scholarly journals Study on Bias Control of Memristor Multistablity System

2021 ◽  
Vol 233 ◽  
pp. 04002
Author(s):  
Hongyan Zang ◽  
Lili Huang ◽  
Yanling Wang ◽  
Tengfei Lei

In this paper, we study a memristor chaotic system with bias control. Based on the analysis of basic dynamic behavior, the hidden attractor coexistence and multi-stability of the non-equilibrium memristor chaotic system are verified, the bias control based on DC power control is studied, and the polarity control of the output variable is realized by using the change of parameters. The sinusoidal function is introduced as the bias periodic function, so that the system can realize signal polarity control only by changing the initial conditions. The analog circuit of memristor chaotic system is designed and verified by simulation..

2022 ◽  
Author(s):  
Shaohui Yan ◽  
Qiyu Wang ◽  
Ertong Wang ◽  
Xi Sun ◽  
Zhenlong Song

Abstract The definition of fractional calculus is introduced into the 5D chaotic system, and the 5D fractional-order chaotic system is obtained. The new 5D fractional-order chaotic system has no equilibrium, multi-scroll hidden attractor and multi-stability. By analyzing the time-domain waveform, phase diagram, bifurcation diagram and complexity, it is found that the system has no equilibrium but is very sensitive to parameters and initial values. With the variation of different parameters, the system can produce attractors of different scroll types accompanied by bursting oscillation. Secondly, the multi-stability of the hidden attractor is studied. Different initial values lead to the coexistence of attractors of different scroll number, which shows the advantages of the system. The correctness and realizability of the fractional-order chaotic system are proved by analog circuit and physical implement. Finally, because of the high security of multi-scroll attractor and hidden attractor, finite-time synchronization based on the fractional-order chaotic system is studied, which has a good application prospect in the field of secure communication.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Lili Huang ◽  
Yanling Wang ◽  
Yicheng Jiang ◽  
Tengfei Lei

By introducing an ideal and active flux-controlled memristor and tangent function into an existing chaotic system, an interesting memristor-based self-replication chaotic system is proposed. The most striking feature is that this system has infinite line equilibria and exhibits the extreme multistability phenomenon of coexisting infinitely many attractors. In this paper, bifurcation diagrams and Lyapunov exponential spectrum are used to analyze in detail the influence of various parameter changes on the dynamic behavior of the system; it shows that the newly proposed chaotic system has the phenomenon of alternating chaos and limit cycle. Especially, transition behavior of the transient period with steady chaos can be also found for some initial conditions. Moreover, a hardware circuit is designed by PSpice and fabricated, and its experimental results effectively verify the truth of extreme multistability.


Entropy ◽  
2019 ◽  
Vol 21 (7) ◽  
pp. 678 ◽  
Author(s):  
Yixuan Song ◽  
Fang Yuan ◽  
Yuxia Li

In this paper, a new voltage-controlled memristor is presented. The mathematical expression of this memristor has an absolute value term, so it is called an absolute voltage-controlled memristor. The proposed memristor is locally active, which is proved by its DC V–I (Voltage–Current) plot. A simple three-order Wien-bridge chaotic circuit without inductor is constructed on the basis of the presented memristor. The dynamical behaviors of the simple chaotic system are analyzed in this paper. The main properties of this system are coexisting attractors and multistability. Furthermore, an analog circuit of this chaotic system is realized by the Multisim software. The multistability of the proposed system can enlarge the key space in encryption, which makes the encryption effect better. Therefore, the proposed chaotic system can be used as a pseudo-random sequence generator to provide key sequences for digital encryption systems. Thus, the chaotic system is discretized and implemented by Digital Signal Processing (DSP) technology. The National Institute of Standards and Technology (NIST) test and Approximate Entropy analysis of the proposed chaotic system are conducted in this paper.


2021 ◽  
Vol 10 (2) ◽  
pp. 11
Author(s):  
Yasir Ahmed Hamza ◽  
Marwan Dahar Omer

In this study, a new approach of image encryption has been proposed. This method is depends on the symmetric encryption algorithm RC4 and Rossler chaotic system. Firstly, the encryption key is employed to ciphering a plain image using RC4 and obtains a ciphered-image. Then, the same key is used to generate the initial conditions of the Rossler system. The system parameters and the initial conditions are used as the inputs for Rossler chaotic system to generate the 2-dimensional array of random values. The resulted array is XORed with the ciphered-image to obtain the final encrypted-image. Based on the experimental results, the proposed method has achieved high security and less computation time. Also, the proposed method can be resisted attacks like (statistical, brute-force, and differential).


2021 ◽  
Author(s):  
Hegui Zhu ◽  
Jiangxia Ge ◽  
Wentao Qi ◽  
Xiangde Zhang ◽  
Xiaoxiong Lu

Abstract Owning to complex properties of ergodicity, non-periodic ability and sensitivity to initial states, chaotic systems are widely used in cryptography. In this paper, we propose a sinusoidal--polynomial composite chaotic system (SPCCS), and prove that it satisfies Devaney's definition of chaos: the sensitivity to initial conditions, topological transitivity and density of periodic points. The experimental results show that the SPCCS has better unpredictability and more complex chaotic behavior than the classical chaotic maps. Furthermore, we provide a new image encryption algorithm combining pixel segmentation operation, block chaotic matrix confusing operation, and pixel diffusion operation with the SPCCS. Detailed simulation results verify effectiveness of the proposed image encryption algorithm.


Author(s):  
Eric Donald Dongmo ◽  
Kayode Stephen Ojo ◽  
Paul Woafo ◽  
Abdulahi Ndzi Njah

This paper introduces a new type of synchronization scheme, referred to as difference synchronization scheme, wherein the difference between the state variables of two master [slave] systems synchronizes with the state variable of a single slave [master] system. Using the Lyapunov stability theory and the active backstepping technique, controllers are derived to achieve the difference synchronization of three identical hyperchaotic Liu systems evolving from different initial conditions, as well as the difference synchronization of three nonidentical systems of different orders, comprising the 3D Lorenz chaotic system, 3D Chen chaotic system, and the 4D hyperchaotic Liu system. Numerical simulations are presented to demonstrate the validity and feasibility of the theoretical analysis. The development of difference synchronization scheme has increases the number of existing chaos synchronization scheme.


2021 ◽  
Vol 15 (4) ◽  
pp. 118-131
Author(s):  
Sadiq A. Mehdi

In this paper, a novel four-dimensional chaotic system has been created, which has characteristics such as high sensitivity to the initial conditions and parameters. It also has two a positive Lyapunov exponents. This means the system is hyper chaotic. In addition, a new algorithm was suggested based on which they constructed an image cryptosystem. In the permutation stage, the pixel positions are scrambled via a chaotic sequence sorting. In the substitution stage, pixel values are mixed with a pseudorandom sequence generated from the 4D chaotic system using XOR operation. A simulation has been conducted to evaluate the algorithm, using the standardized tests such as information entropy, histogram, number of pixel change rate, unified average change intensity, and key space. Experimental results and performance analyses demonstrate that the proposed encryption algorithm achieves high security and efficiency.


Sign in / Sign up

Export Citation Format

Share Document