Search Results

Now showing 1 - 8 of 8
  • Item
    Topology identification of complex network via chaotic ant swarm algorithm
    (New York, NY : Hindawi Publishing Corporation, 2013) Peng, H.; Li, L.; Kurths, J.; Li, S.; Yang, Y.
    Nowadays, the topology of complex networks is essential in various fields as engineering, biology, physics, and other scientific fields. We know in some general cases that there may be some unknown structure parameters in a complex network. In order to identify those unknown structure parameters, a topology identification method is proposed based on a chaotic ant swarm algorithm in this paper. The problem of topology identification is converted into that of parameter optimization which can be solved by a chaotic ant algorithm. The proposed method enables us to identify the topology of the synchronization network effectively. Numerical simulations are also provided to show the effectiveness and feasibility of the proposed method.
  • Item
    The Switch in a Genetic Toggle System with Lévy Noise
    (London : Nature Publishing Group, 2016) Xu, Y.; Li, Y.; Zhang, H.; Li, X.; Kurths, J.
  • Item
    Quantifying the parameter dependent basin of the unsafe regime of asymmetric Lévy-noise-induced critical transitions
    (Dordrecht [u.a.] : Springer, 2021) Ma, Jinzhong; Xu, Yong; Li, Yongge; Tian, Ruilan; Ma, Shaojuan; Kurths, J.
    In real systems, the unpredictable jump changes of the random environment can induce the critical transitions (CTs) between two non-adjacent states, which are more catastrophic. Taking an asymmetric Lévy-noise-induced tri-stable model with desirable, sub-desirable, and undesirable states as a prototype class of real systems, a prediction of the noise-induced CTs from the desirable state directly to the undesirable one is carried out. We first calculate the region that the current state of the given model is absorbed into the undesirable state based on the escape probability, which is named as the absorbed region. Then, a new concept of the parameter dependent basin of the unsafe regime (PDBUR) under the asymmetric Lévy noise is introduced. It is an efficient tool for approximately quantifying the ranges of the parameters, where the noise-induced CTs from the desirable state directly to the undesirable one may occur. More importantly, it may provide theoretical guidance for us to adopt some measures to avert a noise-induced catastrophic CT. © 2021, The Author(s).
  • Item
    Abrupt transitions in time series with uncertainties
    (London : Nature Publishing Group, 2018) Goswami, B.; Boers, N.; Rheinwalt, A.; Marwan, N.; Heitzig, J.; Breitenbach, S.F.M.; Kurths, J.
    Identifying abrupt transitions is a key question in various disciplines. Existing transition detection methods, however, do not rigorously account for time series uncertainties, often neglecting them altogether or assuming them to be independent and qualitatively similar. Here, we introduce a novel approach suited to handle uncertainties by representing the time series as a time-ordered sequence of probability density functions. We show how to detect abrupt transitions in such a sequence using the community structure of networks representing probabilities of recurrence. Using our approach, we detect transitions in global stock indices related to well-known periods of politico-economic volatility. We further uncover transitions in the El Niño-Southern Oscillation which coincide with periods of phase locking with the Pacific Decadal Oscillation. Finally, we provide for the first time an 'uncertainty-aware' framework which validates the hypothesis that ice-rafting events in the North Atlantic during the Holocene were synchronous with a weakened Asian summer monsoon.
  • Item
    A reconfigurable logic cell based on a simple dynamical system
    (New York, NY : Hindawi Publishing Corporation, 2013) Li, L.; Yang, C.; Hui, S.; Yu, W.; Kurths, J.; Peng, H.; Yang, Y.
    This paper introduces a new scheme to achieve a dynamic logic gate which can be adjusted flexibly to obtain different logic functions by adjusting specific parameters of a dynamical system. Based on graphical tools and the threshold mechanism, the distribution of different logic gates is studied, and a transformation method between different logics is given. Analyzing the performance of the dynamical system in the presence of noise, we discover that it is resistant to system noise. Moreover, we find some part of the system can be considered as a leaky integrator which has been already widely applied in engineering. Finally, we provide a proof-of-principle hardware implementation of the proposed scheme to illustrate its effectiveness. With the proposed scheme in hand, it is convenient to build the flexible, robust, and general purpose computing devices such as various network coding routers, communication encoders or decoders, and reconfigurable computer chips.
  • Item
    Prevention and trust evaluation scheme based on interpersonal relationships for large-scale peer-to-peer networks
    (New York, NY : Hindawi Publishing Corporation, 2014) Li, L.; Kurths, J.; Yang, Y.; Liu, G.
    In recent years, the complex network as the frontier of complex system has received more and more attention. Peer-to-peer (P2P) networks with openness, anonymity, and dynamic nature are vulnerable and are easily attacked by peers with malicious behaviors. Building trusted relationships among peers in a large-scale distributed P2P system is a fundamental and challenging research topic. Based on interpersonal relationships among peers of large-scale P2P networks, we present prevention and trust evaluation scheme, called IRTrust. The framework incorporates a strategy of identity authentication and a global trust of peers to improve the ability of resisting the malicious behaviors. It uses the quality of service (QoS), quality of recommendation (QoR), and comprehensive risk factor to evaluate the trustworthiness of a peer, which is applicable for large-scale unstructured P2P networks. The proposed IRTrust can defend against several kinds of malicious attacks, such as simple malicious attacks, collusive attacks, strategic attacks, and sybil attacks. Our simulation results show that the proposed scheme provides greater accuracy and stronger resistance compared with existing global trust schemes. The proposed scheme has potential application in secure P2P network coding.
  • Item
    Transitions in a genetic transcriptional regulatory system under Lévy motion
    (London : Nature Publishing Group, 2016) Zheng, Y.; Serdukova, L.; Duan, J.; Kurths, J.
  • Item
    Synchronization of a Class of Memristive Stochastic Bidirectional Associative Memory Neural Networks with Mixed Time-Varying Delays via Sampled-Data Control
    (London : Hindawi Limited, 2018) Yuan, M.; Wang, W.; Luo, X.; Ge, C.; Li, L.; Kurths, J.; Zhao, W.
    The paper addresses the issue of synchronization of memristive bidirectional associative memory neural networks (MBAMNNs) with mixed time-varying delays and stochastic perturbation via a sampled-data controller. First, we propose a new model of MBAMNNs with mixed time-varying delays. In the proposed approach, the mixed delays include time-varying distributed delays and discrete delays. Second, we design a new method of sampled-data control for the stochastic MBAMNNs. Traditional control methods lack the capability of reflecting variable synaptic weights. In this paper, the methods are carefully designed to confirm the synchronization processes are suitable for the feather of the memristor. Third, sufficient criteria guaranteeing the synchronization of the systems are derived based on the derive-response concept. Finally, the effectiveness of the proposed mechanism is validated with numerical experiments.