搜索资源列表
chaos_paper1
- 构建了一类可切换的三维自治混沌系统,通过系统选择器实现这类系统间的切换) 这类系统都由七项组成,且 都包含三项系统变量乘积的二次非线性项) 详细地分析了这类三维系统平衡点的性质、混沌吸引子的相图和 *+,-./01 指数等特性,设计了实现这类可切换系统的实际电路并进行了电路实验-Construction of a class of three-dimensional autonomous chaotic switching systems, the realization of the
Characteriationofanexperimentalstrangeattractorbyp
- 讨论了具有周期轨道的奇怪吸引子实验的特性,好文章!-Characteriation of an experimental strange attractor by periodic orbits
1
- 下面是Rossler在周期状态下的二维相图和Pioncare截面图,有相空间重构的吸引子图-Here is the cycle state Rossler two-dimensional phase diagram and Pioncare sections, there is phase space reconstruction of the attractor graph
Accurate-path-integration-in-CAN
- 为模拟grid cells,利用CAN实现路径推算,。-continuous attractor network is used to realize PI to simulate grid cells .
fractal-predict-pdf
- 该文章从混沌和分形的关系出发,基于奇异吸引子的分形结构和时间序列的自仿射特性,提出了一种混沌时间序列的预测方法。采用迭代函数系统跟踪混沌的局部运动轨迹,由此确定统计意义上放射性能最优的时间序列段,并分局吸引子定力和拼贴定理建立预测模型。-This article from the chaos and fractal relationship starting, based on the characteristics of self-affine fractal structure and ti
64
- 在简单介绍WH-800型离心机基本结构及工作原理的基础上, 介绍了基于重构吸引子轨迹矩阵的奇异值分解技术,并引入自相关函数对现有奇异值分解技术加以改进. 通过对现场实测故障信号的分析,表 明改进的奇异值分解技术具有很好的降噪效果,能在强噪声背景环境下准确提取设备的故障特征信号, 为离心机的故障诊断提供了一种新的思路.-After a brief introduction WH-800 centrifuge basic structure and working principle, base
xinsanweihundun
- 提出了一个混沌系统,并对该系统的基本动力学特性进行了深入研究.得到该系统的Lyapunov指数、Lyapunov 维数,给出了Poincaré映射图以及时域图和相图.运用电子工作平台EWB软件对实现该新混沌系统的振荡器电路进行了仿真实验.经过数值仿真和电路系统仿真证实该系统与以往发现的混沌吸引子并不拓扑等价,属于新的混沌系统.-Presents a chaotic system, and the basic dynamic characteristics of the system were s
A-four-wing-chaotic-attractor-generated-from-a-ne
- In order to overcome sensitive defects of components deviations and environment defects in analog circuit design, a novel four-dimensional hyperchaotic systems is constructed based on Lü system. Basic nonlinear dynamics characteristics are analyz
chen
- 实现分数阶chen系统的绘制以及求解混沌吸引子-Plotting Fractional chen system and solve the chaotic attractor
gm_chua
- chua chaotic attractor simulin design
Dynamical behavior and application in Josephson Junction coupled by memristor
- With the burst of a Wanna decryptor [1] in the middle of 2017, secure communication within a network [2] has again triggered the considerable attention. Meanwhile, many feasible methods have been proposed to enhance the data security and it is also