Next Article in Journal
Antimicrobial Effect of Phytochemicals from Edible Plants
Previous Article in Journal
Optimization of Ultrasound-Assisted Extraction of Spent Coffee Grounds Oil Using Response Surface Methodology
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Synthesis of Polynomial Fuzzy Model-Based Designs with Synchronization and Secure Communications for Chaos Systems with H Performance

1
Department of Electrical Engineering, National Chung Cheng University, Chia-Yi 62102, Taiwan
2
Department of Electrical Engineering, National Penghu University of Science and Technology, Magong 88046, Taiwan
*
Author to whom correspondence should be addressed.
Submission received: 23 October 2021 / Revised: 17 November 2021 / Accepted: 19 November 2021 / Published: 22 November 2021
(This article belongs to the Section Process Control and Monitoring)

Abstract

:
This paper presents the sum of squares (SOS)-based fuzzy control with H∞ performance for a synchronized chaos system and secure communications. To diminish the influence of the extrinsic perturbation, SOS-based stability criteria of the polynomial fuzzy system are derived by using the polynomial Lyapunov function. The perturbation decreasing achievement is indexed in a H∞ criterion. The submitted SOS-based stability criteria are more relaxed than the existing linear matrix inequality (LMI)-based stability criteria. The cryptography scheme based on an n-shift cipher is combined with synchronization for secure communications. Finally, numerical simulations illustrate the perturbation decay accomplishment of the submitted polynomial fuzzy compensator.

1. Introduction

In recent years, the studies on synchronization of chaos systems have acquired substantial attention. The drive-response frame, which is the means to synchronize chaos systems, was established by Caroll and Pecora [1]. The master chaos system, as a drive system, is synchronized with another chaos system, the response system. Complicated dynamic phenomena are the major characteristics of chaos systems. For instance, chaos systems are sensitive to parameter variation and initial conditions, such that the trajectory of states is unpredictable. As a result of these properties, chaos synchronization can be applied to communications for security and privacy [2], and photovoltaic module fault detection [3]. How to operate the variables of the response system to equal those of the drive system in various original states is the essential problem of the synchronization of chaos systems.
Many control methods have been developed for chaos synchronization, such as iterative learning control [4], robust adaptive control [5], sliding mode control [6], and adaptive fuzzy perturbation observer [7]. The Takagi–Sugeno (T-S) fuzzy model with linear matrix inequality (LMI) control is effective among these control strategies. A nonlinear dynamic plant can be easily described by using the T-S fuzzy model, which is constructed from IF–THEN fuzzy rules [8]. By using the parallel distributed compensation (PDC) method, T-S fuzzy compensators can be portrayed. Furthermore, solving LMI-based stability conditions can secure the state feedback gain. Thus, chaotic systems have been synchronized through T-S fuzzy modeling and control [9,10,11,12]. In [9], the LMI-based fuzzy control was applied to synchronization of chaotic systems. In [10], the perturbation observer-based LMI was engaged for the synchronization of T-S fuzzy chaos systems. In [11], the design of an adaptive TSK fuzzy self-organizing compensator was proposed for chaotic systems. An exact linearization (EL) technique, which was employed to synchronize the chaotic systems via the PDC, has been discussed [12]. However, there still exist two design issues in LMI-based T-S fuzzy control methodology. First, T-S fuzzy models cannot describe all nonlinear systems. Second, the LMI-based stability conditions will be very tentative if the quadratic Lyapunov function is employed. Thus, some literature has taken relaxed stability conditions into account [13,14,15]. In [13], the conservativeness of stabilization criterion for the T-S fuzzy system was significantly relaxed using the constraints condition of the controller membership functions. From a line-integral Lyapunov function, a possible conservatism generated by the derivation of the membership function was removed to raise the relaxation of the sufficient conditions [14]. In [15], the piecewise fuzzy Lyapunov function was introduced and less conservatism was attained. Therefore, this paper employs a polynomial Lyapunov function to acquire the sum of squares (SOS)-based stability criteria of chaotic synchronization systems to reduce the conservativeness of the LMI-based stability criteria.
The polynomial fuzzy model can more efficaciously characterize the nonlinear system than the T-S fuzzy model [16]. Several studies on polynomial fuzzy control systems have been investigated recently [17,18,19,20,21]. In [17], polynomial Lyapunov functions are designed by introducing a gradient algorithm without applying the typical transformation so that the polynomial fuzzy controller with SOS stability conditions was received. In [18], the message and character of membership functions are deliberated in the SOS-based stability design of (interval type 2) IT2 polynomial-fuzzy-model-based control systems. In [19], a homogeneously state-dependent polynomial Lyapunov function was proposed for an observed-state feedback polynomial fuzzy control system. In [20], using a free full-block multiplier, the conservativeness of SOS-based stability analysis was reduced. In [21], using the Lyapunov function and the S-procedure, SOS-based stability criteria are received for uncertain large-scale polynomial T–S fuzzy systems. However, when an extrinsic perturbation occurs in the chaos synchronization systems, the stability of the system cannot be guaranteed using these SOS criteria.
Consequently, based on the above observations from the literature, this paper takes extrinsic perturbation into account to synthesize the H control of polynomial fuzzy chaos synchronization systems. That is, the proffered SOS-based stability conditions not only guarantee that the chaos synchronization systems are stable but also that H is achieved for the perturbation attenuation. Further, the proffered methodology can evade the aforesaid shortcomings of the T-S fuzzy compensator with LMI stability criteria. Moreover, the cryptography scheme based on an n-shift cipher combined with synchronization is applied to increase the security of the transmitted signal. The solutions of the submitted SOS-based criteria in this paper were determined by using SOSTOOLS [22]. This paper proposes two novel theorems and the contributions of this article are summarized as follows. First, SOS-based stability criteria with H performance are proposed for chaos synchronization. Then, a second theorem with SOS stability criteria is acquired to perform quasi-linearization (QL) of a chaos system.
This paper is organized as follows. In Section 2.1, the polynomial fuzzy systems with extrinsic perturbation are given. Moreover, using the polynomial Lyapunov function, we derive the SOS stability criteria and obtain H . In Section 2.2 and Section 2.3, the chaos synchronization and secure communication are discussed. Section 3 shows the simulation results of the comparison with the SOS approach and the LMI approach. Finally, some conclusions are drawn in Section 4.

2. Methods

This section presents the design of a polynomial fuzzy compensator for synchronized chaos systems and secure communications. First, stability criteria are derived for the polynomial fuzzy system with extrinsic perturbation. Second, the drive-response structure is employed for chaotic synchronization, and two cases of the polynomial fuzzy synchronized chaos system are studied. Last, the polynomial fuzzy synchronized chaos system is combined with cryptography technology to raise the security of communications.

2.1. H Polynomial Fuzzy Compensator

The extrinsic perturbation in chaos synchronization systems will result in destroying stability or degrading accomplishment. The polynomial fuzzy model can more efficaciously characterize the nonlinear system and is more universal than the Takagi-Sugeno (T-S) fuzzy model. Accordingly, the H polynomial fuzzy control will be investigated for chaos systems in this section.

2.1.1. Polynomial Fuzzy Chaos System with Extrinsic Perturbation

The state variables are included in the polynomial fuzzy chaos system with extrinsic perturbation. The following fuzzy rules describe the polynomial fuzzy chaos system.
IF   z 1 ( t )   is   M i 1       and   z p ( t )   is   M i p THEN   x ˙ ( t ) = A i ( x ( t ) ) x ^ ( x ( t ) ) + B u ( t ) + D n ( t ) y ( t ) = C x ^ ( x ( t ) ) i = 1 ,   2 ,   ,   r .
where z ( t ) = [ z 1 ( t ) ,   z 2 ( t ) ,   ,   z P ( t ) ] denotes the variables in the premise, M i j ( j = 1 ,   2 ,   ,   p ) is the membership function, and r indicates the number of fuzzy rules. x ( t ) R n denotes a state vector. x ^ ( x ( t ) ) R N is a vector of which all elements are monomials in x ( t ) . A i ( x ( t ) ) R n × N indicates a polynomial system matrix. B R n × m , D R n × p , and C R q × N denote constant system matrices. u ( t ) R m is a compensator input. n ( t ) R p indicates a perturbation. y ( t ) R q denotes a vector of output signal.
The results of the polynomial fuzzy chaos plant are expressed by
x ˙ ( t ) = i = 1 r ω i ( z ( t ) ) { A i ( x ( t ) ) x ^ ( x ( t ) ) + B u ( t ) + D n ( t ) } i = 1 r ω i ( z ( t ) ) = i = 1 r h i ( z ( t ) ) { A i ( x ( t ) ) x ^ ( x ( t ) ) + B u ( t ) + D n ( t ) } y ( t ) = C x ^ ( x ( t ) )
where
ω i ( z ( t ) ) = j = 1 P M i j ( z j ( t ) ) ,   ω i ( z ( t ) ) 0 ,   i = 1 r ω i ( z ( t ) ) > 0 ,   i = 1 ,   2 ,   ,   r .
Thus,
h i ( z ( t ) ) = ω i ( z ( t ) ) i = 1 r ω i ( z ( t ) ) , i = 1 r h i ( z ( t ) ) = 1

2.1.2. Polynomial Fuzzy Compensator Gain

Based on the parallel distributed compensation (PDC) strategy, both the polynomial fuzzy compensator and the polynomial fuzzy model have identical fuzzy membership functions. The polynomial fuzzy compensator can hold state variables, which is the principal discrimination between the polynomial fuzzy compensator and the T-S fuzzy compensator. The following presents the fuzzy control if–then rules
IF   z 1 ( t )   is   M i 1       and   z p ( t )   is   M i p THEN   u ( t ) = F i ( x ( t ) ) x ^ ( x ( t ) ) , i = 1 ,   2 ,   ,   r .
The overall compensator is acquired by executing the sum of each control rule
u ( t ) = i = 1 r h i ( z ( t ) ) F i ( x ( t ) ) x ^ ( x ( t ) )
where F i ( x ( t ) ) denotes the compensator gain.

2.1.3. Polynomial Fuzzy Compensated Chaos System

The whole polynomial fuzzy compensated chaos system include the polynomial fuzzy chaos system and the polynomial fuzzy compensator. Thus, replacing the control signal (2) with (6) obtains the overall polynomial fuzzy compensated chaos system shown by
x ˙ ( t ) = i = 1 r h i ( z ( t ) ) { [ A i ( x ( t ) ) B F i ( x ( t ) ) ] x ^ ( x ( t ) ) } + D n ( t ) y ( t ) = C x ^ ( x ( t ) )

2.1.4. Sum of Squares

The definition of the sum of squares (SOS) for a multivariate polynomial f ( x ( t ) ) (where x ( t )     R n ) is as follows. If there are polynomials f 1 ( x ( t ) ) , , f m ( x ( t ) ) , which meet
f ( x ( t ) ) = i = 1 m f i 2 ( x ( t ) )
Then, f ( x ( t ) ) is an SOS, which intimates it is positive for x ( t )     R n . Accordingly, f ( x ( t ) ) is an SOS if the matrix R is positive and semidefinite so that
f ( x ( t ) ) = x ^ T ( x ( t ) ) R x ^ ( x ( t ) )
where x ^ ( x ( t ) ) denotes a vector whose elements are monomials in x ( t ) .

2.1.5. H SOS-Based Stability Criteria

Using the polynomial Lyapunov function secures the H SOS-based stability criteria to diminish the influence of an extrinsic perturbation and guarantee the polynomial fuzzy compensated chaos system (7) is universally stable. A i k ( x ) indicates the k th row of A i ( x ) . K = { k 1 , k 2 , , k m } denotes the row indices of B and D of which the corresponding row is zero. In addition, define x ˜ = ( x k 1 , x k 2 , , x k m ) . The perturbation attenuation can be achieved through minimizing ξ with
sup n ( t ) 2 0 y ( t ) 2 n ( t ) 2 ξ
Theorem 1.
If the SOS-based stability criteria (11) and (12) are satisfied for a polynomial symmetric matrix  R ( x ˜ ) N × N  and a polynomial matrix  O i ( x )  with prescribed  ξ  in (10), the system (7) will be  H  stable.
minimize   R ,   O 1 , , O r ξ 2
Subject to
w T ( R ( x ˜ ) α ( x ) I ) w   is   SOS ,
w T ( Φ i ( x ) β i ( x ) I   ) w   is   SOS ,   i = 1 ,   2 ,   ,   r .
where w is unconnected with the states, which meets α ( x ) > 0 and β i ( x ) 0 . L i j ( x ) = x ^ i x j ( x ) indicates the (i,j) th element of the polynomial matrix L ( x ) R N × n ;
Φ i ( x ) = [ Q i ( x ) D T L T ( x ) ξ 2 I 0 C R ( x ˜ ) 0 I ]
Q i ( x ) = { L ( x ) A i ( x ) R ( x ˜ ) L ( x ) B O i ( x ) + R ( x ˜ ) A i T ( x ) L T ( x ) O i T ( x ) B T L T ( x ) k K R ( x ˜ ) x k A i k ( x ) x ^ ( x ) }
Furthermore, compensator gains F i ( x ) are calculated by
F i ( x ) = O i ( x ) R 1 ( x ˜ )
The proof of Theorem 1 is given in Appendix A.

2.2. Chaotic Synchronization

This section presents the drive-response structure of chaotic synchronization. The drive system is the reference model, which shall be traced. The proposed H polynomial fuzzy compensator is designed in the response system to accomplish the synchronized chaos systems. The H SOS-based fuzzy compensator can be obtained by employing Theorem 1. Theorem 2 is employed to perform the quasilinearization of the chaos system. Two cases of the synchronized discrepancies are discussed.
Case 1: The synchronization discrepancies are minute.
Case 2: The synchronization discrepancies are in excess of case 1.

2.2.1. Case 1

Assume that the synchronization discrepancies are minute. In this case, the drive chaos system can be characterized by the following polynomial fuzzy model
IF   z d 1 ( t )   is   M i 1   and     and   z d p ( t )   is   M i p THEN   x ˙ d ( t ) = A i ( x d ( t ) ) x ^ d ( t ) y d ( t ) = C x ^ d ( t ) i = 1 ,   2 ,   ,   r .
where z d ( t ) = [ z d 1 ( t ) ,   z d 1 ( t ) ,   ,   z d p ( t ) ] . x d ( t ) = [ x d 1 ( t ) ,   x d 1 ( t ) ,   ,   x d n ( t ) ] T . x ^ d ( t ) R N denotes the state signal and the elements are monomials in x d ( t ) . A i ( x d ( t ) ) R n × N is a system matrix of the drive chaos system. y d ( t ) R q indicates the output signal for the drive chaos system.
The whole drive fuzzy model can be obtained as
x ˙ d ( t ) = i = 1 r h i ( z d ( t ) ) A i ( x d ( t ) ) x ^ d ( t ) y d ( t ) = C x ^ d ( t )
A response chaos system could be described by another polynomial fuzzy model shown as follows
IF   z r 1 ( t )   is   M i 1   and     and   z r p ( t )   is   M i p THEN   x ˙ r ( t ) = A i ( x r ( t ) ) x ^ r ( t ) + B u ( t ) y r ( t ) = C x ^ r ( t ) i = 1 ,   2 ,   ,   r .
where z r ( t ) = [ z r 1 ( t ) ,   z r 2 ( t ) ,   ,   z r p ( t ) ] . x r ( t ) =   [ x r 1 ( t ) ,   x r 2 ( t ) ,   ,   x r n ( t ) ] T . x ^ r ( t ) R N denotes the state signal and the elements are monomials in x r ( t ) . A i ( x r ( t ) ) R n × N is a system matrix of the response chaos system. y r ( t ) R q indicates the output signal for the response chaos system.
The whole response fuzzy model can be obtained by
x ˙ r ( t ) = i = 1 r h i ( z r ( t ) ) A i ( x r ( t ) ) x ^ r ( t ) + B u ( t ) y r ( t ) = C x ^ r ( t )
Let the state discrepancy be defined as e ^ ( t ) = x ^ r ( t ) x ^ d ( t ) . When a message is dispatched between the drive and response chaos systems, an extrinsic perturbation frequently occurs in the public channel. The following presents the discrepancy model with extrinsic perturbation
e ˙ ( t ) = x ˙ r ( t ) x ˙ d ( t ) + D n ( t ) = i = 1 r h i ( z r ( t ) ) A i ( x r ( t ) ) x ^ r ( t ) i = 1 r h i ( z d ( t ) ) A i ( x d ( t ) ) x ^ d ( t ) + B u ( t ) + D n ( t )   = i = 1 r h i ( z r ( t ) ) A i ( x r ( t ) ) e ^ ( t ) + B u ( t ) + D n ( t ) + i = 1 r [ h i ( z r ( t ) ) A i ( x r ( t ) ) h i ( z d ( t ) ) A i ( x d ( t ) ) ] x ^ d ( t ) e y ( t ) = C e ^ ( t )
Let z d T ( t ) = x d ( t ) and z r T ( t ) = x r ( t ) . The final item will approach the null when e ^ ( t ) ρ for the ρ being very small,
i = 1 r [ h i ( z r ( t ) ) A i ( x r ( t ) ) h i ( z d ( t ) ) A i ( x d ( t ) ) ] x ^ d ( t ) 0
This indicates that the norm of synchronization discrepancies is limited to a minute scope. Therefore, the chaos discrepancy model with extrinsic perturbation can be approached as
e ˙ ( t ) = i = 1 r h i ( z r ( t ) ) A i ( x r ( t ) ) e ^ ( t ) + B u ( t ) + D n ( t ) e y ( t ) = C e ^ ( t )
In this case, the SOS-based polynomial fuzzy compensator is sketched by
u ( t ) = i = 1 r h i ( z r ( t ) ) F i ( x r ( t ) ) e ^ ( t )
Utilizing Theorem 1 acquires the compensator gains F i . The chaos discrepancy system can attenuate extrinsic perturbation with H achievement. This indicates that the SOS-based polynomial fuzzy compensator will not be executed until the discrepancy signal falls into a minute scope.

2.2.2. Case 2

Assume that the synchronization discrepancies are in excess the minute scope of case 1. That is, e ^ ( t ) > ρ . Thus, we design two polynomial fuzzy sub-compensators to achieve the synchronization of the chaos systems.
Sub-compensator 1:
IF   z d 1 ( t )   is   M i 1       and   z d p ( t )   is   M i p THEN   u 1 ( t ) = F i ( x d ( t ) ) x ^ d ( t ) i = 1 ,   2 ,   ,   r .
Sub-compensator 2:
IF   z r 1 ( t )   is   M i 1       and   z r p ( t )   is   M i p THEN   u 2 ( t ) = F i ( x r ( t ) ) x ^ r ( t ) i = 1 ,   2 ,   ,   r .
The whole polynomial fuzzy compensator will be built as
u ( t ) = u 1 ( t ) + u 2 ( t ) = i = 1 r h i ( z r ( t ) ) F i ( x r ( t ) ) x ^ r ( t ) + i = 1 r h i ( z d ( t ) ) F i ( x d ( t ) ) x ^ d ( t )
By (20) and (26), the chaos discrepancy system can be rewritten as follows:
e ˙ ( t ) = i = 1 r h i ( z r ( t ) ) { A i ( x r ( t ) ) B F i ( x r ( t ) ) } x ^ r ( t ) + D n ( t )   i = 1 r h i ( z d ( t ) ) { A i ( x d ( t ) ) B F i ( x d ( t ) ) } x ^ d ( t )   e y ( t ) = C e ^ ( t )
The quasilinearization will be used in the following section.
Theorem 2.
If thereare compensator gains F i ( x r ( t ) )  and  F i ( x d ( t ) )  so that
v T ( [ μ I ( G 1 ( x r ( t ) ) G i ( x r ( t ) ) ) R ( x ˜ ( t ) ) ( G 1 ( x d ( t ) ) G i ( x d ( t ) ) ) R ( x ˜ ( t ) ) ( G ( x r ( t ) ) G ( x d ( t ) ) ) R ( x ˜ ( t ) ) I ] ε i 1 ( x r ( t ) ) ) v is   SOS   for   2 i r .
Then, G 1 ( x r ( t ) ) = G i ( x r ( t ) , G 1 ( x d ( t ) ) = G i ( x d ( t ) ) , and G ( x r ( t ) ) = G ( x d ( t ) ) . Thus, the chaos discrepancy system (27) is quasi-linearized (QL) as:
e ˙ ( t ) = G ( x r ( t ) ) x ^ r ( t ) G ( x d ( t ) ) x ^ d ( t ) + D n ( t ) = G ( x r ( t ) ) e ^ ( t ) + D n ( t ) e y ( t ) = C e ^ ( t )
where ε i 1 ( x r ( t ) ) is a nonnegative polynomial for all x r ( t ) , v is a vector, which is unconnected to x r ( t ) , R ( x ˜ ( t ) ) is a positive matrix, and μ is a small positive number.
G i ( x r ( t ) ) = A i ( x r ( t ) ) B F i ( x r ( t ) ) , G i ( x d ( t ) ) = A i ( x d ( t ) ) B F i ( x d ( t ) ) , for   i = 1 ,   2 , r .
The proof of Theorem 2 is given in Appendix A.
The quasilinearization of chaos synchronization can be obtained through Theorem 2. However, Theorem 2 cannot guarantee the system is always stable with H performance. Therefore, we utilize Theorem 1 such that the stability of the quasilinearization of the chaos system is globally stable with H performance. Since the chaos discrepancy system (29) is a special polynomial fuzzy system (i = 1), the stability conditions with H performance (12) of Theorem 1 can be simplified as
w T ( Φ ( x ) β ( x ) I   ) w   is   SOS

2.3. Chaotic Secure Communications

Using the property of a chaotic system, which is excessively reactive to original states, the chaos system can be applied to secure communications. This section combines cryptography technology with a chaotic system to raise the security of the dispatched message. In order to encrypt the original signal, an n-shift cipher is adopted. Figure 1 shows the block diagram of chaotic secure communications.
The encryption function is described as
Θ n ( t ) = f 1 ( f 1 ( f 1 ( p ( t ) , k ( t ) ) , k ( t ) ) , , k ( t ) )
where
f 1 ( p , k ) = { ( p + k ) + 2 λ 2 λ ( p + k ) λ ( p + k ) λ ( p + k ) λ ( p + k ) 2 λ λ ( p + k ) 2 λ
p ( t ) is a plaintext signal, k ( t ) is the key signal, which is retrieved from one state of the variable of the chaotic system, n is the number of shifts, 2 λ is the range of plaintext signal plus key signal, and Θ n ( t ) is a ciphertext signal.
By using the decryption function, the recovered signal p ^ ( t ) can be obtained. The decryption rule is described as
p ^ ( t ) = f 1 ( f 1 ( f 1 ( Θ ^ n ( t ) , k ^ ( t ) ) , k ^ ( t ) ) , , k ^ ( t ) )
where Θ ^ n ( t ) is a recovered ciphertext and k ^ ( t ) is a recovered key signal.
The chaotic secure system with extrinsic perturbation is designed as:
IF   z d 1 ( t )   is   M i 1       and   z d p ( t )   is   M i p THEN   x ˙ d ( t ) = A i ( x d ( t ) ) x ^ d ( t ) + B Θ n ( t ) y d ( t ) = C x ^ d ( t ) i = 1 ,   2 ,   ,   r .
Using fuzzy reasoning obtains the overall outputs of the polynomial fuzzy encrypter system
x ˙ d ( t ) = i = 1 r h i ( z d ( t ) ) A i ( x d ( t ) ) x ^ d ( t ) + B Θ n ( t ) y d ( t ) = C x ^ d ( t )
IF   z r 1 ( t )   is   M i 1       and   z r p ( t )   is   M i p THEN   x ˙ r ( t ) = A i ( x r ( t ) ) x ^ r ( t ) + B ( u ( t ) + s ( t ) ) + D n ( t ) y r ( t ) = C x ^ r ( t ) i = 1 ,   2 ,   ,   r .
where s ( t ) is a transmitted message and designed as
s ( t ) = i = 1 r h i ( z d ( t ) ) F i ( x d ( t ) ) x ^ d ( t ) + Θ n ( t )
u ( t ) = i = 1 r h i ( z r ( t ) ) F i ( x r ( t ) ) x ^ r ( t )
Using fuzzy reasoning obtains the final outputs of the polynomial fuzzy decrypter system
x ˙ r ( t ) = i = 1 r h i ( z r ( t ) ) { A i ( x r ( t ) ) B F i ( x r ( t ) ) } x ^ r ( t ) + i = 1 r h i ( z d ( t ) ) B F i ( x d ( t ) ) x ^ d ( t ) + B Θ n ( t ) + D n ( t ) y r ( t ) = C x ^ r ( t )
By (36)–(40), the chaos discrepancy system with cryptography is obtained
e ˙ ( t ) = i = 1 r h i ( z r ( t ) ) [ A i ( x r ( t ) ) B F i ( x r ( t ) ) ] x ^ r ( t ) + i = 1 r h i ( z d ( t ) ) B F i ( x d ( t ) ) x ^ d ( t ) + B Θ n ( t ) + D n ( t ) [ i = 1 r h i ( z d ( t ) ) A i ( x d ( t ) ) x ^ d ( t ) + B Θ n ( t ) ] e y ( t ) = C e ^ ( t )
In case 1, (41) can be rewritten as follows:
i = 1 r h i ( z r ( t ) ) A i ( x r ( t ) ) e ^ ( t ) i = 1 r h i ( z r ( t ) ) B F i ( x r ( t ) ) e ^ ( t ) + D n ( t ) + i = 1 r [ h i ( z r ( t ) ) A i ( x r ( t ) ) h i ( z d ( t ) ) A i ( x d ( t ) ) ] x ^ d ( t ) + i = 1 r [ h i ( z r ( t ) ) B F i ( x r ( t ) ) h i ( z d ( t ) ) B F i ( x d ( t ) ) ] x ^ d ( t )
Let z d T ( t ) = x d ( t ) and z r T ( t ) = x r ( t ) . The final two items will approach null when e ^ ( t ) ρ for the ρ being very small,
i = 1 r [ h i ( z r ( t ) ) A i ( x r ( t ) ) h i ( z d ( t ) ) A i ( x d ( t ) ) ] x ^ d ( t )   0
i = 1 r [ h i ( z r ( t ) ) B F i ( x r ( t ) ) h i ( z d ( t ) ) B F i ( x d ( t ) ) ] x ^ d ( t ) 0
Therefore, the chaotic error system with cryptography is similar to (22).
In case 2, (41) can be rewritten as (27).

3. Results

In this section, two cases of computer simulation are offered to illustrate the viability of the submitted methodology and to validate the expected H performance. Furthermore, the sum of squares (SOS) compensator is compared with the linear matrix inequality (LMI) compensator to display the effectiveness of the submitted approach.

3.1. Case 1

In this section, the polynomial fuzzy compensator based on Theorem 1 will be executed if the synchronized discrepancies fall into a minute scope. Due to the chaos behavior of Chua’s circuit, one of the state variables will be the key signal for secure communication. The following presents the chaotic Chua’s system with perturbation.
Chua’s circuit:
x ˙ 1 ( t ) = σ 1 ( x 1 ( t ) + x 2 ( t ) f ( x 1 ( t ) ) ) x ˙ 2 ( t ) = x 1 ( t ) x 2 ( t ) + x 3 ( t ) x ˙ 3 ( t ) = σ 2 x 2 ( t )
With a nonlinear resistor f ( x 1 ( t ) ) = g b x 1 ( t ) + 0.5 ( g a   g b ) ( | x 1 ( t ) + 1 | | x 1 ( t ) 1 | ) , where σ 1 = 10 ,   σ 2 = 14.87 , g a = 1.27 , and g b = 0.68 . The nonlinear term f ( x 1 ( t ) ) of Chua’s circuit satisfies lim x 1 ( t ) 0 x Ω ( f ( x 1 ( t ) ) / x 1 ( t ) ) = g a . Then, f ( x 1 ( t ) ) is taken as φ ( x 1 ( t ) ) with
φ ( x 1 ( t ) ) { f ( x 1 ( t ) ) / x 1 ( t ) , g a ,   x 1 ( t ) 0   x 1 ( t ) = 0
Select x 1 ( t ) as the premise state and design the fuzzy set to be M 1 ( x 1 ( t ) ) = ( 1 / 2 ) ( 1 ( φ ( x 1 ( t ) ) / d ) ) and M 2 ( x 1 ( t ) )   = 1 M 1 ( x 1 ( t ) ) with d = sup x r Ω | φ ( x 1 ) | = 3 .
Deliberate synchronization of two fuzzy Chua’s systems in which the drive and response systems are represented by (16) and (18), respectively. Let the system matrices be designed as:
A 1 ( x r ( t ) ) = A 1 ( x d ( t ) ) = [ ( d 1 ) σ 1 σ 1 0 1 1 1 0 σ 2 0 ] ,
A 2 ( x r ( t ) ) = A 2 ( x d ( t ) ) = [ ( d + 1 ) σ 1 σ 1 0 1 1 1 0 σ 2 0 ] ,
B = [ 1 0 0 ] ,   C = [ 1 1 0 ] .
The original conditions of the response system are arbitrarily selected as x r ( 0 ) = [ 0.1 0.1 0.1 ] T and those of the drive system are arbitrarily selected as x d ( 0 ) = [ 0.1 0.1 0.1 ] T . If there exists an extrinsic perturbation, which is a pulse with amplitude 40 occurring from the 35th sec to the 36th sec, we assume the perturbation appeared in the first state, which means that D = [ 1 0 0 ] T . The H achievement is chosen as ξ = 0.2 for better perturbation attenuation. The plaintext signal is set as p(t) = 2sin(t) for better demonstration. The number of shifts is selected as n = 30 for better security. The key signal is retrieved from the first state of the Chua’s circuit, i.e., k(t) = x d 1 ( t ) and k ^ ( t ) = x r 1 ( t ) . The range of plaintext signal plus the key signal is estimated as λ = 8. Then, utilizing Theorem 1 we acquire the compensator ( F 1 ,   F 2 ) and the matrix R whose eigenvalues are positive. To compare with the SOS methodology, the LMI-based compensator is procured from the literature [8].
SOS-based compensator ( ξ = 0.2)
F 1 = [ 61.6093 27.5899 0.0058 ]
F 2 = [ 8.5459 29.5633 0.0734 ]
R = [ 2.7517 1.0915 0.0247 1.0915 1.4974 0.0285 0.0247 0.0285 0.0725 ]
LMI-based compensator ( ξ = 0.2)
F 1 = [ 38.2871 28.5285 0.8880 ]
F 2 = [ 21.7129 28.5285 0.8880 ]
R = [ 0.2500 0.2272 0.0000 0.2272 0.2758 0.0009 0.0000 0.0009 0.0047 ]
Figure 2, Figure 3 and Figure 4 display the compared responses of the perturbation decay achievement. Figure 5 shows that the operation commences at t = 10 s, but the control signal is joined around 10.5 s when e ^ ( t ) 4 . To evaluate the H performance of proposed method, an integral square error (ISE) is defined as follows:
ISE = 35 40 e ( t ) d t
The value of ISE via the SOS method is 3.02 and the value of ISE via the LMI method is 6.17. Apparently, the submitted SOS-based compensator has better perturbation rejection.
Based on Theorem 1, the compensator ( F 1 ,   F 2 ) and the matrix R , whose eigenvalues are positive at various ξ , are obtained as follows. Figure 6, Figure 7 and Figure 8 show the H achievement at various ξ cases with the compensators operating at t 10 . Obviously, the perturbation attenuation achievement will be increased when the value of ξ is decreased.
SOS-based compensator ( ξ = 0.6)
F 1 = [ 48.2971 15.2806 0.0009 ]
F 2 = [ 6.8468 15.6567 0.0164 ]
R = [ 12.5995 2.1331 0.0633 2.1331 4.3748 0.0695 0.0633 0.0695 0.2725 ]
SOS-based compensator ( ξ = 0.9)
F 1 = [ 41.4964 13.4478 0.0136 ]
F 2 = [ 13.3518 13.7721 0.0033 ]
R = [ 16.6246 2.3470 0.0736 2.3470 5.3791 0.0830 0.0736 0.0830 0.3425 ]
Figure 9 shows the encrypted signal. Figure 10 shows the recovered signal with perturbation rejection. Figure 11 and Figure 12 show that the SOS method is more relaxed than the LMI method. The stability criteria via SOS are more universal than those via LMI. That is, the result from the LMI method is also a solution for the SOS-based method. From the above outcomes, we confirm that the proposed SOS-based fuzzy compensator also offers larger feasible space and achieves better perturbation attenuation performance for Chua’s system.

3.2. Case 2

In this section, the polynomial fuzzy decrypter based on Theorem 2 will be executed if the synchronized discrepancies exceed the minute scope of case 1. The fuzzy model of two Chua’s circuits and the simulation parameters (such as the initial states, r, p(t), n, λ , k(t), and k ^ ( t ) ) are the same as case 1 except that the extrinsic perturbation is a pulse with amplitude 40 and occurs from the 30th sec to the 31th sec.
Thus, applying Theorem 2 could acquire the compensators ( F 1 ,   F 2 ) and the matrix R whose eigenvalues are positive. To contrast with the SOS methodology, the LMI-based compensator is procured from the literature [8].
SOS-based compensator ( ξ = 0.2)
F 1 = [ 103.2541 96.2763 0.1880 ]
F 2 = [ 96.5163 91.0441 0.1315 ]
R = [ 0.9843 0.0512 0.0004 0.0512 1.0614 0.0145 0.0004 0.0145 0.0713 ]
LMI-based compensator ( ξ = 0.2)
F 1 = [ 34.7109 25.1400 0.8711 ]
F 2 = [ 25.2891 25.1400 0.8711 ]
R = [ 0.2926 0.2618 0.0000 0.2618 0.3388 0.0013 0.0000 0.0013 0.0070 ]
Figure 13, Figure 14 and Figure 15 show the comparison results of the perturbation attenuation performance for Chua’s circuit. Figure 16 shows the recovered signal with perturbation rejection for Chua’s circuit. Moreover, the SOS approach is superior to the LMI approach for Chua’s circuit.

4. Conclusions

This study displayed the H synthesis of a polynomial fuzzy compensator through the sum of squares (SOS) approach for synchronization of chaos systems and secure communications. The SOS-based criteria with H performance was proposed against the extrinsic perturbation through the polynomial Lyapunov function. Based on the norm of synchronization discrepancies, the chaos synchronization was divided into two cases. Numerical simulation showed that the synchronization discrepancy can converge to zero, and the signal can be recovered under extrinsic perturbation in either case 1 or case 2. The feasible space of the proposed stability conditions via SOS was larger than that of the existing stability conditions via linear matrix inequality (LMI). Moreover, the H performance of the proposed SOS chaos control system was superior to that of the existing LMI chaos control system.

Author Contributions

Conceptualization, G.-R.Y.; formal analysis, G.-R.Y., Y.-D.C. and C.-H.C.; investigation, Y.-D.C. and C.-H.C.; methodology, G.-R.Y. and Y.-D.C.; project administration, G.-R.Y.; software, C.-H.C.; validation, G.-R.Y.; writing—original draft, C.-H.C.; writing—review and editing, G.-R.Y. and Y.-D.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research is sponsored in part by the Ministry of Science and Technology of Taiwan (MOST), under Grant No MOST 108-2221-E-194-058-MY3.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Proof of Theorem 1.
Let the Lyapunov function V ( x ) = x ^ T ( x ) P ( x ˜ ) x ^ ( x ) , where P ( x ˜ ) = R 1 ( x ˜ ) N × N is a polynomial matrix whose eigenvalues are greater than zero. This indicates that the polynomial Lyapunov function will be positive except for the states at the original point when (11) is held. Performing the differentiation of V ( x ) with respect to time obtains
V ˙ ( x ) = x ^ T ( x ) R 1 ( x ˜ ) x ^ ˙ ( x ) + x ^ ˙ T ( x ) R 1 ( x ˜ ) x ^ ( x ) + x ^ T ( x ) R ˙ 1 ( x ˜ ) x ^ ( x ) y T ( t ) y ( t ) + ξ 2 n T ( t ) n ( t )
x ^ T ( x ) R 1 ( x ˜ ) L ( x ) x ˙ + x ˙ T L T ( x ) R 1 ( x ˜ ) x ^ ( x ) + x ^ T ( x ) ( k K R 1 ( x ˜ ) x k x ˙ k ) x ^ ( x ) y T ( t ) y ( t ) + ξ 2 n T ( t ) n ( t )
The following equation holds when B k = 0 and D k = 0 for k K ,
x ˙ k = i = 1 r h i ( z ) A i k ( x ) x ^ ( x )   for   k K
Substituting (7) and (A3) into (A2) grants
i = 1 r h i ( z ) x ^ T ( x ) × { R 1 ( x ˜ ) L ( x ) [ A i ( x ) B F i ( x ) ] + [ A i ( x ) B F i ( x ) ] T L T ( x ) R 1 ( x ˜ ) + k K R 1 ( x ˜ ) x k A i k ( x ) x ^ ( x ) + C T C } x ^ ( x ) + x ^ T ( x ) R 1 ( x ˜ ) L ( x ) D n ( t ) + n T ( t ) D T L T ( x ) R 1 ( x ˜ ) x ^ ( x ) ξ 2 n T ( t ) n ( t ) 0
i = 1 r h i ( z ) [ x ^ T ( x ) n T ( t ) ]   × [ Γ i ( x ) R 1 ( x ˜ ) L ( x ) D D T L T ( x ) R 1 ( x ˜ ) ξ 2 I ] [ x ^ ( x ) n ( t ) ] 0
where
Γ i ( x ) = R 1 ( x ˜ ) L ( x ) [ A i ( x ) B F i ( x ) ] + [ A i ( x ) B F i ( x ) ] T L T ( x ) R 1 ( x ˜ ) + k K R 1 ( x ˜ ) x k A i k ( x ) x ^ ( x ) + C T C
From (A5), the following conditions can be procured:
i = 1 r h i ( z ) [ Γ i ( x ) D T L T ( x ) R 1 ( x ˜ ) ξ 2 I ] 0
(A7) can be decomposed as follows:
[ i = 1 r h i ( z ) Ν i ( x ) D T L T ( x ) R 1 ( x ˜ ) ξ 2 I ] [ C T C 0 0 0 ] = [ i = 1 r h i ( z ) Ν i ( x ) D T L T ( x ) R 1 ( x ˜ ) ξ 2 I ] [ C T 0 ]   [ C 0 ] 0
where
Ν i ( x ) = {   R 1 ( x ˜ ) L ( x ) [ A i ( x ) B F i ( x ) ] + [ A i ( x ) B F i ( x ) ] T L T ( x ) R 1 ( x ˜ ) + k K R 1 ( x ˜ ) x k A i k ( x ) x ^ ( x ) }
Utilizing the Schur complement, (A8) becomes
[ i = 1 r h i ( z ) Ν i ( x ) D T L T ( x ) R 1 ( x ˜ ) ξ 2 I 0 C 0 I ] 0
Consequently, the following inequality holds
[ Ν i ( x ) D T L T ( x ) R 1 ( x ˜ ) ξ 2 I 0 C 0 I ] 0
The left-hand side of the above equation is multiplied by diag { R ( x ˜ ) I I }
[ Τ i ( x ) D T L T ( x ) ξ 2 I 0 C R ( x ˜ ) 0 I ] 0
where
Τ i ( x ) = { L ( x ) [ A i ( x ) B F i ( x ) ] R ( x ˜ ) + R ( x ˜ ) [ A i ( x ) B F i ( x ) ] T L T ( x ) + k K R ( x ˜ ) R 1 ( x ˜ ) x k R ( x ˜ ) A i k ( x ) x ^ ( x ) } .
Since the inverse of R ( x ˜ ) exists, R 1 ( x ˜ ) R ( x ˜ ) = I . Performing the derivative on both sides of the equation obtains
R 1 ( x ˜ ) x k R ( x ˜ ) + R 1 ( x ˜ ) R ( x ˜ ) x k = 0
Rewriting (A14) yields
R ( x ˜ ) x k = R ( x ˜ ) R 1 ( x ˜ ) x k R ( x ˜ )
Utilizing (A15) and letting O i ( x ) = F i ( x ) R ( x ˜ ) , (A12) becomes
Φ i ( x ) = [ Q i ( x ) D T L T ( x ) ξ 2 I 0 C R ( x ˜ ) 0 I ] 0
where
Q i ( x ) = { L ( x ) A i ( x ) R ( x ˜ ) L ( x ) B O i ( x ) + R ( x ˜ ) A i T ( x ) L T ( x ) O i T ( x ) B T L T ( x ) k K R ( x ˜ ) x k A i k ( x ) x ^ ( x ) }
Hence, the SOS-based stability criteria (12) are achieved as follows:
w T ( Φ i ( x ) β i ( x ) I   ) w   is   SOS
Performing the integration on both sides of (12) from zero to infinity obtains
V ( x ( ) ) V ( x ( 0 ) ) 0 y ( t ) 2 2 d t + 0 ξ 2 n ( t ) 2 2 d t
Based on the original state x(0) = 0 and V ( x ( ) ) 0 , the following inequality holds
0 y ( t ) 2 2 d t 0 n ( t ) 2 2 d t ξ 2
Accordingly, if (12) holds, the L2 gain of the polynomial fuzzy chaos plant will be less than ξ . □
Proof of Theorem 2.
Assume there exist F i ( x r ( t ) ) and F i ( x d ( t ) ) such that
[ G 1 ( x r ( t ) ) G i ( x r ( t ) ) G 1 ( x d ( t ) ) G i ( x d ( t ) ) G ( x r ( t ) ) G ( x d ( t ) ) ] T [ G 1 ( x r ( t ) ) G i ( x r ( t ) ) G 1 ( x d ( t ) ) G i ( x d ( t ) ) G ( x r ( t ) ) G ( x d ( t ) ) ] = 0
Then, G 1 ( x r ( t ) ) = G i ( x r ( t ) , G 1 ( x d ( t ) ) = G i ( x d ( t ) ) , and G ( x r ( t ) ) = G ( x d ( t ) ) . The chaotic error system (29) can be obtained. However, if B is a singular matrix, then F i ( x r ( t ) ) ) and F i ( x d ( t ) ) ) cannot be obtained by F i ( x r ( t ) ) = B 1 . ( G ( x d ( t ) ) A i ( x d ( t ) ) )   and   F i ( x d ( t ) ) = B 1 ( G ( x d ( t ) ) A i ( x d ( t ) ) ) , respectively. Therefore, (A22) could be utilized to avoid this situation.
μ I R ( x ˜ ( t ) ) [ G 1 ( x r ( t ) ) G i ( x r ( t ) ) G 1 ( x d ( t ) ) G i ( x d ( t ) ) G ( x r ( t ) ) G ( x d ( t ) ) ] T [ G 1 ( x r ( t ) ) G i ( x r ( t ) ) G 1 ( x d ( t ) ) G i ( x d ( t ) ) G ( x r ( t ) ) G ( x d ( t ) ) ] R ( x ˜ ( t ) ) > 0
where μ a small positive number. This implies if μ I is near zero in the above inequalities, then the condition (A21) is satisfied. Using the Schur complement, we derive
[ μ I ( G 1 ( x r ( t ) ) G i ( x r ( t ) ) ) R ( x ˜ ( t ) ) ( G 1 ( x d ( t ) ) G i ( x d ( t ) ) ) R ( x ˜ ( t ) ) ( G ( x r ( t ) ) G ( x d ( t ) ) ) R ( x ˜ ( t ) ) I ]
Therefore, the SOS condition (28) is obtained as follows:
v T ( [ μ I ( G 1 ( x r ( t ) ) G i ( x r ( t ) ) ) R ( x ˜ ( t ) ) ( G 1 ( x d ( t ) ) G i ( x d ( t ) ) ) R ( x ˜ ( t ) ) ( G ( x r ( t ) ) G ( x d ( t ) ) ) R ( x ˜ ( t ) ) I ] ε i 1 ( x r ( t ) ) ) v   is   SOS .

References

  1. Zhang, F.; Liu, J.; Wang, Z.; Jiang, C. N-Systems function projective combination synchronization—A review of real and complex continuous time chaos synchronization. IEEE Access 2019, 7, 179320–179338. [Google Scholar] [CrossRef]
  2. Jiang, N.; Pan, W.; Yan, L.; Luo, B.; Xiang, S.; Yangn, L.; Zheng, D.; Li, N. Chaos synchronization and communication in multiple time-delayed coupling semiconductor lasers forcen by a third laser. IEEE J. Sel. Top. Quantum Electron. 2017, 17, 1220–1227. [Google Scholar] [CrossRef]
  3. Lu, S.-D.; Wang, M.-H.; Wei, S.-E.; Liu, H.-D.; Wu, C.-C. Photovoltaic module fault detection based on a convolutional neural network. Processes 2021, 9, 1635. [Google Scholar] [CrossRef]
  4. Cheng, C.-K.; Chao, C.-P. Chaotic synchronizing systems with zero time delay and free couple via iterative learning control. Appl. Sci. 2018, 8, 177. [Google Scholar] [CrossRef] [Green Version]
  5. Zare, A.; Mirrezapour, S.Z.; Hallaji, M.; Shoeibi, A.; Jafari, M.; Ghassemi, N.; Alizadehsani, R.; Mosavi, A. Robust adaptive synchronization of a class of uncertain chaotic systems with unknown time-delay. Appl. Sci. 2020, 10, 8875. [Google Scholar] [CrossRef]
  6. Lin, C.-H.; Hu, G.-H.; Chan, C.-Y.; Yan, J.-J. Chaos-based synchronized dynamic keys and their application to image encryption with an improved AES algorithm. Appl. Sci. 2021, 11, 1329. [Google Scholar] [CrossRef]
  7. Giap, V.N.; Nguyen, Q.D.; Huang, S.-C. Synthetic adaptive fuzzy perturbation observer and sliding-mode control for chaos-based secure communication systems. IEEE Access 2021, 9, 23907–23928. [Google Scholar] [CrossRef]
  8. Tanaka, K.; Wang, H.O. Fuzzy Control Systems Design and Analysis: A Linear Matrix Inequality Approach; Wiley-Interscience: New York, NY, USA, 2016. [Google Scholar]
  9. Aguiar, B.; González, T.; Bernal, M. A way to exploit the fractional stability domain for robust chaos suppression and synchronization via LMIs. IEEE Trans. Autom. Control 2016, 61, 2796–2807. [Google Scholar] [CrossRef]
  10. Giap, V.N.; Huang, S.-C.; Nguyen, Q.D.; Su, T.-J. Perturbation observer-based linear matrix inequality for the synchronization of Takagi-Sugeno fuzzy chaotic systems. IEEE Access 2020, 8, 225805–225821. [Google Scholar] [CrossRef]
  11. Wang, S.-Y.; Lin, C.-M.; Li, C.-H. Design of adaptive TSK fuzzy self-organizing recurrent cerebellar model articulation compensator for chaotic systems control. Appl. Sci. 2021, 11, 1567. [Google Scholar] [CrossRef]
  12. Gam, R.; Sakly, A. On the stability of fuzzy chaotic systems based on linear matrix inequalities LMI. In Proceedings of the 2016 5th International Conference on Systems and Control, Marrakesh, Morocco, 25–27 May 2016; pp. 37–42. [Google Scholar]
  13. Lee, S. Novel stabilization criteria for T–S fuzzy systems with affine matched membership functions. IEEE Trans. Fuzzy Syst. 2019, 27, 540–548. [Google Scholar] [CrossRef]
  14. Ku, C.-C.; Yeh, Y.-C.; Lin, Y.-H.; Hsieh, Y.-Y. Fuzzy static output control of T–S fuzzy stochastic systems via line integral Lyapunov function. Processes 2021, 9, 697. [Google Scholar] [CrossRef]
  15. Sun, S.; Zhang, H.; Qin, Z.; Xi, R. Delay-dependent H∞ guaranteed cost control for uncertain switched T–S fuzzy systems with multiple interval time-varying delays. IEEE Trans. Fuzzy Syst. 2021, 29, 1065–1080. [Google Scholar] [CrossRef]
  16. Lam, H.K.; Wu, L.; Lam, J. Two-step stability analysis for general polynomial-fuzzy-model-based control systems. IEEE Trans. Fuzzy Syst. 2015, 23, 511–524. [Google Scholar] [CrossRef] [Green Version]
  17. Tanaka, K.; Tanaka, M.; Chen, Y.-J.; Wang, H.O. A new sum-of-squares design framework for robust control of polynomial fuzzy systems with uncertainties. IEEE Trans. Fuzzy Syst. 2016, 24, 94–110. [Google Scholar] [CrossRef]
  18. Xiao, B.; Lam, H.-K.; Li, H. Stabilization of interval type-2 polynomial-fuzzy-model-based control systems. IEEE Trans. Fuzzy Syst. 2017, 25, 205–217. [Google Scholar] [CrossRef] [Green Version]
  19. Lo, J.-C.; Lin, C. Polynomial fuzzy observed-state feedback stabilization via homogeneous Lyapunov methods. IEEE Trans. Fuzzy Syst. 2018, 26, 2873–2885. [Google Scholar] [CrossRef]
  20. Zhao, Y.; He, Y.; Feng, Z.; Shi, P.; Du, X. Relaxed sum-of-squares based stabilization conditions for polynomial fuzzy-model-based control systems. IEEE Trans. Fuzzy Syst. 2019, 27, 1767–1778. [Google Scholar] [CrossRef]
  21. Vu, V.-P.; Wang, W.-J. Polynomial compensator synthesis for uncertain large-scale polynomial T–S fuzzy systems. IEEE Trans. Cybern. 2021, 51, 1929–1942. [Google Scholar] [CrossRef] [PubMed]
  22. Prajna, S.; Papachristodoulou, A.; Seiler, P.; Parrilo, P.A. SOSTOOLS: Sum of Squares Optimization Toolbox for MATLAB. Available online: https://www.cds.caltech.edu/sostools/ (accessed on 20 August 2021).
Figure 1. Secure communication block diagram.
Figure 1. Secure communication block diagram.
Processes 09 02088 g001
Figure 2. Synchronization discrepancy e 1 ( t ) of Chua’s circuit in case 1.
Figure 2. Synchronization discrepancy e 1 ( t ) of Chua’s circuit in case 1.
Processes 09 02088 g002
Figure 3. Synchronization discrepancy e 2 ( t ) of Chua’s circuit in case 1.
Figure 3. Synchronization discrepancy e 2 ( t ) of Chua’s circuit in case 1.
Processes 09 02088 g003
Figure 4. Synchronization discrepancy e 3 ( t ) of Chua’s circuit in case 1.
Figure 4. Synchronization discrepancy e 3 ( t ) of Chua’s circuit in case 1.
Processes 09 02088 g004
Figure 5. Synchronization discrepancy e ( t ) of Chua’s circuit in case 1.
Figure 5. Synchronization discrepancy e ( t ) of Chua’s circuit in case 1.
Processes 09 02088 g005
Figure 6. Synchronization discrepancy e 1 ( t ) at various ξ in case 1.
Figure 6. Synchronization discrepancy e 1 ( t ) at various ξ in case 1.
Processes 09 02088 g006
Figure 7. Synchronization discrepancy e 2 ( t ) at various ξ in case 1.
Figure 7. Synchronization discrepancy e 2 ( t ) at various ξ in case 1.
Processes 09 02088 g007
Figure 8. Synchronization discrepancy e 3 ( t ) at various ξ in case 1.
Figure 8. Synchronization discrepancy e 3 ( t ) at various ξ in case 1.
Processes 09 02088 g008
Figure 9. The encryption message of Chua’s circuit in case 1.
Figure 9. The encryption message of Chua’s circuit in case 1.
Processes 09 02088 g009
Figure 10. The recovered message of Chua’s circuit in case 1.
Figure 10. The recovered message of Chua’s circuit in case 1.
Processes 09 02088 g010
Figure 11. Feasible space of stability criteria via the SOS approach for Chua’s circuit ( ξ = 0.2).
Figure 11. Feasible space of stability criteria via the SOS approach for Chua’s circuit ( ξ = 0.2).
Processes 09 02088 g011
Figure 12. Feasible space of stability criteria via the LMI approach for Chua’s circuit ( ξ = 0.2).
Figure 12. Feasible space of stability criteria via the LMI approach for Chua’s circuit ( ξ = 0.2).
Processes 09 02088 g012
Figure 13. Synchronization discrepancy e 1 ( t ) of Chua’s circuit in case 2.
Figure 13. Synchronization discrepancy e 1 ( t ) of Chua’s circuit in case 2.
Processes 09 02088 g013
Figure 14. Synchronization discrepancy e 2 ( t ) of Chua’s circuit in case 2.
Figure 14. Synchronization discrepancy e 2 ( t ) of Chua’s circuit in case 2.
Processes 09 02088 g014
Figure 15. Synchronization discrepancy e 3 ( t ) of Chua’s circuit in case 2.
Figure 15. Synchronization discrepancy e 3 ( t ) of Chua’s circuit in case 2.
Processes 09 02088 g015
Figure 16. The recovered message of Chua’s circuit in case 2.
Figure 16. The recovered message of Chua’s circuit in case 2.
Processes 09 02088 g016
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yu, G.-R.; Chang, Y.-D.; Chang, C.-H. Synthesis of Polynomial Fuzzy Model-Based Designs with Synchronization and Secure Communications for Chaos Systems with H Performance. Processes 2021, 9, 2088. https://0-doi-org.brum.beds.ac.uk/10.3390/pr9112088

AMA Style

Yu G-R, Chang Y-D, Chang C-H. Synthesis of Polynomial Fuzzy Model-Based Designs with Synchronization and Secure Communications for Chaos Systems with H Performance. Processes. 2021; 9(11):2088. https://0-doi-org.brum.beds.ac.uk/10.3390/pr9112088

Chicago/Turabian Style

Yu, Gwo-Ruey, Yong-Dong Chang, and Chih-Heng Chang. 2021. "Synthesis of Polynomial Fuzzy Model-Based Designs with Synchronization and Secure Communications for Chaos Systems with H Performance" Processes 9, no. 11: 2088. https://0-doi-org.brum.beds.ac.uk/10.3390/pr9112088

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop