2021
DOI: 10.1049/cds2.12066
|View full text |Cite
|
Sign up to set email alerts
|

Jerk forms dynamics of a Chua’s family and their new unified circuit implementation

Abstract: A scheme to implement the Jerk form of the Chua system family using a controllable canonical form applied in linear systems is proposed. The main thought is that the nonlinear function with a single independent variable input can be superposed by a multiple linear function, which is regarded as the input of the system, and its single variable is regarded as the output of the system. Its state space could be reconstructed into the controllable canonical form. The output after transformation is fed back to the n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 44 publications
0
2
0
Order By: Relevance
“…In order to find out the sensitivity of the parameter b of Equations (24) to image secure communication between multi-UAV based on the hybrid coupling synchronization, add Equation ( 24) to the end of Equation ( 23); according to Figure 9, fix the parameters a ¼ A ¼ 10, c ¼ 8=3 and refer to the flow chart Figure 12; some experimental results of the image decryption with parameter b under different errors of any unknown UAV are shown in Figure 15.…”
Section: Security Analysis On the Encrypted Image Forwarded In Multi-uavmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to find out the sensitivity of the parameter b of Equations (24) to image secure communication between multi-UAV based on the hybrid coupling synchronization, add Equation ( 24) to the end of Equation ( 23); according to Figure 9, fix the parameters a ¼ A ¼ 10, c ¼ 8=3 and refer to the flow chart Figure 12; some experimental results of the image decryption with parameter b under different errors of any unknown UAV are shown in Figure 15.…”
Section: Security Analysis On the Encrypted Image Forwarded In Multi-uavmentioning
confidence: 99%
“…In order to make the fractional part of iterative sequences sufficiently random, the scale expansion 24 of the iterative Equations () should be sufficiently large, k is the scale factor. T is its adjustable iteration time.…”
Section: Image Secure Communication Based On the Hybrid Global Synchr...mentioning
confidence: 99%