
-
Previous Article
Reversible hidden data access algorithm in cloud computing environment
- DCDS-S Home
- This Issue
-
Next Article
Cores and optimal fuzzy communication structures of fuzzy games
Research on iterative repair algorithm of Hyperchaotic image based on support vector machine
1. | College of Telecommunications & Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China |
2. | Department of Computer Science, Winona State University, Winona, MN 55987, USA |
The damaged area of the hyperchaotic image is prone to lack of texture information. It needs to make image restoration design to improve the information expression ability of the image. In this paper, an iterative restoration algorithm of hyperchaotic image based on support vector machine is proposed. The sample blocks in the damaged region of hyperchaotic images are divided into smooth mesh structures according to block segmentation method, and the neighborhood pixels of which points need to repair are ranked efficiently according to gradient values. According to the edge fuzzification features, the position of the important structural information of the damaged area is located. A multi-dimensional spectral peak search method is applied to construct the information feature subspace of image texture, so as to find the best matching block for restoring the damaged region of hyperchaotic image. Considering the features of structural information and texture information, the maximum likelihood algorithm is used to reconstruct the pixel elements in the image region by piecewise fitting. Through the support vector machine algorithm, the image iterative restoration is carried out. The simulation results show that the restoration method for hyperchaotic image can achieve effective restoration of image damaged area, the quality of restorationed image is better, and the computation speed is fast. The image restoration method can effectively ensure the visual effect of the reconstructed image.
References:
[1] |
E. Abiri, Z. Bezareh and A. Darabi, The optimum design of ram cell based on the modified-gdi method using non-dominated sorting genetic algorithm ⅱ (nsga-ⅱ), Journal of Intelligent & Fuzzy Systems, 32 (2017), 4095-4108. Google Scholar |
[2] |
S. Asawasamrit and C. Promsakon,
On quasi-commutative kk-algebra, Journal of Discrete Mathematical Sciences & Cryptography, 19 (2016), 385-395.
doi: 10.1080/09720529.2015.1102885. |
[3] |
M. N. A. Basheer Ahmad—Hugerat, The effectiveness of teachers' use of demonstrations for enhancing students' understanding of and attitudes to learning the oxidation-reduction concept, Eurasia Journal of Mathematics Science & Technology Education, 13 (2017), 555-570. Google Scholar |
[4] |
J. Bensmail, R. Duvignau and S. Kirgizov,
The complexity of deciding whether a graph admits an orientation with fixed weak diameter, Discrete Mathematics and Theoretical Computer Science, 17 (2016), 31-42.
|
[5] |
L. Cai, H. Zhai, L. Yang and X. Tian, Assets evaluation credibility method based on the interpersonal relationship model, Journal of Interdisciplinary Mathematics, 20 (2017), 1047-1058. Google Scholar |
[6] |
J. Chen, Z. H. Yuan, C. Yuan-Bo and S. O. Automation, Control method design of aircraft stability, Computer Simulation, 34 (2017), 39-43. Google Scholar |
[7] |
L. Chen and F. Zhao, Application of local binary pattern weighting algorithm in face recognition based on support vector machine, Bulletin of Science & Technology, 237-240. Google Scholar |
[8] |
Y. Chen, Y. Zhou, X. Wang and L. Guo, Video information hiding algorithm based on diamond coding, Journal of Computer Applications, 37 (2017), 2806-2812. Google Scholar |
[9] |
A. Criminisi, P. Perez and K. Toyama, Object Removal by Exemplar-Based Image Inpainting, Zunic J, Computer Vision and Pattern Recognition, Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Wisconsin: IEEE Computer Society, 2003. Google Scholar |
[10] |
P. Ferrara, T. Bianchi, A. D. Rosa and A. Piva, Image forgery localization via fine-grained analysis of cfa artifacts, IEEE Transactions on Information Forensics & Security, 7 (2012), 1566-1577. Google Scholar |
[11] |
Y. Huang, Z. Wu, L. Wang and T. Tan, Feature coding in image classification: A comprehensive study., IEEE Transactions on Pattern Analysis & Machine Intelligence, 36 (2014), 493-506. Google Scholar |
[12] |
M. A. Jian-Hong and J. I. Li-Xia, Study on agent immune network monitoring system model, Computer Simulation, 30 (2013), 213-216. Google Scholar |
[13] |
T. H. Kwok, H. Sheung and C. C. L. Wang,
Fast Query for Exemplar-Based Image Completion, vol. 19, IEEE Press, 2010.
doi: 10.1109/TIP.2010.2052270. |
[14] |
L. Lei, P. C. Wei, L. I. Li and S. Yin, Fast image encryption algorithm based on a second secret key, Science Technology & Engineering, 16 (2016), 259-263. Google Scholar |
[15] |
T. Li, X. He, Q. Teng and X. Wu, Adaptive bi-lp-l2-norm based blind super-resolution reconstruction for single blurred image, Journal of Computer Applications, 37 (2016), 2313-2318. Google Scholar |
[16] |
L. I. Liu-Qing and Z. L. Chen, Risk early warning of stampedes based on visual image, Computer Simulation, 32 (2015), 429-432. Google Scholar |
[17] |
T. Long, W. Jiao, G. He and W. Wang, Automatic line segment registration using gaussian mixture model and expectation-maximization algorithm, IEEE Journal of Selected Topics in Applied Earth Observations & Remote Sensing, 7 (2014), 1688-1699. Google Scholar |
[18] |
S. Lyu, X. Pan and X. Zhang, Exposing region splicing forgeries with blind local noise estimation, International Journal of Computer Vision, 110 (2014), 202-221. Google Scholar |
[19] |
H. Qin, H. Zhao, H. Zhao and C. N. University, Research on the digital image encryption algorithm based on double chaos, Bulletin of Science & Technology, 32 (2016), 169-173. Google Scholar |
[20] |
Z. Q. Song, Y. F. Long, K. Wang and T. S. Department, Modeling and performance research on hysteresis system basing on svm, Computer Simulation, 32 (2015), 398-402. Google Scholar |
[21] |
Z. Sun, Z. X. Wang, M. Bai and J. S. Zhang, Image inpainting method based on self-organizing maps and k-means clustering, Science Technology & Engineering, 12 (2012), 1790-1794. Google Scholar |
[22] |
R. C. Tan, T. Lei, Q. M. Zhao, L. H. Gong and Z. H. Zhou, Quantum color image encryption algorithm based on a hyper-chaotic system and quantum fourier transform, International Journal of Theoretical Physics, 55 (2016), 1-17. Google Scholar |
[23] |
X. Tang, Spectral analysis of a class of symmetric differential operators with logarithmic coefficients, Journal of Discrete Mathematical Sciences and Cryptography, 20 (2017), 91-102. Google Scholar |
[24] |
J. Wang, Z. Lei and G. Chen, A parameter optimization method for an svm based on improved grid search algorithm, Applied Science & Technology, 24 (2012), 231-233. Google Scholar |
[25] |
X. Wang and H. L. Zhang,
A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems, Nonlinear Dynamics, 83 (2016), 333-346.
doi: 10.1007/s11071-015-2330-8. |
[26] |
Y. Wei, Assessment study on brain wave predictive ability to policemena??s safety law enforcement, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 193-204. Google Scholar |
[27] |
A. Wong and J. Orchard, A nonlocal-means approach to exemplar-based inpainting, in IEEE International Conference on Image Processing, 2008, 2600-2603. Google Scholar |
[28] |
Z. Xu and J. Sun,
Image inpainting by patch propagation using patch sparsity, IEEE Trans. Image Process, 19 (2010), 1153-1165.
doi: 10.1109/TIP.2010.2042098. |
[29] |
L. Zhang and T. Z. Qiao, An binary segmentation algorithm for infrared image, Infrared Technology, 36 (2014), 649-651. Google Scholar |
[30] |
Y. Zhao and M. Li, A modified fuzzy c-means algorithm for segmentation of mri, in International Conference on Computational Intelligence and Multimedia Applications, 2003. Iccima 2003. Proceedings, 32 (2003), 146-149. Google Scholar |
[31] |
Y. Zhou, L. Li and K. Xia, Research on weighted priority of exemplar-based image inpainting, Journal of Electronics(China), 29 (2012), 166-170. Google Scholar |
[32] |
H. Zhu, X. Zhang, H. Yu and et al., An image encryption algorithm based on compound homogeneous hyper-chaotic system, Nonlinear Dynamics, 89 (2017), 61-79. Google Scholar |
show all references
References:
[1] |
E. Abiri, Z. Bezareh and A. Darabi, The optimum design of ram cell based on the modified-gdi method using non-dominated sorting genetic algorithm ⅱ (nsga-ⅱ), Journal of Intelligent & Fuzzy Systems, 32 (2017), 4095-4108. Google Scholar |
[2] |
S. Asawasamrit and C. Promsakon,
On quasi-commutative kk-algebra, Journal of Discrete Mathematical Sciences & Cryptography, 19 (2016), 385-395.
doi: 10.1080/09720529.2015.1102885. |
[3] |
M. N. A. Basheer Ahmad—Hugerat, The effectiveness of teachers' use of demonstrations for enhancing students' understanding of and attitudes to learning the oxidation-reduction concept, Eurasia Journal of Mathematics Science & Technology Education, 13 (2017), 555-570. Google Scholar |
[4] |
J. Bensmail, R. Duvignau and S. Kirgizov,
The complexity of deciding whether a graph admits an orientation with fixed weak diameter, Discrete Mathematics and Theoretical Computer Science, 17 (2016), 31-42.
|
[5] |
L. Cai, H. Zhai, L. Yang and X. Tian, Assets evaluation credibility method based on the interpersonal relationship model, Journal of Interdisciplinary Mathematics, 20 (2017), 1047-1058. Google Scholar |
[6] |
J. Chen, Z. H. Yuan, C. Yuan-Bo and S. O. Automation, Control method design of aircraft stability, Computer Simulation, 34 (2017), 39-43. Google Scholar |
[7] |
L. Chen and F. Zhao, Application of local binary pattern weighting algorithm in face recognition based on support vector machine, Bulletin of Science & Technology, 237-240. Google Scholar |
[8] |
Y. Chen, Y. Zhou, X. Wang and L. Guo, Video information hiding algorithm based on diamond coding, Journal of Computer Applications, 37 (2017), 2806-2812. Google Scholar |
[9] |
A. Criminisi, P. Perez and K. Toyama, Object Removal by Exemplar-Based Image Inpainting, Zunic J, Computer Vision and Pattern Recognition, Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Wisconsin: IEEE Computer Society, 2003. Google Scholar |
[10] |
P. Ferrara, T. Bianchi, A. D. Rosa and A. Piva, Image forgery localization via fine-grained analysis of cfa artifacts, IEEE Transactions on Information Forensics & Security, 7 (2012), 1566-1577. Google Scholar |
[11] |
Y. Huang, Z. Wu, L. Wang and T. Tan, Feature coding in image classification: A comprehensive study., IEEE Transactions on Pattern Analysis & Machine Intelligence, 36 (2014), 493-506. Google Scholar |
[12] |
M. A. Jian-Hong and J. I. Li-Xia, Study on agent immune network monitoring system model, Computer Simulation, 30 (2013), 213-216. Google Scholar |
[13] |
T. H. Kwok, H. Sheung and C. C. L. Wang,
Fast Query for Exemplar-Based Image Completion, vol. 19, IEEE Press, 2010.
doi: 10.1109/TIP.2010.2052270. |
[14] |
L. Lei, P. C. Wei, L. I. Li and S. Yin, Fast image encryption algorithm based on a second secret key, Science Technology & Engineering, 16 (2016), 259-263. Google Scholar |
[15] |
T. Li, X. He, Q. Teng and X. Wu, Adaptive bi-lp-l2-norm based blind super-resolution reconstruction for single blurred image, Journal of Computer Applications, 37 (2016), 2313-2318. Google Scholar |
[16] |
L. I. Liu-Qing and Z. L. Chen, Risk early warning of stampedes based on visual image, Computer Simulation, 32 (2015), 429-432. Google Scholar |
[17] |
T. Long, W. Jiao, G. He and W. Wang, Automatic line segment registration using gaussian mixture model and expectation-maximization algorithm, IEEE Journal of Selected Topics in Applied Earth Observations & Remote Sensing, 7 (2014), 1688-1699. Google Scholar |
[18] |
S. Lyu, X. Pan and X. Zhang, Exposing region splicing forgeries with blind local noise estimation, International Journal of Computer Vision, 110 (2014), 202-221. Google Scholar |
[19] |
H. Qin, H. Zhao, H. Zhao and C. N. University, Research on the digital image encryption algorithm based on double chaos, Bulletin of Science & Technology, 32 (2016), 169-173. Google Scholar |
[20] |
Z. Q. Song, Y. F. Long, K. Wang and T. S. Department, Modeling and performance research on hysteresis system basing on svm, Computer Simulation, 32 (2015), 398-402. Google Scholar |
[21] |
Z. Sun, Z. X. Wang, M. Bai and J. S. Zhang, Image inpainting method based on self-organizing maps and k-means clustering, Science Technology & Engineering, 12 (2012), 1790-1794. Google Scholar |
[22] |
R. C. Tan, T. Lei, Q. M. Zhao, L. H. Gong and Z. H. Zhou, Quantum color image encryption algorithm based on a hyper-chaotic system and quantum fourier transform, International Journal of Theoretical Physics, 55 (2016), 1-17. Google Scholar |
[23] |
X. Tang, Spectral analysis of a class of symmetric differential operators with logarithmic coefficients, Journal of Discrete Mathematical Sciences and Cryptography, 20 (2017), 91-102. Google Scholar |
[24] |
J. Wang, Z. Lei and G. Chen, A parameter optimization method for an svm based on improved grid search algorithm, Applied Science & Technology, 24 (2012), 231-233. Google Scholar |
[25] |
X. Wang and H. L. Zhang,
A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems, Nonlinear Dynamics, 83 (2016), 333-346.
doi: 10.1007/s11071-015-2330-8. |
[26] |
Y. Wei, Assessment study on brain wave predictive ability to policemena??s safety law enforcement, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 193-204. Google Scholar |
[27] |
A. Wong and J. Orchard, A nonlocal-means approach to exemplar-based inpainting, in IEEE International Conference on Image Processing, 2008, 2600-2603. Google Scholar |
[28] |
Z. Xu and J. Sun,
Image inpainting by patch propagation using patch sparsity, IEEE Trans. Image Process, 19 (2010), 1153-1165.
doi: 10.1109/TIP.2010.2042098. |
[29] |
L. Zhang and T. Z. Qiao, An binary segmentation algorithm for infrared image, Infrared Technology, 36 (2014), 649-651. Google Scholar |
[30] |
Y. Zhao and M. Li, A modified fuzzy c-means algorithm for segmentation of mri, in International Conference on Computational Intelligence and Multimedia Applications, 2003. Iccima 2003. Proceedings, 32 (2003), 146-149. Google Scholar |
[31] |
Y. Zhou, L. Li and K. Xia, Research on weighted priority of exemplar-based image inpainting, Journal of Electronics(China), 29 (2012), 166-170. Google Scholar |
[32] |
H. Zhu, X. Zhang, H. Yu and et al., An image encryption algorithm based on compound homogeneous hyper-chaotic system, Nonlinear Dynamics, 89 (2017), 61-79. Google Scholar |






SVM iterative restoration algorithm | Criminisi algorithm | ||||||
Image data set | Computing time |
The signal to noise ratio of the restored image: V( |
Computing time |
The signal to noise ratio of the restored image: V( |
Ratio of restoration restoration time |
Comparison of signal-to-noise ratio: |
|
Cow( |
209.656 | 22.564 | 1545.233 | 21.544 | 8.24 | ||
Rabbit( |
20.53 | 33.241 | 174.324 | 33.232 | 8.35 | ||
Golf( |
12.234 | 30.665 | 85.245 | 30.344 | 7.02 | ||
Wall( |
6.323 | 28.543 | 46.314 | 30.454 | 7.34 | ||
Stripes( |
2.453 | 42.032 | 16.543 | 43.445 | 6.64 |
SVM iterative restoration algorithm | Criminisi algorithm | ||||||
Image data set | Computing time |
The signal to noise ratio of the restored image: V( |
Computing time |
The signal to noise ratio of the restored image: V( |
Ratio of restoration restoration time |
Comparison of signal-to-noise ratio: |
|
Cow( |
209.656 | 22.564 | 1545.233 | 21.544 | 8.24 | ||
Rabbit( |
20.53 | 33.241 | 174.324 | 33.232 | 8.35 | ||
Golf( |
12.234 | 30.665 | 85.245 | 30.344 | 7.02 | ||
Wall( |
6.323 | 28.543 | 46.314 | 30.454 | 7.34 | ||
Stripes( |
2.453 | 42.032 | 16.543 | 43.445 | 6.64 |
SVM iterative restoration algorithm | Criminisi algorithm | ||||||
Image data set | Computing time |
The signal to noise ratio of the restored image: V( |
Computing time |
The signal to noise ratio of the restored image: V( |
Ratio of restoration restoration time |
Comparison of signal-to-noise ratio: |
|
Cow( |
142.354 | 22.545 | 1655.221 | 21.444 | 11.85 | ||
Rabbit( |
15.545 | 32.740 | 157.545 | 33.464 | 11.55 | ||
Golf( |
7.344 | 30.469 | 85.565 | 30.443 | 11.45 | ||
Wall( |
4.455 | 30.908 | 46.877 | 30.356 | 9.56 | ||
Stripes( |
1.666 | 41.876 | 16.54 | 43.676 | 9.65 |
SVM iterative restoration algorithm | Criminisi algorithm | ||||||
Image data set | Computing time |
The signal to noise ratio of the restored image: V( |
Computing time |
The signal to noise ratio of the restored image: V( |
Ratio of restoration restoration time |
Comparison of signal-to-noise ratio: |
|
Cow( |
142.354 | 22.545 | 1655.221 | 21.444 | 11.85 | ||
Rabbit( |
15.545 | 32.740 | 157.545 | 33.464 | 11.55 | ||
Golf( |
7.344 | 30.469 | 85.565 | 30.443 | 11.45 | ||
Wall( |
4.455 | 30.908 | 46.877 | 30.356 | 9.56 | ||
Stripes( |
1.666 | 41.876 | 16.54 | 43.676 | 9.65 |
SVM iterative restoration algorithm | Criminisi algorithm | ||||||
Image data set | Computing time |
The signal to noise ratio of the restored image: V( |
Computing time |
The signal to noise ratio of the restored image: V( |
Ratio of restoration restoration time |
Comparison of signal-to-noise ratio: |
|
Cow( |
109.464 | 22.454 | 1232.243 | 22.976 | 11.63 | ||
Rabbit( |
13.045 | 31.554 | 163.465 | 32.566 | 12.34 | ||
Golf( |
6.454 | 30.464 | 81.354 | 30.654 | 13.43 | ||
Wall( |
3.833 | 28.578 | 40.456 | 28.533 | 10.46 | ||
Stripes( |
1.354 | 40.665 | 15.566 | 43.355 | 9.76 |
SVM iterative restoration algorithm | Criminisi algorithm | ||||||
Image data set | Computing time |
The signal to noise ratio of the restored image: V( |
Computing time |
The signal to noise ratio of the restored image: V( |
Ratio of restoration restoration time |
Comparison of signal-to-noise ratio: |
|
Cow( |
109.464 | 22.454 | 1232.243 | 22.976 | 11.63 | ||
Rabbit( |
13.045 | 31.554 | 163.465 | 32.566 | 12.34 | ||
Golf( |
6.454 | 30.464 | 81.354 | 30.654 | 13.43 | ||
Wall( |
3.833 | 28.578 | 40.456 | 28.533 | 10.46 | ||
Stripes( |
1.354 | 40.665 | 15.566 | 43.355 | 9.76 |
[1] |
Mehdi Bastani, Davod Khojasteh Salkuyeh. On the GSOR iteration method for image restoration. Numerical Algebra, Control & Optimization, 2021, 11 (1) : 27-43. doi: 10.3934/naco.2020013 |
[2] |
Ying Lin, Qi Ye. Support vector machine classifiers by non-Euclidean margins. Mathematical Foundations of Computing, 2020, 3 (4) : 279-300. doi: 10.3934/mfc.2020018 |
[3] |
Manxue You, Shengjie Li. Perturbation of Image and conjugate duality for vector optimization. Journal of Industrial & Management Optimization, 2020 doi: 10.3934/jimo.2020176 |
[4] |
Kateřina Škardová, Tomáš Oberhuber, Jaroslav Tintěra, Radomír Chabiniok. Signed-distance function based non-rigid registration of image series with varying image intensity. Discrete & Continuous Dynamical Systems - S, 2021, 14 (3) : 1145-1160. doi: 10.3934/dcdss.2020386 |
[5] |
Abdelghafour Atlas, Mostafa Bendahmane, Fahd Karami, Driss Meskine, Omar Oubbih. A nonlinear fractional reaction-diffusion system applied to image denoising and decomposition. Discrete & Continuous Dynamical Systems - B, 2020 doi: 10.3934/dcdsb.2020321 |
[6] |
Liam Burrows, Weihong Guo, Ke Chen, Francesco Torella. Reproducible kernel Hilbert space based global and local image segmentation. Inverse Problems & Imaging, 2021, 15 (1) : 1-25. doi: 10.3934/ipi.2020048 |
[7] |
Balázs Kósa, Karol Mikula, Markjoe Olunna Uba, Antonia Weberling, Neophytos Christodoulou, Magdalena Zernicka-Goetz. 3D image segmentation supported by a point cloud. Discrete & Continuous Dynamical Systems - S, 2021, 14 (3) : 971-985. doi: 10.3934/dcdss.2020351 |
[8] |
Jia Cai, Guanglong Xu, Zhensheng Hu. Sketch-based image retrieval via CAT loss with elastic net regularization. Mathematical Foundations of Computing, 2020, 3 (4) : 219-227. doi: 10.3934/mfc.2020013 |
[9] |
Editorial Office. Retraction: Xiaohong Zhu, Zili Yang and Tabharit Zoubir, Research on the matching algorithm for heterologous image after deformation in the same scene. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1281-1281. doi: 10.3934/dcdss.2019088 |
[10] |
Maika Goto, Kazunori Kuwana, Yasuhide Uegata, Shigetoshi Yazaki. A method how to determine parameters arising in a smoldering evolution equation by image segmentation for experiment's movies. Discrete & Continuous Dynamical Systems - S, 2021, 14 (3) : 881-891. doi: 10.3934/dcdss.2020233 |
[11] |
Editorial Office. Retraction: Xiaohong Zhu, Lihe Zhou, Zili Yang and Joyati Debnath, A new text information extraction algorithm of video image under multimedia environment. Discrete & Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1265-1265. doi: 10.3934/dcdss.2019087 |
[12] |
Jianhua Huang, Yanbin Tang, Ming Wang. Singular support of the global attractor for a damped BBM equation. Discrete & Continuous Dynamical Systems - B, 2020 doi: 10.3934/dcdsb.2020345 |
[13] |
Min Ji, Xinna Ye, Fangyao Qian, T.C.E. Cheng, Yiwei Jiang. Parallel-machine scheduling in shared manufacturing. Journal of Industrial & Management Optimization, 2020 doi: 10.3934/jimo.2020174 |
[14] |
Vaibhav Mehandiratta, Mani Mehra, Günter Leugering. Existence results and stability analysis for a nonlinear fractional boundary value problem on a circular ring with an attached edge : A study of fractional calculus on metric graph. Networks & Heterogeneous Media, 2021 doi: 10.3934/nhm.2021003 |
[15] |
Wen Li, Wei-Hui Liu, Seak Weng Vong. Perron vector analysis for irreducible nonnegative tensors and its applications. Journal of Industrial & Management Optimization, 2021, 17 (1) : 29-50. doi: 10.3934/jimo.2019097 |
[16] |
Liping Tang, Ying Gao. Some properties of nonconvex oriented distance function and applications to vector optimization problems. Journal of Industrial & Management Optimization, 2021, 17 (1) : 485-500. doi: 10.3934/jimo.2020117 |
[17] |
Kengo Nakai, Yoshitaka Saiki. Machine-learning construction of a model for a macroscopic fluid variable using the delay-coordinate of a scalar observable. Discrete & Continuous Dynamical Systems - S, 2021, 14 (3) : 1079-1092. doi: 10.3934/dcdss.2020352 |
[18] |
Jianfeng Huang, Haihua Liang. Limit cycles of planar system defined by the sum of two quasi-homogeneous vector fields. Discrete & Continuous Dynamical Systems - B, 2021, 26 (2) : 861-873. doi: 10.3934/dcdsb.2020145 |
[19] |
Jingjing Wang, Zaiyun Peng, Zhi Lin, Daqiong Zhou. On the stability of solutions for the generalized vector quasi-equilibrium problems via free-disposal set. Journal of Industrial & Management Optimization, 2021, 17 (2) : 869-887. doi: 10.3934/jimo.2020002 |
2019 Impact Factor: 1.233
Tools
Metrics
Other articles
by authors
[Back to Top]