|
[1] S. N. Resband, Chaotic Dynamics of Nonlinear Systems, A Wiley — Interscience Publication, 1989. [2] A. S. Poznyak, W. Yu and E. N. Sanchez, “Identification and control of unknown chaotic systems dynamic neural networks”, IEEE Transactions on Circuits and Systems I: Fundamental Theory Applications, Vol. 46, No. 12, pp. 1491-1495, 1999. [3] T. Hrycej, “Identifying chaotic attractors with neural networks”, Proceedings of IEEE International Conference on Neural Network, Vol. 5, pp. 2664-2668, 1995. [4] H. Demuth and M. Beale, “Neural Network Toolbox for Use with MATLAB”, The Math Works, Inc, 2001. [5] J. H. Holland, “Adaptation in natural and artificial systems”, Ann Arbor: The University of Michigan Press, 1975. [6] H. Chou, G. Premkumar and C. H. Chu, “Genetic algorithms for communications network design — an empirical study of the factors that influence performance”, IEEE Transactions on Evolutionary Computation, Vol. 5, No. 3, pp. 236-249, 2001. [7] T. L. Carroll and L. M. Pecora, “Synchronization in Chaotic Systems”, IEEE Trans. Circuits Sys. I, Vol. 38, pp.453-456, 1991. [8] L. M. Pecora and T. L. Carroll, “Synchronized Chaotic Signals and Systems”, Proceeding of IEEE ICASSP, Vol. IV, pp.137-140, 1992. [9] L. M. Pecora and T. L. Carroll, “Synchronization in Chaotic Systems”, Physical Review Letters, Vol.64, No.8, pp.821-824, 1990. [10] J. Yen, and R. Langari, Fuzzy Logic: Intelligence, Control, and Information New Jersey: Prentice-Hell, 1999. [11] Jang, J.-S.R. “ANFIS: Adaptive-Network-Based-Fuzzy Inference System”, IEEE Transactions on System, Vol.23, No.3, pp.665-685, 1993. [12] K. M. Cuomo, A. V. Oppenheim, and S. H.Strogatz, “Synchronization of Lorenz-based Chaotic Circuits with Applications to Communications”, IEEE Trans. Circuits Syst., Vol. 40, pp.626-633, Oct. 1993. [13] C. W. Wu and L.O. Chua, “A Simple Way to Synchronize Chaotic Systems with Applications to Secure Communication Systems”, Int. J. Bifurcation Chaos, Vol. 3, No.6, pp.1619-1627, 1993. [14] Li-Xin Wang, A Course in Fuzzy Systems and Control New Jersey: Prentice-Hell, 1997. [15] T. Yang, C. W. Wu and L. O. Chua, “Cryptography based on chaotic systems”, IEEE Trans. Circuits Sys., Vol.44, pp.469-472, 1997. [16] M. S. Baptista, “Cryptography with Chaos”, Physical Letters A, Vol.240, pp.50-54, 1998. [17] G. Jakimoski and L. Kocarev, “Analysis of Some Recently Proposed Chaos-Based Encryption Algorithms”, submitted for publication. [18] G. Jakimoski and L. Kocarev, “ Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps”, to appear in IEEE Transactions on Circuit and Systems — Part 1; L. Kocarev and G. Jakimoski, “Chaos and Cryptography From Chaotic Maps to Encryption Algorithms” submitted for publication; N. Masuda and K. Aihara, “Cryptosysems with Discretized Chaotic Maps” submitted for publication. [19] T. Y. Li and J. A. Yorke, “Period three implies chaos”, Amer. Math. Monthly, Vol. 82, No. 10, pp. 985-992, 1975. [20] C. Zhou and T. Chen, “Extracting Information Masked by Chaos and Contaminated with Noise: Some Considerations on the Security of Communication Approaches Using Chaos”, Phys. Lett. A, Vol. 234, pp.429-435, 1997. [21] T. Yang, “Recovery of Digital Signals from Chaotic Switching”, Int. J. Circuit Theory Appl., Vol. 23, No. 6, pp.611-615, 1995. [22] H. Leung. and J. Lam, “Design of Demodulator for the Chaotic Modulation Communication System”, IEEE Trans. Circuits Syst., Vol. 44, pp.262-267, Mar 1997. [23] D. E. Denning, Cryptography and Data Security, Addison-Wesley, 1982. [24] W. Diffie and M. E. Hellman, “Privacy and Authentication: An to Cryptography”, Proceedings of the IEEE, Vol.67, No.3, pp.397-427, 1979. [25] W. Diffie and M. E. Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, Vol.IT-22, No.6, pp.644-654, 1976. [26] X. Lai and J. Massey, “A Proposal for a New Block Encryption Standard”, Advances in Cryptology — EUROCRYPT ’90, pp.389-404. ,1991. [27] X. Lai and J. Massey, and S. Murphy, “Markov Ciphers and Differential Cryptanalysis”, Advances in Cryptology — EUROCRYPT ’91, pp.17-38, 1991. [28] Simon Haykin, Neural Network: A Comprehensive Foundation, Prentice Hall, 1999. [29] Ned Mohan and Tore M. Undeland and William P. Robbins, Power Electronics: Converters, Applications, and Design, John Wiley, 1995. [30] 余國瑞,吳東軒,“應用遺傳演算法與類神經網路於混沌系統之辨識”, 2002人工智慧與應用研討會,pp.719-724,2002。 [31] 余國瑞,吳東軒,“植基後勤映射之模糊同步安全”,2003中華民國自動控制研討會暨生物機電系統控制與應用研討會,pp.1858-1863,2003。
|