids. In this regard, a two-stage mechanism based on deep learning and spline interpolation is proposed. The first stage employs an LSTM-based classifier to detect TSAs in the cyber layer. Post-TSA detection, the second stage uses spline interpolation to filter out malicious data. The filtering allows for the restoration of the actual pre-TSA data acquired from PMUs. The proposed TSA detection and correction scheme has been validated extensively across various TSA scenarios on IEEE 9, 14, and 57 bus systems. Majority of the reported works of TSA detection have been validated using offline numerical simulations, which have limitations in replicating practical TSA dynamics. To address the same, the proposed scheme has been validated using a real-time testbed comprising of a digital simulator, real PMU, GPS receiver, and a data acquisition module with a communication interface.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115647"},"PeriodicalIF":5.3,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Tabu learning neuron model with variable activation gradient and its application to secure healthcare 具有可变激活梯度的新型 Tabu 学习神经元模型及其在安全医疗中的应用
IF 5.3 1区 数学 Q1 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-22 DOI: 10.1016/j.chaos.2024.115632
Donghua Jiang , Zeric Tabekoueng Njitacke , Guoqiang Long , Jan Awrejcewicz , Mingwen Zheng , Lei Cai
Currently, the latest advances in artificial neural networks have deeply affected various aspects of the general public. To this end, a new Tabu Learning Neuron (TLN) model with variable activation gradients is proposed in this paper. Specifically, its kinetic behaviors and intrinsic properties are investigated by means of a two-parameter Lyapunov exponential spectrum, a bifurcation and an equilibrium point analysis. Moreover, its electronic circuit built in the PSpice environment agrees with the numerical results. Besides, in respect of its engineering applications, a novel data compression-encryption scheme based on the new TLN model, matrix factorization theory and compressive sensing technology is introduced for providing a secure data exchange environment in the healthcare community. Finally, performance evaluation indicates that the proposed cryptography scheme has remarkable advantages in terms of reconstruction quality and security.
当前,人工神经网络的最新进展已深入影响到大众的方方面面。为此,本文提出了一种具有可变激活梯度的新型塔布学习神经元(TLN)模型。具体而言,本文通过双参数 Lyapunov 指数谱、分岔和平衡点分析研究了该模型的动力学行为和内在特性。此外,在 PSpice 环境中构建的电子电路与数值结果相吻合。此外,在工程应用方面,介绍了一种基于新 TLN 模型、矩阵因式分解理论和压缩传感技术的新型数据压缩加密方案,为医疗界提供了一个安全的数据交换环境。最后,性能评估表明,所提出的加密方案在重构质量和安全性方面具有显著优势。
{"title":"Novel Tabu learning neuron model with variable activation gradient and its application to secure healthcare","authors":"Donghua Jiang ,&nbsp;Zeric Tabekoueng Njitacke ,&nbsp;Guoqiang Long ,&nbsp;Jan Awrejcewicz ,&nbsp;Mingwen Zheng ,&nbsp;Lei Cai","doi":"10.1016/j.chaos.2024.115632","DOIUrl":"10.1016/j.chaos.2024.115632","url":null,"abstract":"<div><div>Currently, the latest advances in artificial neural networks have deeply affected various aspects of the general public. To this end, a new Tabu Learning Neuron (TLN) model with variable activation gradients is proposed in this paper. Specifically, its kinetic behaviors and intrinsic properties are investigated by means of a two-parameter Lyapunov exponential spectrum, a bifurcation and an equilibrium point analysis. Moreover, its electronic circuit built in the PSpice environment agrees with the numerical results. Besides, in respect of its engineering applications, a novel data compression-encryption scheme based on the new TLN model, matrix factorization theory and compressive sensing technology is introduced for providing a secure data exchange environment in the healthcare community. Finally, performance evaluation indicates that the proposed cryptography scheme has remarkable advantages in terms of reconstruction quality and security.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115632"},"PeriodicalIF":5.3,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diffusion-driven instabilities in a tri-trophic food web model: From Turing to non-Turing patterns and waves 三营养食物网模型中的扩散驱动不稳定性:从图灵到非图灵模式和波浪
IF 5.3 1区 数学 Q1 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-22 DOI: 10.1016/j.chaos.2024.115634
Bhaskar Chakraborty , Sounov Marick , Nandadulal Bairagi
This work uses a reaction–diffusion system to explore self-organized pattern-forming phenomena through species distribution in a tri-trophic food web system. The interacting non-diffusive system involves a bottom prey, one specialist intermediate predator dependent on the bottom prey, and a generalist top predator, having its food preference regulation on both the bottom prey and intermediate predator. The system encounters temporal instability through Hopf-bifurcation and chaotic oscillations about the coexistence equilibrium with over-dependency on a particular food source. We provide analytical conditions for diffusion-driven Turing and wave instabilities. A weakly nonlinear analysis (WNA) is performed to examine the patterns of Turing instability close to the critical threshold. Numerical simulations show spatiotemporal patterns like spots, stripes, a mixture of spots & stripes and spatiotemporal chaos. The numerical investigations highlight the non-Turing instabilities consisting of Hopf, wave, Hopf-Turing, Hopf-wave. The diffusion of species suppresses regular and irregular spatiotemporal oscillations, giving stability to the system. Using a heat map of the Lyapunov exponents of the time series for different pairs of parameter values in a bi-parametric plane, it is demonstrated that the Turing pattern dominates the oscillatory Hopf pattern if the critical parameter value is from the Hopf-Turing region and is close to the Hopf bifurcation threshold, but the Hopf pattern dominates if the parameter pair is significantly away from it. The qualitative comparison of the non-Turing instabilities is provided with the corresponding spatiotemporal distribution of the species. It is observed that the high-amplitude oscillations of Hopf and Hopf-dominated non-Turing oscillations are vicious for the spatially distributed population.
这项研究利用反应-扩散系统来探索三营养食物网系统中物种分布的自组织模式形成现象。这个相互作用的非扩散系统包括一个底层猎物、一个依赖于底层猎物的专业中间捕食者和一个对底层猎物和中间捕食者都有食物偏好调节作用的通才顶层捕食者。该系统通过霍普夫分岔(Hopf-bifurcation)遇到时间不稳定性,并在过度依赖某一特定食物源的共存平衡点附近发生混沌振荡。我们为扩散驱动的图灵和波不稳定性提供了分析条件。我们进行了弱非线性分析(WNA),以研究临界阈值附近的图灵不稳定性模式。数值模拟显示了时空模式,如斑点、条纹、斑点与条纹的混合以及时空混沌。数值研究突出了由霍普夫、波、霍普夫-图灵、霍普夫-波组成的非图灵不稳定性。物种的扩散抑制了规则和不规则的时空振荡,使系统趋于稳定。利用双参数平面上不同参数值对的时间序列 Lyapunov 指数热图,可以证明如果临界参数值来自霍普夫-图灵区域并接近霍普夫分岔阈值,图灵模式会主导振荡的霍普夫模式,但如果参数对明显远离该阈值,则霍普夫模式会主导振荡的霍普夫模式。非图灵不稳定性的定性比较是通过相应的物种时空分布进行的。研究发现,霍普夫振荡和霍普夫主导的非图灵振荡的高振幅振荡对于空间分布的种群来说是恶性的。
{"title":"Diffusion-driven instabilities in a tri-trophic food web model: From Turing to non-Turing patterns and waves","authors":"Bhaskar Chakraborty ,&nbsp;Sounov Marick ,&nbsp;Nandadulal Bairagi","doi":"10.1016/j.chaos.2024.115634","DOIUrl":"10.1016/j.chaos.2024.115634","url":null,"abstract":"<div><div>This work uses a reaction–diffusion system to explore self-organized pattern-forming phenomena through species distribution in a tri-trophic food web system. The interacting non-diffusive system involves a bottom prey, one specialist intermediate predator dependent on the bottom prey, and a generalist top predator, having its food preference regulation on both the bottom prey and intermediate predator. The system encounters temporal instability through Hopf-bifurcation and chaotic oscillations about the coexistence equilibrium with over-dependency on a particular food source. We provide analytical conditions for diffusion-driven Turing and wave instabilities. A weakly nonlinear analysis (WNA) is performed to examine the patterns of Turing instability close to the critical threshold. Numerical simulations show spatiotemporal patterns like spots, stripes, a mixture of spots &amp; stripes and spatiotemporal chaos. The numerical investigations highlight the non-Turing instabilities consisting of Hopf, wave, Hopf-Turing, Hopf-wave. The diffusion of species suppresses regular and irregular spatiotemporal oscillations, giving stability to the system. Using a heat map of the Lyapunov exponents of the time series for different pairs of parameter values in a bi-parametric plane, it is demonstrated that the Turing pattern dominates the oscillatory Hopf pattern if the critical parameter value is from the Hopf-Turing region and is close to the Hopf bifurcation threshold, but the Hopf pattern dominates if the parameter pair is significantly away from it. The qualitative comparison of the non-Turing instabilities is provided with the corresponding spatiotemporal distribution of the species. It is observed that the high-amplitude oscillations of Hopf and Hopf-dominated non-Turing oscillations are vicious for the spatially distributed population.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115634"},"PeriodicalIF":5.3,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating digital chaotic systems of the simplest structure via a strongly connected graph inverse approach 通过强连接图反演法生成结构最简单的数字混沌系统
IF 5.3 1区 数学 Q1 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-22 DOI: 10.1016/j.chaos.2024.115655
Qianxue Wang, Dongsheng Kuang, Simin Yu
This paper designs the simplest m-dimensional (m=2,3,4,) digital chaotic system using a strongly connected graph inverse approach. Compared to previous systems, this approach significantly simplifies the system structure while enhancing statistical performance. First, in the m-dimensional digital iterative system, we construct 2m-state transition graph with bidirectional direct paths between any two states. Under the condition that the bitwise XOR result between any two states equals the combination of the current m unilateral infinite sequence outputs, we derive the corresponding simplest uncoupled m-dimensional iterative functions based on the inverse approach. Second, based on the simplest uncoupled m-dimensional iterative functions, we develop a cascaded closed-loop coupling approach to obtain the corresponding simplest fully coupled m-dimensional iterative functions, theoretically proving that they satisfy Devaney’s chaos definition. Compared to previous systems, this closed-loop coupling method not only simplifies the system structure, making it the simplest form among all fully coupled m-dimensional iterative functions, but also significantly improves statistical performance, as evidenced by passing both NIST and TestU01 tests. Finally, we validate the effectiveness and superiority of the simplest m-dimensional digital chaotic system through circuit design and FPGA simulation experiments.
本文利用强连接图逆方法设计了最简单的 m 维(m=2,3,4,...)数字混沌系统。与以往的系统相比,这种方法大大简化了系统结构,同时提高了统计性能。首先,在 m 维数字迭代系统中,我们构建了 2m 状态转换图,任意两个状态之间都有双向直接路径。在任意两个状态之间的比特XOR结果等于当前m个单边无穷序列输出组合的条件下,我们基于逆方法推导出相应的最简单的非耦合m维迭代函数。其次,在最简单的非耦合 m 维迭代函数的基础上,我们开发了一种级联闭环耦合方法,得到了相应的最简单的完全耦合 m 维迭代函数,并从理论上证明了它们满足 Devaney 的混沌定义。与以前的系统相比,这种闭环耦合方法不仅简化了系统结构,使其成为所有全耦合 m 维迭代函数中最简单的形式,而且显著提高了统计性能,通过 NIST 和 TestU01 测试就是证明。最后,我们通过电路设计和 FPGA 仿真实验验证了最简单 m 维数字混沌系统的有效性和优越性。
{"title":"Generating digital chaotic systems of the simplest structure via a strongly connected graph inverse approach","authors":"Qianxue Wang,&nbsp;Dongsheng Kuang,&nbsp;Simin Yu","doi":"10.1016/j.chaos.2024.115655","DOIUrl":"10.1016/j.chaos.2024.115655","url":null,"abstract":"<div><div>This paper designs the simplest <span><math><mi>m</mi></math></span>-dimensional (<span><math><mrow><mi>m</mi><mo>=</mo><mn>2</mn><mo>,</mo><mn>3</mn><mo>,</mo><mn>4</mn><mo>,</mo><mo>…</mo></mrow></math></span>) digital chaotic system using a strongly connected graph inverse approach. Compared to previous systems, this approach significantly simplifies the system structure while enhancing statistical performance. First, in the <span><math><mi>m</mi></math></span>-dimensional digital iterative system, we construct <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi></mrow></msup></math></span>-state transition graph with bidirectional direct paths between any two states. Under the condition that the bitwise XOR result between any two states equals the combination of the current <span><math><mi>m</mi></math></span> unilateral infinite sequence outputs, we derive the corresponding simplest uncoupled <span><math><mi>m</mi></math></span>-dimensional iterative functions based on the inverse approach. Second, based on the simplest uncoupled <span><math><mi>m</mi></math></span>-dimensional iterative functions, we develop a cascaded closed-loop coupling approach to obtain the corresponding simplest fully coupled <span><math><mi>m</mi></math></span>-dimensional iterative functions, theoretically proving that they satisfy Devaney’s chaos definition. Compared to previous systems, this closed-loop coupling method not only simplifies the system structure, making it the simplest form among all fully coupled <span><math><mi>m</mi></math></span>-dimensional iterative functions, but also significantly improves statistical performance, as evidenced by passing both NIST and TestU01 tests. Finally, we validate the effectiveness and superiority of the simplest <span><math><mi>m</mi></math></span>-dimensional digital chaotic system through circuit design and FPGA simulation experiments.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115655"},"PeriodicalIF":5.3,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability of nonlinear delayed impulsive control systems via step-function method 通过阶跃函数法实现非线性延迟脉冲控制系统的稳定性
IF 5.3 1区 数学 Q1 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-22 DOI: 10.1016/j.chaos.2024.115631
Yinuo Wang , Chuandong Li , Hongjuan Wu , Hao Deng
In this paper, considering that the limited speed of information transfer may generate time delay, which can sometimes influence the stability of the system, but in reality time delay is pervasive, and sometimes can have a positive impact on system’s stability, so it is essential to think about its existence. The nonlinear systems under delayed impulsive control (IC) are investigated here, and we mainly utilize the multiple-spans step-function method to analyse the stability conditions of the considered systems, which can be counted as a generalization of the Lyapunov-like stability method and is less conservative compared with the existing traditional Lyapunov-like function method. Moreover, it is the first time that this method employed for the stability of systems with IC and time delay. Two examples of equidistant impulses of nonlinear autonomous system and non-equidistant impulses of linear time-varying system by using two-spans step-function method are presented to validate the utility of the presented approach, respectively. Besides, the Zeno behavior of autonomous system without time delay is provided and treated by the presented method, which can better manifest the extensive viability of the method compared with the Lyapunov-like function method.
本文考虑到信息传递速度有限可能会产生时延,时延有时会影响系统的稳定性,但实际上时延无处不在,有时会对系统的稳定性产生积极影响,因此有必要思考时延的存在。本文研究了延迟脉冲控制(IC)下的非线性系统,主要利用多跨阶跃函数法分析了所考虑系统的稳定性条件,该方法可以算作是类李雅普诺夫稳定性方法的广义化,与现有的传统类李雅普诺夫函数法相比,其保守性较低。此外,该方法还首次用于具有 IC 和时延的系统的稳定性。本文以非线性自主系统的等距脉冲和线性时变系统的非等距脉冲为例,分别验证了所提出方法的实用性。此外,提出的方法还提供并处理了无时延自主系统的 Zeno 行为,与 Lyapunov 类函数方法相比,更能体现该方法的广泛可行性。
{"title":"Stability of nonlinear delayed impulsive control systems via step-function method","authors":"Yinuo Wang ,&nbsp;Chuandong Li ,&nbsp;Hongjuan Wu ,&nbsp;Hao Deng","doi":"10.1016/j.chaos.2024.115631","DOIUrl":"10.1016/j.chaos.2024.115631","url":null,"abstract":"<div><div>In this paper, considering that the limited speed of information transfer may generate time delay, which can sometimes influence the stability of the system, but in reality time delay is pervasive, and sometimes can have a positive impact on system’s stability, so it is essential to think about its existence. The nonlinear systems under delayed impulsive control (IC) are investigated here, and we mainly utilize the multiple-spans step-function method to analyse the stability conditions of the considered systems, which can be counted as a generalization of the Lyapunov-like stability method and is less conservative compared with the existing traditional Lyapunov-like function method. Moreover, it is the first time that this method employed for the stability of systems with IC and time delay. Two examples of equidistant impulses of nonlinear autonomous system and non-equidistant impulses of linear time-varying system by using two-spans step-function method are presented to validate the utility of the presented approach, respectively. Besides, the Zeno behavior of autonomous system without time delay is provided and treated by the presented method, which can better manifest the extensive viability of the method compared with the Lyapunov-like function method.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115631"},"PeriodicalIF":5.3,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal resilient tracking control of switched systems under denial-of-service attacks 拒绝服务攻击下交换系统的最优弹性跟踪控制
IF 5.3 1区 数学 Q1 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-21 DOI: 10.1016/j.chaos.2024.115648
Chen Chen , Lijie Wang
This article investigates the optimal output tracking problem for linear switched systems under DoS attacks. In contrast to early results which only consider the stability of switched systems under DoS attacks, the proposed control scheme can ensure the stability of the system while optimizing the system performance. Firstly, an augmented system is constructed based on the physical objects and command generator. Then, a Riccati equation of such an augmented system with DoS attacks is provided, and the optimal control scheme is obtained by iterative algorithm. Furthermore, to better align with practical scenarios, in this article, some restrictions on the instants of DoS attacks and switchings are removed, that is, multiple switchings are allowed during both active and inactive intervals of DoS attacks. In addition, the quantitative relationship regarding the duration and frequency of DoS attacks and the switching law is provided, which plays a key role in ensuring the stability of switching system under attacks. Finally, numerical examples are provided to demonstrate the effectiveness of the proposed method.
本文研究了 DoS 攻击下线性开关系统的最优输出跟踪问题。与早期仅考虑 DoS 攻击下开关系统稳定性的研究成果相比,本文提出的控制方案既能保证系统的稳定性,又能优化系统性能。首先,根据物理对象和指令发生器构建一个增强系统。然后,提供了这种具有 DoS 攻击的增强系统的 Riccati 方程,并通过迭代算法得到了最优控制方案。此外,为了更好地贴近实际应用场景,本文取消了对 DoS 攻击和切换时刻的一些限制,即在 DoS 攻击的活跃期和非活跃期都允许多次切换。此外,本文还提供了 DoS 攻击持续时间和频率与切换规律的定量关系,这对确保攻击下切换系统的稳定性起到了关键作用。最后,还提供了数值示例来证明所提方法的有效性。
{"title":"Optimal resilient tracking control of switched systems under denial-of-service attacks","authors":"Chen Chen ,&nbsp;Lijie Wang","doi":"10.1016/j.chaos.2024.115648","DOIUrl":"10.1016/j.chaos.2024.115648","url":null,"abstract":"<div><div>This article investigates the optimal output tracking problem for linear switched systems under DoS attacks. In contrast to early results which only consider the stability of switched systems under DoS attacks, the proposed control scheme can ensure the stability of the system while optimizing the system performance. Firstly, an augmented system is constructed based on the physical objects and command generator. Then, a Riccati equation of such an augmented system with DoS attacks is provided, and the optimal control scheme is obtained by iterative algorithm. Furthermore, to better align with practical scenarios, in this article, some restrictions on the instants of DoS attacks and switchings are removed, that is, multiple switchings are allowed during both active and inactive intervals of DoS attacks. In addition, the quantitative relationship regarding the duration and frequency of DoS attacks and the switching law is provided, which plays a key role in ensuring the stability of switching system under attacks. Finally, numerical examples are provided to demonstrate the effectiveness of the proposed method.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115648"},"PeriodicalIF":5.3,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Chaos Solitons & Fractals
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1