2010
DOI: 10.1142/s0218127410026514
|View full text |Cite
|
Sign up to set email alerts
|

Implementing Memristor Based Chaotic Circuits

Abstract: This paper provides a practical implementation of a memristor based chaotic circuit. We realize a memristor using off-the-shelf components and then construct the memristor along with the associated chaotic circuit on a breadboard. The goal is to construct a physical chaotic circuit that employs the four fundamental circuit elements — the resistor, capacitor, inductor and the memristor. The central concept behind the memristor circuit is to use an analog integrator to obtain the electric flux across the memrist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
291
0
3

Year Published

2013
2013
2021
2021

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 559 publications
(296 citation statements)
references
References 12 publications
2
291
0
3
Order By: Relevance
“…which make system (1) chaotic [22,23]. Figure 1 shows the chaotic phenomenon of this system with the initial condition (V 1 (0), V 2 (0), (0), (0)) = (0.1302, 0.0924, 0.0078, 0.1253) .…”
Section: Memristor Based Chaotic Circuit and Its Equivalent Formmentioning
confidence: 99%
See 3 more Smart Citations
“…which make system (1) chaotic [22,23]. Figure 1 shows the chaotic phenomenon of this system with the initial condition (V 1 (0), V 2 (0), (0), (0)) = (0.1302, 0.0924, 0.0078, 0.1253) .…”
Section: Memristor Based Chaotic Circuit and Its Equivalent Formmentioning
confidence: 99%
“…Muthuswamy [22] provided a practical implementation of a memristor based chaotic circuit. By applying impulsive control theory, Yang et al [23] obtained some sufficient conditions for the asymptotic stabilization and synchronization of the memristor based chaotic system shown in [22].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…[12][13][14][15][16][17][18] • Provide perfect security via the key size, which can be tuned to match the message length.…”
Section: Introductionmentioning
confidence: 99%