23 results on '"Liao, Xiao-feng"'
Search Results
2. An optimized vertical handoff algorithm based on Markov process in vehicle heterogeneous network
- Author
-
Ma Bin, Deng Hong, Xie Xian-zhong, and Liao Xiao-feng
- Subjects
Computer Networks and Communications ,Wireless network ,business.industry ,Computer science ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Heterogeneous wireless network ,Markov process ,Load balancing (computing) ,Fuzzy logic ,symbols.namesake ,Handover ,symbols ,Electrical and Electronic Engineering ,business ,Heterogeneous network ,Computer network - Abstract
In order to solve the problem the existing vertical handoff algorithms of vehicle heterogeneous wireless network do not consider the diversification of network’s status, an optimized vertical handoff algorithm based on markov process is proposed and discussed in this paper. This algorithm takes into account that the status transformation of available network will affect the quality of service (QoS) of vehicle terminal’s communication service. Firstly, Markov process is used to predict the transformation of wireless network’s status after the decision via transition probability. Then the weights of evaluating parameters will be determined by fuzzy logic method. Finally, by comparing the total incomes of each wireless network, including handoff decision incomes, handoff execution incomes and communication service incomes after handoff, the optimal network to handoff will be selected. Simulation results show that: the algorithm proposed, compared to the existing algorithm, is able to receive a higher level of load balancing and effectively improves the average blocking rate, packet loss rate and ping-pang effect.
- Published
- 2015
3. Stability Analysis and Design of Impulsive Control Lorenz Systems Family
- Author
-
Zhang Hong-Bin, Yu Juebang, Zhang Fengli, Liao Xiao-feng, and Yu Yong-Bin
- Subjects
Nonlinear Sciences::Chaotic Dynamics ,Chen ,Physics and Astronomy (miscellaneous) ,biology ,Exponential stability ,Control theory ,Computer science ,Chaotic systems ,Chaotic ,Impulse (physics) ,Lorenz system ,biology.organism_classification - Abstract
Lorenz systems family unifying Lorenz system, Chen system and Lu system is a typical chaotic family. In this paper, we consider impulsive control Lorenz chaotic systems family with time-varying impulse intervals. By establishing an effective tool of a set of inequalities, we analyze the asymptotic stability of impulsive control Lorenz systems family and obtain some new less conservative conditions. Based on the stability analysis, we design a novel impulsive controller with time-varying impulse intervals. Illustrative examples are provided to show the feasibility and effectiveness of our method. The obtained results not only can be used to design impulsive control for Lorenz systems family, but also can be extended to other chaotic systems.
- Published
- 2009
4. Impulsive Control for Fractional-Order Chaotic Systems
- Author
-
Yu Yong-Bin, Bao Jingfu, Liao Xiao-feng, and Zhong Qi-Shui
- Subjects
Computer simulation ,Computer Science::Systems and Control ,Computer science ,Chaotic systems ,Control theory ,Control (management) ,Fuzzy model ,Chaotic ,General Physics and Astronomy ,Order (ring theory) ,Linear matrix - Abstract
We propose an impulsive control scheme for fractional-order chaotic systems. Based on the Takagi–Sugeno (T-S) fuzzy model and linear matrix inequalities (LMIs), some sufficient conditions are given to stabilize the fractional-order chaotic system via impulsive control. Numerical simulation shows the effectiveness of this approach.
- Published
- 2008
5. Impulsive control of nonlinear systems with time-varying delays
- Author
-
Zhang Hong-Bin, Bao Jingfu, Liao Xiao-feng, Yu Yong-Bin, Zhong Qi-Shui, and Yu Juebang
- Subjects
Lyapunov function ,symbols.namesake ,Nonlinear system ,Computer science ,Control theory ,Stability theory ,symbols ,General Physics and Astronomy ,Impulse (physics) - Abstract
A whole impulsive control scheme of nonlinear systems with time-varying delays, which is an extension for impulsive control of nonlinear systems without time delay, is presented in this paper. Utilizing the Lyapunov functions and the impulsive-type comparison principles, we establish a series of different conditions under which impulsively controlled nonlinear systems with time-varying delays are asymptotically stable. Then we estimate upper bounds of impulse interval and time-varying delays for asymptotically stable control. Finally a numerical example is given to illustrate the effectiveness of the method.
- Published
- 2008
6. Exponential stability of Takagi–Sugeno fuzzy systems with impulsive effects and small delays
- Author
-
Zhong Qi-Shui, Yu Juebang, Liao Xiao-feng, and Yu Yong-Bin
- Subjects
Takagi sugeno ,Exponential stability ,Computer Science::Systems and Control ,Control theory ,General Physics and Astronomy ,Fuzzy control system ,Computer Science::Artificial Intelligence ,Linear matrix ,Mathematics - Abstract
This paper deals with the exponential stability of impulsive Takagi–Sugeno fuzzy systems with delay. Impulsive control and delayed fuzzy control are applied to the system, and the criterion on exponential stability expressed in terms of linear matrix inequalities (LMIs) is presented.
- Published
- 2008
7. On Impulsive Control for Synchronization and Its Application to Matsumoto–Chua–Kobayashi (MCK) Circuit
- Author
-
Li Chuan-Dong, Li Yang, Liao Xiao-feng, and Wang Yong
- Subjects
Physics and Astronomy (miscellaneous) ,Control theory ,Chaotic systems ,Computer science ,Synchronization (computer science) ,Interval (mathematics) ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Control (linguistics) - Abstract
The issue of impulsive control theory for synchronization of the MCK circuit is developed. We propose an impulsive control scheme for the complete synchronization of the MCK circuit including chaotic systems. A sufficient condition for the impulsive control is derived, with an easily calculated maximum impulsive interval. The proposed impulsive control scheme is applied to the MCK circuit and the simulation result demonstrates the effectiveness of the method.
- Published
- 2007
8. Impulsive Synchronization of Laser Plasma System
- Author
-
Li Chuan-Dong, Liao Xiao-feng, Li Yang, and Chen Guo
- Subjects
Physics and Astronomy (miscellaneous) ,Control theory ,law ,Control system ,Synchronization (computer science) ,Chaotic ,Plasma ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,Laser ,Chaos theory ,System a ,law.invention - Abstract
The issue of impulsive synchronization of the coupled chaotic laser plasma system is investigated. A new framework for impulsive synchronization of such chaotic systems is presented, which makes the synchronization error system a linear impulsive control system. We derive some sufficient conditions for the synchronization of a laser plasma system via impulsive control with the varying impulsive intervals, which allows us to derive the impulsive synchronization law easily. To illustrate the effectiveness of the proposed results, two numerical examples are given.
- Published
- 2007
9. Impulsive control for synchronization of nonlinear Rössler chaotic systems
- Author
-
Li Chuan-Dong, Liao Xiao-feng, Chen Guo, and Li Yang
- Subjects
Nonlinear Sciences::Chaotic Dynamics ,Nonlinear system ,Chaotic systems ,Control theory ,Computer science ,ComputerSystemsOrganization_MISCELLANEOUS ,Synchronization of chaos ,Control system ,Control (management) ,Synchronization (computer science) ,General Physics and Astronomy ,Hardware_ARITHMETICANDLOGICSTRUCTURES ,System a - Abstract
This paper reports that an impulsive control theory for synchronization of nonlinear Rossler chaotic systems is developed. A new framework for impulsive synchronization between such chaotic systems is presented, which makes the synchronization error system a linear impulsive control system. Therefore, it is easy to derive the impulsive synchronization law. The proposed impulsive control scheme is illustrated by nonlinear Rossler chaotic systems and the simulation results demonstrate the effectiveness of the method.
- Published
- 2006
10. A chaotic block encryption scheme based on the piecewise nonlinear map
- Author
-
Liao Xiao-feng, Zhang Wei, Yang Hua-qian, and Wei Pengcheng
- Subjects
Multidisciplinary ,Theoretical computer science ,business.industry ,Chaotic ,Binary number ,Cryptography ,Encryption ,Communications security ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Piecewise ,business ,Algorithm ,Computer Science::Cryptography and Security ,Block cipher ,Mathematics ,Block (data storage) - Abstract
In order to improve communication security, proposed a chaotic block cryptographic scheme based on the coupled piecewise nonlinear map. Using the coupled chaotic systems to generate random binary sequences, a key-dependent shift approach permuted the plain-text block and then using the classical chaotic masking technique encrypted the plain-text block. Simulation results show that the proposed algorithm has excellent cryptographic properties such as diffusion and confusion properties and it can resist the know plain-text attacks and chosen plain-text attacks.
- Published
- 2006
11. A multilayer complex neural network training algorithm and its application in adaptive equalization
- Author
-
Yu Juebang, Li Chunguang, Wu Zhongfu, and Liao Xiao-feng
- Subjects
Recursive least squares filter ,Artificial neural network ,Time delay neural network ,business.industry ,Computer science ,Computer Science::Neural and Evolutionary Computation ,Equalization (audio) ,Training (meteorology) ,Adaptive equalizer ,Probabilistic neural network ,Artificial intelligence ,Electrical and Electronic Engineering ,Layer (object-oriented design) ,business ,Algorithm - Abstract
In this paper, the layer-by-layer optimizing algorithm for training multilayer neural network is extended for the case of a multilayer neural network whose inputs, weights, and activation functions are all complex. The updating of the weights of each layer in the network is based on the recursive least squares method. The performance of the proposed algorithm is demonstrated with application in adaptive complex communication channel equalization.
- Published
- 2001
12. Conditions of asymptotic stability for cellular neural networks with time delay
- Author
-
Liao Xiao-feng, Wu Zhongfu, and Yu Juebang
- Subjects
Liapunov function ,Exponential stability ,Simple (abstract algebra) ,Control theory ,Cellular neural network ,Electrical and Electronic Engineering ,Mathematics - Abstract
In this paper, global asymptotic stability for cellular neural networks with time delay is discussed using a novel Liapunov function. Some novel sufficient conditions for global asymptotic stability are obtained. Those results are simple and practical than those given by P. P. Civalleri, et al., and have a leading importance to design cellular neural networks with time delay.
- Published
- 2000
13. Security analysis of discrete logarithm based cryptosystems
- Author
-
Liao Xiao-feng and Wang Yuzhu
- Subjects
Security analysis ,Multidisciplinary ,Protocol design ,Group (mathematics) ,Discrete logarithm ,Cryptosystem ,Listing (computer) ,Mathematical structure ,Computer security ,computer.software_genre ,computer ,Baby-step giant-step ,Mathematics - Abstract
Discrete logarithm based cryptosystems have subtle problems that make the schemes vulnerable. This paper gives a comprehensive listing of security issues in the systems and analyzes three classes of attacks which are based on mathematical structure of the group which is used in the schemes, the disclosed information of the subgroup and implementation details respectively. The analysis will, in turn, allow us to motivate protocol design and implementation decisions.
- Published
- 2006
14. Pinning consensus analysis of multi-agent networks with arbitrary topology
- Author
-
Ji Liang-Hao, Chen Xin, and Liao Xiao-feng
- Subjects
Computer Science::Multiagent Systems ,Matrix (mathematics) ,Work (thermodynamics) ,Correctness ,Computer science ,Condensed Matter::Superconductivity ,Node (networking) ,General Physics and Astronomy ,Topology (electrical circuits) ,Laplacian matrix ,Topology ,Dynamical system ,Eigenvalues and eigenvectors - Abstract
In this paper the pinning consensus of multi-agent networks with arbitrary topology is investigated. Based on the properties of M-matrix, some criteria of pinning consensus are established for the continuous multi-agent network and the results show that the pinning consensus of the dynamical system depends on the smallest real part of the eigenvalue of the matrix which is composed of the Laplacian matrix of the multi-agent network and the pinning control gains. Meanwhile, the relevant work for the discrete-time system is studied and the corresponding criterion is also obtained. Particularly, the fundamental problem of pinning consensus, that is, what kind of node should be pinned, is investigated and the positive answers to this question are presented. Finally, the correctness of our theoretical findings is demonstrated by some numerical simulated examples.
- Published
- 2013
15. Consensus problems of first-order dynamic multi-agent systems with multiple time delays
- Author
-
Ji Liang-Hao and Liao Xiao-feng
- Subjects
Computer science ,Control theory ,Node (networking) ,Multi-agent system ,Nyquist stability criterion ,Numerical analysis ,Convergence (routing) ,General Physics and Astronomy ,Topology (electrical circuits) ,Data transmission - Abstract
Consensus problems of first-order multi-agent systems with multiple time delays are investigated in this paper. We discuss three cases: 1) continuous, 2) discrete, and 3) a continuous system with a proportional plus derivative controller. In each case, the system contains simultaneous communication and input time delays. Supposing a dynamic multi-agent system with directed topology that contains a globally reachable node, the sufficient convergence condition of the system is discussed with respect to each of the three cases based on the generalized Nyquist criterion and the frequency-domain analysis approach, yielding conclusions that are either less conservative than or agree with previously published results. We know that the convergence condition of the system depends mainly on each agent's input time delay and the adjacent weights but is independent of the communication delay between agents, whether the system is continuous or discrete. Finally, simulation examples are given to verify the theoretical analysis.
- Published
- 2013
16. Group consensus analysis of multi-agent systems with delays
- Author
-
Liu Qun, Liao Xiao-feng, and Ji Liang-Hao
- Subjects
Computer Science::Multiagent Systems ,Theoretical computer science ,Consensus analysis ,Group (mathematics) ,Computer science ,Multi-agent system ,General Physics and Astronomy - Abstract
In this paper, a new consensus problem is investigated which is group consensus. It contains such consensus problem as a special case that all agents in a network reach a consistent value asymptotically. Consider a dynamic multi-agent system with connected undirected or connected bipartite graph topology and delays, two novel consensus protocols are introduced to solve the group consensus problem. The convergence analysis is discussed and the sufficient condition for system group convergence is obtained based on the frequency-domain analysis and generalized Nyquist criterion, respectively. And we know that the condition of group convergence is only depended on system's time delay and the adjacent weight between the agents, meanwhile, delay can affect the dynamic characteristics of the system. Finally, simulations are provided to demonstrate the effectiveness of our theoretical results.
- Published
- 2012
17. SPIHT-based joint image compression and encryption
- Author
-
Liao Xiao-feng, Kwok-Wo Wong, Wei Pengcheng, Zhang Wei, and Yang Hua-qian
- Subjects
Discrete wavelet transform ,Computer science ,business.industry ,Sign bit ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,General Physics and Astronomy ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,Encryption ,Set partitioning in hierarchical trees ,Reconstructed image ,business ,Algorithm ,Coding (social sciences) ,Image compression - Abstract
A joint of image encryption and compression is investigated, and a novel joint encryption and compression scheme is proposed. In our scheme, the encryption process is performed before compression. Making use of the properties of discrete wavelet transform (DWT) and Set Partitioning in Hierarchical Trees (SPIHT) coding, confusion is restricted to the interior of single subband image itself and so image details are retained. Furthermore, diffusion preserves the two most significant bits (MSBs) and the sign bit, which contain important information about the image. The experiments show that the proposed algorithm possesses a good visual quality of the reconstructed image and a high encryption speed.
- Published
- 2012
18. Synchronization of uncertain chaotic systems based on neural network and sliding mode control
- Author
-
Huang Hong-Yu, Liao Xiao-feng, and Li Hua-Qing
- Subjects
Artificial neural network ,Control theory ,Computer science ,Synchronization of chaos ,Synchronization (computer science) ,General Physics and Astronomy ,Response time ,Lorenz system ,Interference (wave propagation) ,Sliding mode control - Abstract
The synchronization between two unknown chaotic systems is achieved by designing a controller based on the sliding mode control technique and radial basis function neural network. The controller design method is independent of the system mathematical model, but only depends on the output of the system state. Moreover, it is robust to parameter uncertainties and the outside interference. Finally, synchronization between unknown Lorenz systems and between unknown Lorenz system and Chen system are achieved using the proposed method. The response time is very short and the synchronization performance is good.
- Published
- 2011
19. Color image degradation algorithms based on Z-matrix map and selective encryption
- Author
-
Xiao Di, Zhao Liang, Xiang Tao, and Liao Xiao-feng
- Subjects
Color image ,business.industry ,Property (programming) ,Reliability (computer networking) ,General Physics and Astronomy ,Encryption ,Deterministic encryption ,Matrix (mathematics) ,Geography ,Computer vision ,Artificial intelligence ,business ,Z-matrix (chemistry) ,Algorithm ,Degradation (telecommunications) - Abstract
With the development of information technology and network, multimedia protection has become a major concern, in which images are the important research objects. Especially, the image degradation is one of basic fields. This paper introduces a three-dimensional Z-matrix map which can be used for encryption, and shows its satisfactory property. Then, two color image degradation algorithms based on different templates for selective encryption are proposed. Finally, the performance and security of them are analyzed. Simulation results indicate the reliability of these schemes.
- Published
- 2010
20. Image encryption based on arithmetic coding with order-1 Markov model
- Author
-
Xiang Tao, Liao Xiao-feng, and Duan Li-Li
- Subjects
Computer science ,Order (business) ,business.industry ,General Physics and Astronomy ,Data_CODINGANDINFORMATIONTHEORY ,Markov model ,Encryption ,business ,Algorithm ,Image (mathematics) ,Arithmetic coding - Abstract
Encryption based on compression can provide compression and encryption in a single step, in which redundancy is removed by compression and security is guaranteed by encryption. A novel secure arithmetic coding scheme based on order-1 Markov model is proposed in this paper, and it is applied to image encryption where images can be transmitted securely on the Internet and the proposed algorithm significantly improve the compression efficiency of coding. Experimental results and security analyses indicate that, the algorithm can not only resist existing attacks based on arithmetic coding, but also be immune to other cryptanalysis.
- Published
- 2010
21. Multidimensional Z -Matrix with Control Parameters and Its Applications in Image Encryption
- Author
-
Xiang Tao, Liao Xiao-feng, Xiao Di, and Zhao Liang
- Subjects
CHAOS (operating system) ,business.industry ,Computer science ,Long period ,General Physics and Astronomy ,Encryption ,business ,Control parameters ,Z-matrix (chemistry) ,Algorithm ,Image (mathematics) - Abstract
An n-dimensional Z-matrix with control parameters is presented, and its periodicity and chaos are testified. Experimental results show that the proposed Z-matrix has a long period and changeable periodicity with different dimensions. Some examples of image encryption with a Z-matrix of different dimensions are listed for demonstrating its applications.
- Published
- 2009
22. A key generation algorithm for biometric cryptosystems based on TD-ERCS
- Author
-
Hu Yue, Liao Xiao-feng, and Zhou Qing
- Subjects
Key generation ,Theoretical computer science ,Biometrics ,Computer science ,Random number generation ,Data_MISCELLANEOUS ,General Physics and Astronomy ,A* search algorithm ,Biometric cryptosystems ,law.invention ,CHAOS (operating system) ,law ,Key (cryptography) ,Algorithm - Abstract
Biometric cryptosystems are widely studied recently, which bind a cryptographic key with the biometric characteristic of a user in such a way that the key cannot be recovered without a successful biometric authentication. By now, the key is generated from extra random number generators, which makes the system more complex. A novel method is proposed, which generates the key from biometric characteristics directly, and makes the biometric cryptosystems much cheaper, simpler and more convenient. To make the keys secure enough, the TD-ERCS is adopted and revised in the proposed algorithm. Experiments show that the algorithm is sensitive to biometric characteristics, free of collision, and the generated keys seem also random. It is believed that such a algorithm can be practically used for various biometric cryptosystems.
- Published
- 2009
23. Ture random number generators based on mouse movement and chaos systems
- Author
-
Hu Yue, Liao Xiao-feng, and Zhou Qing
- Subjects
CHAOS (operating system) ,Random number generation ,business.industry ,Computer science ,Hash function ,Personal computer ,General Physics and Astronomy ,NIST ,Sensitivity (control systems) ,Encryption ,business ,Algorithm ,Image (mathematics) - Abstract
True random number generator (TRNG) is usually more secure than pseudo-random number generator.In this paper,a novel TRNG which produces random bits by noving the mouse casually is proposed which is cheap,convenient and universal for personal computer (PC) platforms.To eliminate the patterns among mouse movements of the same user,two approaches based on image encryption algorithm and Hash function were poposed,both making use of the sensitivity of chaos system.Abundant random bits generated by three users were tested strictly using U.S. NIST’s 16 statistical tests.All TRNGs passed the test successfully,and the revised TRNG is believed to be applicable practically on PC platforms.
- Published
- 2008
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.