2022
DOI: 10.1007/s40815-022-01312-0
|View full text |Cite
|
Sign up to set email alerts
|

4-D Memristive Chaotic Systems-Based Audio Secure Communication Using Dual-Function-Link Fuzzy Brain Emotional Controller

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 53 publications
0
5
0
Order By: Relevance
“…To mitigate the potential for approximation error in (59), we use an H∞ tracking power [26] in the following way:…”
Section: Robust Compensator Control System Designmentioning
confidence: 99%
See 1 more Smart Citation
“…To mitigate the potential for approximation error in (59), we use an H∞ tracking power [26] in the following way:…”
Section: Robust Compensator Control System Designmentioning
confidence: 99%
“…The components of the BINN are: Input, Learning, Output, Emotion, Emotion Output, and Controller Output. By combining with other systems such as CMAC [13], [25], function-link [26], TSK fuzzy system [13], [27], wavelet type-2 fuzzy system [13], and type-2 fuzzy system [28], the performance of BINN can be improved.…”
Section: Introductionmentioning
confidence: 99%
“…To show the quality of the proposed method for the secure communication system, the signal to noise ratio (SNR) is given for three channels per disturbances. The signal to noise ratio is presented as follows (Huynh et al, 2022; Giap et al, 2020, 2021):where xmi is original signal, Ns is number of samples, and mi is encrypted signal. The SNR should be greater than zero dB to confirm that the desired signal is greater than the noise.…”
Section: An Illustrative Examplementioning
confidence: 99%
“…The synchronization methods for the network systems can be found in [11][12][13][14]. The discussions of secure communications of chaotic systems with support of neural network controllers can be found in [15][16]. The encryption methods for images can be found [17][18].…”
Section: Introductionmentioning
confidence: 99%