In this section, a novel chaotic system will be proposed by only considering the straight-line position and the pitch angle of the two-wheeled self-balancing robot of Googol Technology. A mathematical model related to the two-wheeled self-balancing robot of Googol Technology was established by Son and Anh [208]. The linear mathematical model for and of the two-wheeled self-balancing robot of Googol Technology is described in the form of
where denotes the pitch torque.
To transform the linear mathematical model into a chaotic system, we consider as a nonlinear term , which will be given in next section.
Considering the nonlinear function and the control input , Equation (4.1) can be described as
where the control input .
In this chapter, we aim to construct a novel chaotic system without equilibrium and to develop a fractional-order control scheme, so that the stabilization of the whole closed-loop system, including the novel chaotic system and the control input, is realized based on the designed control strategy. Under the designed fractional-order controller, the state variables of the closed-loop system are asymptotically stable.
In Chapter 2, three types of fractional calculus definitions were introduced. According to the different types of fractional calculus, some important control schemes have been proposed. ML stability theorems have been proposed [209–211] for fractional-order systems. The stability theorem was developed for fractional differential system with the RL derivative [212–214]. In this chapter, a control scheme based on the fractional-order controller will be designed using the Caputo definition (2.17), with the lower limit of the integral as and fractional order .
In this chapter, a novel chaotic system without equilibrium has been constructed based on the linear mathematical model (4.1) of the two-wheeled self-balancing robot. For this case, the proposed novel chaotic system can be regarded as an open-loop system of the system (4.2). Furthermore, the chaotic circuit is designed to address the physical realizability of the proposed chaotic system.
From Equation (4.2), the novel chaotic system can be described as follows:
where is the state vector of the nonlinear system with , , and . The nonlinear function is given by
where and are constants. When and , we obtain the Lyapunov exponents , , , and by calculating for the initial conditions . Obviously, the system (4.3) is a chaotic system under such case because , , , and . On the basis of the system (4.3) and the mentioned parameter values, the simulation results are further presented as shown in Figure 4.1. In addition, to further reflect the properties of chaos, the Poincaré map is shown in Figure 4.2.
To solve the equilibrium of system (4.3), we let , , , and ; this gives
According to system (4.5), we obtain that there is no equilibrium in system (4.3). Furthermore, we ensure that the system (4.3) is dissipative with the following exponential contraction rate of the exponential function :
with
To further illustrate the physical realizability of the proposed novel chaotic system (4.3), the system circuit is designed. By using resistors, capacitors, and operational amplifiers (TL082), the designed circuit of the chaotic system is shown in Figure 4.3. According to Figure 4.3, the circuit equation of the chaotic system is described as follows:
By comparing system (4.3) with system (4.8), it can be deduced that all resistance values , , , , , , , , , , , and are 10 k, and are 1 M, , , and are 21.7514 k, , , and are 5.251715 k, is 42.2474 k, is 8.031303 k, is 435.02849 k, and is 105.0343 k. The voltage values are V and V. To speed up the circuit response time, we make a time-scale transformation by multiplying by a factor of 100 on the right-hand-side of system (4.3); the capacitance values , , , and are then 10 nF. In Figure 4.3, are operational amplifiers, where is a unity-gain multiplier.
From the designed circuit of the chaotic system (4.3), experimental circuit phase portraits are presented in Figure 4.4. Comparing Figure 4.1 and Figure 4.4, we observe that there is consistency between numerical simulations and circuit experimental simulations; the circuit simulation results prove the physical realizability of the proposed novel chaotic system (4.3).
In this section, the control scheme will be proposed for the whole closed-loop system including the constructed chaotic system (4.3) and a fractional-order controller. The goal is to guarantee the stabilization of the closed-loop system under the proposed fractional-order controller.
From Equations (4.3) and (4.4), the chaotic system can be rewritten as
where
with the state vector, and
According to the chaotic system (4.9) and considering the control input , the corresponding system can be written in the following form:
where is the designed fractional-order control input.
Based on the state-feedback control method, the controller is defined as
where is a design control gain matrix and the fractional order satisfies .
According to Equations (4.10) and (4.11), one has
To render the stabilization of the closed-loop system (4.12) under the proposed controller (4.11), the following assumption is required.
The fractional-order controller based control scheme for the system (4.10) can be summarized in the following theorem.
In this section, to illustrate and verify the effectiveness of the proposed control scheme, the closed-loop system (4.12) is analyzed. Furthermore, we use the proposed control scheme to stabilize chaotic systems with equilibrium, such as the Chen system [216], Genesio's system [217] and the hyperchaotic Lorenz system [218].
Combining the novel chaotic system (4.3) with the designed controller (4.11), we have the following:
The equilibrium of system (4.23) is obtained by solving , , , and , which gives the following:
According to system (4.24), we obtain that is the equilibrium of the system (4.23). Furthermore, when the design parameters , , , and satisfy , , , and , we can guarantee that the equilibrium is a stable equilibrium based on the stability analysis method of the equilibrium [164]. From Equation (4.23), we have
which implies that satisfies Assumption 4.1. On the basis of Theorem 4.1 and the pole placement technique, the feedback control gain matrix and the order are chosen as
From this discussion, we have , , and ; the conditions of Theorem 4.1 are satisfied. The simulation results are shown in Figure 4.5 and Figure 4.6. According to the numerical simulation results, the closed-loop system (4.23) is asymptotically stable, which implies that the proposed control scheme works effectively.
To further illustrate the effectiveness of the developed control scheme in this chapter, we use the proposed control scheme (4.11) to control the Chen system [216], Genesio's system [217], and the hyperchaotic Lorenz system [218]. We first analyze the following dynamic model of the Chen system [216]:
From Equation (4.11), the control input is designed for the Chen system as follows:
Invoking system (4.27), we have
where . According to Equation (4.29), the nonlinear function in (4.27) can satisfy Assumption 4.1. Therefore, the Chen system (4.27) can be stabilized to zero by choosing appropriate parameters , , and .
Genesio's system is written as follows:
To control Genesio's system (4.30), the control input can be designed based on Equation (4.11), as follows:
From system (4.30), we obtain
where .
The nonlinear function in system (4.30) can satisfy Assumption 4.1 based on Equation (4.32). Thus, Genesio's system (4.30) can be stabilized to zero under the appropriate parameters , , and .
The hyperchaotic Lorenz system is given as follows:
Combining the hyperchaotic Lorenz system (4.33) and the control law (4.11), the control input is written as follows:
According to system (4.33), we have
where .
On the basis of Equation (4.35), Assumption 4.1 is satisfied for the nonlinear function in system (4.33). By choosing appropriate parameters , , , and , the stabilization of the hyperchaotic Lorenz system (4.33) can be realized.
According to the this discussion and analysis, we obtain that the Chen system (4.27), Genesio's system (4.30), and the hyperchaotic Lorenz system (4.33) are controlled using the control scheme described in this chapter. For the numerical simulation of the Chen system (4.27), we choose the control parameters , , and , the initial conditions , and the fractional order . For the numerical simulation of Genesio's system (4.30), we set the control parameters , , and , the initial conditions , and the fractional order . In the numerical simulation of the hyperchaotic Lorenz system (4.33), the control parameters are designed as , , , and , the initial conditions are assumed as , and the fractional order is chosen as .
On the basis of the given simulation conditions, the numerical results are presented in Figure 4.7, Figure 4.8, Figure 4.9, Figure 4.10, Figure 4.11, and Figure 4.12 for the Chen system (4.27), Genesio's system (4.30), and the hyperchaotic Lorenz system (4.33), respectively. The control results of the Chen system (4.27) are shown in Figure 4.7. It is shown that good control performance is obtained under the designed controller (4.28). Figure 4.8 presents the control inputs (4.28). The numerical simulation results of Genesio's system (4.30) are given in Figure 4.9 and Figure 4.10. Figure 4.9 and Figure 4.10 show that the controller (4.31) can stabilize Genesio's system (4.30) well. Finally, Figure 4.11 and Figure 4.12 show that the fractional-order controller (4.34) can control all state variables of the hyperchaotic Lorenz system (4.33) to the origin. Therefore, all the simulation results show that the fractional-order controller can also control the chaotic and hyperchaotic systems with equilibrium.
On the basis of the proposed chaotic system without equilibrium (4.3), the image encryption scheme is developed in this section. Generally, the security will be better if the encrypted image is very fuzzy. The analysis of the effect of encryption for the image encryption scheme [219] will be given by the following four aspects:
According to the chaotic sequences of the chaotic system without equilibrium (4.3), pixel substitution, and pixel value scrambling methods, the image encryption scheme is given for an image (the size is , where and represent the rows and columns of the image). The steps for the encryption algorithm are as follows:
We assume that the size of the original image is and the range of gray levels for each pixel is 0–255. The original image is presented in Figure 4.13a. The initial condition of the chaotic system without equilibrium (4.3) is chosen as . Then four groups of chaotic time sequences are obtained by numerical simulation. The chaotic time sequence – is selected as the subsequence and the original image is encrypted using the pixel substitution method. Furthermore, we select the chaotic time sequence – as the replacement matrix . Finally, the fully encrypted image is shown in Figure 4.14a.
Figure 4.13b and Figure 4.14b show the corresponding gray distributions of the original image and the image encrypted using the designed algorithm, respectively. The results from Figure 4.13 and Figure 4.14 indicate that the image encryption scheme is valid, that is: (i) the encrypted image in Figure 4.14a is totally different from the original image (Figure 4.13a); (ii) the statistical characteristics of the encrypted image in Figure 4.14b are also different from those of the original image (Figure 4.13b).
Figure 4.15a and Figure 4.15b show the correlations of two horizontal adjacent pixels for the original and encrypted images, respectively. Also, Table 4.1 presents the correlation coefficient of the encrypted image and the original image. It is obvious that the correlation coefficient of the encrypted image in any direction is approximately equal to zero. As a result, the correlated relationship is very low.
Table 4.1 Correlation coefficients in original and encrypted images
Original image | Encrypted image | |
Horizontal | 0.7467 | |
Vertical | 0.8319 | |
Diagonal | 0.3468 |
Take the cropping attack as the analysis object. We assume that the intermediate region is attacked (the size is ) or that the boundary area is attacked (the size is ), as shown in Figure 4.16. Then the decrypted image, as shown in Figure 4.17, can also present the shape of the original image. Furthermore, Figure 4.17 is further handled by a median filter algorithm. The restored image is shown in Figure 4.18, which shows that a better restored effect is presented. It is obvious from Figure 4.16, Figure 4.17, and Figure 4.18 that the attacked image can also be restored using the designed image encryption scheme.
Key sensitivity is an essential property for any good cryptosystem, and ensures the security of the cryptosystem against brute-force attacks. The encrypted image produced by the cryptosystem should be sensitive to the secret key. That is to say, if the attacker uses two slightly different keys to decrypt the same plain image, the two encrypted images should be completely independent of each other [220]. The encrypted image of Figure 4.14a is decrypted using the secret keys and the decrypted image is shown in Figure 4.19a. Now, we attempt to decrypt the encrypted image using other keys (the key is assumed as ). The decrypted image is shown in Figure 4.19b. Obviously, the decrypted image is different from the original image (Figure 4.19a). We can conclude that the decrypted image cannot be restored via incorrect keys.
According to the Caputo fractional derivative (2.17), the fractional-order system can be written as [221]
where is the state vector, is a constant matrix, and the fractional order is . If denotes another state vector, the nonlinear functions and satisfy the following condition:
where and denote the linear and nonlinear parts, respectively.
This section aims to develop a synchronization control scheme based on the fractional-order controller. On the basis of the designed controller, the response system can synchronize the drive system well under the proper conditions.
Since synchronization can be applied to secure communications and signal processing, synchronization control is an important problem for investigations of fractional-order chaotic systems. Synchronization of fractional-order chaotic systems is realized by designing an appropriate fractional-order controller.
The fractional-order chaotic system (4.40) is taken as the master system, and the slave system is defined as
where denotes the control input vector.
Define the synchronization error as
where .
According to Equations (4.40) (4.42), and (4.43), the synchronization error system can be described as
Furthermore, the control input is designed by
where denotes the design matrix, is an invertible matrix, denotes a diagonal matrix, and denotes an identity matrix.
This synchronization control scheme for fractional-order nonlinear chaotic systems can be summarized in the following theorem.
To illustrate the effectiveness of the designed synchronization controller, the fractional-order Chen system [223] and the fractional-order Lorenz system [179] are investigated.
The fractional-order Chen system is given as follows [223]:
where is the fractional order, , , and are system parameters, and , , and are system state variables. The parameters are chosen as , and , the fractional order is given by , and the initial conditions are chosen as . Then the chaotic behaviors of the fractional-order Chen system (4.55) are shown in Figure 4.20.
Furthermore, the fractional-order Chen system (4.55) can be written as
The fractional-order Chen system (4.55) is taken as the master system, and the slave system is described by
where , , and are system state variables and , , and are control inputs.
According to Equations (4.56) and (4.57), we obtain
On the basis of Equation (4.58), we have
From Equation (4.59), we obtain
Referring to the designed controller of Equations (4.45) (4.56) (4.57), and (4.59), on the basis of Equation (4.58), we have
where is a design control matrix. If the conditions in Theorem 4.2 are satisfied, the error system (4.61) will tend to zero. Then synchronization is realized between the master system (4.56) and the slave system (4.57).
For the numerical simulation, we choose the design parameters as , , and and the initial conditions as and . Then we have
According to Equation (4.57), we obtain that and , thus the conditions in Theorem 4.2 are satisfied. The numerical results are shown in Figure 4.21 and Figure 4.22 under the proposed synchronization control scheme. The state synchronization results of the master system (4.56) and the slave system (4.57) are given in Figure 4.21a–c. It is shown that the good synchronization performance is achieved. Figure 4.22 shows that the synchronization errors , , and are convergent. According to the simulation results, the master system (4.56) and the slave system (4.57) are synchronous under the designed fractional-order controller (4.45). Therefore, the proposed synchronization control scheme is valid for fractional-order chaotic systems.
According to Equation (2.46), the fractional-order Lorenz system can be written as follows:
where is the fractional order, , , and are system state variables, and , , and are system parameters. For the fractional order given by , system parameters chosen as , , and , and initial conditions chosen as , the simulation results of the fractional-order Lorenz system are shown in Figure 2.1.
From Equation (4.63), we have
The fractional-order Lorenz system (4.64) is taken as the master system, and the slave system is given as
where , , and are system state variables and , , and are control inputs.
From Equations (4.64) and (4.65), we obtain
According to Equation (4.66), we have
On the basis of Equation (4.67), we obtain
Invoking Equations (4.45) (4.64)–(4.66), and (4.67), we have
where is a design matrix. The error system (4.69) will tend to zero when the conditions in Theorem 4.2 are satisfied. Then synchronization is realized between the master system (4.64) and the slave system (4.65).
For the numerical simulation, the design parameters are designed as , , and , the initial conditions are chosen as and . Then we have
According to Equation (4.70), we obtain that and , thus the conditions in Theorem 4.2 are satisfied. According to the proposed synchronization control scheme, the numerical results are given in Figure 4.23 and Figure 4.24. The state synchronization results are presented in Figure 4.23a–c. From Figure 4.23, the synchronization performance is good. Figure 4.24 shows that the synchronization errors , , and are convergent. On the basis of the simulation results, the master system (4.64) and the slave system (4.65) are synchronous, based on the designed fractional-order controller (4.45). Therefore, the proposed synchronization control scheme is effective for fractional-order chaotic systems.
In this section, the synchronization control scheme is applied in secure communication through the chaotic masking technology. The information signal can be concealed and recovered.
To illustrate the effectiveness of the synchronization control scheme in secure communication, synchronization of the fractional-order Chen system is applied in secure communication based on the chaotic masking technology [224] illustrated in Figure 4.25. For secure communication, we assume that the master system (4.55) is regarded as the transmitter of the secure communication system and the slave system (4.57) is regarded as the acceptor of the secure communication system. Then we use the chaotic synchronization signals and to realize encryption transmission of the information signal . If synchronization is achieved for the chaotic signals and , the synchronization error will tend to zero and the recovered signal can be described as
According to Equation (4.71), we can obtain that the encrypted signal can be recovered by the acceptor of the secure communication system when synchronization is realized. For the numerical simulation, we assume that the information signal . The mixture signal of and can be written as . Then the secure communication system is realized based on synchronization of the fractional-order Chen system. The simulation results are presented in Figure 4.26. From Figure 4.26, we can see that the information signal can be masked by the chaotic signal . Furthermore, the acceptor can recover the encrypted signal well. Thus, the effectiveness of the synchronization control scheme is illustrated in secure communication.
In this chapter, a novel chaotic system without equilibrium has been proposed. The Lyapunov exponents and the Poincaré map of the proposed chaotic system have been given. Meanwhile, the dissipativeness of the new chaotic system has been illustrated. The chaotic circuit has been designed to demonstrate the physical realizability of the novel chaotic system. In addition, on the basis of the Gronwall inequality, the Laplace transform, the ML function, and the state-feedback method, a stability theorem for the chaotic system without equilibrium has been given. The designed controller has been developed to realize the stabilization of the closed-loop systems. The proposed control scheme has been developed to control the chaotic and hyperchaotic systems with equilibrium, i.e. the Chen system, Genesio's system, and the hyperchaotic Lorenz system. An image encryption scheme has been developed by using the proposed chaotic system without equilibrium. Furthermore, on the basis of the Gronwall inequality, the Laplace transform, the ML function, and the state-feedback method, a synchronization control scheme has been given for a class of fractional-order nonlinear systems. The synchronization control scheme has been used to realize the synchronization of two fractional-order Chen systems and two fractional-order Lorenz systems, respectively. Numerical simulation results further illustrate the effectiveness of the developed synchronization control scheme. Finally, the proposed synchronization control scheme has been applied in secure communication through chaotic masking technology and the effectiveness of synchronization control scheme in secure communication is illustrated.
3.133.141.6