scholarly journals Controlling Discrete Time T-S Fuzzy Chaotic Systems via Adaptive Adjustment

2012 ◽  
Vol 24 ◽  
pp. 1915-1921 ◽  
Author(s):  
Yibei Nian ◽  
Yongai Zheng
2009 ◽  
Vol 2009 ◽  
pp. 1-12 ◽  
Author(s):  
Marcio Eisencraft ◽  
Renato D. Fanganiello ◽  
Luiz A. Baccala

Over the last couple of decades, many methods for synchronizing chaotic systems have been proposed with communications applications in view. Yet their performance has proved disappointing in face of the nonideal character of usual channels linking transmitter and receiver, that is, due to both noise and signal propagation distortion. Here we consider a discrete-time master-slave system that synchronizes despite channel bandwidth limitations and an allied communication system. Synchronization is achieved introducing a digital filter that limits the spectral content of the feedback loop responsible for producing the transmitted signal.


2022 ◽  
Author(s):  
Wenhao Yan ◽  
Zijing Jiang ◽  
Qun Ding

Abstract The physical implementation of continuoustime memristor makes it widely used in chaotic circuits, whereas discrete-time memristor has not received much attention. In this paper, the backward-Euler method is used to discretize TiO2 memristor model, and the discretized model also meets the three fingerprinter characteristics of the generalized memristor. The short period phenomenon and uneven output distribution of one-dimensional chaotic systems affect their applications in some fields, so it is necessary to improve the dynamic characteristics of one-dimensional chaotic systems. In this paper, a two-dimensional discrete-time memristor model is obtained by linear coupling the proposed TiO2 memristor model and one-dimensional chaotic systems. Since the two-dimensional model has infinite fixed points, the stability of these fixed points depends on the coupling parameters and the initial state of the discrete TiO2 memristor model. Furthermore, the dynamic characteristics of one-dimensional chaotic systems can be enhanced by the proposed method. Finally, we apply the generated chaotic sequence to secure communication.


2017 ◽  
Vol 90 (3) ◽  
pp. 1519-1533 ◽  
Author(s):  
Ouerdia Megherbi ◽  
Hamid Hamiche ◽  
Saïd Djennoune ◽  
Maamar Bettayeb

Sign in / Sign up

Export Citation Format

Share Document