scispace - formally typeset
Search or ask a question

Showing papers by "Hai Yu published in 2009"


Proceedings ArticleDOI
06 Nov 2009
TL;DR: This paper investigates the flocking problem with a bounded control input under the assumption that the underlying network is connected, all agents can attain the same velocity vector, and distances between the agents are stabilized.
Abstract: Recently, the broad applications of multi-agent systems in many areas have stimulated a great deal of interests in studying coordinated control problems. Previous flocking protocols do not consider the input saturation. In this paper, we investigate the flocking problem with a bounded control input. Under the assumption that the underlying network is connected, all agents can attain the same velocity vector, and distances between the agents are stabilized. Numerical simulations are worked out to illustrate theoretical results.

18 citations


Proceedings ArticleDOI
06 Nov 2009
TL;DR: In the proposed encryption scheme, the Cat map is not with the fixed control parameters but a variable one during the confusion phase to enlarge the key space of the encryption scheme.
Abstract: In recent years, the classic encryption architecture based on chaotic map—“confusion diffusion” has been investigated. Among them, a two dimension Cat map is usually employed in confusion phase as an image can be seen as a two dimension array, meanwhile the flew of Cat map is obvious, that is the key space of it is not large enough. In the proposed encryption scheme, the Cat map is not with the fixed control parameters but a variable one during the confusion phase to enlarge the key space of the encryption scheme. Simulations are carried out with detail analyses, demonstrating the high security and efficient operation of our cryptosystem.

8 citations


01 Jan 2009
TL;DR: In the proposed encryption scheme, the Cat map is not with the fixed control parameters but a variable one during the confusion phase to enlarge the key space of the encryption scheme.
Abstract: In recent years, the classic encryption architecture based on chaotic map—"confusion diffusion" has been investigated. Among them, a two dimension Cat map is usually employed in confusion phase as an image can be seen as a two dimension array, meanwhile the flew of Cat map is obvious, that is the key space of it is not large enough. In the proposed encryption scheme, the Cat map is not with the fixed control parameters but a variable one during the confusion phase to enlarge the key space of the encryption scheme. Simulations are carried out with detail analyses, demonstrating the high security and efficient operation of our cryptosystem.

5 citations


Proceedings ArticleDOI
06 Nov 2009
TL;DR: Based on the chaos anti-control theory, a new fourdimensional autonomous hyperchaotic system is formulated by adding a periodic driving signal rsin(cos(φt)) to the second equation of the three-dimensional autonomous Chen chaotic system in this paper.
Abstract: Based on the chaos anti-control theory, a new four-dimensional autonomous hyperchaotic system is formulated by adding a periodic driving signal rsin(cos(φt)) to the second equation of the three-dimensional autonomous Chen chaotic system in this paper. The basic dynamical behavior of the new hyperchaotic system was not only demonstrated by numerical simulation, but also verified with Lyapunov exponents and bifurcation analysis. The new hyperchaotic system can be periodic, quasi-periodic, chaotic and hyperchaotic with the variation of the parameter φ. It also has broad and stable hyperchaotic region which makes the new hyperchaotic system has a good application prospect.

4 citations


Proceedings ArticleDOI
06 Nov 2009
TL;DR: An efficient image encryption algorithm is proposed, based on image reconstruction using some adjacent pixel characteristics, which has relatively high efficiency and security.
Abstract: An efficient image encryption algorithm is proposed, based on image reconstruction using some adjacent pixel characteristics. Since the permutation of sub-images composing of high 4-bits of the original image has a relatively high computational complexity, in the new scheme the permutation of sub-images is performed with low 4-bits instead, which therefore has a lower computational complexity. Experiment has been carried out, showing relatively high efficiency and security of the new cryptosystem.

4 citations


Proceedings ArticleDOI
Jingping Song1, Zhiliang Zhu1, Ye Yang1, Hai Yu1, Mengmeng Li1 
12 Aug 2009
TL;DR: The solution can implement the self- healing by introducing intelligent network self-healing devices which were developed and produced on the authors' own between outside and inside networks, without changing of the current network structure.
Abstract: An intelligent network self-healing solution with regard to the current problem existing in the dedicated network was proposed in this paper The solution can implement the self-healing by introducing intelligent network self-healing devices which were developed and produced on our own between outside and inside networks, without changing of the current network structure The devices enable the 1 + 1 hot backup of links and also possess functions such as malfunction supervision, localization, automatic processing, etc