Next Article in Journal
Sleep Spindle-Related EEG Connectivity in Children with Attention-Deficit/Hyperactivity Disorder: An Exploratory Study
Next Article in Special Issue
Prediction of Contact Fatigue Performance Degradation Trends Based on Multi-Domain Features and Temporal Convolutional Networks
Previous Article in Journal
Quality of Security Guarantees for and with Physical Unclonable Functions and Biometric Secrecy Systems
Previous Article in Special Issue
Density-Based Entropy Centrality for Community Detection in Complex Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Projective Synchronization of Delayed Uncertain Coupled Memristive Neural Networks and Their Application

1
School of Cybersecurity, Northwestern Polytechnical University, Xi’an 710072, China
2
International School, Beijing University of Posts and Telecommunications, Beijing 100876, China
3
The 20th Research Institute of China Electronics Technology Group Corporation, Xi’an 710068, China
4
School of Computer Science, Inner Mongolia University, Hohhot 010021, China
5
School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(8), 1241; https://doi.org/10.3390/e25081241
Submission received: 31 May 2023 / Revised: 9 August 2023 / Accepted: 9 August 2023 / Published: 21 August 2023
(This article belongs to the Special Issue Signal and Information Processing in Networks)

Abstract

:
In this article, the authors analyzed the nonlinear effects of projective synchronization between coupled memristive neural networks (MNNs) and their applications. Since the complete signal transmission is difficult under parameter mismatch and different projective factors, the delays, which are time-varying, and uncertainties have been taken to realize the projective synchronization of MNNs with multi-links under the nonlinear control method. Through the extended comparison principle and a new approach to dealing with the mismatched parameters, sufficient criteria have been determined under different types of projective factors and the framework of the Lyapunov–Krasovskii functional (LKF) for projective convergence of the coupled MNNs. Instead of the classical treatment for secure communication, the concept of error of synchronization between the drive and response systems has been applied to solve the signal encryption/decryption problem. Finally, the simulations in numerical form have been demonstrated graphically to confirm the adaptability of the theoretical results.

1. Introduction

A fact that is well-known is that a chaotic system is essential in signal processing and secure communication. However, some existing results for secure communication are still based on traditional neural networks [1,2,3]. Actually, the memristor, the fourth basic element of electrical circuits, was firstly raised by Prof. Leon Chua [4] in 1971; the memristor exhibited better chaotic characteristics than the resistor in mimicking the synaptic plasticity. Depending on such excellent attributes in biologicals, many scholars have combined the memristor with neural networks (NNs) to propose the memristive neural networks (MNNs) [5,6,7,8,9] for a better understanding of the structure and functions of brain networks. Nevertheless, up to now, few researchers have conducted the memristor to the chaotic system for signal encryption and decryption, which inspired us to consider the MNNs for secure communication from the biological point of view.
In recent years, due to the superior mimic of the human brain, the synchronization of MMNs has attached considerable attention from various fields and became a hot topic. It is worth mentioning that as a principle dynamic behavior of MNNs, the accuracy of synchronization determines the validity of encryption and decryption. Therefore, the potential application of synchronization has extended to various areas, such as in image protection [10], social networks [11], pattern recognition, etc. In [12], the cluster output synchronization was investigated and two different control approaches were proposed. Finite-time and fixed-time synchronization were investigated in [13,14]. Considering the sensitivity of the channel for secure communication, Ref. [15] studied Dos attacks between the master and slave MNNs, and the results were applied to image encryption. However, the problem with faster communication still exists [16] regardless of whether extending binary digital to M-nary digital. For this issue, the projective synchronization was first introduced by Mainieri et al. [17].
In a practical circumstance, different synchronizations are necessary between the drive-response MNNs, even more so for secure communication. The impact caused by various projective factors for different structures of neural networks has been regarded in many studies [18,19,20]. Fu et al. [18], under a pinning control scheme, studied the projective synchronization for fuzzy MNNs. The projective synchronization that is fix-time and with discrete-time delay was investigated in [19]. Considering the lag factor of the system, the projective synchronization was investigated in [20]. Nevertheless, in the synchronization mechanism, parameter mismatch is unavoidable. The projective synchronization of delayed NNs with parameter-mismatched has been studied in [21]. In [22], the quasi-projective synchronization of the parameter-mismatched complex-valued NNs was realized under a feedback controller that is linear. Later on, in [23], the impulsive effect on weak projective synchronization in parameter-mismatched MNNs has been investigated. Uncertainty has not been taken into account in previous studies. We found found that different models ought to be described to meet the practical requirements in the complex situation. Therefore, time-varying delays and uncertainties term in the modeling of MNNs are more essential [24,25,26]. The authors, therefore, have been inspired to go for the model that is less conservative to explore the projective synchronization of MNNs.
To date, in order to realize the information storage and transmission, the multi-links complex NNs were proposed in [27], which are divided into some subnets according to various time-varying delays. They are more realistic than signal link neural networks in the fields of transportation networks [28], social networks [29], brain networks [30], etc. This means that different path transmission delays represent various sub-nets, reflecting the flexibility and universality of the system. In view of these discussions, the muti-links memristive neural networks are more reasonable and have a practical significance in synchronization mechanisms; the authors have adopted coupled MNNs with multi-links. The synchronization with finite time lag of multi-links MNNs under the adaptive control scheme was studied in [31]. Zhao et al. [32] discussed the exponential synchronization of coupled MNNs with multi-links. As far as we know, the dynamic behaviors of multi-links coupled MNNs with time-varying delays and uncertainties remain untouched, especially in dealing with projective synchronization under parameter mismatch situations. Thus, this is the main inspiration for this paper.
For a secure communication mechanism, the plaintexts among the drive and response systems are sent via switching back and forth continuously. The error system stability will greatly affect the quality of signal decryption [33]. Through the event-triggered scheme, quantized synchronization was used in secure communication. During the process of chaotic secure communication, whether the chaos system is stable or not plays a crucial part in the performance of signal processing. As a consequence, ref. [34] recovered the image signals through stability analyses and deep learning methods. From the perspective of synchronization, adaptive synchronization [35] and impulsive synchronization [36] were applied to the security of networks and image encryption, respectively. Neural cryptography was used in image sharing [37] and the synchronization of MNNs was investigated to realize secure communication [38]. Accordingly, the chaotic states of NNs with fractional order can also be employed in signal processing and image encryption [39]. As mentioned above, the projective synchronization mechanism of the proposed system is studied, and its performance regarding signal encryption/decryption of secure communication is investigated in this paper.
Inspired by the above consideration, the aim of this paper is to guarantee projective synchronization of multi-links coupled MNNs with delays that are time-varying and with uncertainties. The following are the novel aspects of current article:
  • Unlike previous coupled MNNs, the proposed model takes the time-varying delays, uncertainties, and multi-links into consideration, which is a class of uncertain switching systems, and it is more helpful to verify the dynamic behavior of systems under different communication situations.
  • The principle of extended comparison and a new approach are proposed to deal with the issue of parameters that are mismatched. To transform the state-depended-coupled MNNs into a class of systems with interval parameters, the criteria of projective synchronization are derived under the mechanism of the novel Lyapunov–Krasovskii functional (LKF). Accordingly, less conservative results compared with the traditional approaches are obtained in this paper. Moreover, the obtained outcomes can be easily extended to various synchronization schemes, depending on the projective parameter.
  • Considering the concept of synchronization, the chaotic sequences of drive and response systems are employed in signal encryption and decryption of secure communication. Taking the advantage of projective synchronization into account, the adaptive signal processing scheme is designed, and the keyspace can expand effectively compared with the conventional methods.
The arrangement of the remaining current study is illustrated below. Section 2 introduces the mathematical model of coupled MNNs, the useful definitions, considerations, and lemmas. Section 3 illustrates the essential outcomes of the current study, involving three theorems and one corollary. Numerical examples are presented to evaluate the correctness of the presented outcomes in Section 4. Finally, the conclusions are given in Section 5.

2. Model and Preliminaries

2.1. Coupled MNNs Model

Considering with the characteristic of the memristor Figure 1 a class of delayed MNNs are expressed by the following equation
c p d x p ( t ) d t = [ ( M f p g + N h p g ) + 1 R p ] x p ( t ) + g = 1 n M f p g × sgn p g f g ( x g ( t ) ) + g = 1 n N h p g × sgn p g f g ( x g ( t τ ( t ) ) ) + I p ( t ) ,
where the voltage of capacitor is represented as c p , and the neural feedback functions with non-delayed and time-varying delays are f g ( x g ( t ) ) and f g ( x g ( t τ ( t ) ) ) . Consider the real behavior of solid-state memristors or emulators, M f p g illustrates the memristance of the memristor between f g ( x g ( t ) ) and x p ( t ) , then, N h p g represents the memristance of the memristor between f g ( x g ( t τ ( t ) ) ) and x g ( t τ ( t ) ) . Accordingly, τ ( t ) denotes the time-varying delay, R p is the resistor, and I p ( t ) is an external bias.
For the propose of simplifying the mathematical model of the memristor on the premise of obtaining the pinched hysteresis feature, we select a surrogate memristor model.
d x p ( t ) d t = d p ( x p ( t ) ) x p ( t ) + g = 1 n a p g ( x p ( t ) ) f g ( x g ( t ) ) + g = 1 n b p g ( x p ( t τ ( t ) ) ) f g ( x g ( t τ ( t ) ) ) + I p ( t ) ,
where d p ( x p ( t ) ) is the p t h neuron self-inhibition, which represents as 1 c p [ ( M f p g + N h p g ) + 1 R p ] . a p g ( x p ( t ) ) and b p g ( x p ( t τ ( t ) ) ) represent the memristive connection weights, which denotes as 1 c p g = 1 n M f p g × sgn p g and 1 c p g = 1 n N h p g × sgn p g ; and f g ( · ) is the activation function. We assume that the solution x ( t ) = ( x 1 ( t ) , x 2 ( t ) , , x p ( t ) ) T of system (2) with initial conditions x ( s ) = ϕ ( s ) = ( ϕ 1 ( t ) , ϕ 2 ( t ) , , ϕ p ( t ) ) T C ( [ τ , 0 ] , R T ) exists.
Regarding the characters of a memristor and simplified mathematical model of the memristor Figure 2, the parameters of systems are supposed to meet the following conditions
d p ( x p ( t ) ) = d ´ p , | x p ( t ) | T p , unchanged , | x p ( t ) | = T p , d ` p , | x p ( t ) | > T p ,
a p g ( x p ( t ) ) = a ´ p g , | x p ( t ) | T p , unchanged , | x p ( t ) | = T p , a ` p g , | x p ( t ) | > T p ,
b p g ( x p ( t ) ) = b ´ p g , | x p ( t ) | T p , unchanged , | x p ( t ) | = T p , b ` p g , | x p ( t ) | > T p .
Consider of N time-varying uncertain coupled MNNs as follows
d x i ( t ) d t = D ( t ) x i ( t ) + [ A ( t ) + A 1 ( t ) ] f ( x i ( t ) ) + [ B ( t ) + B 1 ( t ) ] f ( x i ( t τ 0 ( t ) ) ) + σ j = 1 N w i j 0 Γ x j ( t ) + σ j = 1 N w i j 1 Γ x j ( t τ 1 ( t ) ) + I i ( t ) , i = 1 , 2 , . . . , N ,
then, the delayed coupled MNNs as drive system contains N identical MNNs is described as Equation (3), in which x i ( t ) = ( x i 1 ( t ) , x i 2 ( t ) , , x i n ( t ) ) T R n are the state variables of the i t h dynamical networks. τ 0 ( t ) and τ 1 ( t ) are time-varying delays, which satisfy τ ˙ 0 ( t ) τ 0 < 1 , τ ˙ 1 ( t ) τ 1 < 1 , τ = max { τ 0 , τ 1 } . We make the uncertainties as A 1 ( t ) and B 1 ( t ) . Then, w i j 0 is non-delayed coupled matrix, and w i j 1 is delayed coupled matrix. Additionally, we make w i i 0 = j = 1 , j i N w i j 0 and w i i 1 = j = 1 , j i N w i j 1 , and the following conditions are satisfied [32]
w i j 0 = 1 , w i j 1 = 0 a directed edge from i to j , w i j 0 = 0 , w i j 1 = 1 others .
The constant σ > 0 stands for the coupling strength, the matrix Γ = ( r i j ) R n × n is non-delayed inner connecting matrix, and the coupled matrix W = ( w i j ) N × N represents the topology structure of the whole networks.
Then, the following state-space equations represent the corresponding response system:
d y i ( t ) d t = D ( t ) y i ( t ) + [ A ( t ) + A 2 ( t ) ] f ( y i ( t ) ) + [ B ( t ) + B 2 ( t ) ] f ( y i ( t τ 0 ( t ) ) ) + σ j = 1 N w i j 0 Γ y j ( t ) + σ j = 1 N w i j 1 Γ y j ( t τ 1 ( t ) ) + U i ( t ) + I i ( t ) , i = 1 , 2 , . . . , N ,
where y i ( t ) stands for the state vector with initial condition y ( s ) = φ ( s ) = ( φ 1 ( t ) , φ 2 ( t ) , , φ p ( t ) ) T C ( [ τ , 0 ] , R T ) . A 2 ( t ) and B 2 ( t ) are the response uncertainties and U i ( t ) describes the nonlinear controller that will be constructed later. We choose the parameters similar to the drive system, that is,
D ^ = ( d ´ i p ) n × n , D ˇ = ( d ` i p ) n × n , A ^ = ( a ´ p g ) n × n , A ˇ = ( a ` p g ) n × n , B ^ = ( b ´ p g ) n × n , B ˇ = ( b ` p g ) n × n .
Therefore, the drive-system (3) is modified as
d x ( t ) d t ( D + c o [ D ˜ , D ˜ ] ) x ( t ) + [ A + c o [ A ˜ , A ˜ ] + A 1 ( t ) ] f ( x ( t ) ) + [ B + c o [ B ˜ , B ˜ ] + B 1 ( t ) ] f ( x ( t τ 0 ( t ) ) ) + σ W 0 Γ x ( t ) + σ W 1 Γ x ( t τ 1 ( t ) ) + I ( t ) , i = 1 , 2 , . . . , N ,
Then, we obtain
D = max { D ^ , D ˇ } , D = min { D ^ , D ˇ } , A = max { A ^ , A ˇ } , A = min { A ^ , A ˇ } , B = max { B ^ , B ˇ } , B = min { B ^ , B ˇ } , D = 1 2 ( D + D ) , D ˜ = 1 2 ( D D ) , A = 1 2 ( A + A ) , A ˜ = 1 2 ( A A ) , B = 1 2 ( B + B ) , B ˜ = 1 2 ( B B ) .
where x ( t ) = ( x 1 T ( t ) , x 2 T ( t ) , , x N T ( t ) ) T , f ( x ( t ) ) = ( f 1 T ( t ) ( x 1 ( t ) ) , f 1 T ( t ) ( x 2 ( t ) ) , , f 1 T ( t ) ( x N ( t ) ) ) T , W 0 = ( w i j 0 ) N × N , W 1 = ( w i j 1 ) N × N .
We define the inner couple matrix Γ as identity matrix. The measurable functions are
D ( t ) = D ˜ , D = D ¯ D ˜ , D = D ̲ ,
A ( t ) = A ˜ , A = A ¯ A ˜ , A = A ̲
B ( t ) = B ˜ , B = B ¯ B ˜ , B = B ̲
Consequently, from the set-valued mappings technique and differential inclusion theory, the Equation (6) can be transferred as:
d x ( t ) d t = ( D + D ( t ) ) x ( t ) + [ A + A ( t ) + A 1 ( t ) ] f ( x ( t ) ) + [ B + B ( t ) + B 1 ( t ) ] f ( x ( t τ 0 ( t ) ) ) + σ W 0 Γ x ( t ) + σ W 1 Γ x ( t τ 1 ( t ) ) + I ( t ) , i = 1 , 2 , . . . , N .
Remark 1.
The interval parameters are introduced to transform Equations (3)–(11). Accordingly, considering the state dependence characters of the memristor, we derived measurable function Equations (8)–(10) to confirm the variables D ( t ) , A ( t ) and B ( t ) cannnot get the maximum and minimum values simultaneously. In other words, when D ^ > D ˇ or D ^ < D ˇ , the corresponding A ^ > A ˇ or A ^ < A ˇ , B ^ > B ˇ or B ^ < B ˇ may not be satisfied.
Similarly, we have the response system as
d y ( t ) d t = ( D + D ( t ) ) y ( t ) + [ A + A ( t ) + A 2 ( t ) ] f ( y ( t ) ) + [ B + B ( t ) + B 2 ( t ) ] f ( y ( t τ 0 ( t ) ) ) + σ W 0 Γ y ( t ) + σ W 1 Γ y ( t τ 1 ( t ) ) + I ( t ) , i = 1 , 2 , . . . , N ,
and D ( t ) [ D , D ] , A ( t ) [ A , A ] , B ( t ) [ B , B ] .

2.2. Some Useful Definitions and Assumptions

Assumption 1.
The parameters D ( t ) , A ( t ) , B ( t ) , A ( t ) , B ( t ) are norm-bounded and time-varying, which satisfy
A ( t ) = H 1 F 1 ( t ) M 1 , A ( t ) = H 1 E 1 ( t ) M 1 , B ( t ) = H 2 F 2 ( t ) M 2 , B ( t ) = H 2 E 2 ( t ) M 2 ,
we set M 1 equals to A A , and M 2 equals to B B . H 1 = H 2 = diag { 0.5 , 0.5 , , 0.5 } . For measurable functions F l ( t ) and E l ( t ) ( l = 1 , 2 ), we have F l T ( t ) F l ( t ) I , E l T ( t ) E l ( t ) I .
Assumption 2.
The activation function f ( x ) is bounded and Lipschitez-continuous. There is a real constant L > 0 such that
| f i ( ξ 1 ) f i ( ξ 2 ) | L | ξ 1 ξ 2 | ,
for all ξ 1 R , ξ 2 R , i N , f ( 0 ) = 0 .
Assumption 3.
For all initial values x ( s ) = ϕ ( s ) = ( ϕ 1 ( t ) , ϕ 2 ( t ) , , ϕ p ( t ) ) T C ( [ τ , 0 ] , R T ) , the solution of (11) is bounded, that is | x i ( t ) | M for t [ τ , ) .
Assumption 4.
Supposing universities are bounded, which means | A l ( t ) | Z , | B l ( t ) | Z ( l = 1 , 2 ), and satisfy
A 1 ( t ) = A 1 ω A ( t ) , B 1 ( t ) = B 1 ω B ( t ) , A 2 ( t ) = A 2 μ A ( t ) , B 2 ( t ) = B 2 μ B ( t ) ,
and ω A 2 ( t ) 1 , ω B 2 ( t ) 1 , μ A 2 ( t ) 1 , and μ B 2 ( t ) 1 .
Lemma 1.
If P and Q represent the matrices with suitable dimensions, such that, such as
P T Q + Q T P δ P T P + 1 δ Q T Q ,
which δ > 0 .
Definition 1.
If there exist constant α > 0 , that is, for any colution x ( t ) and y ( t ) of (11) and (12), one can derive
lim t + | | y ( t ) α x ( t ) | | = 0 ,
then, systems (11) and (12) can achieve projective synchronization.
Notably, the error system e ( t ) = ( e 1 T ( t ) , e 2 T ( t ) , , e N T ( t ) ) T such that e ( t ) = y ( t ) α x ( t ) can be extracted from relations (11) and (12) as follows
d e ( t ) d t = ( D + D ( t ) ) e ( t ) + [ A + A ( t ) + A 2 ( t ) ] f ( e ( t ) ) + [ B + B ( t ) + B 2 ( t ) ] f ( e ( t τ 0 ( t ) ) ) + Υ ( t ) + σ W 0 Γ e ( t ) + σ W 1 Γ e ( t τ 1 ( t ) ) + U ( t ) ,
where Υ ( t ) = [ A + A ( t ) + A 2 ( t ) ] f ( α x ( t ) ) + [ B + B ( t ) + B 2 ( t ) ] f ( α x ( t τ 0 ( t ) ) ) + α ( D ( t ) D ( t ) ) x ( t ) α [ A + A ( t ) + A 1 ( t ) ] f ( x ( t ) ) α [ B + B ( t ) + B 1 ( t ) ] f ( x ( t τ 0 ( t ) ) ) , f ( e ( t ) ) = f ( y ( t ) ) f ( α x ( t ) ) , f ( e ( t τ 0 ( t ) ) ) = f ( y ( t ) ) f ( α x ( t τ 0 ( t ) ) ) .
Remark 2.
If α > 0 , systems (11) and (12) can achieve synchronization; if α < 0 , systems (11) and (12) can achieve anti-synchronization; if α = 0 , system (11) is stable to the origin state asymptotically.

3. Fudamental Results

The current section presents the solution to the adaptive synchronization problem of uncertain coupled MNNs under the nonlinear control and its application.
Before starting our fundamental outcomes, the controller is designed as follows
U ( t ) = R e ( t ) Ω sign ( e ( t ) )
where R = diag ( r i 1 , r i 2 , , r i n ) ( i = 1 , 2 , , N ) stands for the feedback controller matrix that will be constructed. Ω = diag ( w i 1 , w i 2 , , w i n ) , r i p and w i p , p = 1 , 2 , , n describe positive constants, and
ω i p = l = 0 n 2 L α ( | d ´ i p d ` i p | + | a ´ p g a ` p g | + | b ´ p g b ` p g | + 2 Z ) M .
Theorem 1.
Consider Assumptions 1–4; systems (11) and (12) are projective synchronization with the control law (19), if there exist constants θ 1 > 0 , θ 2 > 0 , such that
Λ = 2 D 2 D ˜ + θ 1 A A T + 3 L 2 θ 1 + θ 1 | | M 1 | | 2 H 1 T H 1 + θ 1 | | A 2 | | 2 H 1 T A 2 + θ 2 B B T + θ 2 | | M 2 | | 2 H 2 T H 2 + θ 2 | | B 2 | | 2 H 1 T B 2 + σ 2 Γ W 1 W 1 T Γ T + σ W 0 Γ 2 R < 0 .
Proof. 
Assume the subsequent nonnegative function for system (18)
V ( t ) = e T ( t ) e ( t ) + 1 1 τ [ 3 θ 2 L 2 t τ 0 ( t ) t e T ( s ) e ( s ) d s + t τ 1 ( t ) t e T ( s ) e ( s ) d s ] .
We make
V 1 ( t ) = e T ( t ) e ( t ) , V 2 ( t ) = 1 1 τ 3 θ 2 L 2 t τ 0 ( t ) t e T ( s ) e ( s ) d s + t τ 1 ( t ) t e T ( s ) e ( s ) d s .
Based on the trajectory of e ( t ) , we get the derivative of V 1 ( t ) as follows
V ˙ 1 ( t ) = 2 e T ( t ) e ˙ ( t ) = 2 e T ( t ) [ ( D + D ( t ) ) e ( t ) + Υ ( t ) + A f ( e ( t ) ) + A ( t ) f ( e ( t ) ) + A 2 ( t ) f ( e ( t ) ) + B f ( e ( t τ 0 ( t ) ) ) + B ( t ) f ( e ( t τ 0 ( t ) ) ) + B 2 ( t ) f ( e ( t τ 0 ( t ) ) ) + σ W 0 Γ e ( t ) + σ W 1 Γ e ( t τ 1 ( t ) ) R e ( t ) Ω sign ( e ( t ) ) ] .
According to Assumptions 1–3 and Lemma 1, we deduce
2 e T ( t ) ( D + D ( t ) ) e ( t ) 2 ( D D ˜ ) e T ( t ) e ( t ) .
2 e T ( t ) [ A + A ( t ) + A 2 ( t ) ] f ( e ( t ) ) θ 1 e T ( t ) A A T e ( t ) + 1 θ 1 f T ( e ( t ) ) f ( e ( t ) ) + θ 1 e T ( t ) A ( t ) ( A ( t ) ) T e ( t ) + 1 θ 1 f T ( e ( t ) ) f ( e ( t ) ) + θ 1 e T ( t ) A 2 ( t ) Δ A 2 T ( t ) e ( t ) + 1 θ 1 f T ( e ( t ) ) f ( e ( t ) ) θ 1 e T ( t ) A A T e ( t ) + 3 θ 1 f T ( e ( t ) ) f ( e ( t ) ) + θ 1 e T ( t ) M 1 T E 1 T ( t ) H 1 T H 1 E 1 ( t ) M 1 ( t ) e ( t ) + θ 1 e T ( t ) μ A T ( t ) A 2 T A 2 μ A ( t ) e ( t ) e T ( t ) θ 1 e T ( t ) A A T + 3 θ 1 L 2 + θ 1 | | M 1 | | 2 H 1 T H 1 + θ 1 A 2 T A 2 e ( t ) .
Similarly, we get
2 e T ( t ) B f ( e ( t τ 0 ( t ) ) ) + 2 e T ( t ) B ( t ) f ( e ( t τ 0 ( t ) ) ) + 2 e T ( t ) B 2 ( t ) f ( e ( t τ 0 ( t ) ) ) e T ( t ) θ 2 e T ( t ) B B T e ( t ) + e T ( t ) θ 2 | | M 2 | | 2 H 2 T H 2 e ( t ) + e T ( t ) θ 2 B 2 T B 2 e ( t ) + 3 θ 2 L 2 e T ( t τ 0 ( t ) ) e ( t τ 0 ( t ) ) .
By usint Young’s inequality and Lemma 1, we have
2 e T ( t ) σ W 1 Γ e t τ 1 ( t ) σ 2 e T ( t ) Γ W 1 W 1 T e ( t ) + e T t τ 1 ( t ) e t τ 1 ( t ) .
For Υ ( t ) , we have
| [ A + A ( t ) + A 2 ( t ) ] f ( α x ( t ) ) | | A + A ˜ + Z | | f ( α x ( t ) ) | α L ( A + A ˜ + Z ) M .
Then we get
| [ B + B ( t ) + B 2 ( t ) ] f ( α x ( t τ ( 0 ) ( t ) ) ) | α L ( B + B ˜ + Z ) M , α | ( D ( t ) D ( t ) ) x ( t ) | 2 α D ˜ M ,
and
α | [ A + A ( t ) + A 1 ( t ) ] f ( x ( t ) ) | α L ( A A ˜ Z ) M , α | [ B + B ( t ) + B 1 ( t ) ] f ( α x ( t τ ( 0 ) ( t ) ) ) | α L ( B B ˜ Z ) M .
Consider (18) and mentioned above, we conclude
Υ ( t ) 2 α L ( A ˜ + B ˜ D ˜ + 2 Z ) M .
Then, we take U ( t ) into account for deduce
2 e T ( t ) U ( t ) = 2 R e T ( t ) e ( t ) 2 e T ( t ) Ω sign ( e ( t ) ) ,
then we make
2 e T ( t ) ( Υ ( t ) Ω sign ( e ( t ) ) ) 2 p = 0 n | e i p ( t ) | 2 α L g = 0 n ( a ˜ p g + b ˜ p g + d ˜ p g + 2 Z ) M ω i p = 0 .
Similarly, the derivative of V 2 ( t ) is described as
V ˙ 2 ( t ) = 3 L 2 ( 1 τ ) θ 2 e T ( t ) e ( t ) e T ( t τ 1 ( t ) ) e ( t τ 1 ( t ) ) 3 L 2 θ 2 e T ( t τ 0 ( t ) ) e ( t τ 0 ( t ) )
Combing the mentioned above, we have
V ˙ ( t ) e T ( t ) Λ e ( t ) .
Accordin to Definition 1, we get V ˙ ( t ) e T ( t ) Λ e ( t ) < 0 , that is, we make Λ < 0 can realize the projective synchronization among systems (12) and (13).
The proof is now completed. □
Corollary 1.
As a particular case, we consider that there are no uncertainties between systems (11) and (12). Now, the error system is rewritten as follows.
d e ( t ) d t = ( D + D ( t ) ) e ( t ) + U ( t ) + Υ ( t ) + [ B + B ( t ) ] f ( e ( t τ 0 ( t ) ) ) + [ A + A ( t ) ] f ( e ( t ) ) + σ W 0 Γ e ( t ) + σ W 1 Γ e ( t τ 1 ( t ) ) ,
where Υ ( t ) = [ A + A ( t ) ] f ( α x ( t ) ) + [ B + B ( t ) ] f ( α x ( t τ 0 ( t ) ) ) + α ( D ( t ) D ( t ) ) x ( t ) α [ A + A ( t ) ] f ( x ( t ) ) α [ B + B ( t ) ] f ( x ( t τ 0 ( t ) ) ) , f ( e ( t ) ) = f ( y ( t ) ) f ( α x ( t ) ) , f ( e ( t τ 0 ( t ) ) ) = f ( y ( t ) ) f ( α x ( t τ 0 ( t ) ) ) .
Suppose Assumptions 1–4 hold, the systems systems (11) and (12) can achieve projective synchronization with contrl inputs, if the parameters are choosen as θ 1 > 0 , θ 2 > 0 , which satisfy
Λ = 2 D 2 D ˜ + θ 1 A A T + 2 L 2 θ 1 + θ 1 | | M 1 | | 2 H 1 T H 1 + θ 2 B B T + θ 2 | | M 2 | | 2 H 2 T H 2 + σ 2 Γ W 1 W 1 T Γ T + σ W 0 Γ 2 R < 0 .
Proof. 
Consider the nonnegative function, for system (37), the Lyapunov function is proposed as follows
V ( t ) = e T ( t ) e ( t ) + 1 1 τ [ 2 θ 2 L 2 t τ 0 ( t ) t e T ( s ) e ( s ) d s + t τ 1 ( t ) t e T ( s ) e ( s ) d s ] .
This proof can be obtained immediately by considering the uncertainties as zero in Theorem 1. Hence, it is neglected here. □
Remark 3.
During the process of synchronization, the control with discontinuous characteristics is essential to the converge of the error system. However, the stochastic disturbance from various uncertainties inevitably disturbs the practical communication among subsystems of coupled neural networks. Therefore, a simple adaptive method is proposed for the projective synchronization of the system (11) based on the designed Lyapunov function.
Theorem 2.
Consider Assumptions 1–4, systems (11) and (12) are projective synchronization with the adaptive control approach (41), if there are constants θ 1 > 0 , θ 2 > 0 , such that
Λ = 2 ( 1 1 τ + L A D ) + 2 σ W 0 + σ 2 Γ W 1 W 1 T Γ T + 3 L 2 θ 1 + θ 1 [ A A T + | | M 1 | | 2 + | | M 1 | | 2 H 1 T H 1 + A ( A ) T ] + θ 2 [ B B T + | | M 2 | | 2 + | | M 2 | | 2 H 2 T H 2 + B ( B ) T ] < 0 ,
and the adaptive controller (41) as follows.
U ( t ) = R ( t ) e ( t ) Ω sign ( e ( t ) ) R ˙ ( t ) = R e T ( t ) e ( t )
where R is positive constant.
Proof. 
The subsequent Lyapunov function is established for the error system
V ( t ) = e T ( t ) e ( t ) + ( R ( t ) + L A ) 2 R 1 1 τ 3 θ 2 L 2 t τ 0 ( t ) t e T ( s ) e ( s ) d s + t τ 1 ( t ) t e T ( s ) e ( s ) d s .
For the first of (42), we have
V ˙ 1 ( t ) = 2 e T ( t ) e ˙ ( t ) = 2 e T ( t ) [ ( D + D ( t ) ) e ( t ) + Υ ( t ) + A f ( e ( t ) ) + A ( t ) f ( e ( t ) ) + A 2 ( t ) f ( e ( t ) ) + B f ( e ( t τ 0 ( t ) ) ) + B ( t ) f ( e ( t τ 0 ( t ) ) ) + B 2 ( t ) f ( e ( t τ 0 ( t ) ) ) + σ W 0 Γ e ( t ) + σ W 1 Γ e ( t τ 1 ( t ) ) R ( t ) e ( t ) Λ sign ( e ( t ) ) ] + 2 ( R ( t ) + L A ) e T ( t ) e ( t ) .
Similar to the proof of Theorem 1, combining with Definition 1, we can obtain
V ˙ ( t ) e T ( t ) Λ e ( t ) ,
and
Λ = 2 ( 1 1 τ + L A D ) + 2 σ W 0 + σ 2 Γ W 1 W 1 T Γ T + 3 L 2 θ 1 + θ 1 [ A A T + | | M 1 | | 2 + | | M 1 | | 2 H 1 T H 1 + A ( A ) T ] + θ 2 [ B B T + | | M 2 | | 2 + | | M 2 | | 2 H 2 T H 2 + B ( B ) T ] < 0 .
Accordingly, we conclude the gain matrix with adaptive controller (41) as follows
ω i p = g = 0 n 2 L α ( | d ´ i p d ` i p | + | a ´ p g a ` p g | + | b ´ p g b ` p g | + 2 Z ) M .
That is, with the synchronization criteria (21) and (46), systems (11) and (12) can realize the complete projective synchronization under the adaptive control approach (41).
The proof is now completed. □
Theorem 3.
Consider the encrypted chaotic sequences x ( t ) from drive system (11) are added to the plaintexts r ( t ) , then we get the transmitted signals s ( t ) as follows
s ( t ) = x ( t ) + r ( t ) .
Accordingly, the recovered signal is obtained based on decrypted chaotic y ( t ) from response system (12) as the following
r ( t ) = s ( t ) y ( t ) .
Then, an adaptive observer synchronization of coupled MNNs approach is designed as:
d x ( t ) d t = ( D + D ( t ) ) x ( t ) + [ A + A ( t ) + A 1 ( t ) ] f ( x ( t ) ) + [ B + B ( t ) + B 1 ( t ) ] f ( x ( t τ 0 ( t ) ) ) + σ W 0 Γ x ( t ) + σ W 1 Γ x ( t τ 1 ( t ) ) + I ( t ) + k 1 ( r ( t ) w ( t ) ) , i = 1 , 2 , . . . , N ,
and
d y ( t ) d t = ( D + D ( t ) ) y ( t ) + [ A + A ( t ) + A 2 ( t ) ] f ( y ( t ) ) + [ B + B ( t ) + B 2 ( t ) ] f ( y ( t τ 0 ( t ) ) ) + σ W 0 Γ y ( t ) + σ W 1 Γ y ( t τ 1 ( t ) ) + I ( t ) + U ( t ) , i = 1 , 2 , . . . , N ,
where w ˙ ( t ) = k 2 ( r ( t ) w ( t ) ) .
The proposed adaptive controller U ( t ) as follows
U ( t ) = U ( t ) + k 1 s ( t ) y ( t ) w ( t ) U ( t ) = Re ( t ) Ω sign ( e ( t ) ) w ˙ ( t ) = k 2 s ( t ) y ( t ) w ( t )
where k 1 , k 2 are positive constants.

4. Numerical Simulations

The current section presents various numerical examples to evaluate the correctness of the developed theoretical results.
Example 1.
Projective synchronization.
Assume the three-dimensional coupled MNNs (11) and (12) consists three neural networks and the edge weights are 1. The topology structure of the system is illustrated as the coupling strength σ = 1 , the inner connecting matrix Γ , coupled matrix W 0 , and W 1 are as follows
Γ = 1 0 0 0 1 0 0 0 1 , W 0 = W 1 = 2 1 1 1 1 0 1 0 1 .
For systems (11) and (12), the time-varying delay are τ 0 ( t ) = e t / ( e t + 1 ) , and τ 1 ( t ) = tanh ( t ) . The initial values for drive system are ϕ = [ 1.57 , 0.99 , 1.31 , 0.37 , 1.21 , 0.36 , 1.11 , 1.28 , 0.97 ] T C ( [ τ , 0 ] , then we make the intial valued for response system are φ = [ 0.78 , 2.11 , 0.58 , 2.04 , 0.89 , 1.44 , 1.67 , 1.89 , 0.78 ] T C ( [ τ , 0 ] . The active function is f ( x ) = | x + 1 | | x 1 | 2 1 .
Based on the mismatched parameters for coupled MNNs transmission method, we make the following parameters
D = 1.25 0.9 0.9 1.05 1.1 0.95 1.0 1.0 1.05 , D ˜ = 0.25 0.1 0.1 0.25 0.1 0.05 0.1 0 0.15 .
A = 1.65 2.6 2.75 1.1 1.6 1.4 1.0 1.65 1.2 , A ˜ = 0.15 0.2 0.25 0.2 0.1 0.2 0.2 0.35 0.2 .
B = 0.35 0.25 0.8 3.2 3.55 1.7 4.2 2.9 0.75 , B ˜ = 0.05 0.05 0.25 0.2 0.25 0.2 0.1 0.1 0.25 .
Taken into the following uncertainties into consideration, we have
A 1 ( t ) = 0.3 cos ( t ) 1 1 1 1 1 1 1 1 1 , B 1 ( t ) = 0.1 sin ( t e t e t + 1 ) 1 1 1 1 1 1 1 1 1 .
A 2 ( t ) = 0.2 sin ( t ) 1 1 1 1 1 1 1 1 1 , B 2 ( t ) = 0.5 cos ( t e t e t + 1 ) 1 1 1 1 1 1 1 1 1 .
According to Assumptions 1 and 2, we make
M 1 = 0.3 0.4 0.3 0.4 0.2 0.4 0.4 0.7 0.4 , M 2 = 0.2 0.2 0.3 0.2 0.2 0.5 0.5 0.5 0.4 .
H 1 = H 2 = 0.5 0 0 0 0.5 0 0 0 0.5 , L = 1 0 0 0 1 0 0 0 1 .
For drive/response systems (11) and (12), we choose three different initial values to illustrate the chaotic for such system, the dynamic trajectories of states without controller are presented in Figure 3. Additionally, Figure 3c shows the input of the ineffective control, which means the states of such system is chaotic under the ineffective control method, and the system will be controlled under the suitabl control methods as following.
For Theorem 1, when projective factor α = 1 , we have the complete stable of error system. Then we set R = 10 as control gains for feedback controller (19), as illustrated in Figure 4, such controller can guarantee the stability of the system. When projective factor α = 1 , we obtain the antisynchronization between systems (11) and (12), which shown in Figure 4e.
For Theorem 2, we verify the effect of adaptive controller for such systems. It can be seen from Figure 4f, the rationality and effectiveness of the designed controller (41)
Remark 4.
For controller, we define as follows
sign ( e ( t ) ) 1 , if e ( t ) < 0 , 0 , if e ( t ) = 0 , 1 , if e ( t ) > 0 ,
but the characteristic of sign ( e ( t ) ) will lead to a buffeting phenomenon; thus we replace e ( t ) e ( t ) | + K ( K = 0.001 ) to to alleviate this phenomenon. The Figure 5 illustrates the effective of such method. Figure 6a–c demonstrate the different types of controllers under buffeting phenomenon due to the sign ( e ( t ) ) factor, and Figure 6d–f show the corresponding controllers, which get away from the buffeting under the influence of e ( t ) e ( t ) | + K .
For Corollary 1, we make the uncertainties as zeros, the states of (37) without control are presented in Figure 5a–c. It is shown that the error system (18) converges to zero gradually, which verify the Corollary 1 is reasonable.
Example 2.
Secure communication.
The secure communication process of the proposed algorithm is illustrated in Figure 7. We make the same parameters as Corollary 1. Two plaintexts are r 1 ( t ) = sin ( t ) and r 2 ( t ) = cos ( t ) . For the process of encryption, two encryption chaotic sequences x 1 ( t ) and x 2 ( t ) are chosen from the drive system (11). We combine plaintext signals and chaotic sequences, and the transmitted signals as shown in Figure 8. Consider the process of the decryption, two decryption chaotic sequences y 1 ( t ) and y 2 ( t ) are chosen from the corresponding response system (12). For the adaptive controller (51), we set k 1 = 0.03 , k 2 = 15 . Figure 9 illustrated the trajectories of plaintexts and decrypted signals. From Figure 10, we notice the error between plaintexts and decrypted signals converge to zero, which means the projective synchronization approach can solve the encryption/decryption problem effective in secure communication.
Remark 5.
Comparing with current literature [40,41] for secure communication, the parameters in the proposed model, that is, W 0 and W 1 can not only demonstrate the special structure of MNNs, but also can build the internal connection between the sufficient condition and the projective synchronization approach under the multi-links coupled condition. Consequently, in terms of the effect of secure communication (e.g., number of keys, types of encryption and decryption), the proposed method is more flexible and expandable than other approaches.

5. Conclusions

This paper focused on the projective synchronization of coupled multi-links MNNs with uncertainties and delays that is time-varying. Aiming at the issue of parameter mismatch, the principle of extended comparison and a new approach were employed to transform the proposed system into one with interval parameters. Furthermore, according to the designed LKF, several sufficient criteria for projective synchronization were derived under the nonlinear controller. Finally, the chaotic sequences of drive and response systems were applied in signal encryption and decryption of secure communication. Based on the concept of projective synchronization, the adaptive control mechanism has been proposed to improve the effectiveness of signal decryption and decryption in secure communication.

Author Contributions

Methodology, Z.H. and M.Y.; Software, N.C. and X.W.; Formal analysis, N.C.; Investigation, Z.H. and X.W.; Resources, M.Y.; Writing—original draft, H.L.; Writing—review & editing, H.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant No. 62106020; 62073263); the Fundamental Research Funds for the Central Universities (Grant No. FRF-IDRY-20-022); the China Postdoctoral Science Foundation (Grant No. 2021M690355); Postdoctoral Research Foundation of Shunde Graduate School of University of Science and Technology Beijing (Grant No. 2021BH008).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Aliabadi, F.; Majidi, M.H.; Khorashadizadeh, S. Chaos synchronization using adaptive quantum neural networks and its application in secure communication and cryptography. Neural Comput. Appl. 2022, 34, 6521–6533. [Google Scholar] [CrossRef]
  2. Sham, E.E.; Vidyarthi, D.P. CoFA for QoS based secure communication using adaptive chaos dynamical system in fog-integrated cloud. Digit. Signal Process. 2022, 126, 103523. [Google Scholar] [CrossRef]
  3. Nguyen, Q.D.; Huang, S.C. Synthetic adaptive fuzzy disturbance observer and sliding-mode control for chaos-based secure communication systems. IEEE Access 2021, 9, 23907–23928. [Google Scholar]
  4. Chua, L. Memristor-the missing circuit element. IEEE Trans. Circuit Theory 1971, 18, 507–519. [Google Scholar] [CrossRef]
  5. Zhu, S.; Bao, H. Event-triggered synchronization of coupled memristive neural networks. Appl. Math Comput. 2022, 415, 126715. [Google Scholar] [CrossRef]
  6. Milano, G.; Miranda, E.; Ricciardi, C. Connectome of memristive nanowire networks through graph theory. Neural Netw. 2022, 150, 137–148. [Google Scholar] [CrossRef]
  7. Alsaedi, A.; Cao, J.; Ahmad, B.; Tian, X. Synchronization of master-slave memristive neural networks via fuzzy output-based adaptive strategy. Chaos Solitons Fractals 2022, 158, 112095. [Google Scholar] [CrossRef]
  8. Yu, T.; Wang, H.; Cao, J.; Xue, C. Finite-time stabilization of memristive neural networks via two-phase method. Neurocomputing 2022, 491, 24–33. [Google Scholar] [CrossRef]
  9. Lin, A.; Cheng, J.; Rutkowski, L.; Wen, S.; Luo, M.; Cao, J. Asynchronous fault detection for memristive neural networks with dwell-time-based communication protocol. IEEE Trans. Neural Netw. Learn Syst. 2022, 1–12. [Google Scholar] [CrossRef]
  10. Yuan, M.; Wang, W.; Wang, Z.; Luo, X.; Kurths, J. Exponential synchronization of delayed memristor-based uncertain complex-valued neural networks for image protection. IEEE Trans. Neural. Netw. Learn Syst. 2021, 32, 151165. [Google Scholar] [CrossRef]
  11. Zhu, P.; Cheng, L.; Gao, C.; Wang, Z.; Li, X. Locating multi sources in social networks with a low infection rate. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1853–1865. [Google Scholar] [CrossRef]
  12. Zhou, C.; Wang, C.; Sun, Y.; Yao, W.; Lin, H. Cluster output synchronization for memristive neural networks. Inf. Sci. 2022, 589, 459–477. [Google Scholar] [CrossRef]
  13. Kashkynbayev, A.; Issakhanov, A.; Otkel, M.; Kurths, J. Finite-time and fixed time synchronization analysis of shunting inhibitory memristive neural networks with time-varying delays. Chaos Solitons Fractals 2022, 156, 111866. [Google Scholar] [CrossRef]
  14. Cheng, L.; Tang, F.; Shi, X.; Qiu, J. Finite-time and fixed-time synchronization of delayed memristive neural networks via adaptive aperiodically intermittent adjustment Strategy. IEEE Trans. Neural Netw. Learn Syst. 2022, 1–15. [Google Scholar] [CrossRef]
  15. Zhou, C.; Wang, C.; Yao, W.; Lin, H. Observer-based synchronization of memristive neural networks under DoS attacks and actuator saturation and its application to image encryption. Appl. Math. Comput. 2022, 425, 127080. [Google Scholar] [CrossRef]
  16. Chee, C.Y.; Xu, D. Chaos-based Mary digital communication technique using controlled projective synchronization. IEEE Proc.-Circ. Dev. Syst. 2006, 153, 357–360. [Google Scholar] [CrossRef]
  17. Mainieri, R.; Rehacek, J. Projective synchronization in three-dimensional chaotic systems. Phys. Rev. Lett. 1999, 82, 3042. [Google Scholar] [CrossRef]
  18. Fu, Q.; Zhong, S.; Jiang, W.; Xie, W. Projective synchronization of fuzzy memristive neural networks with pinning impulsive control. J. Frankl. Inst. 2020, 357, 10387–10409. [Google Scholar] [CrossRef]
  19. Chen, C.; Li, L.; Peng, H.; Yang, Y.; Mi, L.; Qiu, B. Fixed-time projective synchronization of memristive neural networks with discrete delay. Phys. Stat. Mech. Its Appl. 2019, 534, 122248. [Google Scholar] [CrossRef]
  20. Ding, Z.; Chen, C.; Wen, S.; Li, S.; Wang, L. Lag projective synchronization of nonidentical fractional delayed memristive neural networks. Neurocomputing 2022, 469, 138–150. [Google Scholar] [CrossRef]
  21. Kumar, R.; Sarkar, S.; Das, S.; Cao, J. Projective synchronization of delayed neural networks with mismatched parameters and impulsive effects. IEEE Trans. Neural Netw. Learn Syst. 2019, 31, 1211–1221. [Google Scholar] [CrossRef]
  22. Guo, R.; Lv, W.; Zhang, Z. Quasi-projective synchronization of stochastic complex-valued neural networks with time-varying delay and mismatched parameters. Neurocomputing 2020, 415, 184–192. [Google Scholar] [CrossRef]
  23. Yang, N.; Yu, Y.; Zhong, S.; Wang, X.; Shi, K.; Cai, J. Impulsive effects on weak projective synchronization of parameter-mismatched stochastic memristive neural networks. J. Frankl. Inst. 2021, 358, 5909–5930. [Google Scholar] [CrossRef]
  24. Wu, F.; Huang, Y. Finite-time synchronization and H∞ synchronization of coupled complex-valued memristive neural networks with and without parameter uncertainty. Neurocomputing 2022, 469, 163–179. [Google Scholar] [CrossRef]
  25. Rajchakit, G.; Sriraman, R. Robust passivity and stability analysis of uncertain complex-valued impulsive neural networks with time-varying delays. Neural Process Lett. 2021, 53, 581–606. [Google Scholar] [CrossRef]
  26. Li, H.L.; Hu, C.; Zhang, L.; Jiang, H.; Cao, J. Non-separation method-based robust finite-time synchronization of uncertain fractional-order quaternion-valued neural networks. Appl. Math. Comput. 2021, 409, 126377. [Google Scholar] [CrossRef]
  27. Peng, H.; Wei, N.; Li, L.; Xie, W.; Yang, Y. Models and synchronization of time-delayed complex dynamical networks with multi-links based on adaptive control. Phys. Lett. A 2010, 374, 2335–2339. [Google Scholar] [CrossRef]
  28. Sheikh, M.S. A complex network analysis approach for estimation and detection of traffic incidents based on independent component analysis. Phys. Lett. A 2022, 586, 126504. [Google Scholar] [CrossRef]
  29. Cheng, L.; Li, X.; Han, Z.; Luo, T.; Ma, L.; Zhu, P. Path-based multi-sources localization in multiplex networks. Chaos Solitons Fractals 2022, 159, 112139. [Google Scholar] [CrossRef]
  30. Suárez, L.E.; Markello, R.D.; Betzel, R.F.; Misic, B. Linking structure and function in macroscale brain networks. Trends Cogn. Sci. 2020, 24, 302–315. [Google Scholar] [CrossRef]
  31. Qin, X.; Wang, C.; Li, L.; Peng, H.; Ye, L. Finite-time lag synchronization of memristive neural networks with multi-links via adaptive control. IEEE Access 2020, 8, 55398–55410. [Google Scholar] [CrossRef]
  32. Zhao, H.; Zheng, M. Finite-time synchronization of coupled memrisive neural network via robust control. IEEE Access 2019, 7, 31820–31831. [Google Scholar] [CrossRef]
  33. He, W.; Luo, T.; Tang, Y.; Du, W.; Tian, Y.C.; Qian, F. Secure communication based on quantized synchronization of chaotic neural networks under an event-triggered strategy. IEEE Trans. Neural Netw. Learn. Syst. 2019, 31, 3334–3345. [Google Scholar] [CrossRef]
  34. Mobini, M.; Kaddoum, G. Deep chaos synchronization. IEEE Open J. Commun. Soc. 2020, 1, 1571–1582. [Google Scholar] [CrossRef]
  35. Shanmugam, L.; Mani, P.; Rajan, R.; Joo, Y.H. Adaptive synchronization of reaction–diffusion neural networks and its application to secure communication. IEEE Trans. Cybern. 2018, 50, 911–922. [Google Scholar] [CrossRef] [PubMed]
  36. Ouyang, D.; Shao, J.; Jiang, H.; Nguang, S.K.; Shen, H.T. Impulsive synchronization of coupled delayed neural networks with actuator saturation and its application to image encryption. Neural Netw. 2020, 128, 158–171. [Google Scholar] [CrossRef]
  37. Gupta, M.; Gupta, M.; Deshmukh, M. Single secret image sharing scheme using neural cryptography. Multimed. Tools Appl. 2020, 79, 12183–12204. [Google Scholar] [CrossRef]
  38. Xiu, C.; Zhou, R.; Liu, Y. New chaotic memristive cellular neural network and its application in secure communication system. Chaos Sol. Fractals 2020, 141, 110316. [Google Scholar] [CrossRef]
  39. Chen, L.; Yin, H.; Huang, T.; Yuan, L.; Zheng, S.; Yin, L. Chaos in fractional-order discrete neural networks with application to image encryption. Neural Netw. 2020, 125, 174–184. [Google Scholar] [CrossRef]
  40. Yuan, M.; Wang, W.; Luo, X.; Li, L. Asymptotic anti-synchronization of memristor-based BAM neural networks with probabilistic mixed time-varying delays and its application. Mod. Phys. Lett. B 2018, 32, 1850287. [Google Scholar] [CrossRef]
  41. Liu, A.; Zhao, H.; Wang, Q.; Niu, S.; Gao, X.; Chen, C.; Li, L. A new predefined-time stability theorem and its application in the synchronization of memristive complex-valued BAM neural networks. Neural Netw. 2022, 153, 152–163. [Google Scholar] [CrossRef] [PubMed]
Figure 1. The nonlinear behavioral model of the memristor.
Figure 1. The nonlinear behavioral model of the memristor.
Entropy 25 01241 g001
Figure 2. The simplified mathematical model of the memristor.
Figure 2. The simplified mathematical model of the memristor.
Entropy 25 01241 g002
Figure 3. Dynamic trajectories of systems (11) and (12) without controller. (a) Chaotic sequences of drive system (11); (b) States of error system (18); (c) Input of the ineffective control.
Figure 3. Dynamic trajectories of systems (11) and (12) without controller. (a) Chaotic sequences of drive system (11); (b) States of error system (18); (c) Input of the ineffective control.
Entropy 25 01241 g003
Figure 4. Dynamic trajectories of systems (11) and (12). (a) Chaotic sequences of drive system (11); (b) States of drive system (11) without controller; (c) States of response system (12) without controller; (d) Synchronization error of system (18) under feedback controller (19) with α = 1 ; (e) Anti-synchronization error of system(18) under feedback controller (19) with α = 1 ; (f) Adaptive-synchronization error of system (18) under adaptive controller (41).
Figure 4. Dynamic trajectories of systems (11) and (12). (a) Chaotic sequences of drive system (11); (b) States of drive system (11) without controller; (c) States of response system (12) without controller; (d) Synchronization error of system (18) under feedback controller (19) with α = 1 ; (e) Anti-synchronization error of system(18) under feedback controller (19) with α = 1 ; (f) Adaptive-synchronization error of system (18) under adaptive controller (41).
Entropy 25 01241 g004
Figure 5. Dynamic trajectories of systems (11) and (12) without uncertainties. (a) Chaotic sequences of drive system (11); (b) States of drive system (11) without controller; (c) States of response system (12) without controller; (d) Synchronization error of system (18) under feedback controller (19) with α = 1 ; (e) Anti-synchronization error of system (18) under feedback controller (19) with α = 1 ; (f) Adaptive-synchronization error of system (18) under adaptive controller (41).
Figure 5. Dynamic trajectories of systems (11) and (12) without uncertainties. (a) Chaotic sequences of drive system (11); (b) States of drive system (11) without controller; (c) States of response system (12) without controller; (d) Synchronization error of system (18) under feedback controller (19) with α = 1 ; (e) Anti-synchronization error of system (18) under feedback controller (19) with α = 1 ; (f) Adaptive-synchronization error of system (18) under adaptive controller (41).
Entropy 25 01241 g005
Figure 6. Inputs from different types controllers. (a) Feedback controller (19) with buffeting phenomenon; (b) Feedback anti-controller with buffeting phenomenon; (c) Adaptive controller (41) with buffeting phenomenon; (d) Feedback controller (19) without buffeting phenomenon; (e) Feedback anti-controller without buffeting phenomenon; (f) Adaptive controller (41) without buffeting phenomenon.
Figure 6. Inputs from different types controllers. (a) Feedback controller (19) with buffeting phenomenon; (b) Feedback anti-controller with buffeting phenomenon; (c) Adaptive controller (41) with buffeting phenomenon; (d) Feedback controller (19) without buffeting phenomenon; (e) Feedback anti-controller without buffeting phenomenon; (f) Adaptive controller (41) without buffeting phenomenon.
Entropy 25 01241 g006
Figure 7. Secure communication process of proposed algorithm.
Figure 7. Secure communication process of proposed algorithm.
Entropy 25 01241 g007
Figure 8. The transmitted signals.
Figure 8. The transmitted signals.
Entropy 25 01241 g008
Figure 9. Trajectories of plaintexts and decrypted siganls under adaptive control approach. (a) r 1 ( t ) = sin ( t ) ; (b) r 2 ( t ) = cos ( t ) .
Figure 9. Trajectories of plaintexts and decrypted siganls under adaptive control approach. (a) r 1 ( t ) = sin ( t ) ; (b) r 2 ( t ) = cos ( t ) .
Entropy 25 01241 g009
Figure 10. The error between plaintexts and decrypted siganls.
Figure 10. The error between plaintexts and decrypted siganls.
Entropy 25 01241 g010
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Han, Z.; Chen, N.; Wei, X.; Yuan, M.; Li, H. Projective Synchronization of Delayed Uncertain Coupled Memristive Neural Networks and Their Application. Entropy 2023, 25, 1241. https://doi.org/10.3390/e25081241

AMA Style

Han Z, Chen N, Wei X, Yuan M, Li H. Projective Synchronization of Delayed Uncertain Coupled Memristive Neural Networks and Their Application. Entropy. 2023; 25(8):1241. https://doi.org/10.3390/e25081241

Chicago/Turabian Style

Han, Zhen, Naipeng Chen, Xiaofeng Wei, Manman Yuan, and Huijia Li. 2023. "Projective Synchronization of Delayed Uncertain Coupled Memristive Neural Networks and Their Application" Entropy 25, no. 8: 1241. https://doi.org/10.3390/e25081241

APA Style

Han, Z., Chen, N., Wei, X., Yuan, M., & Li, H. (2023). Projective Synchronization of Delayed Uncertain Coupled Memristive Neural Networks and Their Application. Entropy, 25(8), 1241. https://doi.org/10.3390/e25081241

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop