2023
DOI: 10.3390/electronics12132818
|View full text |Cite
|
Sign up to set email alerts
|

A Novel 3-D Jerk System, Its Bifurcation Analysis, Electronic Circuit Design and a Cryptographic Application

Sundarapandian Vaidyanathan,
Alain Soup Tewa Kammogne,
Esteban Tlelo-Cuautle
et al.

Abstract: This paper introduces a new chaotic jerk system with three cubic nonlinear terms. The stability properties of the three equilibrium points of the proposed jerk system are analyzed in detail. We show that the three equilibrium points of the new chaotic jerk system are unstable and deduce that the jerk system exhibits self-excited chaotic attractors. The bifurcation structures of the proposed jerk system are investigated numerically, showing period-doubling, periodic windows and coexisting bifurcations. An elect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 35 publications
0
7
0
Order By: Relevance
“…An equilibrium point of system (14) has the form E(x 0 , 0, 0), where x 0 is a solution of the equation βX + sX 2 + O(X 3 ) = 0. A solution is x 1 = 0, and the others satisfy F(β, X) = 0 near (0, 0), where F(β, X) = β + sX + X 2 ϕ(X, β).…”
Section: Approximate Normal Forms For the Transcritical Bifurcationmentioning
confidence: 99%
See 1 more Smart Citation
“…An equilibrium point of system (14) has the form E(x 0 , 0, 0), where x 0 is a solution of the equation βX + sX 2 + O(X 3 ) = 0. A solution is x 1 = 0, and the others satisfy F(β, X) = 0 near (0, 0), where F(β, X) = β + sX + X 2 ϕ(X, β).…”
Section: Approximate Normal Forms For the Transcritical Bifurcationmentioning
confidence: 99%
“…Bifurcations of particular jerk systems were analyzed (see, e.g., [7][8][9][10][11]). Moreover, new chaotic jerk systems were recently reported (see, e.g., [12][13][14]).…”
Section: Introductionmentioning
confidence: 99%
“…Hence, the key must satisfy various criteria, encompassing considerations such as length, space, and complexity [10,11]. This implies that the user-inputted key for image encryption needs preprocessing to generate a more intricate form, such as a pseudorandom sequence [12]. However, these keys can also be changed by simply performing standard operations, such as rearranging the image stream [13].…”
Section: Introductionmentioning
confidence: 99%
“…can model processes characterized by changes in acceleration. Despite their simple form, jerk systems provide examples of chaotic behavior (see, e.g., [2][3][4]). Bifurcations in the dynamics of jerk systems are also analyzed (see, e.g., [5][6][7][8]).…”
Section: Introductionmentioning
confidence: 99%