2023
DOI: 10.1109/tcsii.2022.3212394
|View full text |Cite
|
Sign up to set email alerts
|

Generating n-Scroll Chaotic Attractors From a Memristor-Based Magnetized Hopfield Neural Network

Abstract: This brief presents a novel method to generate n-scroll chaotic attractors. First, a magnetized Hopfield neural network (HNN) with three neurons is modeled by introducing an improved multi-piecewise memristor to describe the effect of electromagnetic induction. Theoretical analysis and numerical simulation show that the memristor-based magnetized HNN can generate multi-scroll chaotic attractors with arbitrary number of scrolls. The number of scrolls can be easily changed by adjusting the memristor control para… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
30
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(30 citation statements)
references
References 26 publications
0
30
0
Order By: Relevance
“…With the deepening of research on chaotic image encryption technology, chaotic image encryption algorithms are mainly divided into three categories [ 17 , 18 ]. The first type is encryption by a self-synchronous stream cipher, which does not require an additional secure channel and is practical [ 19 , 20 , 21 , 22 , 23 ]. The second type is encryption related to plaintext; this scheme has no equivalent key, and it is difficult to crack, but the premise is that additional parameters, such as the hash value, need to be assumed to be transmitted through an additional secure channel, which is not practical.…”
Section: Introductionmentioning
confidence: 99%
“…With the deepening of research on chaotic image encryption technology, chaotic image encryption algorithms are mainly divided into three categories [ 17 , 18 ]. The first type is encryption by a self-synchronous stream cipher, which does not require an additional secure channel and is practical [ 19 , 20 , 21 , 22 , 23 ]. The second type is encryption related to plaintext; this scheme has no equivalent key, and it is difficult to crack, but the premise is that additional parameters, such as the hash value, need to be assumed to be transmitted through an additional secure channel, which is not practical.…”
Section: Introductionmentioning
confidence: 99%
“…Since then, chaos synchronization control has become a very active research topic [4][5][6][7][8][9][10][11][12][13][14][15][16], for example, projective synchronization control and hybrid function projective synchronization control. Many control methods have been used to synchronize different chaotic systems, such as feedback linearization method [17], optimal control [18], and neural network control [19][20][21][22][23][24]. However, few people study the problem of chaos synchronization on a finite time interval.…”
Section: Introductionmentioning
confidence: 99%
“…Chaos is a physical phenomenon highly sensitive to initial value. Its development and the related research have made great progress in just a few decades, meanwhile, the study of the chaotic system [1][2][3][4][5][6][7][8][9][10][11] has gradually expanded to weather, finance, communication and other fields. Due to the study of the chaotic system model, many different types of chaotic systems have been derived, such as the discrete chaotic system [12][13][14], the memristor chaotic system, the hyperchaotic system [15][16][17][18] and so on.…”
Section: Introductionmentioning
confidence: 99%