Firoz Chogle , Seba Sara Varghese , Abdel-Baset M.A. Ibrahim , Awadhesh Prasad , Hichem Eleuch
{"title":"Chaos and regularities in cavity assisted two-channel nonlinear coupler","authors":"Firoz Chogle , Seba Sara Varghese , Abdel-Baset M.A. Ibrahim , Awadhesh Prasad , Hichem Eleuch","doi":"10.1016/j.chaos.2024.115650","DOIUrl":"10.1016/j.chaos.2024.115650","url":null,"abstract":"<div><div>This paper presents a study of the dynamical behavior in a cavity-assisted two-channel Kerr nonlinear directional coupler. Applying a deterministic periodic laser pump to a two-channel coupled system led to a range of dynamic behaviors, encompassing periodicity, quasiperiodicity, chaoticity and hyperchaoticity. This is confirmed by the exploration of the Lyapunov exponents, Poincaré sections and bifurcation diagrams for resonance and low cavity detuning. For low cavity detuning, chaos arises when the laser pump’s amplitude is large. This is due to higher interactions between photons and the cavity, resulting in more photons inside and higher nonlinearity. On the other hand, the reduced interactions in high cavity detuning displayed regular behavior which is explained qualitatively.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115650"},"PeriodicalIF":5.3,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of hybrid strategies of complex network attack and defense games","authors":"Zhe Li, Jin Liu, Jiaqi Ren, Yibo Dong, Weili Li","doi":"10.1016/j.chaos.2024.115662","DOIUrl":"10.1016/j.chaos.2024.115662","url":null,"abstract":"<div><div>Critical infrastructure networks serve as the backbone of modern society’s operations, and the application of game theory to safeguard these networks against deliberate attacks under resource constraints is of paramount importance. Regrettably, the existing body of research on hybrid attack and defense strategies for nodes and edges is notably scarce, despite the ubiquity of such strategies in practical contexts. Current understanding regarding the establishment of a cost constraint model within the framework of hybrid attack and defense strategies, the strategic inclinations of both adversarial and defensive parties under varying cost constraint coefficients, and the influence of resource allocation ratios on equilibrium outcomes remains limited. Consequently, this study constructs a game-theoretic model for the engagement of critical infrastructure networks under non-uniform cost constraints, incorporating hybrid attack and defense strategies for nodes and edges, and conducts an equilibrium analysis across a range of cost constraint coefficients and resource allocation ratios. The findings reveal that when resource availability is limited, both attackers and defenders are inclined towards a strategy of concentrated resource allocation; in contrast, under most circumstances, defenders exhibit a preference for an equitable distribution of resources.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115662"},"PeriodicalIF":5.3,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hongwei Kang , Xin Li , Yong Shen, Xingping Sun, Qingyi Chen
{"title":"Particle swarm optimization with historical return decay enhances cooperation in public goods games with investment risks","authors":"Hongwei Kang , Xin Li , Yong Shen, Xingping Sun, Qingyi Chen","doi":"10.1016/j.chaos.2024.115665","DOIUrl":"10.1016/j.chaos.2024.115665","url":null,"abstract":"<div><div>In the realm of spatial public goods games, heterogeneous investment has emerged as a potent mechanism to enhance cooperative behavior. Savvy investors dynamically adjust their investment levels to optimize returns based on environmental conditions and personal circumstances. This study delves into the evolution of cooperation within a spatial public goods game framework, characterized by heterogeneous investment and associated risks, conducted on a square lattice. We introduce the investors (I) with heterogeneous investment, who updates his investment amount according to the current environment of the game and his own historical experience. We introduce a particle swarm optimization algorithm with decaying historical returns to fine-tune the investment levels of investors. Furthermore, a risk mechanism inspired by the ultimatum game is integrated into the model. This paper investigates the impact of the risk threshold <span><math><mi>θ</mi></math></span> on cooperative behavior and examines the influence of the risk decay factor <span><math><mi>α</mi></math></span> on cooperation. Additionally, it analyzes the investment behavior of investors in scenarios where two types of investors coexist. Finally, this study explores the effects of the historical best payoff decay factor <span><math><mi>β</mi></math></span> and the self-learning rate <span><math><msub><mrow><mi>c</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> on cooperative behavior. This research contributes to a nuanced understanding of heterogeneous investment behaviors in public goods games under specified risk mechanisms, providing novel insights into the intricate dynamics of cooperation in complex systems.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115665"},"PeriodicalIF":5.3,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying influential nodes in social networks via improved Laplacian centrality","authors":"Xiaoyu Zhu , Rongxia Hao","doi":"10.1016/j.chaos.2024.115675","DOIUrl":"10.1016/j.chaos.2024.115675","url":null,"abstract":"<div><div>Identifying influential nodes in social networks has significant applications in terms of social analysis and information dissemination. How to capture the crucial features of influential nodes without increasing the computational complexity is an urgent issue to be solved in the context of big data. Laplacian centrality (LC) measures nodal influence by computing nodes' degree, making it extremely low complexity. However, there is still significant room for improvement. Consequently, we propose the improved Laplacian centrality (ILC) to identify influential nodes based on the concept of self-consistent. Identifying results on 9 real networks prove that ILC is superior to LC and other 6 classical measures in terms of ranking accuracy, top-k nodes identification and discrimination capability. Moreover, the computational complexity of ILC has not significantly increased compared to LC, and remains the linear order of magnitude O(m). Additionally, ILC has excellent robustness and universality such that there is no need to adjust parameters according to different network structures.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115675"},"PeriodicalIF":5.3,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving resilience of cyber physical power networks against Time Synchronization Attacks (TSAs) using deep learning and spline interpolation with real-time validation","authors":"Soma Bhattacharya, Ebha Koley, Subhojit Ghosh","doi":"10.1016/j.chaos.2024.115647","DOIUrl":"10.1016/j.chaos.2024.115647","url":null,"abstract":"<div><div>The integration of high-speed communication networks and synchrophasors into smart grids has significantly improved real-time monitoring and control accuracy. However, the increased reliance on communication infrastructure has also heightened the vulnerability of the power networks to cyber intrusions. Synchronized phasor data and GPS time-stamping used by Phasor Measurement Units (PMUs), make them prime targets for cyber intrusions. Among the different types of intrusions in smart grids, Time Synchronization Attacks (TSA), because of their impact and easier execution, are widely employed by intruders to disrupt grid operations. Such attacks aim at spoofing GPS signals, thereby altering voltage and current phasor information across the network. The same leads to malfunction of the operations executed at the control center. The present work aims to develop a secured and resilient mechanism against TSAs in smart grids. In this regard, a two-stage mechanism based on deep learning and spline interpolation is proposed. The first stage employs an LSTM-based classifier to detect TSAs in the cyber layer. Post-TSA detection, the second stage uses spline interpolation to filter out malicious data. The filtering allows for the restoration of the actual pre-TSA data acquired from PMUs. The proposed TSA detection and correction scheme has been validated extensively across various TSA scenarios on IEEE 9, 14, and 57 bus systems. Majority of the reported works of TSA detection have been validated using offline numerical simulations, which have limitations in replicating practical TSA dynamics. To address the same, the proposed scheme has been validated using a real-time testbed comprising of a digital simulator, real PMU, GPS receiver, and a data acquisition module with a communication interface.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115647"},"PeriodicalIF":5.3,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Donghua Jiang , Zeric Tabekoueng Njitacke , Guoqiang Long , Jan Awrejcewicz , Mingwen Zheng , Lei Cai
{"title":"Novel Tabu learning neuron model with variable activation gradient and its application to secure healthcare","authors":"Donghua Jiang , Zeric Tabekoueng Njitacke , Guoqiang Long , Jan Awrejcewicz , Mingwen Zheng , Lei Cai","doi":"10.1016/j.chaos.2024.115632","DOIUrl":"10.1016/j.chaos.2024.115632","url":null,"abstract":"<div><div>Currently, the latest advances in artificial neural networks have deeply affected various aspects of the general public. To this end, a new Tabu Learning Neuron (TLN) model with variable activation gradients is proposed in this paper. Specifically, its kinetic behaviors and intrinsic properties are investigated by means of a two-parameter Lyapunov exponential spectrum, a bifurcation and an equilibrium point analysis. Moreover, its electronic circuit built in the PSpice environment agrees with the numerical results. Besides, in respect of its engineering applications, a novel data compression-encryption scheme based on the new TLN model, matrix factorization theory and compressive sensing technology is introduced for providing a secure data exchange environment in the healthcare community. Finally, performance evaluation indicates that the proposed cryptography scheme has remarkable advantages in terms of reconstruction quality and security.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115632"},"PeriodicalIF":5.3,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diffusion-driven instabilities in a tri-trophic food web model: From Turing to non-Turing patterns and waves","authors":"Bhaskar Chakraborty , Sounov Marick , Nandadulal Bairagi","doi":"10.1016/j.chaos.2024.115634","DOIUrl":"10.1016/j.chaos.2024.115634","url":null,"abstract":"<div><div>This work uses a reaction–diffusion system to explore self-organized pattern-forming phenomena through species distribution in a tri-trophic food web system. The interacting non-diffusive system involves a bottom prey, one specialist intermediate predator dependent on the bottom prey, and a generalist top predator, having its food preference regulation on both the bottom prey and intermediate predator. The system encounters temporal instability through Hopf-bifurcation and chaotic oscillations about the coexistence equilibrium with over-dependency on a particular food source. We provide analytical conditions for diffusion-driven Turing and wave instabilities. A weakly nonlinear analysis (WNA) is performed to examine the patterns of Turing instability close to the critical threshold. Numerical simulations show spatiotemporal patterns like spots, stripes, a mixture of spots & stripes and spatiotemporal chaos. The numerical investigations highlight the non-Turing instabilities consisting of Hopf, wave, Hopf-Turing, Hopf-wave. The diffusion of species suppresses regular and irregular spatiotemporal oscillations, giving stability to the system. Using a heat map of the Lyapunov exponents of the time series for different pairs of parameter values in a bi-parametric plane, it is demonstrated that the Turing pattern dominates the oscillatory Hopf pattern if the critical parameter value is from the Hopf-Turing region and is close to the Hopf bifurcation threshold, but the Hopf pattern dominates if the parameter pair is significantly away from it. The qualitative comparison of the non-Turing instabilities is provided with the corresponding spatiotemporal distribution of the species. It is observed that the high-amplitude oscillations of Hopf and Hopf-dominated non-Turing oscillations are vicious for the spatially distributed population.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115634"},"PeriodicalIF":5.3,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generating digital chaotic systems of the simplest structure via a strongly connected graph inverse approach","authors":"Qianxue Wang, Dongsheng Kuang, Simin Yu","doi":"10.1016/j.chaos.2024.115655","DOIUrl":"10.1016/j.chaos.2024.115655","url":null,"abstract":"<div><div>This paper designs the simplest <span><math><mi>m</mi></math></span>-dimensional (<span><math><mrow><mi>m</mi><mo>=</mo><mn>2</mn><mo>,</mo><mn>3</mn><mo>,</mo><mn>4</mn><mo>,</mo><mo>…</mo></mrow></math></span>) digital chaotic system using a strongly connected graph inverse approach. Compared to previous systems, this approach significantly simplifies the system structure while enhancing statistical performance. First, in the <span><math><mi>m</mi></math></span>-dimensional digital iterative system, we construct <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>m</mi></mrow></msup></math></span>-state transition graph with bidirectional direct paths between any two states. Under the condition that the bitwise XOR result between any two states equals the combination of the current <span><math><mi>m</mi></math></span> unilateral infinite sequence outputs, we derive the corresponding simplest uncoupled <span><math><mi>m</mi></math></span>-dimensional iterative functions based on the inverse approach. Second, based on the simplest uncoupled <span><math><mi>m</mi></math></span>-dimensional iterative functions, we develop a cascaded closed-loop coupling approach to obtain the corresponding simplest fully coupled <span><math><mi>m</mi></math></span>-dimensional iterative functions, theoretically proving that they satisfy Devaney’s chaos definition. Compared to previous systems, this closed-loop coupling method not only simplifies the system structure, making it the simplest form among all fully coupled <span><math><mi>m</mi></math></span>-dimensional iterative functions, but also significantly improves statistical performance, as evidenced by passing both NIST and TestU01 tests. Finally, we validate the effectiveness and superiority of the simplest <span><math><mi>m</mi></math></span>-dimensional digital chaotic system through circuit design and FPGA simulation experiments.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115655"},"PeriodicalIF":5.3,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yinuo Wang , Chuandong Li , Hongjuan Wu , Hao Deng
{"title":"Stability of nonlinear delayed impulsive control systems via step-function method","authors":"Yinuo Wang , Chuandong Li , Hongjuan Wu , Hao Deng","doi":"10.1016/j.chaos.2024.115631","DOIUrl":"10.1016/j.chaos.2024.115631","url":null,"abstract":"<div><div>In this paper, considering that the limited speed of information transfer may generate time delay, which can sometimes influence the stability of the system, but in reality time delay is pervasive, and sometimes can have a positive impact on system’s stability, so it is essential to think about its existence. The nonlinear systems under delayed impulsive control (IC) are investigated here, and we mainly utilize the multiple-spans step-function method to analyse the stability conditions of the considered systems, which can be counted as a generalization of the Lyapunov-like stability method and is less conservative compared with the existing traditional Lyapunov-like function method. Moreover, it is the first time that this method employed for the stability of systems with IC and time delay. Two examples of equidistant impulses of nonlinear autonomous system and non-equidistant impulses of linear time-varying system by using two-spans step-function method are presented to validate the utility of the presented approach, respectively. Besides, the Zeno behavior of autonomous system without time delay is provided and treated by the presented method, which can better manifest the extensive viability of the method compared with the Lyapunov-like function method.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115631"},"PeriodicalIF":5.3,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal resilient tracking control of switched systems under denial-of-service attacks","authors":"Chen Chen , Lijie Wang","doi":"10.1016/j.chaos.2024.115648","DOIUrl":"10.1016/j.chaos.2024.115648","url":null,"abstract":"<div><div>This article investigates the optimal output tracking problem for linear switched systems under DoS attacks. In contrast to early results which only consider the stability of switched systems under DoS attacks, the proposed control scheme can ensure the stability of the system while optimizing the system performance. Firstly, an augmented system is constructed based on the physical objects and command generator. Then, a Riccati equation of such an augmented system with DoS attacks is provided, and the optimal control scheme is obtained by iterative algorithm. Furthermore, to better align with practical scenarios, in this article, some restrictions on the instants of DoS attacks and switchings are removed, that is, multiple switchings are allowed during both active and inactive intervals of DoS attacks. In addition, the quantitative relationship regarding the duration and frequency of DoS attacks and the switching law is provided, which plays a key role in ensuring the stability of switching system under attacks. Finally, numerical examples are provided to demonstrate the effectiveness of the proposed method.</div></div>","PeriodicalId":9764,"journal":{"name":"Chaos Solitons & Fractals","volume":"189 ","pages":"Article 115648"},"PeriodicalIF":5.3,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}