In this paper, a new dynamical network model is introduced, in which the nodes of the network are different. It is shown that by the designed controllers, the state of the network can exponentially synchronize onto a homogeneous stationary state. Some criteria are derived and some examples are presented. The numerical simulations coincide with theoretical analysis.
Zhengquan YANG Zhongxin LIU Zengqiang CHEN Zhuzhi YUAN
A hyperchaos-based watermarking algorithm is developed in the wavelet domain for images.The algorithm is based on discrete wavelet transform and combines the communication model with side information.We utilize a suitable scale factor to scale host image,then construct cosets for embedding digital watermarking according to scale version of the host image.Our scheme makes a tradeoff between imperceptibility and robustness,and achieves security.The extraction algorithm is a blind detection algorithm which retrieves the watermark without the original host image.In addition,we propose a new method for watermark encryption with hyperchaotic sequence.This method overcomes the drawback of small key space of chaotic sequence and improves the watermark security.Simulation results indicate that the algorithm is a well-balanced watermarking method that offers good robustness and imperceptibility.
Commwarrior worm is capable of spreading through both Bluetooth and multimedia messaging service (MMS) in smart phone networks. According to the propagation characteristics of Bluetooth and MMS, we built the susceptibleexposed-infected-recovered-dormancy (SEIRD) model for the Bluetooth and MMS hybrid spread mode and performed the stability analysis. The simulation results show good correlation with our theoretical analysis and demonstrate the effectiveness of this dynamic propagation model. On the basis of the SEIRD model, we further discuss at length the influence of the propagation parameters such as user gather density in groups, moving velocity of smart phone, the time for worm to replicate itself, and other interrelated parameters on the propagation of the virus. On the basis of these analytical and simulation results, some feasible control strategies will be proposed to restrain the spread of mobile worm such as commwarrior on smart phone network.