In this paper, we further study the dynamic characteristics of the Yu–Wang chaotic system obtained by Yu and Wang in 2012. The system can show a four-wing chaotic attractor in any direction, including all 3D spaces and 2D planes. For this reason, our interest is focused on multistability generation and chaotic FPGA implementation. The stability analysis, bifurcation diagram, basin of attraction, and Lyapunov exponent spectrum are given as the methods to analyze the dynamic behavior of this system. The analyses show that each system parameter has different coexistence phenomena including coexisting chaotic, coexisting stable node, and coexisting limit cycle. Some remarkable features of the system are that it can generate transient one-wing chaos, transient two-wing chaos, and offset boosting. These phenomena have not been found in previous studies of the Yu–Wang chaotic system, so they are worth sharing. Then, the RK4 algorithm of the Verilog 32-bit floating-point standard format is used to realize the autonomous multistable 4D Yu–Wang chaotic system on FPGA, so that it can be applied in embedded engineering based on chaos. Experiments show that the maximum operating frequency of the Yu–Wang chaotic oscillator designed based on FPGA is 161.212 MHz.
In this paper, we propose a method to design the pseudorandom number generator (PRNG) using three kinds of four-wing memristive hyperchaotic systems (FWMHSs) with different dimensions as multientropy sources. The principle of this method is to obtain pseudorandom numbers with good randomness by coupling XOR operation on the three kinds of FWMHSs with different dimensions. In order to prove its potential application in secure communication, the security of PRNG based on this scheme is analyzed from the perspective of cryptography. In addition, PRNG has passed the NIST 800.22 and ENT test, which shows that PRNG has good statistical characteristics. Finally, an image encryption algorithm based on PRNG is adopted. In the encryption algorithm, the optimized Arnold matrix scrambling method and the diffusion processing based on XOR are used to obtain the final encrypted image. Through the evaluation of encryption performance, it is concluded that there is no direct relationship between the pristine image and encrypted image. The results show that the proposed image encryption scheme has good statistical output characteristics and security performance in line with cryptography.
Many deficiencies with grammatical evolution (GE) such as inconvenience in solution derivations, modularity analysis, and semantic computing can partly be explained from the angle of genotypic representations. In this paper, we deepen some of our previous work in visualizing concept relationships, individual structures and total evolutionary process, contributing new ideas, perspectives, and methods in these aspects; reveal the principle hidden in early work so that to develop a practical methodology; provide formal proofs for issues of concern which will be helpful for understanding of mathematical essence of issues, establishing of Communicated by V. Loia. B Pei He an unified formal framework as well as practical implementation; exploit genotypic modularity like modular discovery systematically which for the lack of supporting mechanism, if not impossible, is done poorly in many existing systems, and finally demonstrate the possible gains through semantic analysis and modular reuse. As shown in this work, the search space and the number of nodes in the parser tree are reduced using concepts from building blocks, and concepts such as the codon-to-grammar mapping and the integer modulo arithmetic used in most existing GE can be abnegated.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.