2019
DOI: 10.1007/s10470-018-01382-x
|View full text |Cite
|
Sign up to set email alerts
|

A new secure communication scheme using fractional order delayed chaotic system: design and electronics circuit simulation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…We used the fractional order (q = 0.98); the approximation of 1/s 0.98 can be calculated as in Equation ( 9) [37]. In Figure 3, the transfer function between terminals 1 and 2 can be calculated as shown in Equation (10) [38].…”
Section: Circuit Realization Of the Fractional-order Memristormentioning
confidence: 99%
See 1 more Smart Citation
“…We used the fractional order (q = 0.98); the approximation of 1/s 0.98 can be calculated as in Equation ( 9) [37]. In Figure 3, the transfer function between terminals 1 and 2 can be calculated as shown in Equation (10) [38].…”
Section: Circuit Realization Of the Fractional-order Memristormentioning
confidence: 99%
“…Figure 6 depicts the fractional-order memristor symbolic diagram. In Figure 3, the transfer function between terminals 1 and 2 can be calculated as shown in Equation (10) [38].…”
Section: Circuit Realization Of the Fractional-order Memristormentioning
confidence: 99%
“…The simulation results of the circuit are consistent with those of the numerical simulation. 1.1μF C [15,38]. The chain cell circuit is used to replace the capacitor in the common integration circuit to achieve fractional integration of order α = 0.9 , so we obtain ( ) Figure 3.…”
Section: Equivalent Circuit Of the Memristormentioning
confidence: 99%
“…On the other hand, a security problem, due to advanced modern communication technology, has recently emerged as a hot topic in the engineering applications [24,25], especially in autonomous vehicle platooning [26,27]. Since the control components such as sensors, controllers, and actuators are connected by the shared communication networks to achieve remote control, compromise by malicious adversaries is extremely risky [22,28,29].…”
Section: Introductionmentioning
confidence: 99%