scholarly journals Synchronization Phenomena in Coupled Birkhoff-Shaw Chaotic Systems Using Nonlinear Controllers

Author(s):  
Christos K. Volos ◽  
Hector E. Nistazakis ◽  
Ioannis M. Kyprianidis ◽  
Ioannis N. Stouboulos ◽  
George S. Tombras
2014 ◽  
Vol 2014 ◽  
pp. 1-17 ◽  
Author(s):  
Cheng-Hsiung Yang ◽  
Cheng-Lin Wu

Recently many chaotic systems’ circuits are designed to generate phenomenon of chaos signals. The ability to synchronize chaotic circuits opens a great number of ways to use them in application signals masking. In this paper, first a new nonlinear chaotic dynamical system had be design, analyze and build circuit. Second, using GYC, partial region stability theory is applied to adaptive control for two identical chaotic systems with uncertain parameters. The results of numerical simulation are performed to verify examples of the proposed nonlinear controllers.


2004 ◽  
Vol 10 (7) ◽  
pp. 979-993 ◽  
Author(s):  
Ahmad M. Harb ◽  
Issam A. Smadi

In this paper, we introduce the control of the strange attractor, chaos. Because of the importance of controlling undesirable behavior in systems. researchers are investigating the use of linear and nonlinear controllers, either to remove such oscillations (in power systems) or to match two chaotic systems (in secure communications). The idea of using the fuzzy logic concept for controlling chaotic behavior is presented. There are two good reasons for using fulzy control: first, there is no mathematical model available for the process; secondly. it can satisfy nonlinear control that can be developed empirically. without complicated mathematics. The two systems are well-known models so the first reason is not a big problem. and we can take advantage of the second reason.


Author(s):  
Sayyed Rouhollah Jafari Tafti ◽  
Yousha Radparvar ◽  
Hassan Salarieh ◽  
Aria Alasty

In this paper, a new method for tracking a desired path in nonlinear chaotic systems is presented. This method is based on using fuzzy gain scheduling in designing PID controller and Lead compensator. Using two standard controllers, PID and Lead, instead of complicated and costly nonlinear controllers is the main advantage of the proposed control system. PID controller has a stabilizing role whereas Lead compensator improves the performance of the system to track the desired path properly. To determine the PID and Lead gains, the nonlinear system is linearized around some working points which are the points of the desired path in specified times, and the gains are designed for each linearized system. Using a Sugeno system as a fuzzy gain scheduler, PID and Lead gains are determined in each time and are applied to the control system to make the nonlinear system track the desired path. To verify the presented method, Duffing equation as a chaotic system is considered to be controlled to which the proposed procedure is applied. Simulation results show the effectiveness of fuzzy gain scheduling in making the nonlinear system track different desired paths more smoothly.


2015 ◽  
Vol 9 (6) ◽  
pp. 568
Author(s):  
Ahmad Al-Jarrah ◽  
Mohammad Ababneh ◽  
Suleiman Bani Hani ◽  
Khalid Al-Widyan

Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


Sign in / Sign up

Export Citation Format

Share Document