2020
DOI: 10.1109/access.2020.3035368
|View full text |Cite
|
Sign up to set email alerts
|

A Fractional-Order Chaotic System With Infinite Attractor Coexistence and its DSP Implementation

Abstract: In this paper, the fractional calculus is introduced into a simplest memristive circuit to construct a new four-dimensional fractional-order chaotic system. Combining conformable differential definition and Adomian decomposition method (ADM) algorithm is used to solve the numerical solution of the system. The attractor coexistence of the fractional-order system is investigated from the attractor phase diagram, coexistence bifurcation model, coexistence Lyapunov exponent spectrum and attractor basin. In additio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 52 publications
0
5
0
Order By: Relevance
“…The maximum error range of each parameter and initial value in the decryption process is obtained by numerical simulation, where q is -10 , 16 a i ( = i 1, 2, 4,...,8), x x , 1 2 are -10 15 and a , 3 x , 3 x 4 are -10 . 14 Therefore, the key space is ´´´» + ´+ 4 8 6 10 2 , 3 8 16 15 9 14 3 672 which is much larger than the theoretical key space value 2 100 [58] of the cryptosystem. In addition, the key space size of the designed scheme is compared with that in the existing literature [22,23,40], and the results are shown in table 3.…”
Section: Key Space Analysismentioning
confidence: 95%
See 2 more Smart Citations
“…The maximum error range of each parameter and initial value in the decryption process is obtained by numerical simulation, where q is -10 , 16 a i ( = i 1, 2, 4,...,8), x x , 1 2 are -10 15 and a , 3 x , 3 x 4 are -10 . 14 Therefore, the key space is ´´´» + ´+ 4 8 6 10 2 , 3 8 16 15 9 14 3 672 which is much larger than the theoretical key space value 2 100 [58] of the cryptosystem. In addition, the key space size of the designed scheme is compared with that in the existing literature [22,23,40], and the results are shown in table 3.…”
Section: Key Space Analysismentioning
confidence: 95%
“…In the encryption process, the closer the digital transmission distance of the encrypted data, the better the encryption performance. Through numerical simulations, histograms of plaintext Sailboat, Fruits and Pepper images in R, G and B channels are obtained, as shown in figure 12 (b3) = +x 2.6 10 , 3 14 (b4) = +x 2.8 10 , 4 14 (b5) = +q 0.74 10 , 16 (b6) = +a 10 10 , 1 14 (b7) = +a 5 10 . Table 3.…”
Section: Histogram Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The most common methods for solving fractional-order chaotic systems are frequency domain method (FDM) [48,49], predictor-corrector method (PCM) [50,51], and Adomian decomposition method (ADM) [52,53]. As a numerical resolution algorithm, ADM is more accurate than FDM and PCM numerically and theoretically [53].…”
Section: A Fractional-order a Chaotic Systemmentioning
confidence: 99%
“…Authors have been focusing on the numerical solutions of FPDEs with these novel fractional derivative operators over the past few years while considering a variety of fractional orders. According to the article (Liu et al, 2020), authors have developed a new four-dimensional fractional-order chaotic system using fractional calculus for the simplest memristive circuit. However, some authors, in the reference (Wang et al, 2022), have analyzed the numerical solution of travelling waves in chemical kinetics.…”
Section: Introductionmentioning
confidence: 99%