Chaos An Interdisciplinary Journal of Nonlinear Science,
Journal Year:
2024,
Volume and Issue:
34(7)
Published: July 1, 2024
In
this
study,
considering
a
bi-stable
plasma
model
with
slow
parametric
excitation,
the
bifurcation
of
periodic
and
chaotic
responses
as
well
resulting
fast-slow
motions
is
discussed
analytically
numerically.
For
nonautonomous
fast
sub-system,
generalized
harmonic
balancing
method
utilized
to
obtain
an
averaged
system.
Bifurcation
analysis
about
system
shows
that
critical
manifolds
form
S-shape
structure.
Meanwhile,
supercritical
subcritical
period
doubling
(PD)
occurs
on
upper
branch
simultaneously.
As
frequency
external
excitation
changes,
points
limit
cycle
can
present
different
relative
locations.
Moreover,
additional
structure
induced
by
Cusp
emanates
from
branch.
On
other
hand,
existence
attractor
corresponding
boundary
crisis
phenomenon
are
verified
using
Melnikov
basin
attraction.
The
structures
numerical
diagram
show
good
agreements
analytical
results.
Considering
two
cases
low-frequency
dynamics
discussed.
It
found
that,
when
flow
passing
PD
point,
low
magnitudes
will
lead
patterns
delay,
i.e.,
typical
one
excessive
which
suppress
PD.
for
passage
effects
no
distinct
influence.
Thus,
three
transition
mechanisms
based
explained,
including
"fold
cycle-fold
cycle"
type,
cycle-delayed
PD"
cycle-boundary
crisis"
type.
Physica Scripta,
Journal Year:
2024,
Volume and Issue:
99(8), P. 085226 - 085226
Published: July 4, 2024
Abstract
The
study
of
neuron
model
under
electromagnetic
radiation
is
significant
for
learning
brain
principles
and
treating
mental
diseases.
In
this
paper,
a
novel
discrete
locally
active
memristor(DLAM)
designed
its
characteristics
are
investigated
thoroughly.
Then,
the
DLAM
used
to
imitate
stimulate
Aihara
neuron,
called
EMR-Aihara
model.
equilibrium
point
analyzed.
Dynamical
studied
by
means
phase
diagram,
iteration
sequence,
bifurcation
Lyapunov
Exponent
spectrum(LEs),
Kolmogorow
entropy(KE)
Spectral
Entropy(SE)
complexity.
With
these
analysis
methods,
rich
dynamical
behaviors
firing
patterns
discovered
from
map,
including
hyperchaos,
chaos
period.
addition,
complex
multistability
state
transition
phenomena
concerning
various
attractors
modes
observed.
This
map
implemented
in
digital
circuit
DSP
platform
as
well,
confirming
physical
availability
can
simulate
biological
apply
image
encryption.
International Journal of Bifurcation and Chaos,
Journal Year:
2024,
Volume and Issue:
34(11)
Published: Aug. 24, 2024
In
this
paper,
a
novel
discrete
flux-controlled
generalized
memristor
is
proposed
to
be
used
in
Electromagnetic
Radiation
(EMR)
KTz
neuron.
The
introduction
of
can
simulate
the
behavior
changes
neuron
under
EMR.
stability
EMR
Neuron
(EKN)
map
discussed,
and
fixed
point
system
characterized.
With
change
parameters,
complex
rich
dynamical
characteristics
EKN
are
demonstrated.
firing
patterns
different
initial
values
also
investigated,
discharge
waveforms
similar
general
shape
structure
human
heart
brain
disease
phenomena
analyzed.
Finally,
hardware
implementation
verified
on
Digital
Signal
Processing
(DSP)
platform.
results
show
that
these
findings
great
value
for
practical
applications
neural
networks,
with
theoretical
basis
provided.
Mathematics,
Journal Year:
2024,
Volume and Issue:
12(13), P. 1990 - 1990
Published: June 27, 2024
With
the
fast
growth
of
information
technology
(IT),
safety
image
transmission
and
storing
images
are
becoming
increasingly
important.
Traditional
encryption
algorithms
have
certain
limitations
in
security,
so
there
is
an
urgent
need
for
a
secure
reliable
algorithm.
A
universal
compression
sensing
(CS)
(IE)
algorithm
based
on
DNA-triploid
mutation
(DTM)
presented
this
paper.
Firstly,
by
using
CS
algorithm,
compressed
while
obtaining
range
chaotic
sequences
iteration
map.
Then,
DNA
generated
encoding
and,
DTM,
new
mutant
according
to
specific
rules.
Next,
operated
at
level
perform
confusion
diffusion
operations
ensure
security
data.
Finally,
decoding
carried
out
obtain
encrypted
image.
The
simulation
results
show
that
can
effectively
complete
decryption
images.
performance
test
has
sufficiently
large
key
space
10587.
entropy
cipher
close
8.
In
summary,
both
experiments
tests
fully
high
reliability
proposed
protecting
privacy
achieved.