1. Generating Any Number of Initial Offset-Boosted Coexisting Chua’s Double-Scroll Attractors via Piecewise-Nonlinear Memristor
- Author
-
Xiaoping Wang, Chunbiao Li, Zhigang Zeng, Xuenan Peng, Jiahao Zheng, and Sen Zhang
- Subjects
Offset (computer science) ,Computer science ,Chaotic ,Memristor ,Topology ,law.invention ,Nonlinear Sciences::Chaotic Dynamics ,Controllability ,Nonlinear system ,Computer Science::Emerging Technologies ,Control and Systems Engineering ,law ,Attractor ,Piecewise ,Electrical and Electronic Engineering ,Multistability - Abstract
Due to the natural nonlinearity and unique memory characteristics, memristors are promising candidates for the construction of multi-scroll attractors having better application potential in the field of information encryption than the traditional double-scroll attractors. This paper proposes a novel memristive multi-double-scroll Chua's system (MMDSCS) via coupling a non-ideal flux-controlled memristor with multi-piecewise-linear memductance function in Chua's system directly. Specially, any number of multi-double-scroll chaotic attractors can be generated through adjusting the internal parameters of the memristor and without changing the original system's nonlinearity. Moreover, the amount of double scrolls is also closely related to the strength of the memristive coupling. Another highlight is that infinite initial offset-boosted coexisting Chua's double-scroll attractors with the same shape are produced with variation of the memristor initial conditions, indicating the emergence of an intriguing phenomenon of homogeneous extreme multistability. Furthermore, hardware experiments based on the field-programmable gate array (FPGA) are carried out to confirm the numerical simulations. Finally, an image encryption scheme is designed based on the memristor initial offset boosting dynamics. In comparison with the existing memristive Chua's systems, the proposed MMDSCS has many merits, such as memristor initial-controlled chaotic sequences with controllability and high security performance, which is more practical in applications.
- Published
- 2022