Computer Modelling, Analysis of the Main Information Properties of Memristor and Its Application in Secure Communication System Volodymyr Rusyn1, Sergey Subbotin2, George Vorobets1 and Oleksandr Vorobets1 1 Yuriy Fedkovych Chernivtsi National University, Kotsybynsky str. 2, Chernivtsi, 58012, Ukraine 2 National University “Zaporizhzhia polytechnic”, Zhukovsky str., 64, Zaporizhzhia, 69063, Ukraine Abstract In this paper, we present equation and system parameters that realize memristive chaotic system. The analysis and computer modelling of the main information properties of memristor are shown. For this, we created programming interface using one of the modern software LabView that allows to generate, analysis and research of the main information properties of memristor, focusing on time series of the three coordinates and phase portraits. The created another programming interface that demonstrates the masking and decrypt of the information are also presented. Keywords Memristor, information properties, LabView, security system1 1. Introduction Chaos theory has been established since the 1970’s due to its applications in many different engineering research areas, such as robotics [1], electronic circuits of chaotic generators [2-11], information security [12-14], etc. Many chaotic systems are realized using Arduino [15] and FPGA [16-21]. In 1971, Leon Chua suggested the existence of another basic element of the electrochemical system, which realizes the connection between magnetic flux and charge. In 2008, scientists managed to discover a new component. This component is called a memristor, this term was formed as a result of merging the words "memory" and "resistor" (electrical resistance). This term refers to a bipolar device, the electrical resistance of which varies depending on the amount of charge flowing through it. The resistance of the memristor is called the memristor (M), which is defined as the ratio of the change in the magnitude of the magnetic field flux to the change in charge, and its value depends on how long the electric current flows through the memristor, that is, the amount of charge that passed through it. The main advantage of a memristor is properties that are not stored in the form of a charge. These properties differ from most types of modern semiconductor memory elements. This is the main advantage, because it is not afraid of charge leakage, which is the main evil that everyone wants to get rid of when switching to "nanochips". Another advantage of the memristor is its energy independence. These properties ensure that the memristor is stored at the same time as the existing materials used to make it. The successful production of the memristor by Hewlett Packard (HP) greatly increased the interest of researchers in the memristor. Many scientists began to use the memristor in analog systems and in digital media. Others have used memristors as resistive memory modules and logic programs. The potential of using a memristor in neuromorphic applications has also been studied by many researchers [22-25]. Memristors, first of all, are extremely promising elements of binary non-volatile memory, in which information is recorded by switching electrical resistance between resistive states with low (ON) and high (OFF) resistance. Moreover, their electronic states “adjust” to input signals, CMIS-2024: Seventh International Workshop on Computer Modeling and Intelligent Systems, May 3, 2024, Zaporizhzhia, Ukraine rusyn_v@ukr.net (V. Rusyn); subbotin@zntu.edu.ua (S. Subbotin); g.vorobets@chnu.edu.ua (G. Vorobets); o.vorobets@chnu.edu.ua (O. Vorobets) 0000-0001-6219-1031 (V. Rusyn); 0000-0001-5814-8268 (S. Subbotin); 0000-0001-8125-2047 (G. Vorobets); 0000-0003-3195-8214 (O. Vorobets) © 2024 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR ceur-ws.org Workshop ISSN 1613-0073 Proceedings just as living organisms do. This is why memristors can imitate the functioning of biological synapses connecting neurons in the brain. The main function of the latter is to transmit a signal from one neuron to another, and the magnitude of the connection between neurons depends on the relative time of their “firing”. It is this mechanism that is responsible for associative learning, that is, the brain’s ability to find connections between different events, so the memristor can be considered a prototype of an “electronic synapse”. Research in the field of artificial intelligence, and more specifically on the creation of an artificial brain based on memristors, is also being conducted at Michigan State University under the leadership of Wei Lu. Here, a memristor model was built based on a layer of a mixture of silver and silicon and tungsten electrodes, and in the near future the scientists plan to create large circuits consisting of thousands of such elements. The already studied properties of memristors allow us to say that on their basis it is possible to create computers of a fundamentally new architecture, with performance significantly exceeding semiconductor ones. Modern computers are built on the von Neumann architecture: both data and programs are stored in the machine's memory in binary code, with the computing module separated from the storage devices, and the programs executed sequentially, one after the other. Progressive in the middle of the last century, such an architecture today no longer meets the requirements for computer technology: programs have become much more complex, and the volume of processed data has grown by orders of magnitude, if not tens of orders of magnitude. A computer based on memristors could be a significant step forward, since it is capable of simulating the functioning of the human brain, which does not have any single center for collecting and processing information. Each block receives, processes and transmits its own data arrays to other blocks, muscles, and sensory organs, which are insignificant compared to the entire volume of incoming information. According to recent estimates, to build a model of the human cerebral cortex from modern computer components, you will need at least 150,000 processors and 144 TB of RAM alone, and we are not even talking about the intelligence of a baby. In a memristor computer, many modules operate in parallel and independently of each other, and the ability to store and operate an unlimited set of values from 0 to 1 means that executable programs are not limited to binary code. Moreover, individual computer hardware components - processors, video chips, memory and hard drives - will become unnecessary in principle; the machine will be an architecturally homogeneous device where all data will be simultaneously stored and all operations with it will be carried out. For an upgrade, it will be enough to install additional memristor modules, and for repairs, replace the failed ones. The memristor computer will not need to be “booted”: immediately after turning it on, it will be ready to continue working, and from the very point where it was interrupted. Compared to modern technology, the energy consumption of memristor machines will be negligible, and the computing power will be simply gigantic. Considering that there is literally one step left before the mass production of memristors, it is very possible that a memristor computer will become an intermediate step on the path to a quantum computer. 2. Computer modelling of the main information properties of memristor The common thread that binds these four elements together as the four basic elements of circuit theory is the fact that the characteristics of these elements relate the four variables in electrical engineering (voltage, current, flux and charge) intimately. Fig. 1 shows this relationship graphically. Nonlinear behavior of memristive information properties is described by next equation system (1): 𝑦𝑦 𝑥𝑥̇ = ; 𝐶𝐶 �𝑦𝑦̇ = −1 [𝑥𝑥 + 𝛽𝛽 (𝑧𝑧 2 − 1)𝑦𝑦]; (1) 𝐿𝐿 𝑧𝑧̇ = −𝑦𝑦 − 𝛼𝛼𝛼𝛼 + 𝑦𝑦𝑦𝑦. A chaotic time series is a sequence of data that exhibits chaotic behavior over time when plotted. A characteristic of chaotic signals is that they are sensitive to initial conditions. This means that a small change in the initial conditions can cause the results to look very different over time. Chakotic signals often look chaotic and unpredictable. They look like random noise, but they have a underlying deterministic dynamic. Figure 1: The four basic circuit elements The logistic map, the Henon map, the Lorenz and Rossler systems are examples of chaotic signals [26-30]. These chaotic signals used in different physical systems and mathematical models, such as economics, radioengineering, physics, mathematics [31-43]. Time series for X, Y and Z coordinates are shown in Fig. 2. The parameter values are: C = 1, L = 3, α = 0.6, β = 1.5, dt = 0.01, number of iterations N = 10000. For modelling was used modern software environment LabView. Figure 2: Time series for X, Y and Z coordinates Until recently, specialists, when solving problems in their own subject area, were forced to resort to the help of professional programmers, who, as a rule, were not knowledgeable in this area. Such intermediation most often increased material and time costs, and most importantly, reduced the quality of research and development. Even the use of specialized software only partially solved this problem. The emergence of the latest generation of software products with very user-friendly interfaces, adapted to the mentality and professional skills of specialists, has made it possible for specialists to use them directly, without resorting to the help of intermediaries. These new software products include LabVIEW, which has a very convenient user interface and powerful graphical programming tools. With each subsequent version of LabVIEW, the level of intellectualization of the user interface and ease of use increases. LabVIEW (Laboratory Virtual Instrumentation Engineering Workbench) is a platform and development environment for a visual programming language created by National Instruments. The purpose of this language is to automate the use of computational and measuring laboratory equipment. For more than 35 years, engineers and scientists have used NI LabVIEW to develop measurement systems, test benches, and control systems. LabVIEW is based on the graphical programming language G. In addition to being programmable, LabVIEW provides a wide range of tools and libraries, from interactive wizards and user interfaces to built-in compilers, linkers, and debugging tools. There are two main differences between LabVIEW and other programming languages. First, LabVIEW implements the concept of graphical programming, so the source code is a block diagram (icons of language elements connected together), which is then compiled into machine code. Despite this approach, LabVIEW uses the same programming constructs and techniques as other languages: data types, loops, variables, recursion, event handling, and object-oriented programming. The second distinctive feature of LabVIEW is its support for executing code written in the G language in a data stream mode (stream programming), while traditional text-based languages (for example, C and C++) provide code execution as a sequence of commands. Stream programming languages (such as G, Agilent VEE, Microsoft Visual Programming Language and Apple Quartz Composer) are based on the concept of data flow, which determines the sequence of execution of the functional units of the program. At first it may seem that the difference between this approach and the traditional one is not significant, but in practice it turns out differently. Namely, stream programming in the LabVIEW environment allows the developer to fully focus on the data and how to process it. Program nodes - functions, loops and other language constructs - receive data through inputs, process them and output data using outputs. As soon as the parameter values arrive at each of the input terminals of the node, the node code is executed (processing of the incoming data), after which the values of the output parameters are available at the output terminals of the node for their further transmission to other nodes according to the logic of the data flow. Accordingly, of two sequentially connected nodes, the second one can be executed only after receiving data from the previous one. Because the G language concept is easy to understand, LabVIEW provides equally user- friendly and intuitive development environment tools. For example, unique debugging tools allow you to visually display the process of data propagation along wires, as well as display the corresponding values at the inputs and outputs of code nodes (we are talking about execution animation). LabVIEW's graphical language and flow programming concept allows you to solve problems more conveniently and efficiently than traditional text-based languages. The key features of LabVIEW programming—namely, intuitive, graphical code and data-driven execution—make programming more thought-like than other languages. Despite the high level of code abstraction, the performance of programs written in LabVIEW remains comparable to languages like C, thanks to the built-in code compiler. Another information property of memristor are phase portraits (Fig. 3). For qualitative analysis of nonlinear circuits, the phase space method is used. The current values of the state variables of the analyzed circuit are plotted on its coordinate axes. Their changes in time correspond to certain curves—phase trajectories—in the space of state variables. The set of all phase trajectories—the phase portrait of the circuit—represents a comprehensive description of all its possible modes. Figure 3: Phase portraits in XY, XZ and YZ projections 3. Masking and decryption of the information using memristor Protecting information from unauthorized access is one of the most pressing tasks in telecommunications. Often in telecommunication systems, we deal with digital signals as an information carrier, for which there are already effective protection methods based on cryptography algorithms. In the case of analog signals, other methods of information protection are required, one of which is the masking method. The essence of this method is that it is necessary to find a specific signal source that has the same spectral properties as the protected information signal. Accordingly, if such a signal is mixed with an information signal, the resulting signal turns out to be uninformative, and as a result, the information signal turns out to be protected. The last decade has been known for extreme interest in the possibility of using dynamic chaos for data encryption. At a conceptual level, there is a peculiar relationship between chaotic systems and cryptographic systems. Therefore, in nonlinear dynamics, and in cryptography, nonlinear transformation of information materializes. Such a transformation is deterministic (for example, performed by a computer), on the other hand, it must be unpredictable for an external observer. Therefore, the word “deterministic chaos” is quite “suitable” for cryptography. The block scheme demonstrates process of transmitting and receiving information using chaotic signal for masking and decryption (Fig. 4). In this case, the transmitter and the receiver systems are identical. Figure 4: The block scheme for transmitting and receiving information using chaotic signal for masking and decryption The masking of the information based on nonlinear properties is provided by blending information with the chaotic signal that was generated of the different coordinates. As an information, there was used a sinusoidal signal with amplitude of 5 V and system parameters α = 0.6, β = 1.5, C = 1, L = 3, dt = 0.01, number of iterations N = 10000, dynamic variables x = y = 1. Dynamic variables and system parameters are the keys for the masking information. Algorithm for the decryption has opposite effect. The program interface, which demonstrates the masking and decrypt of the information based on a properties of memristor system (1) is presented in Fig. 5. Figure 5: Software interface shows masking and decryption of the information 4. Discussion A memristor is a two-contact device, which means that a memristor can be integrated into multilayer matrices of mutually perpendicular metal nanowires. Its architecture is significantly more compact compared to modern semiconductor silicon processors, besides, the logic of controlling such a matrix of intersecting nanowires is significantly simpler. The fundamental and main difference between a memristor and most types of modern semiconductor memory is that it does not retain its properties in the form of a charge. A memristor is not characterized by charge leakage during recording, thus it can be said that it is completely non-volatile. It is implied that the information recorded in the memristor can store digital information for several tens of years. The duration of information storage depends on the material of the memristor. Compared to these digital memory stores, the memristor has a much longer lifetime. With the help of memristor technology, it is possible to design a new generation of computer equipment that will surpass computers in such parameters as: speed, energy efficiency, the ability to process large streams and volumes of information. Memristor technology is also widely used in robotics. A memristor can be used as a bipolar key, a memory element, or a component of a logic element. 5. Conclusions There was used one of the modern software LabView (LabView-2020 (64-bit version for Windows) for the analysis and modelling of the main information properties of memristor. Equation and system parameters that realized memristive chaotic system are shown. The main information properties of memristor such as a time series of the three chaotic X, Y and Z coordinates and phase portraits in XY, XZ and YZ projections are presented. Masking and decrypting of the information are presented using programming interface. Memristor that generate nonlinear oscillations can be used as one of the main parts in modern communication systems for security of information. References [1] P. Milicka, P. Cížek, and J. Faigl, On chaotic oscillator-based central pattern generator for motion control of hexapod walking robot. CEUR Workshop Proceedings 1649 (2016): 131- 137. [2] M. Guzan, M. Olejar, V. Cviklovic, and J. Petrzela, Simulation of the Chua’s Circuit with Audio Output, in: 26th International Conference Radioelektronika, Kosice, 2016, art. no. 121867. [3] S. Vaidyanathan, A.Sambas, D. Clemente-Lopez, J.M. Munoz-Pacheco, A.S.T. Kammogne, V.F. Mawamba, S.S. Martin, S.A. Safaan, Electronic Circuit Design and FPGA-Based Hardware Implementation of a New Multistable 4-D Hyperchaotic Four-Leaf System. International Journal of Computer Applications in Technology, 72 (2023): 13-28. DOI: 10.1504/IJCAT.2023.132548. [4] T. Bonny, S. Vaidyanathan, A. Sambas, K. Benkouider, W.A. Nassan, O. Naqaweh, Multistability and Bifurcation Analysis of a Novel 3D Jerk System: Electronic Circuit Design, FPGA Implementation, and Image Cryptography Scheme. IEEE Access, 11 (2023): 78584-78600. DOI: 10.1109/ACCESS.2023.3299171. [5] V. Rusyn, M.A. Mohamed, D. Purwandari, M. Mamat, J. Titaley, B. Pinontoan, Chaotic and Controlling Regimes of a New Modified Chua’s Generator. Journal of Advanced Research in Dynamical and Control Systems, 12(2) (2020): 556-561. DOI: 10.5373/JARDCS/V12I2/S20201077. [6] S. Vaidyanathan, I.M. Moroz, A. Sambas, A New Two-Scroll 4-D Hyperchaotic System with a Unique Saddle Point Equilibrium, Its Bifurcation Analysis, Circuit Design and a Control Application to Complete Synchronization. Archives of Control Sciences, 33 (2023): 277-298. DOI: 10.24425/acs.2023.146276. [7] S. Vaidyanathan, K. Benkouider, A. Sambas, Modelling, Bifurcation Analysis and Multistability of a New 4D Hyperchaotic System with No Balance Point, Its Master-Slave Synchronisation and Multisim Circuit Simulation. International Journal of Modelling, Identification and Control, 40 (2022): 279-293. DOI: 10.1504/IJMIC.2022.125551 [8] M. Kopp, A. Kopp, A New 6D Chaotic Generator: Computer Modelling and Circuit Design. Int. J. Eng. Technol. Innov., 12 (2022): 288-307. doi.org/10.46604/ijeti.2022.9601. [9] V. Rusyn, M. Mohamad, J. Titaley, N. Nainggolan, M. Mamat, Design, Computer Modelling, Analysis and Control of the New Chaotic Generator, Journal of Advanced Research in Dynamical & Control Systems, 12(2) (2020): 2306-2311. DOI: 10.5373/JARDCS/V12I2/S20201276. [10] S. Vaidyanathan, L.G. Dolvis, K. Jacques, C.H. Lien, A. Sambas, A New Five-Dimensional Four- Wing Hyperchaotic System with Hidden Attractor, Its Electronic Circuit Realisation and Synchronisation via Integral Sliding Mode Control. International Journal of Modelling, Identification and Control, 32 (2019): 30-45. doi.org/10.1504/IJMIC.2019.101959. [11] C.-H. Lien, S. Vaidyanathan, A. Sambas, Sukono, M. Mamat, W.S.M. Sanjaya, Subiyanto, A New Two-scroll Chaotic Attractor with Three Quadratic Nonlinearities, Its Adaptive Control and Circuit Design. IOP Conference Series: Materials Science and Engineering, 332 (2018), art.no. 012010. DOI 10.1088/1757-899X/332/1/012010. [12] V. Rusyn, A. Sambas, Mujiarto, Information security system based on chaotic signals. CEUR Workshop Proceedings, 3039 (2021): 294-299. [13] V. Rusyn, Mujiarto, M. Mamat, F. Azharul, W.S. Mada Sanjaya, A. Sambas, E. Dwipriyoko, A. Sutoni, Computer Modelling of the Information Properties of Hyper Chaotic Lorenz System and Its Application in Secure Communication System. Journal of Physics: Conference Series, 1764, (2021), art.no. 012205. DOI: 10.1088/1742-6596/1764/1/012205. [14] V. Rusyn, Modeling and Research Information Properties of Rucklidge Chaotic System using Labview, in: 10th International Conference on Chaotic Modeling and Simulation, 2017, pp. 739-744. [15] V. Rusyn, S. Subbotin, A. Sambas, Analysis and experimental realization of the logistic map using Arduino Pro Mini. CEUR Workshop Proceedings 2608, (2020) 300-310. [16] O. Guillen-Fernandez, A. Melendez-Cano, E. Tielo-Cuautle, J.C. Nunez-Perez, J. de Jesus Rangel-Magdaleno, On the Synchronization Techniques of Chaotic Oscillations and Their FPGA-based Implementation for Secure Image Transmission. PLoS ONE, vol. 14(2) (2019), art. no. e0209618. doi: 10.1371/journal.pone.0209618. [17] V.-A. Adeyemi, J.-C. Nuñez-Perez, Y.S. Ibarra, F.-J. Perez-Pinal, E. Tlelo-Cuautle, FPGA Realization of the Parameter-Switching Method in the Chen Oscillator and Application in Image Transmission. Symmetry, 13 (2021): 923. doi.org/10.3390/sym13060923. [18] O. Guillén-Fernández, M.F. Moreno-López, E. Tlelo-Cuautle, Issues on Applying One-and Multi-step Numerical Methods to Chaotic Oscillators for FPGA Implementation. Mathematics, 9 (2021): 151. doi.org/10.3390/math9020151. [19] X. Peng, Y. Zeng, M. Wang, Z. Li, Generating Multi-layer Nested Chaotic Attractor and Its FPGA Implementation. Chinese Physics B, 30(6) (2021), art. no. 060509. doi.org/10.1088/1674- 1056/abda34. [20] A. Sambas, S. Vaidyanathan, T. Bonny, S. Zhang, Sukono, Y. Hidayat, G. Gundara, M. Mamat, Mathematical Model and FPGA Realization of a Multi-Stable Chaotic Dynamical System with a Closed Butterfly-Like Curve of Equilibrium Points. Appl. Sci., 11(2) (2021): 788. doi.org/10.3390/app11020788. [21] D. Enzeng, Y. Mingfeng, H. Fangfang, T. Jigang, D. Shengzhi, Topological Horseshoe Analysis and FPGA Implementation of a Classical Fractional Order Chaotic System. IEEE Access, 7 (2019): 129095-129103. doi.org/10.1109/ACCESS.2019.2938556. [22] V. Rusyn, S. Khrapko, Memristor: modeling and research of information properties, in: Ch. H. Skiadas, I. Lubashevsky (Eds.), Springer Proceedings in Complexity. Springer, Cham, 2019, pp. 229-238. DOI: 10.1007/978-3-030-15297-0_21. [23] L. Chua, Memristor-The Missing Circuit Element. IEEE Transactions on Circuit Theory, 18 (1971): 507-519. doi: 10.1109/TCT.1971.1083337. [24] Z.F. Wang, L. Shi, H. Wu, N. Helian, O.L. Chua, Fractional memristor. Applied Physics Letter, 111 (2017): art.no. 243502. doi.org/10.1063/1.5000919. [25] D. Yu, C. Zheng, H. H. C. Iu, T. Fernando, L.O. Chua, A new circuit for emulating memristors using inductive coupling. IEEE Access, 5 (2017): 1284-1295. doi.org/10.1109/ACCESS.2017.2649573. [26] R.M. May, Simple mathematical models with very complicated dynamics. Nature, 261 (1976): 459-467. doi.org/10.1038/261459a0. [27] M. Hénon, A two-dimensional mapping with a strange attractor. Communications in Mathematical Physics, 50 (1976): 69–77. doi:10.1007/BF01608556. [28] O.E. Rössler, An equation for continuous chaos. Physics Letters A, 57 (1976): 397-398. doi.org/10.1016/0375-9601(76)90101-8. [29] G.F.V. Amaral, C. Letellier, L.A. Aguirre, Piecewise affine models of chaotic attractors: The Rossler and Lorenz systems. Chaos: An Interdisciplinary Journal of Nonlinear Science, 16 (2006): 013115. doi: 10.1063/1.2149527. [30] A. Sambas, W.S. Mada Sanjaya, M. Mamat, Halimatussadiyah, Design and analysis bidirectional chaotic synchronization of Rossler circuit and its application for secure communication, Applied Mathematical Sciences, 7 (2013): 11-21. doi: 10.12988/ams.2013.13002. [31] V. Rusyn, O. Savko, Modeling of Chaotic Behavior in the Economic Model, in: 8th International Conference on Chaotic Modeling and Simulation, 2015, pp. 705-712. [32] S. Vaidyanathan, A.T. Azar, K. Rajagopal, A. Sambas, S. Kacar, Ü. Çavusoglu, A new hyperchaotic temperature fluctuations model, its circuit simulation, FPGA implementation and an application to image encryption. IJSPM, 13 (2018): 281-296. http://dx.doi.org/10.1504/IJSPM.2018.093113. [33] R. Voliansky, O. Statsenko, O. Sergienko, M. Zhelinskyi, O. Sinkevych, N. Volianska, Chua’s Circuit with Nonlinear Energy Storages and Its Synchronization, in: 2023 IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics (UkrMiCo), 2023, doi:10.1109/UkrMiCo61577.2023.10380417. [34] A. Sambas, S. Vaidyanathan, M. Mamat, W.S. Mada Sanjaya, A six-term novel chaotic system with hidden attractor and its circuit design, Studies in Systems, Decision and Control, 133 (2018): 365-373. doi: 10.1007/978-3-319-71243-7_16. [35] R. Voliansky, A. Sadovoi, Chua's circuits interval synchronization, in: 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), 2017, doi:10.1109/INFOCOMMST.2017.8246434. [36] V. Rusyn, A. Samila, C. Skiadas, Computer Modeling and Practical Realization of Chaotic Circuit with a Light-Emitting Diode. Proceedings of SPIE - The International Society for Optical Engineering, 11369 (2020): art. no. 113690D. DOI: 10.1117/12.2550813. [37] R. Voliansky, O. Kluev, O. Sadovoi, O. Sinkevych, N. Volianska, Chaotic Time-variant Dynamical System, in: 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), 2020, doi:10.1109/TCSET49122.2020.235503. [38] R. Voliansky, A. Pranolo, A.P. Wibawa, Haviluddin, Transformation of 3-D Jerk Chaotic System into Parallel Form, in: 2018 International Symposium on Advanced Intelligent Informatics (SAIN), 2018, doi:10.1109/SAIN.2018.8673346. [39] V. Rusyn, M. Sadli, M. Mamat, Mujiarto, W.S.M. Sanjaya, Computer modelling of a new simple chaotic generator, Journal of Physics: Conference Series, 1477(2020): art.no. 022010. doi:10.1088/1742-6596/1477/2/022010. [40] M.I. Kopp, A.V. Tur, V.V. Yanovsky, Chaotic Dynamics of Magnetic Fields Generated by Thermomagnetic Instability in a Nonuniformly Rotating Electrically Conductive Fluid. Journal of Physical Studies, 27 (2023): art. no. 2403. DOI: 10.30970/JPS.27.2403. [41] S. Vaidyanathan, M. Feki, A. Sambas, C. H. Lien, A new biological snap oscillator: its modelling, analysis, simulations and circuit design. International Journal of Simulation and Process Modelling, 13(5), (2018) pp. 419-432. doi.org/10.1504/IJSPM.2018.10015882. [42] C.H. Skiadas, C. Skiadas, Chaotic Modelling and Simulation: Analysis of Chaotic Models, Attractors and Forms. In: Taylor & Francis Group, (2008), pp. 1-345. [43] C.H. Skiadas, Exact solutions of stochastic differential equations: Gompertz, generalized logistic and revised exponential. Methodology and Computing in Applied Probability, 12 (2010): 261-270.