2018
DOI: 10.1142/s0218127418500323
|View full text |Cite
|
Sign up to set email alerts
|

Constructing Chaotic Systems from a Class of Switching Systems

Abstract: This paper aims to develop an approach for constructing chaotic systems from a class of linear continuous-time switching systems. First, the Shilnikov criterion is analyzed and extended to the switching systems. Then some kinds of “swing planes” are provided via a heteroclinic loop design, which act as switching planes to chaotify the systems. Furthermore, a numerical example is presented to validate the proposed principle and implementation scheme. The theoretical analysis and numerical simulation have demons… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…Throughout the perturbed nonlinear chaotic systems study, unaccustomed aspects have been highlighted. Thereby, such systems are characterized by their strong sensitivity to initial conditions [29], [49].…”
Section: Lemma 2 [43]mentioning
confidence: 99%
“…Throughout the perturbed nonlinear chaotic systems study, unaccustomed aspects have been highlighted. Thereby, such systems are characterized by their strong sensitivity to initial conditions [29], [49].…”
Section: Lemma 2 [43]mentioning
confidence: 99%
“…The associate editor coordinating the review of this manuscript and approving it for publication was Huan Zhou. at the network edge [6]. The cloud server is in charge of managing and monitoring the fog nodes and the entire network [7], [8]. In such an application scenario, the user and the in-vehicle navigation device generate a large amount of interaction, for example, the user may need the smart navigation device to personalize the content (bar, restaurant, and supermarket) that is of interest to the user [9].…”
Section: Introductionmentioning
confidence: 99%
“…For the commercial and military applications, secure and reliable communications are crucial for maintaining data dependability and confidentiality [ 3 ]. In recent years, many security aspects in WSN have been reconsidered, such as routing, localization, data fusion and access control [ 4 , 5 , 6 , 7 ]. We take the secure routing as an example.…”
Section: Introductionmentioning
confidence: 99%