Download full-text PDF

Source
http://dx.doi.org/10.1103/physreva.45.3503DOI Listing

Publication Analysis

Top Keywords

dependence chaotic
4
chaotic behavior
4
behavior residual
4
residual interaction
4
interaction odd-odd
4
odd-odd nucleus
4
nucleus 106ag
4
dependence
1
behavior
1
residual
1

Similar Publications

Improving the flexible and deep peak shaving capability of supercritical (SC) unit under full operating conditions to adapt a larger-scale renewable energy integrated into the power grid is the main choice of novel power system. However, it is particularly challenging to establish an accurate SC unit model under large-scale variable loads and deep peak shaving. To this end, a data-driven modeling strategy combining Transformer-Extra Long (Transformer-XL) and quantum chaotic nutcracker optimization algorithm is proposed.

View Article and Find Full Text PDF

Memristors are commonly used to introduce various chaotic systems and can be used to enhance their chaotic characteristics. However, due to the strict construction conditions of Hamiltonian systems, there has been limited research on the development of memristive Hamiltonian conservative chaotic systems (MHCCSs). In this work, a method for constructing three-terminal memristors is proposed, and the three-terminal memristors are incorporated into the Hamiltonian system, resulting in the development of a class of n-D MHCCS.

View Article and Find Full Text PDF

We examine the impact of the time delay on two coupled massive oscillators within the second-order Kuramoto model, which is relevant to the operations of real-world networks that rely on signal transmission speed constraints. Our analytical and numerical exploration shows that time delay can cause multi-stability within phase-locked solutions, and the stability of these solutions decreases as the inertia increases. In addition to phase-locked solutions, we discovered non-phase-locked solutions that exhibit periodic and chaotic behaviors, depending on the amount of inertia and time delay.

View Article and Find Full Text PDF

A framework for hardware trojan detection based on contrastive learning.

Sci Rep

December 2024

Electronic Engineering College, Heilongjiang University, Harbin, 150080, China.

With the rapid development of the semiconductor industry, Hardware Trojans (HT) as a kind of malicious function that can be implanted at will in all processes of integrated circuit design, manufacturing, and deployment have become a great threat in the field of hardware security. Side-channel analysis is widely used in the detection of HT due to its high efficiency, non-contact nature, and accuracy. In this paper, we propose a framework for HT detection based on contrastive learning using power consumption information in unsupervised or weakly supervised scenarios.

View Article and Find Full Text PDF

Magnetic structures in the explicitly time-dependent nontwist map.

Chaos

December 2024

Department of Atomic Physics, Eötvös Loránd University, 1117 Pázmány Péter sétány 1A, Budapest, Hungary.

We investigate how the magnetic structures of the plasma change in a large aspect ratio tokamak perturbed by an ergodic magnetic limiter, when a system parameter is non-adiabatically varied in time. We model such a scenario by considering the Ullmann-Caldas nontwist map, where we introduce an explicit time-dependence to the ratio of the limiter and plasma currents. We apply the tools developed recently in the field of chaotic Hamiltonian systems subjected to parameter drift.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!