Chapter 4
Design of Fractional-Order Controllers for Nonlinear Chaotic Systems and Some Applications

4.1 Fractional-Order Control for a Novel Chaotic System Without Equilibrium

4.1.1 Problem Statement

In this section, a novel chaotic system will be proposed by only considering the straight-line position c04-math-001 and the pitch angle c04-math-002 of the two-wheeled self-balancing robot of Googol Technology. A mathematical model related to the two-wheeled self-balancing robot of Googol Technology was established by Son and Anh [208]. The linear mathematical model for c04-math-003 and c04-math-004 of the two-wheeled self-balancing robot of Googol Technology is described in the form of

where c04-math-006 denotes the pitch torque.

To transform the linear mathematical model into a chaotic system, we consider c04-math-007 as a nonlinear term c04-math-008, which will be given in next section.

Considering the nonlinear function c04-math-009 and the control input c04-math-010, Equation (4.1) can be described as

where the control input c04-math-012.

In this chapter, we aim to construct a novel chaotic system without equilibrium and to develop a fractional-order control scheme, so that the stabilization of the whole closed-loop system, including the novel chaotic system and the control input, is realized based on the designed control strategy. Under the designed fractional-order controller, the state variables of the closed-loop system are asymptotically stable.

In Chapter 2, three types of fractional calculus definitions were introduced. According to the different types of fractional calculus, some important control schemes have been proposed. ML stability theorems have been proposed [209–211] for fractional-order systems. The stability theorem was developed for fractional differential system with the RL derivative [212–214]. In this chapter, a control scheme based on the fractional-order controller will be designed using the Caputo definition (2.17), with the lower limit of the integral as c04-math-013 and fractional order c04-math-014.

4.1.2 Design of Chaotic System and Circuit Implementation

In this chapter, a novel chaotic system without equilibrium has been constructed based on the linear mathematical model (4.1) of the two-wheeled self-balancing robot. For this case, the proposed novel chaotic system can be regarded as an open-loop system of the system (4.2). Furthermore, the chaotic circuit is designed to address the physical realizability of the proposed chaotic system.

4.1.2.1 A Novel Chaotic System

From Equation (4.2), the novel chaotic system can be described as follows:

where c04-math-016 is the state vector of the nonlinear system with c04-math-017, c04-math-018, c04-math-019 and c04-math-020. The nonlinear function c04-math-021 is given by

where c04-math-023 and c04-math-024 are constants. When c04-math-025 and c04-math-026, we obtain the Lyapunov exponents c04-math-027, c04-math-028, c04-math-029, and c04-math-030 by calculating for the initial conditions c04-math-031. Obviously, the system (4.3) is a chaotic system under such case because c04-math-032, c04-math-033, c04-math-034, and c04-math-035. On the basis of the system (4.3) and the mentioned parameter values, the simulation results are further presented as shown in Figure 4.1. In addition, to further reflect the properties of chaos, the Poincaré map is shown in Figure 4.2.

Geometrical representation of Chaotic behaviors of the novel chaotic system.

Figure 4.1 Chaotic behaviors of the novel chaotic system: (a) c04-math-036c04-math-037 plane; (b) c04-math-038c04-math-039 plane; (c) c04-math-040c04-math-041 plane; (d) c04-math-042c04-math-043c04-math-044 space.

Geometrical representation of Poincaré map in the x2-x3 plane.

Figure 4.2 Poincaré map in the c04-math-045c04-math-046 plane.

To solve the equilibrium of system (4.3), we let c04-math-047, c04-math-048, c04-math-049, and c04-math-050; this gives

According to system (4.5), we obtain that there is no equilibrium in system (4.3). Furthermore, we ensure that the system (4.3) is dissipative with the following exponential contraction rate of the exponential function c04-math-052:

with

4.7 equation

4.1.2.2 Circuit Implementation

To further illustrate the physical realizability of the proposed novel chaotic system (4.3), the system circuit is designed. By using resistors, capacitors, and operational amplifiers (TL082), the designed circuit of the chaotic system is shown in Figure 4.3. According to Figure 4.3, the circuit equation of the chaotic system is described as follows:

By comparing system (4.3) with system (4.8), it can be deduced that all resistance values c04-math-056, c04-math-057, c04-math-058, c04-math-059, c04-math-060, c04-math-061, c04-math-062, c04-math-063, c04-math-064, c04-math-065, c04-math-066, and c04-math-067 are 10 kc04-math-068, c04-math-069 and c04-math-070 are 1 Mc04-math-071, c04-math-072, c04-math-073, and c04-math-074 are 21.7514 kc04-math-075, c04-math-076, c04-math-077, and c04-math-078 are 5.251715 kc04-math-079, c04-math-080 is 42.2474 kc04-math-081, c04-math-082 is 8.031303 kc04-math-083, c04-math-084 is 435.02849 kc04-math-085, and c04-math-086 is 105.0343 kc04-math-087. The voltage values are c04-math-088 V and c04-math-089 V. To speed up the circuit response time, we make a time-scale transformation by multiplying by a factor of 100 on the right-hand-side of system (4.3); the capacitance values c04-math-090, c04-math-091, c04-math-092, and c04-math-093 are then 10 nF. In Figure 4.3, c04-math-094 are operational amplifiers, where c04-math-095 is a unity-gain multiplier.

Scheme for Circuit of the novel chaotic system.

Figure 4.3 Circuit of the novel chaotic system (4.3).

From the designed circuit of the chaotic system (4.3), experimental circuit phase portraits are presented in Figure 4.4. Comparing Figure 4.1 and Figure 4.4, we observe that there is consistency between numerical simulations and circuit experimental simulations; the circuit simulation results prove the physical realizability of the proposed novel chaotic system (4.3).

Geometrical representation of Chaotic behaviors of the chaotic circuit: (a) x1-x2 plane; (b) x1-x3 plane; (c) x1-x4 plane.

Figure 4.4 Chaotic behaviors of the chaotic circuit: (a) c04-math-096c04-math-097 plane; (b) c04-math-098c04-math-099 plane; (c) c04-math-100c04-math-101 plane.

4.1.3 Design of Fractional-Order Controller and Stability Analysis

In this section, the control scheme will be proposed for the whole closed-loop system including the constructed chaotic system (4.3) and a fractional-order controller. The goal is to guarantee the stabilization of the closed-loop system under the proposed fractional-order controller.

From Equations (4.3) and (4.4), the chaotic system can be rewritten as

where

equation

with c04-math-103 the state vector, and

equation

According to the chaotic system (4.9) and considering the control input c04-math-104, the corresponding system can be written in the following form:

where c04-math-106 is the designed fractional-order control input.

Based on the state-feedback control method, the controller c04-math-107 is defined as

where c04-math-109 is a design control gain matrix and the fractional order satisfies c04-math-110.

According to Equations (4.10) and (4.11), one has

To render the stabilization of the closed-loop system (4.12) under the proposed controller (4.11), the following assumption is required.

The fractional-order controller based control scheme for the system (4.10) can be summarized in the following theorem.

4.1.4 Numerical Simulation

In this section, to illustrate and verify the effectiveness of the proposed control scheme, the closed-loop system (4.12) is analyzed. Furthermore, we use the proposed control scheme to stabilize chaotic systems with equilibrium, such as the Chen system [216], Genesio's system [217] and the hyperchaotic Lorenz system [218].

4.1.4.1 Novel Chaotic System

Combining the novel chaotic system (4.3) with the designed controller (4.11), we have the following:

The equilibrium of system (4.23) is obtained by solving c04-math-153, c04-math-154, c04-math-155, and c04-math-156, which gives the following:

According to system (4.24), we obtain that c04-math-158 is the equilibrium of the system (4.23). Furthermore, when the design parameters c04-math-159, c04-math-160, c04-math-161, and c04-math-162 satisfy c04-math-163, c04-math-164, c04-math-165, and c04-math-166, we can guarantee that the equilibrium c04-math-167 is a stable equilibrium based on the stability analysis method of the equilibrium [164]. From Equation (4.23), we have

4.25 equation

which implies that c04-math-169 satisfies Assumption 4.1. On the basis of Theorem 4.1 and the pole placement technique, the feedback control gain matrix c04-math-170 and the order c04-math-171 are chosen as

4.26 equation

From this discussion, we have c04-math-173, c04-math-174, and c04-math-175; the conditions of Theorem 4.1 are satisfied. The simulation results are shown in Figure 4.5 and Figure 4.6. According to the numerical simulation results, the closed-loop system (4.23) is asymptotically stable, which implies that the proposed control scheme works effectively.

Illustration of Numerical simulation results of the system.

Figure 4.5 Numerical simulation results of the system (4.23).

Illustration of Control inputs of the system.

Figure 4.6 Control inputs of the system (4.23).

4.1.4.2 Chaotic Systems with Equilibrium

To further illustrate the effectiveness of the developed control scheme in this chapter, we use the proposed control scheme (4.11) to control the Chen system [216], Genesio's system [217], and the hyperchaotic Lorenz system [218]. We first analyze the following dynamic model of the Chen system [216]:

From Equation (4.11), the control input c04-math-177 is designed for the Chen system as follows:

Invoking system (4.27), we have

where c04-math-180. According to Equation (4.29), the nonlinear function in (4.27) can satisfy Assumption 4.1. Therefore, the Chen system (4.27) can be stabilized to zero by choosing appropriate parameters c04-math-181, c04-math-182, and c04-math-183.

Genesio's system is written as follows:

To control Genesio's system (4.30), the control input c04-math-185 can be designed based on Equation (4.11), as follows:

From system (4.30), we obtain

where c04-math-188.

The nonlinear function in system (4.30) can satisfy Assumption 4.1 based on Equation (4.32). Thus, Genesio's system (4.30) can be stabilized to zero under the appropriate parameters c04-math-189, c04-math-190, and c04-math-191.

The hyperchaotic Lorenz system is given as follows:

Combining the hyperchaotic Lorenz system (4.33) and the control law (4.11), the control input c04-math-193 is written as follows:

According to system (4.33), we have

where c04-math-196.

On the basis of Equation (4.35), Assumption 4.1 is satisfied for the nonlinear function in system (4.33). By choosing appropriate parameters c04-math-197, c04-math-198, c04-math-199, and c04-math-200, the stabilization of the hyperchaotic Lorenz system (4.33) can be realized.

According to the this discussion and analysis, we obtain that the Chen system (4.27), Genesio's system (4.30), and the hyperchaotic Lorenz system (4.33) are controlled using the control scheme described in this chapter. For the numerical simulation of the Chen system (4.27), we choose the control parameters c04-math-201, c04-math-202, and c04-math-203, the initial conditions c04-math-204, and the fractional order c04-math-205. For the numerical simulation of Genesio's system (4.30), we set the control parameters c04-math-206, c04-math-207, and c04-math-208, the initial conditions c04-math-209, and the fractional order c04-math-210. In the numerical simulation of the hyperchaotic Lorenz system (4.33), the control parameters are designed as c04-math-211, c04-math-212, c04-math-213, and c04-math-214, the initial conditions are assumed as c04-math-215, and the fractional order is chosen as c04-math-216.

On the basis of the given simulation conditions, the numerical results are presented in Figure 4.7, Figure 4.8, Figure 4.9, Figure 4.10, Figure 4.11, and Figure 4.12 for the Chen system (4.27), Genesio's system (4.30), and the hyperchaotic Lorenz system (4.33), respectively. The control results of the Chen system (4.27) are shown in Figure 4.7. It is shown that good control performance is obtained under the designed controller (4.28). Figure 4.8 presents the control inputs (4.28). The numerical simulation results of Genesio's system (4.30) are given in Figure 4.9 and Figure 4.10. Figure 4.9 and Figure 4.10 show that the controller (4.31) can stabilize Genesio's system (4.30) well. Finally, Figure 4.11 and Figure 4.12 show that the fractional-order controller (4.34) can control all state variables of the hyperchaotic Lorenz system (4.33) to the origin. Therefore, all the simulation results show that the fractional-order controller can also control the chaotic and hyperchaotic systems with equilibrium.

Illustration of Stabilization of Chen system.

Figure 4.7 Stabilization of Chen system (4.27).

Illustration of Control inputs of Chen system.

Figure 4.8 Control inputs of Chen system (4.27).

Illustration of Stabilization of Genesio's system.

Figure 4.9 Stabilization of Genesio's system (4.30).

Illustration of Control inputs for Genesio's system.

Figure 4.10 Control inputs for Genesio's system (4.30).

Illustration of Stabilization of hyperchaotic Lorenz system.

Figure 4.11 Stabilization of hyperchaotic Lorenz system (4.33).

Illustration of Control inputs for hyperchaotic Lorenz system.

Figure 4.12 Control inputs for hyperchaotic Lorenz system (4.33).

4.2 Application of Chaotic System without Equilibrium in Image Encryption

On the basis of the proposed chaotic system without equilibrium (4.3), the image encryption scheme is developed in this section. Generally, the security will be better if the encrypted image is very fuzzy. The analysis of the effect of encryption for the image encryption scheme [219] will be given by the following four aspects:

  1. 1. Histogram analysis. The histogram of the image is an important statistical characteristic of the image, and is the approximation of the density function of the gray image.
  2. 2. Correlation of two adjacent pixels. Each pixel of any image has a high correlation with its adjacent pixels, either horizontally, vertically, or diagonally. The correlation of two adjacent pixels can be presented in a diagram. Furthermore, the correlation coefficient of each pair of pixels can also be calculated via the following formulas [219]:
    4.36 equation
    4.37 equation
    4.38 equation
    4.39 equation
  3. where c04-math-221 and c04-math-222 are the gray values of two adjacent pixels in the image, c04-math-223 denotes the expectation, c04-math-224 denotes the variance, c04-math-225 denotes the covariance, c04-math-226 denotes the total number of adjacent pairs of pixels, and c04-math-227 denotes the correlation coefficient of two adjacent pixels.
  4. 3. Anti-attack ability of image encryption scheme. The anti-attack ability is analyzed by the recovery level of the broken image.
  5. 4. Sensitivity of keys. A good encryption algorithm should be sensitive to a secret key. Small changes in the decryption key will lead to failed decrypted images.

4.2.1 Image Encryption Scheme

According to the chaotic sequences of the chaotic system without equilibrium (4.3), pixel substitution, and pixel value scrambling methods, the image encryption scheme is given for an image (the size is c04-math-228, where c04-math-229 and c04-math-230 represent the rows and columns of the image). The steps for the encryption algorithm are as follows:

  1. 1. Assume a random value c04-math-231 as the initial condition of the chaotic system without equilibrium (4.3). Then four groups of chaotic time sequences with good stochastic properties are obtained.
  2. 2. Select a group of chaotic time sequences from the given four groups of chaotic time sequences. Then a subsequence is designed, based on the selected chaotic time sequence, where the size of the subsequence is c04-math-232. Moreover, a new sequence of integers is given according to the subsequence, where the sequence of integers is set as c04-math-233.
  3. 3. The pixel values of the origin image are loaded. Then the time sequence of pixel values (c04-math-234) is then translated into the binary serialization.
  4. 4. The elements in c04-math-235 and c04-math-236 are handled by the xor method for each of c04-math-237 and c04-math-238. Then a new time sequence c04-math-239 is obtained and the binary serialization is translated into decimal format.
  5. 5. Select another group of chaotic time sequence from the given four groups of chaotic time sequences. Then a subsequence c04-math-240 is designed based on the selected chaotic time sequence, where the size of the subsequence is c04-math-241. Furthermore, the subsequence c04-math-242 is further tackled by c04-math-243.
  6. 6. A group of new natural sequences c04-math-244 is added. Then the elements in c04-math-245 are initialized, that is, c04-math-246. The following processing procedure for the element c04-math-247 is given as: (1) select the element c04-math-248 in c04-math-249. Then the c04-math-250th element in c04-math-251 is exchanged by the c04-math-252th element; (2) the exchanged element is moved back c04-math-253 positions.
  7. 7. A new time sequence c04-math-254 is obtained based on the given time sequences c04-math-255 and c04-math-256. Then the new time sequence c04-math-257 is translated into a replacement matrix c04-math-258.
  8. 8. Setting the replacement matrix c04-math-259 as the mapping address table, and the address of elements for the matrix c04-math-260 are rearranged. Then a new pixel matrix c04-math-261 is obtained. Therefore, the image encryption scheme is realized.

4.2.2 Histogram Analysis

We assume that the size of the original image is c04-math-262 and the range of gray levels for each pixel is 0–255. The original image is presented in Figure 4.13a. The initial condition of the chaotic system without equilibrium (4.3) is chosen as c04-math-263. Then four groups of chaotic time sequences are obtained by numerical simulation. The chaotic time sequence c04-math-264c04-math-265 is selected as the subsequence c04-math-266 and the original image is encrypted using the pixel substitution method. Furthermore, we select the chaotic time sequence c04-math-267c04-math-268 as the replacement matrix c04-math-269. Finally, the fully encrypted image is shown in Figure 4.14a.

Illustration of (a) Original image (a); (b) corresponding gray distribution histogram.

Figure 4.13 (a) Original image; (b) corresponding gray distribution histogram.

Illustration of (a) Encrypted image; (b) corresponding gray distribution histogram.

Figure 4.14 (a) Encrypted image; (b) corresponding gray distribution histogram.

Figure 4.13b and Figure 4.14b show the corresponding gray distributions of the original image and the image encrypted using the designed algorithm, respectively. The results from Figure 4.13 and Figure 4.14 indicate that the image encryption scheme is valid, that is: (i) the encrypted image in Figure 4.14a is totally different from the original image (Figure 4.13a); (ii) the statistical characteristics of the encrypted image in Figure 4.14b are also different from those of the original image (Figure 4.13b).

4.2.3 Correlation of Two Adjacent Pixels

Figure 4.15a and Figure 4.15b show the correlations of two horizontal adjacent pixels for the original and encrypted images, respectively. Also, Table 4.1 presents the correlation coefficient of the encrypted image and the original image. It is obvious that the correlation coefficient of the encrypted image in any direction is approximately equal to zero. As a result, the correlated relationship is very low.

Illustration of Correlations of two horizontal adjacent pixels: (a) in original image; (b) in encrypted image.

Figure 4.15 Correlations of two horizontal adjacent pixels: (a) in original image; (b) in encrypted image.

Table 4.1 Correlation coefficients in original and encrypted images

Original image Encrypted image
Horizontal 0.7467 c04-math-270
Vertical 0.8319 c04-math-271
Diagonal 0.3468 c04-math-272

4.2.4 Anti-Attack Ability of Image Encryption Scheme

Take the cropping attack as the analysis object. We assume that the intermediate region is attacked (the size is c04-math-273) or that the boundary area is attacked (the size is c04-math-274), as shown in Figure 4.16. Then the decrypted image, as shown in Figure 4.17, can also present the shape of the original image. Furthermore, Figure 4.17 is further handled by a median filter algorithm. The restored image is shown in Figure 4.18, which shows that a better restored effect is presented. It is obvious from Figure 4.16, Figure 4.17, and Figure 4.18 that the attacked image can also be restored using the designed image encryption scheme.

Illustration of cropped Attacked images.

Figure 4.16 Attacked images.

Illustration of cropped Decrypted images.

Figure 4.17 Decrypted images.

Illustration of cropped Restored images.

Figure 4.18 Restored images.

4.2.5 Sensitivity Analysis of Key

Key sensitivity is an essential property for any good cryptosystem, and ensures the security of the cryptosystem against brute-force attacks. The encrypted image produced by the cryptosystem should be sensitive to the secret key. That is to say, if the attacker uses two slightly different keys to decrypt the same plain image, the two encrypted images should be completely independent of each other [220]. The encrypted image of Figure 4.14a is decrypted using the secret keys c04-math-275 and the decrypted image is shown in Figure 4.19a. Now, we attempt to decrypt the encrypted image using other keys (the key is assumed as c04-math-276). The decrypted image is shown in Figure 4.19b. Obviously, the decrypted image is different from the original image (Figure 4.19a). We can conclude that the decrypted image cannot be restored via incorrect keys.

Illustration of cropped Decryption attempt results using: (a) correct key; (b) incorrect key.

Figure 4.19 Decryption attempt results using: (a) correct key; (b) incorrect key.

4.3 Synchronization Control for Fractional-Order Nonlinear Chaotic Systems

4.3.1 Problem Description

According to the Caputo fractional derivative (2.17), the fractional-order system can be written as [221]

where c04-math-278 is the state vector, c04-math-279 is a constant matrix, and the fractional order is c04-math-280. If c04-math-281 denotes another state vector, the nonlinear functions c04-math-282 and c04-math-283 satisfy the following condition:

where c04-math-285 and c04-math-286 denote the linear and nonlinear parts, respectively.

This section aims to develop a synchronization control scheme based on the fractional-order controller. On the basis of the designed controller, the response system can synchronize the drive system well under the proper conditions.

4.3.2 Design of Synchronization Controller

Since synchronization can be applied to secure communications and signal processing, synchronization control is an important problem for investigations of fractional-order chaotic systems. Synchronization of fractional-order chaotic systems is realized by designing an appropriate fractional-order controller.

The fractional-order chaotic system (4.40) is taken as the master system, and the slave system is defined as

where c04-math-288 denotes the control input vector.

Define the synchronization error as

where c04-math-290.

According to Equations (4.40) (4.42), and (4.43), the synchronization error system can be described as

Furthermore, the control input is designed by

where c04-math-293 denotes the design matrix, c04-math-294 is an invertible matrix, c04-math-295 denotes a diagonal matrix, and c04-math-296 denotes an identity matrix.

This synchronization control scheme for fractional-order nonlinear chaotic systems can be summarized in the following theorem.

4.3.3 Simulation Examples

To illustrate the effectiveness of the designed synchronization controller, the fractional-order Chen system [223] and the fractional-order Lorenz system [179] are investigated.

4.3.3.1 Fractional-Order Chen System

The fractional-order Chen system is given as follows [223]:

where c04-math-329 is the fractional order, c04-math-330, c04-math-331, and c04-math-332 are system parameters, and c04-math-333, c04-math-334, and c04-math-335 are system state variables. The parameters are chosen as c04-math-336, c04-math-337 and c04-math-338, the fractional order is given by c04-math-339, and the initial conditions are chosen as c04-math-340. Then the chaotic behaviors of the fractional-order Chen system (4.55) are shown in Figure 4.20.

Geometrical representation of Chaotic behaviors of fractional-order Chen system.

Figure 4.20 Chaotic behaviors of fractional-order Chen system: (a) c04-math-341c04-math-342 plane; (b) c04-math-343c04-math-344 plane; (c) c04-math-345c04-math-346 plane; (d) c04-math-347c04-math-348c04-math-349 space.

Furthermore, the fractional-order Chen system (4.55) can be written as

The fractional-order Chen system (4.55) is taken as the master system, and the slave system is described by

where c04-math-352, c04-math-353, and c04-math-354 are system state variables and c04-math-355, c04-math-356, and c04-math-357 are control inputs.

According to Equations (4.56) and (4.57), we obtain

On the basis of Equation (4.58), we have

From Equation (4.59), we obtain

4.60 equation

Referring to the designed controller of Equations (4.45) (4.56) (4.57), and (4.59), on the basis of Equation (4.58), we have

where c04-math-365 is a design control matrix. If the conditions in Theorem 4.2 are satisfied, the error system (4.61) will tend to zero. Then synchronization is realized between the master system (4.56) and the slave system (4.57).

For the numerical simulation, we choose the design parameters as c04-math-366, c04-math-367, and c04-math-368 and the initial conditions as c04-math-369 and c04-math-370. Then we have

4.62 equation

According to Equation (4.57), we obtain that c04-math-372 and c04-math-373, thus the conditions in Theorem 4.2 are satisfied. The numerical results are shown in Figure 4.21 and Figure 4.22 under the proposed synchronization control scheme. The state synchronization results of the master system (4.56) and the slave system (4.57) are given in Figure 4.21a–c. It is shown that the good synchronization performance is achieved. Figure 4.22 shows that the synchronization errors c04-math-374, c04-math-375, and c04-math-376 are convergent. According to the simulation results, the master system (4.56) and the slave system (4.57) are synchronous under the designed fractional-order controller (4.45). Therefore, the proposed synchronization control scheme is valid for fractional-order chaotic systems.

Illustration of Synchronization results of state variables: (a) x1(t) and y1(t); (b) x2(t) and y2(t); (c) x3(t) and y3(t).

Figure 4.21 Synchronization results of state variables of two fractional-order Chen systems: (a) c04-math-377 and c04-math-378; (b) c04-math-379 and c04-math-380; (c) c04-math-381 and c04-math-382.

Illustration of Synchronization errors e1(t), e2(t), and e3(t).

Figure 4.22 Synchronization errors c04-math-358, c04-math-359, and c04-math-360 of two fractional-order Chen systems.

4.3.3.2 Fractional-Order Lorenz System

According to Equation (2.46), the fractional-order Lorenz system can be written as follows:

where c04-math-384 is the fractional order, c04-math-385, c04-math-386, and c04-math-387 are system state variables, and c04-math-388, c04-math-389, and c04-math-390 are system parameters. For the fractional order given by c04-math-391, system parameters chosen as c04-math-392, c04-math-393, and c04-math-394, and initial conditions chosen as c04-math-395, the simulation results of the fractional-order Lorenz system are shown in Figure 2.1.

From Equation (4.63), we have

The fractional-order Lorenz system (4.64) is taken as the master system, and the slave system is given as

where c04-math-398, c04-math-399, and c04-math-400 are system state variables and c04-math-401, c04-math-402, and c04-math-403 are control inputs.

From Equations (4.64) and (4.65), we obtain

According to Equation (4.66), we have

On the basis of Equation (4.67), we obtain

4.68 equation

Invoking Equations (4.45) (4.64)–(4.66), and (4.67), we have

where c04-math-408 is a design matrix. The error system (4.69) will tend to zero when the conditions in Theorem 4.2 are satisfied. Then synchronization is realized between the master system (4.64) and the slave system (4.65).

For the numerical simulation, the design parameters are designed as c04-math-409, c04-math-410, and c04-math-411, the initial conditions are chosen as c04-math-412 and c04-math-413. Then we have

According to Equation (4.70), we obtain that c04-math-415 and c04-math-416, thus the conditions in Theorem 4.2 are satisfied. According to the proposed synchronization control scheme, the numerical results are given in Figure 4.23 and Figure 4.24. The state synchronization results are presented in Figure 4.23a–c. From Figure 4.23, the synchronization performance is good. Figure 4.24 shows that the synchronization errors c04-math-417, c04-math-418, and c04-math-419 are convergent. On the basis of the simulation results, the master system (4.64) and the slave system (4.65) are synchronous, based on the designed fractional-order controller (4.45). Therefore, the proposed synchronization control scheme is effective for fractional-order chaotic systems.

Scheme for Synchronization results of state variables: (a) x1(t) and y1(t); (b) x2(t) and y2(t); (c) x3(t) and y3(t).

Figure 4.23 Synchronization results of state variables of two fractional-order Lorenz systems: (a) c04-math-420 and c04-math-421; (b) c04-math-422 and c04-math-423; (c) c04-math-424 and c04-math-425.

Scheme for Synchronization errors e1(t), e2(t), and e3(t).

Figure 4.24 Synchronization errors c04-math-426, c04-math-427, and c04-math-428 of two fractional-order Lorenz systems.

4.3.4 Application of Synchronization Control Scheme in Secure Communication

In this section, the synchronization control scheme is applied in secure communication through the chaotic masking technology. The information signal can be concealed and recovered.

To illustrate the effectiveness of the synchronization control scheme in secure communication, synchronization of the fractional-order Chen system is applied in secure communication based on the chaotic masking technology [224] illustrated in Figure 4.25. For secure communication, we assume that the master system (4.55) is regarded as the transmitter of the secure communication system and the slave system (4.57) is regarded as the acceptor of the secure communication system. Then we use the chaotic synchronization signals c04-math-429 and c04-math-430 to realize encryption transmission of the information signal c04-math-431. If synchronization is achieved for the chaotic signals c04-math-432 and c04-math-433, the synchronization error c04-math-434 will tend to zero and the recovered signal c04-math-435 can be described as

Scheme for Chaotic masking technology.

Figure 4.25 Chaotic masking technology.

According to Equation (4.71), we can obtain that the encrypted signal can be recovered by the acceptor of the secure communication system when synchronization is realized. For the numerical simulation, we assume that the information signal c04-math-437. The mixture signal of c04-math-438 and c04-math-439 can be written as c04-math-440. Then the secure communication system is realized based on synchronization of the fractional-order Chen system. The simulation results are presented in Figure 4.26. From Figure 4.26, we can see that the information signal c04-math-441 can be masked by the chaotic signal c04-math-442. Furthermore, the acceptor can recover the encrypted signal well. Thus, the effectiveness of the synchronization control scheme is illustrated in secure communication.

Illustration of Simulation results: (a) information signal p(t); (b) mixture signal m(t); (c) recovered signal p'(t); (d) error signal error = p(t) - p'(t).

Figure 4.26 Simulation results: (a) information signal c04-math-443; (b) mixture signal c04-math-444; (c) recovered signal c04-math-445; (d) error signal c04-math-446.

4.4 Conclusion

In this chapter, a novel chaotic system without equilibrium has been proposed. The Lyapunov exponents and the Poincaré map of the proposed chaotic system have been given. Meanwhile, the dissipativeness of the new chaotic system has been illustrated. The chaotic circuit has been designed to demonstrate the physical realizability of the novel chaotic system. In addition, on the basis of the Gronwall inequality, the Laplace transform, the ML function, and the state-feedback method, a stability theorem for the chaotic system without equilibrium has been given. The designed controller has been developed to realize the stabilization of the closed-loop systems. The proposed control scheme has been developed to control the chaotic and hyperchaotic systems with equilibrium, i.e. the Chen system, Genesio's system, and the hyperchaotic Lorenz system. An image encryption scheme has been developed by using the proposed chaotic system without equilibrium. Furthermore, on the basis of the Gronwall inequality, the Laplace transform, the ML function, and the state-feedback method, a synchronization control scheme has been given for a class of fractional-order nonlinear systems. The synchronization control scheme has been used to realize the synchronization of two fractional-order Chen systems and two fractional-order Lorenz systems, respectively. Numerical simulation results further illustrate the effectiveness of the developed synchronization control scheme. Finally, the proposed synchronization control scheme has been applied in secure communication through chaotic masking technology and the effectiveness of synchronization control scheme in secure communication is illustrated.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.141.6