<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Seventh International Workshop on Computer Modeling and Intelligent Systems, May</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Computer Modelling, Analysis of the Main Information Properties of Memristor and Its Application in Secure Communication System</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Volodymyr Rusyn</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergey Subbotin</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>George Vorobets</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Vorobets</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National University “Zaporizhzhia polytechnic”</institution>
          ,
          <addr-line>Zhukovsky str., 64, Zaporizhzhia, 69063</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Yuriy Fedkovych Chernivtsi National University</institution>
          ,
          <addr-line>Kotsybynsky str. 2, Chernivtsi, 58012</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2024</year>
      </pub-date>
      <volume>3</volume>
      <issue>2024</issue>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>In this paper, we present equation and system parameters that realize memristive chaotic system. The analysis and computer modelling of the main information properties of memristor are shown. For this, we created programming interface using one of the modern software LabView that allows to generate, analysis and research of the main information properties of memristor, focusing on time series of the three coordinates and phase portraits. The created another programming interface that demonstrates the masking and decrypt of the information are also presented.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Memristor</kwd>
        <kwd>information properties</kwd>
        <kwd>LabView</kwd>
        <kwd>security system1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Chaos theory has been established since the 1970’s due to its applications in many different
engineering research areas, such as robotics [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], electronic circuits of chaotic generators [
        <xref ref-type="bibr" rid="ref10 ref2 ref3 ref4 ref5 ref6 ref7 ref8 ref9">2-11</xref>
        ],
information security [12-14], etc. Many chaotic systems are realized using Arduino [15] and FPGA
[16-21].
      </p>
      <p>In 1971, Leon Chua suggested the existence of another basic element of the electrochemical
system, which realizes the connection between magnetic flux and charge. In 2008, scientists
managed to discover a new component. This component is called a memristor, this term was
formed as a result of merging the words "memory" and "resistor" (electrical resistance). This
term refers to a bipolar device, the electrical resistance of which varies depending on the amount
of charge flowing through it. The resistance of the memristor is called the memristor (M), which
is defined as the ratio of the change in the magnitude of the magnetic field flux to the change in
charge, and its value depends on how long the electric current flows through the memristor, that
is, the amount of charge that passed through it.</p>
      <p>The main advantage of a memristor is properties that are not stored in the form of a charge.
These properties differ from most types of modern semiconductor memory elements. This is the
main advantage, because it is not afraid of charge leakage, which is the main evil that everyone
wants to get rid of when switching to "nanochips". Another advantage of the memristor is its
energy independence. These properties ensure that the memristor is stored at the same time as
the existing materials used to make it. The successful production of the memristor by Hewlett
Packard (HP) greatly increased the interest of researchers in the memristor. Many scientists
began to use the memristor in analog systems and in digital media. Others have used memristors
as resistive memory modules and logic programs. The potential of using a memristor in
neuromorphic applications has also been studied by many researchers [22-25].</p>
      <p>Memristors, first of all, are extremely promising elements of binary non-volatile memory, in
which information is recorded by switching electrical resistance between resistive states with
low (ON) and high (OFF) resistance. Moreover, their electronic states “adjust” to input signals,
just as living organisms do. This is why memristors can imitate the functioning of biological
synapses connecting neurons in the brain. The main function of the latter is to transmit a signal
from one neuron to another, and the magnitude of the connection between neurons depends on
the relative time of their “firing”. It is this mechanism that is responsible for associative learning,
that is, the brain’s ability to find connections between different events, so the memristor can be
considered a prototype of an “electronic synapse”.</p>
      <p>Research in the field of artificial intelligence, and more specifically on the creation of an
artificial brain based on memristors, is also being conducted at Michigan State University under
the leadership of Wei Lu. Here, a memristor model was built based on a layer of a mixture of silver
and silicon and tungsten electrodes, and in the near future the scientists plan to create large
circuits consisting of thousands of such elements.</p>
      <p>The already studied properties of memristors allow us to say that on their basis it is possible
to create computers of a fundamentally new architecture, with performance significantly
exceeding semiconductor ones. Modern computers are built on the von Neumann architecture:
both data and programs are stored in the machine's memory in binary code, with the computing
module separated from the storage devices, and the programs executed sequentially, one after
the other. Progressive in the middle of the last century, such an architecture today no longer
meets the requirements for computer technology: programs have become much more complex,
and the volume of processed data has grown by orders of magnitude, if not tens of orders of
magnitude.</p>
      <p>A computer based on memristors could be a significant step forward, since it is capable of
simulating the functioning of the human brain, which does not have any single center for
collecting and processing information. Each block receives, processes and transmits its own data
arrays to other blocks, muscles, and sensory organs, which are insignificant compared to the
entire volume of incoming information. According to recent estimates, to build a model of the
human cerebral cortex from</p>
      <p>modern computer components, you will need at least 150,000
processors and 144 TB of RAM alone, and we are not even talking about the intelligence of a baby.</p>
      <p>In a memristor computer, many modules operate in parallel and independently of each other,
and the ability to store and operate an unlimited set of values from 0 to 1 means that executable
programs are not limited to binary code. Moreover, individual computer hardware components
processors, video chips, memory and hard drives - will become unnecessary in principle; the
machine will be an architecturally homogeneous device where all data will be simultaneously
stored and all operations with it will be carried out. For an upgrade, it will be enough to install
additional memristor modules, and for repairs, replace the failed ones.</p>
      <p>The memristor computer will not need to be “booted”: immediately after turning it on, it will
be ready to continue working, and from the very point where it was interrupted. Compared to
modern technology, the energy consumption of memristor machines will be negligible, and the
computing power will be simply gigantic.</p>
      <p>Considering that there is literally one step left before the mass production of memristors, it is
very possible that a memristor computer will become an intermediate step on the path to a
quantum computer.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Computer modelling of the main information properties of memristor</title>
      <p>The common thread that binds these four elements together as the four basic elements of circuit
theory is the fact that the characteristics of these elements relate the four variables in electrical
engineering (voltage, current, flux and charge) intimately. Fig. 1 shows this relationship</p>
      <p>Nonlinear behavior of memristive information properties is described by next equation
graphically.
system (1):
 ̇ = ;


 ̇ = −1 [ +  ( 2 − 1) ];
 ̇ = − −   +   .
(1)</p>
      <p>A chaotic time series is a sequence of data that exhibits chaotic behavior over time when
plotted. A characteristic of chaotic signals is that they are sensitive to initial conditions. This
means that a small change in the initial conditions can cause the results to look very different over
time. Chakotic signals often look chaotic and unpredictable. They look like random noise, but they
have a underlying deterministic dynamic.</p>
      <p>Until recently, specialists, when solving problems in their own subject area, were forced to
resort to the help of professional programmers, who, as a rule, were not knowledgeable in this
area. Such intermediation most often increased material and time costs, and most importantly,
reduced the quality of research and development. Even the use of specialized software only
partially solved this problem. The emergence of the latest generation of software products with
very user-friendly interfaces, adapted to the mentality and professional skills of specialists, has
made it possible for specialists to use them directly, without resorting to the help of
intermediaries. These new software products include LabVIEW, which has a very convenient user
interface and powerful graphical programming tools. With each subsequent version of LabVIEW,
the level of intellectualization of the user interface and ease of use increases.</p>
      <p>LabVIEW (Laboratory Virtual Instrumentation Engineering Workbench) is a platform and
development environment for a visual programming language created by National Instruments.
The purpose of this language is to automate the use of computational and measuring laboratory
equipment.</p>
      <p>For more than 35 years, engineers and scientists have used NI LabVIEW to develop
measurement systems, test benches, and control systems. LabVIEW is based on the graphical
programming language G. In addition to being programmable, LabVIEW provides a wide range of
tools and libraries, from interactive wizards and user interfaces to built-in compilers, linkers, and
debugging tools.</p>
      <p>There are two main differences between LabVIEW and other programming languages. First,
LabVIEW implements the concept of graphical programming, so the source code is a block
diagram (icons of language elements connected together), which is then compiled into machine
code. Despite this approach, LabVIEW uses the same programming constructs and techniques as
other languages: data types, loops, variables, recursion, event handling, and object-oriented
programming.</p>
      <p>The second distinctive feature of LabVIEW is its support for executing code written in the G
language in a data stream mode (stream programming), while traditional text-based languages
(for example, C and C++) provide code execution as a sequence of commands. Stream
programming languages (such as G, Agilent VEE, Microsoft Visual Programming Language and
Apple Quartz Composer) are based on the concept of data flow, which determines the sequence
of execution of the functional units of the program.</p>
      <p>At first it may seem that the difference between this approach and the traditional one is not
significant, but in practice it turns out differently. Namely, stream programming in the LabVIEW
environment allows the developer to fully focus on the data and how to process it. Program nodes
- functions, loops and other language constructs - receive data through inputs, process them and
output data using outputs. As soon as the parameter values arrive at each of the input terminals
of the node, the node code is executed (processing of the incoming data), after which the values
of the output parameters are available at the output terminals of the node for their further
transmission to other nodes according to the logic of the data flow. Accordingly, of two
sequentially connected nodes, the second one can be executed only after receiving data from the
previous one.</p>
      <p>Because the G language concept is easy to understand, LabVIEW provides equally
userfriendly and intuitive development environment tools. For example, unique debugging tools
allow you to visually display the process of data propagation along wires, as well as display the
corresponding values at the inputs and outputs of code nodes (we are talking about execution
animation).</p>
      <p>LabVIEW's graphical language and flow programming concept allows you to solve problems
more conveniently and efficiently than traditional text-based languages. The key features of
LabVIEW programming—namely, intuitive, graphical code and data-driven execution—make
programming more thought-like than other languages. Despite the high level of code abstraction,
the performance of programs written in LabVIEW remains comparable to languages like C, thanks
to the built-in code compiler.</p>
      <p>Another information property of memristor are phase portraits (Fig. 3).</p>
      <p>For qualitative analysis of nonlinear circuits, the phase space method is used. The current
values of the state variables of the analyzed circuit are plotted on its coordinate axes. Their
changes in time correspond to certain curves—phase trajectories—in the space of state variables.
The set of all phase trajectories—the phase portrait of the circuit—represents a comprehensive
description of all its possible modes.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Masking and decryption of the information using memristor</title>
      <p>Protecting information from unauthorized access is one of the most pressing tasks in
telecommunications. Often in telecommunication systems, we deal with digital signals as an
information carrier, for which there are already effective protection methods based on
cryptography algorithms. In the case of analog signals, other methods of information protection
are required, one of which is the masking method. The essence of this method is that it is
necessary to find a specific signal source that has the same spectral properties as the protected
information signal. Accordingly, if such a signal is mixed with an information signal, the resulting
signal turns out to be uninformative, and as a result, the information signal turns out to be
protected.</p>
      <p>The last decade has been known for extreme interest in the possibility of using dynamic chaos
for data encryption. At a conceptual level, there is a peculiar relationship between chaotic systems
and cryptographic systems. Therefore, in nonlinear dynamics, and in cryptography, nonlinear
transformation of information materializes. Such a transformation is deterministic (for example,
performed by a computer), on the other hand, it must be unpredictable for an external observer.
Therefore, the word “deterministic chaos” is quite “suitable” for cryptography.</p>
      <p>The block scheme demonstrates process of transmitting and receiving information using
chaotic signal for masking and decryption (Fig. 4). In this case, the transmitter and the receiver
systems are identical.</p>
      <p>The masking of the information based on nonlinear properties is provided by blending
information with the chaotic signal that was generated of the different coordinates. As an
information, there was used a sinusoidal signal with amplitude of 5 V and system parameters α =
0.6, β = 1.5, C = 1, L = 3, dt = 0.01, number of iterations N = 10000, dynamic variables x = y = 1.
Dynamic variables and system parameters are the keys for the masking information.</p>
      <p>Algorithm for the decryption has opposite effect.</p>
      <p>The program interface, which demonstrates the masking and decrypt of the information based
on a properties of memristor system (1) is presented in Fig. 5.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Discussion</title>
      <p>A memristor is a two-contact device, which means that a memristor can be integrated into
multilayer matrices of mutually perpendicular metal nanowires. Its architecture is significantly
more compact compared to modern semiconductor silicon processors, besides, the logic of
controlling such a matrix of intersecting nanowires is significantly simpler.
The fundamental and main difference between a memristor and most types of modern
semiconductor memory is that it does not retain its properties in the form of a charge. A
memristor is not characterized by charge leakage during recording, thus it can be said that it is
completely non-volatile. It is implied that the information recorded in the memristor can store
digital information for several tens of years. The duration of information storage depends on the
material of the memristor.</p>
      <p>Compared to these digital memory stores, the memristor has a much longer lifetime. With the
help of memristor technology, it is possible to design a new generation of computer equipment
that will surpass computers in such parameters as: speed, energy efficiency, the ability to process
large streams and volumes of information. Memristor technology is also widely used in robotics.
A memristor can be used as a bipolar key, a memory element, or a component of a logic element.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>There was used one of the modern software LabView (LabView-2020 (64-bit version for
Windows) for the analysis and modelling of the main information properties of memristor.
Equation and system parameters that realized memristive chaotic system are shown. The main
information properties of memristor such as a time series of the three chaotic X, Y and Z
coordinates and phase portraits in XY, XZ and YZ projections are presented. Masking and
decrypting of the information are presented using programming interface. Memristor that
generate nonlinear oscillations can be used as one of the main parts in modern communication
systems for security of information.
Synchronisation via Integral Sliding Mode Control. International Journal of Modelling,
Identification and Control, 32 (2019): 30-45. doi.org/10.1504/IJMIC.2019.101959.
[11] C.-H. Lien, S. Vaidyanathan, A. Sambas, Sukono, M. Mamat, W.S.M. Sanjaya, Subiyanto, A New
Two-scroll Chaotic Attractor with Three Quadratic Nonlinearities, Its Adaptive Control and
Circuit Design. IOP Conference Series: Materials Science and Engineering, 332 (2018), art.no.
012010. DOI 10.1088/1757-899X/332/1/012010.
[12] V. Rusyn, A. Sambas, Mujiarto, Information security system based on chaotic signals. CEUR</p>
      <p>Workshop Proceedings, 3039 (2021): 294-299.
[13] V. Rusyn, Mujiarto, M. Mamat, F. Azharul, W.S. Mada Sanjaya, A. Sambas, E. Dwipriyoko, A.</p>
      <p>Sutoni, Computer Modelling of the Information Properties of Hyper Chaotic Lorenz System
and Its Application in Secure Communication System. Journal of Physics: Conference Series,
1764, (2021), art.no. 012205. DOI: 10.1088/1742-6596/1764/1/012205.
[14] V. Rusyn, Modeling and Research Information Properties of Rucklidge Chaotic System using
Labview, in: 10th International Conference on Chaotic Modeling and Simulation, 2017, pp.
739-744.
[15] V. Rusyn, S. Subbotin, A. Sambas, Analysis and experimental realization of the logistic map
using Arduino Pro Mini. CEUR Workshop Proceedings 2608, (2020) 300-310.
[16] O. Guillen-Fernandez, A. Melendez-Cano, E. Tielo-Cuautle, J.C. Nunez-Perez, J. de Jesus
Rangel-Magdaleno, On the Synchronization Techniques of Chaotic Oscillations and Their
FPGA-based Implementation for Secure Image Transmission. PLoS ONE, vol. 14(2) (2019),
art. no. e0209618. doi: 10.1371/journal.pone.0209618.
[17] V.-A. Adeyemi, J.-C. Nuñez-Perez, Y.S. Ibarra, F.-J. Perez-Pinal, E. Tlelo-Cuautle, FPGA
Realization of the Parameter-Switching Method in the Chen Oscillator and Application in
Image Transmission. Symmetry, 13 (2021): 923. doi.org/10.3390/sym13060923.
[18] O. Guillén-Fernández, M.F. Moreno-López, E. Tlelo-Cuautle, Issues on Applying One-and
Multi-step Numerical Methods to Chaotic Oscillators for FPGA Implementation. Mathematics,
9 (2021): 151. doi.org/10.3390/math9020151.
[19] X. Peng, Y. Zeng, M. Wang, Z. Li, Generating Multi-layer Nested Chaotic Attractor and Its FPGA
Implementation. Chinese Physics B, 30(6) (2021), art. no. 060509.
doi.org/10.1088/16741056/abda34.
[20] A. Sambas, S. Vaidyanathan, T. Bonny, S. Zhang, Sukono, Y. Hidayat, G. Gundara, M. Mamat,
Mathematical Model and FPGA Realization of a Multi-Stable Chaotic Dynamical System with
a Closed Butterfly-Like Curve of Equilibrium Points. Appl. Sci., 11(2) (2021): 788.
doi.org/10.3390/app11020788.
[21] D. Enzeng, Y. Mingfeng, H. Fangfang, T. Jigang, D. Shengzhi, Topological Horseshoe Analysis
and FPGA Implementation of a Classical Fractional Order Chaotic System. IEEE Access, 7
(2019): 129095-129103. doi.org/10.1109/ACCESS.2019.2938556.
[22] V. Rusyn, S. Khrapko, Memristor: modeling and research of information properties, in: Ch. H.</p>
      <p>Skiadas, I. Lubashevsky (Eds.), Springer Proceedings in Complexity. Springer, Cham, 2019,
pp. 229-238. DOI: 10.1007/978-3-030-15297-0_21.
[23] L. Chua, Memristor-The Missing Circuit Element. IEEE Transactions on Circuit Theory, 18
(1971): 507-519. doi: 10.1109/TCT.1971.1083337.
[24] Z.F. Wang, L. Shi, H. Wu, N. Helian, O.L. Chua, Fractional memristor. Applied Physics Letter,
111 (2017): art.no. 243502. doi.org/10.1063/1.5000919.
[25] D. Yu, C. Zheng, H. H. C. Iu, T. Fernando, L.O. Chua, A new circuit for emulating memristors
using inductive coupling. IEEE Access, 5 (2017): 1284-1295.
doi.org/10.1109/ACCESS.2017.2649573.
[26] R.M. May, Simple mathematical models with very complicated dynamics. Nature, 261 (1976):
459-467. doi.org/10.1038/261459a0.
[27] M. Hénon, A two-dimensional mapping with a strange attractor. Communications in</p>
      <p>Mathematical Physics, 50 (1976): 69–77. doi:10.1007/BF01608556.
[28] O.E. Rössler, An equation for continuous chaos. Physics Letters A, 57 (1976): 397-398.</p>
      <p>doi.org/10.1016/0375-9601(76)90101-8.
[29] G.F.V. Amaral, C. Letellier, L.A. Aguirre, Piecewise affine models of chaotic attractors: The
Rossler and Lorenz systems. Chaos: An Interdisciplinary Journal of Nonlinear Science, 16
(2006): 013115. doi: 10.1063/1.2149527.
[30] A. Sambas, W.S. Mada Sanjaya, M. Mamat, Halimatussadiyah, Design and analysis
bidirectional chaotic synchronization of Rossler circuit and its application for secure
communication, Applied Mathematical Sciences, 7 (2013): 11-21. doi:
10.12988/ams.2013.13002.
[31] V. Rusyn, O. Savko, Modeling of Chaotic Behavior in the Economic Model, in: 8th International</p>
      <p>Conference on Chaotic Modeling and Simulation, 2015, pp. 705-712.
[32] S. Vaidyanathan, A.T. Azar, K. Rajagopal, A. Sambas, S. Kacar, Ü. Çavusoglu, A new
hyperchaotic temperature fluctuations model, its circuit simulation, FPGA implementation
and an application to image encryption. IJSPM, 13 (2018): 281-296.
http://dx.doi.org/10.1504/IJSPM.2018.093113.
[33] R. Voliansky, O. Statsenko, O. Sergienko, M. Zhelinskyi, O. Sinkevych, N. Volianska, Chua’s
Circuit with Nonlinear Energy Storages and Its Synchronization, in: 2023 IEEE International
Conference on Information and Telecommunication Technologies and Radio Electronics
(UkrMiCo), 2023, doi:10.1109/UkrMiCo61577.2023.10380417.
[34] A. Sambas, S. Vaidyanathan, M. Mamat, W.S. Mada Sanjaya, A six-term novel chaotic system
with hidden attractor and its circuit design, Studies in Systems, Decision and Control, 133
(2018): 365-373. doi: 10.1007/978-3-319-71243-7_16.
[35] R. Voliansky, A. Sadovoi, Chua's circuits interval synchronization, in: 2017 4th International
Scientific-Practical Conference Problems of Infocommunications. Science and Technology
(PIC S&amp;T), 2017, doi:10.1109/INFOCOMMST.2017.8246434.
[36] V. Rusyn, A. Samila, C. Skiadas, Computer Modeling and Practical Realization of Chaotic
Circuit with a Light-Emitting Diode. Proceedings of SPIE - The International Society for
Optical Engineering, 11369 (2020): art. no. 113690D. DOI: 10.1117/12.2550813.
[37] R. Voliansky, O. Kluev, O. Sadovoi, O. Sinkevych, N. Volianska, Chaotic Time-variant
Dynamical System, in: 2020 IEEE 15th International Conference on Advanced Trends in
Radioelectronics, Telecommunications and Computer Engineering (TCSET), 2020,
doi:10.1109/TCSET49122.2020.235503.
[38] R. Voliansky, A. Pranolo, A.P. Wibawa, Haviluddin, Transformation of 3-D Jerk Chaotic System
into Parallel Form, in: 2018 International Symposium on Advanced Intelligent Informatics
(SAIN), 2018, doi:10.1109/SAIN.2018.8673346.
[39] V. Rusyn, M. Sadli, M. Mamat, Mujiarto, W.S.M. Sanjaya, Computer modelling of a new simple
chaotic generator, Journal of Physics: Conference Series, 1477(2020): art.no. 022010.
doi:10.1088/1742-6596/1477/2/022010.
[40] M.I. Kopp, A.V. Tur, V.V. Yanovsky, Chaotic Dynamics of Magnetic Fields Generated by
Thermomagnetic Instability in a Nonuniformly Rotating Electrically Conductive Fluid.</p>
      <p>Journal of Physical Studies, 27 (2023): art. no. 2403. DOI: 10.30970/JPS.27.2403.
[41] S. Vaidyanathan, M. Feki, A. Sambas, C. H. Lien, A new biological snap oscillator: its modelling,
analysis, simulations and circuit design. International Journal of Simulation and Process
Modelling, 13(5), (2018) pp. 419-432. doi.org/10.1504/IJSPM.2018.10015882.
[42] C.H. Skiadas, C. Skiadas, Chaotic Modelling and Simulation: Analysis of Chaotic Models,</p>
      <p>Attractors and Forms. In: Taylor &amp; Francis Group, (2008), pp. 1-345.
[43] C.H. Skiadas, Exact solutions of stochastic differential equations: Gompertz, generalized
logistic and revised exponential. Methodology and Computing in Applied Probability, 12
(2010): 261-270.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P.</given-names>
            <surname>Milicka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Cížek</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Faigl</surname>
          </string-name>
          ,
          <article-title>On chaotic oscillator-based central pattern generator for motion control of hexapod walking robot</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          <volume>1649</volume>
          (
          <year>2016</year>
          ):
          <fpage>131</fpage>
          -
          <lpage>137</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Guzan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Olejar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Cviklovic</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Petrzela</surname>
          </string-name>
          ,
          <article-title>Simulation of the Chua's Circuit with Audio Output</article-title>
          , in: 26th International Conference Radioelektronika, Kosice,
          <year>2016</year>
          , art. no.
          <issue>121867</issue>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vaidyanathan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sambas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Clemente-Lopez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.M.</given-names>
            <surname>Munoz-Pacheco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.S.T.</given-names>
            <surname>Kammogne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.F.</given-names>
            <surname>Mawamba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.S.</given-names>
            <surname>Martin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.A.</given-names>
            <surname>Safaan</surname>
          </string-name>
          ,
          <article-title>Electronic Circuit Design and FPGA-Based Hardware Implementation of a New Multistable 4</article-title>
          -
          <string-name>
            <given-names>D</given-names>
            <surname>Hyperchaotic</surname>
          </string-name>
          Four-Leaf System.
          <source>International Journal of Computer</source>
          Applications in Technology,
          <volume>72</volume>
          (
          <year>2023</year>
          ):
          <fpage>13</fpage>
          -
          <lpage>28</lpage>
          . DOI:
          <volume>10</volume>
          .1504/IJCAT.
          <year>2023</year>
          .
          <volume>132548</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>T.</given-names>
            <surname>Bonny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Vaidyanathan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sambas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Benkouider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.A.</given-names>
            <surname>Nassan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Naqaweh</surname>
          </string-name>
          ,
          <article-title>Multistability and Bifurcation Analysis of a Novel 3D Jerk System: Electronic Circuit Design, FPGA Implementation, and Image Cryptography Scheme</article-title>
          .
          <source>IEEE Access</source>
          ,
          <volume>11</volume>
          (
          <year>2023</year>
          ):
          <fpage>78584</fpage>
          -
          <lpage>78600</lpage>
          . DOI:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2023</year>
          .
          <volume>3299171</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V.</given-names>
            <surname>Rusyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.A.</given-names>
            <surname>Mohamed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Purwandari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mamat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Titaley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Pinontoan</surname>
          </string-name>
          ,
          <article-title>Chaotic and Controlling Regimes of a New Modified Chua's Generator</article-title>
          .
          <source>Journal of Advanced Research in Dynamical and Control Systems</source>
          ,
          <volume>12</volume>
          (
          <issue>2</issue>
          ) (
          <year>2020</year>
          ):
          <fpage>556</fpage>
          -
          <lpage>561</lpage>
          . DOI:
          <volume>10</volume>
          .5373/JARDCS/V12I2/S20201077.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vaidyanathan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.M.</given-names>
            <surname>Moroz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sambas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A New</given-names>
            <surname>Two-Scroll</surname>
          </string-name>
          4-
          <string-name>
            <given-names>D</given-names>
            <surname>Hyperchaotic</surname>
          </string-name>
          <article-title>System with a Unique Saddle Point Equilibrium, Its Bifurcation Analysis, Circuit Design and a Control Application to Complete Synchronization</article-title>
          .
          <source>Archives of Control Sciences</source>
          ,
          <volume>33</volume>
          (
          <year>2023</year>
          ):
          <fpage>277</fpage>
          -
          <lpage>298</lpage>
          . DOI:
          <volume>10</volume>
          .24425/acs.
          <year>2023</year>
          .
          <volume>146276</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vaidyanathan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Benkouider</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sambas</surname>
          </string-name>
          , Modelling,
          <string-name>
            <given-names>Bifurcation</given-names>
            <surname>Analysis</surname>
          </string-name>
          and
          <article-title>Multistability of a New 4D Hyperchaotic System with No Balance Point, Its Master-Slave Synchronisation and Multisim Circuit Simulation</article-title>
          .
          <source>International Journal of Modelling, Identification and Control</source>
          ,
          <volume>40</volume>
          (
          <year>2022</year>
          ):
          <fpage>279</fpage>
          -
          <lpage>293</lpage>
          . DOI:
          <volume>10</volume>
          .1504/IJMIC.
          <year>2022</year>
          .125551
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kopp</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kopp</surname>
          </string-name>
          ,
          <article-title>A New 6D Chaotic Generator: Computer Modelling</article-title>
          and
          <string-name>
            <given-names>Circuit Design. Int. J.</given-names>
            <surname>Eng</surname>
          </string-name>
          . Technol. Innov.,
          <volume>12</volume>
          (
          <year>2022</year>
          ):
          <fpage>288</fpage>
          -
          <lpage>307</lpage>
          . doi.org/10.46604/ijeti.
          <year>2022</year>
          .
          <volume>9601</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Rusyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mohamad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Titaley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Nainggolan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mamat</surname>
          </string-name>
          , Design, Computer Modelling,
          <article-title>Analysis and Control of the New Chaotic Generator</article-title>
          ,
          <source>Journal of Advanced Research in Dynamical &amp; Control Systems</source>
          ,
          <volume>12</volume>
          (
          <issue>2</issue>
          ) (
          <year>2020</year>
          ):
          <fpage>2306</fpage>
          -
          <lpage>2311</lpage>
          . DOI:
          <volume>10</volume>
          .5373/JARDCS/V12I2/S20201276.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vaidyanathan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.G.</given-names>
            <surname>Dolvis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Jacques</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.H.</given-names>
            <surname>Lien</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sambas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A New</given-names>
            <surname>Five-Dimensional FourWing Hyperchaotic</surname>
          </string-name>
          <article-title>System with Hidden Attractor, Its Electronic Circuit Realisation and</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>