Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30 results about "Chaos model" patented technology

In computing, the chaos model is a structure of software development. Its creator, who used the pseudonym L.B.S. Raccoon, noted that project management models such as the spiral model and waterfall model, while good at managing schedules and staff, didn't provide methods to fix bugs or solve other technical problems. At the same time, programming methodologies, while effective at fixing bugs and solving technical problems, do not help in managing deadlines or responding to customer requests. The structure attempts to bridge this gap. Chaos theory was used as a tool to help understand these issues.

Document authentication method based on interweaving watermark and biological characteristic

The present invention relates to a document integrity authentication method based on an interleaving watermark and a biological feature, a chaos model is adopted to generate an authentication code, and the biological information of a deliverer is generated to a biological feature code streaming after being extracted through the feature. The authentication code and the biological feature code streaming are returned to the deliverer after a plurality of interleaving treatments under the control of a third party, and then the deliverer inserts the interleaving information in the document. When being authenticated, on the one hand, the extracted authentication code and a generated reference sequence are compared, the integrity of the document content is determined, and a tampered area is positioned; on the other hand, the extracted biological feature is identified, the identity of the deliverer is determined, and a disavowal behavior is prevented. The present invention can authenticate the integrality of the document, and can detect and position a tampered location. The different requirements of users to the precision are supported, and the positioning precision is adjustable and controllable. An authentication result is given by error, and the tampered location can be directly and visually reflected. The identity of the deliver can be determined, and the disavowal behavior is prevented.
Owner:BEIJING JIAOTONG UNIV

GAN game confrontation encryption system (method) based on chaotic model

The invention discloses a GAN game confrontation encryption system (method) based on a chaotic model, relates to a chaotic encryption method and a confrontation neural network in machine learning, andgenerates a dynamic encryption algorithm and an encryption key based on the thought of the game theory. The invention aims to solve the problem that encrypted data is easy to attack in the existing encryption technology. According to the technical scheme, the system comprises the following steps: 1, analyzing the characteristics of an insect mouth logistic chaotic model; 2, inputting a determined[mu]m value, and generating a chaotic model under the mu value and a one-time pad security key by utilizing generative adversarial network adversarial; 3, testing random number generation: testing whether the randomness of the generated sequence is the same as or similar to that of the original sequence or not; 4, setting different loss convergence values, and synthesizing the different loss convergence values and [mu]m into a decision (mu, l) as decision parameters of the discriminator; and 5, inputting different [mu]m values in an interval where [mu]m is located when the model is in chaos,and generating a chaos model corresponding to the [mu]m values by utilizing the generation model; and judging when to stop according to the decision parameter, wherein the model obtained when to stopis the GAN encryption algorithm based on chaos. The invention is applied to the field of communication.
Owner:HEILONGJIANG UNIV

Security-level-controllable carrier, constellation and mode multi-chaos masking light transmission method

The invention provides a security-level-controllable carrier, constellation and mode multi-chaos masking light transmission method, which comprises the following steps of: performing serial-parallel change on data, and mapping the data to each constellation point; masking the three-dimensional constellation diagram by using a Chua's chaotic model, so that the three-dimensional constellation pointsare converted into a sphere; then, the Lorentz model being used for masking the subcarrier and the orthogonal mode, meanwhile, parameters of the Lorentz model and the Chua's circuit model being modulated, and therefore security level controllability of chaotic encryption being achieved. At the receiving end, an original Chua's circuit and an original Lorentz model secret key are used for decrypting the chaotic constellation diagram. The signals decrpted by the receiving end are compared with the transmitting end, thus to calculate the system error ratio, thereby judging the system performance. By the control over the parameters a chaos model, encryption of one dimension or multiple dimensions can be conducted, thus security classification can be achieved. According to different conditions, high-security transmission is realized at the lowest encryption cost.
Owner:NANJING UNIV OF INFORMATION SCI & TECH

Four-dimensional fractional-order chaos model and circuit

InactiveCN109302277ASimple structureOvercoming the drawbacks of encryption that is easy to be decipheredSecuring communication by chaotic signalsMultiplexerEngineering
The invention discloses a four-dimensional fractional-order chaos model and a circuit. The circuit of the four-dimensional fractional-order chaos model comprises four channel circuits; an output signal -x of a first channel is connected with a signal input end of the first channel and the signal input end of a second channel; a previous output signal of the first channel x is connected with the signal input end of a third channel; an output signal -y of a second channel is connected with the signal input end of a fourth channel, the previous output signal y of the second channel is connected with the signal input end of the first channel, and a multiplier A2; the previous output signal z of the third channel is connected with a multiplexer A1; and the previous output signal w of the fourthchannel is connected with the signal input end of the second channel. The fractional-order chaos model provided by the invention has higher complexity in comparison with the integer-order chaos model, and can produce more complex dynamics behavior; the fractional-order chaos model can be used for fractional-order chaos system circuit design and experiment, and can overcome the disadvantage that the existing chaos system information encryption can be easily decoded due to low complexity, thereby providing evidence for the application of the chaos system.
Owner:XIANGTAN UNIV

Underwater acoustic communication balanced decoding method based on recursive chaotic code

The invention discloses an underwater acoustic communication balanced decoding method based on a recursive chaotic code, and the method comprises: step 1, inputting an information source information sequence into a recursive chaos model by a coding sending end, carrying out the recursive chaotic coding, generating a symbol frame sequence, generating an information sub-frame, and sending the information sub-frame after signal modulation to a coding receiving end; step 2, the coding receiving end demodulating the received information subframes to generate a symbol sequence, and generating a joint equalization decoding tree according to the number of information fragments in the symbol sequence and the number of information fragments in the information source information sequence; and step 3,the coding receiving end calculating the Euclidean distance between the symbol sequence in each branch and the symbol sequence which is actually received, selecting the branch with the minimum Euclidean distance, and marking the branch as a decoding result. Through the technical scheme provided by the invention, the bit error rate performance of the underwater acoustic communication system is improved, the influence of strong inter-code crosstalk of the underwater acoustic channel and the complexity of a joint equalization decoding algorithm are reduced, and the transmission reliability of the underwater acoustic channel is improved.
Owner:INST OF ACOUSTICS CHINESE ACAD OF SCI

Aircraft intelligent trajectory planning method based on chaotic model and DNN

The invention discloses an aircraft intelligent trajectory planning method based on a chaos model and a DNN, and belongs to the technical field of aircraft trajectory planning. The method comprises the following steps: obtaining a network mapping relation between a flight state quantity and a flight control quantity; converting the process constraint into flight height and heeling angle constraint; generating a final chaotic signal in the guidance instruction; calculating a heeling angle section median meeting task constraints and a heeling angle required in real time; the size of the heeling angle after chaos processing is obtained; determining a heeling angle direction by adopting a sight angle error corridor; and restraining the amplitude of the heeling angle and the amplitude of the heeling rate. According to the method, the model limitation during the traditional flight path design is overcome, and the unpredictability of the guide instruction and the flight path is increased; and the influence of uncertainty on task reachability is limited. Therefore, the chaos of the flight path is increased on the premise of ensuring the feasibility of the predetermined task, the process constraint is met in the guidance instruction calculation, and the method has a certain engineering practical value.
Owner:哈尔滨逐宇航天科技有限责任公司

HEVC video encryption method by adopting dynamic integer chaos

The invention discloses an HEVC video encryption method by adopting dynamic integer chaos, which comprises the following steps: firstly, carrying out multiple times of transformation by adopting a keyof a dynamic integer chaos model through a Feistel password structure, and initializing the dynamic integer chaos model to obtain an iterative sequence initial value of the dynamic integer chaos model; adopting a multi-core parallel computing mode to run the chaotic model, and generating an integer chaotic pseudo-random sequence in parallel; secondly, performing transformation for multiple timesby adopting Standard mapping, and selecting 9 integer chaotic pseudo-random sequences required by HEVC video encryption; and carrying out XOR encryption on nine syntax elements in the HEVC entropy coding binarization process by utilizing the nine selected integer chaotic pseudo-random sequences to realize HEVC video encryption. According to the method, the high efficiency of video encryption can be improved on the basis of ensuring the security of video encryption, and the method is suitable for the fields of video conferences with strict requirements on real-time performance and the like.
Owner:BEIJING INSTITUTE OF PETROCHEMICAL TECHNOLOGY

Space encryption method based on three-dimensional CAP constellation

The invention belongs to the technical field of communication, and particularly relates to a space encryption method based on a three-dimensional CAP constellation. The space encryption method comprises the following steps: taking a Logistic Map model as a first chaos model, and generating a first-level masking factor for performing exclusive-or operation on pseudo-random input data; taking the super-four-wing chaotic model as a second chaotic model and used for generating a second-level masking factor and a third-level masking factor which are used for carrying out displacement transformation and spatial transformation on the three-dimensional CAP constellation respectively; and applying the three-level masking factor to encryption modulation of the three-dimensional CAP constellation. According to the method, two chaos models are combined, exclusive-or operation is firstly carried out on pseudo-random input data, then displacement transformation and spatial transformation of a three-dimensional constellation are realized, and the effect of communication security can be effectively improved; according to the spatial encryption method based on the three-dimensional CAP constellation, the encryption flexibility is improved, and meanwhile, due to the fact that the Euclidean distance is larger than that of a two-dimensional constellation, higher encryption performance is achieved, and meanwhile better bit error rate performance is achieved.
Owner:常州京信新一代信息技术研究院有限公司

Traffic flow prediction parallel method based on chaos and reinforcement learning

The invention provides a traffic flow prediction parallel method based on chaos and reinforcement learning. Comprising the following steps: 1, carrying out preprocessing and chaotic analysis on data, generating a comparison chaotic time sequence through a chaotic model, and carrying out reconstruction, standardization and data set division; 2, performing reinforcement learning training and comparison environment construction by using the preprocessed data; 3, constructing an act-critic neural network model to learn an intelligent agent strategy and judge a behavior value; and 4, generating a plurality of training models by the slave process under the parallel framework to interact with the environment, realizing parallel updating through dispersion comparison and reward with the central neural network model of the host process, and finally performing prediction verification by the host process. According to the method, the traffic flow is predicted by adopting reinforcement learning and a chaotic time sequence, and compared with a traditional statistical prediction method, the method has higher interpretability and online adjustment learning ability; parallel reinforcement learning can learn and adjust more quickly, and an optimal prediction result is generated.
Owner:HARBIN UNIV OF SCI & TECH

Encrypted light transmission method and system based on four-dimensional memristor condition symmetric chaotic system and memristor neural network

The invention discloses an encrypted optical transmission method and system based on a four-dimensional memristor condition symmetric chaotic system and a memristor neural network, and belongs to the technical field of optical transmission. The method comprises the following steps: generating a logistic chaos sequence through a logistic chaos model, and selecting a certain chaos sequence or attractor in a key space library pre-established through a four-dimensional memristor condition symmetric chaos system by using the logistic chaos sequence; inputting the original sequence and the selected chaotic sequence or attractor into a memristor neural network for XOR encryption to obtain encrypted data, modulating the encrypted data, and transmitting the modulated encrypted data into a channel for transmission; the received encrypted data are demodulated and decrypted, and optical transmission is completed; multi-layer encryption of data is realized, the security performance of optical transmission is improved, and the defect that the transmission security is less considered in the prior art is overcome; the overall complexity is further reduced, and the method is very suitable for an OFDM-PON scene.
Owner:NANJING UNIV OF INFORMATION SCI & TECH

Document authentication method based on interweaving watermark and biological characteristic

The present invention relates to a document integrity authentication method based on an interleaving watermark and a biological feature, a chaos model is adopted to generate an authentication code, and the biological information of a deliverer is generated to a biological feature code streaming after being extracted through the feature. The authentication code and the biological feature code streaming are returned to the deliverer after a plurality of interleaving treatments under the control of a third party, and then the deliverer inserts the interleaving information in the document. When being authenticated, on the one hand, the extracted authentication code and a generated reference sequence are compared, the integrity of the document content is determined, and a tampered area is positioned; on the other hand, the extracted biological feature is identified, the identity of the deliverer is determined, and a disavowal behavior is prevented. The present invention can authenticate the integrality of the document, and can detect and position a tampered location. The different requirements of users to the precision are supported, and the positioning precision is adjustable and controllable. An authentication result is given by error, and the tampered location can be directly and visually reflected. The identity of the deliver can be determined, and the disavowal behavior is prevented.
Owner:BEIJING JIAOTONG UNIV

A combined source-channel decoding method for underwater acoustic communication

The invention discloses an underwater acoustic communication information source channel joint decoding method, which comprises the following steps: acquiring information data sent by an encoding end,demodulating the information data, and determining a receiving symbol sequence and an information source contribution degree, the information source contribution degree being a ratio of redundancy ofa sending information source sequence to a redundancy mean value; generating a joint decoding tree by utilizing a recursive chaos model according to the encoding parameters of the encoding end, and calculating a part of encoding symbol sequences corresponding to each branch in the decoding tree and a part of information sequences corresponding to decoding paths in the decoding tree layer by layer;calculating a branch metric value of eac information sequence of the decoding tree by adopting an information source channel joint maximum posteriori probability criterion and combining noise energy,information source prior information, the information source contribution degree and the receiving symbol sequence; and calculating a path metric sum value corresponding to each branch in the decoding tree, and selecting the branch corresponding to the maximum path metric sum value to obtain a decoding information sequence. According to the method, the correlation between signal source symbols isfully utilized, channel decoding is corrected, and the decoding performance of underwater acoustic communication is improved.
Owner:INST OF ACOUSTICS CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products