Next Article in Journal
Interaction Solutions for the Fractional KdVSKR Equations in (1+1)-Dimension and (2+1)-Dimension
Previous Article in Journal
Fractional Hermite–Hadamard, Newton–Milne, and Convexity Involving Arithmetic–Geometric Mean-Type Inequalities in Hilbert and Mixed-Norm Morrey Spaces q(·)(Mp(·),v(·)) with Variable Exponents
Previous Article in Special Issue
Analysis of Caputo Sequential Fractional Differential Equations with Generalized Riemann–Liouville Boundary Conditions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Synchronization for Delayed Fractional-Order Memristive Neural Networks Based on Intermittent-Hold Control with Application in Secure Communication

1
The School of Applied Mathematics, Chengdu University of Information Technology, Chengdu 610225, China
2
The School of Computer and Software Engineering, Xihua University, Chengdu 610039, China
3
The School of Mathematical Sciences, University of Electronic Science and Technology of China, Chengdu 611731, China
*
Authors to whom correspondence should be addressed.
Fractal Fract. 2024, 8(9), 519; https://doi.org/10.3390/fractalfract8090519
Submission received: 25 June 2024 / Revised: 28 August 2024 / Accepted: 29 August 2024 / Published: 30 August 2024

Abstract

:
This article investigates the dynamic behaviors of delayed fractional-order memristive fuzzy cellular neural networks via the Lyapunov method. To address the delay terms of fractional-order systems, a novel lemma is provided to make the solutions of the systems exponentially stable. Furthermore, two new intermittent-hold controllers are designed to improve the robustness of the system and reduce the cost of the controller. One intermittent-hold controller is based on the feedback control strategy, while the other one integrates an adaptive control strategy. Moreover, two crucial theorems are derived from the proposed lemma and controllers, guaranteeing the exponential synchronization between drive and response systems. Finally, the superior performance of the controllers in achieving exponential synchronization is demonstrated through simulations.

1. Introduction

A memristor is a kind of basic circuit element introduced by Chua [1]. In 2008, a physical model was proposed, making memristors appropriate for practical applications [2]. Owing to their unique nonlinear characteristics and considerable advantages, memristors have been extensively studied. Inspired by biological concepts, memristors have been applied in neural networks due to their abilities to learn and forget [3]. Therefore, memristors have become a hot topic in various fields, including electrical engineering [4], chaotic circuits [5] and neural networks [6]. Memristor neural networks (MNNs) are complex network systems that integrate the characteristics of memristors and neural networks. The authors of [7] investigated the multistability of MNNs using nonlinear theory and demonstrated the chaotic behavior of memristor-based Hopfield neural networks. Finite time synchronization was proposed through an adaptive control strategy for memristive neural networks in [8]. MNNs can perform chaotic behavior when appropriate parameters are selected, which has attracted significant attention [9,10].
Cellular neural networks (CNNs) were proposed in 1988 in [11], with the connection weights determined according to the characteristics and dynamical behaviors of neurons, reflecting the intrinsic nature of CNNs. CNNs have attracted a lot of attention, as seen in [12,13,14]. Fuzzy cellular neural networks (FCNNs) are a specialized form of CNNs incorporating fuzzy operations that were first proposed in [15]. Fuzzy logic can provide effective features of dynamic behavior, such as increased robustness and stability. The uncertainties in the FCNNs make them well-suited to address nonlinear filtering problems. Furthermore, ref. [16] demonstrated that FCNNs behave well in image processing and recognition. The authors of [17], investigated the mean square stability of FCNNs with mixed delays. The authors of [18] introduced memristive cellular neural networks (MCNNs) by integrating memristors with cellular neural networks. Compared with CNNs, their improved storage capacity makes MCNNs more popular Furthermore, the authors of [19] investigated MCNNs, with fixed-time synchronization conditions established by using feedback controllers and Lyapunov methods. Additionally, ref. [20] reported the synchronization results of memristive neural networks with the fuzzy cellular neural networks (MFCNNs) through feedback controllers. The combination of memristors with FCNNs can expand the advantages of memory, in addition to exhibiting chaotic characteristics.
Fractional-order calculus originated three hundred years ago, although it was not widely promoted due to the lack of physical meanings. Scientists and engineers began to realize that fractional derivatives and integrals can more accurately describe practical phenomena [21]. For instance, the model of a DC–DC converter is a typical fractional-order (FO) system, and its performance is affected if a traditional integer-order model is adopted [22]. In [23], Stamova and Stamov studied fractional-order neural networks (FNNs) with delays and reaction–diffusion. The concept of FO cellular neural networks was proposed by the authors of [24]. The authors of [25] integrated fuzzy logic into FO cellular neural networks. With the efforts of scholars, FNNs have become increasingly significant, with their dynamic properties, such as stability and synchronization, having received extensive attention. The introduction of FO memristive neural networks (FMNNs) is discussed in [26]. Since then, many efforts have been made in the study of FMNNs. For instance, FO memristive fuzzy cellular neural networks (FMFCNNs), which integrate fuzzy logic with fractional-order MNNs, have been explored, with finite-time stability results reported in [27]. The authors of [28,29] studied FMFCNNs for finite-time synchronization and fixed-time synchronization, respectively. However, the authors of [28] did not employ the Lyapunov method, and the authors of [29] used an integer-order derivative to handle the Lyapunov function. Research on FMFCNNs, particularly concerning exponential synchronization, remains limited. This is one of the motivations of this paper.
Synchronization is a critical dynamic behavior that has been extensively studied. Controller design is a core problem, and there are many effective traditional controllers [30,31,32,33]. Intermittent controllers stand out as an economical option that can reduce control resource loss and is easy to achieve. From the perspective of engineering, the transmitted information may be interrupted by disturbances, which means discontinuous controllers are more suitable for practical applications. The authors of [34,35] investigated the synchronization of neural networks using an intermittent controller. In [36], a novel intermittent-hold controller was proposed that extends traditional intermittent control by incorporating holding time, allowing the system to retain state information when communication is interrupted. This enhancement increases the robustness of the system. Traditional intermittent control strategies set the control input to zero during communication interruptions, which may cause a decreased convergence rate. However, intermittent-hold control strategies can improve this phenomenon, as demonstrated in [37]. Moreover, intermittent-hold control strategies simplify the design of controllers by not updating the control input during communication interruptions, thereby reducing the cost of controllers. But this kind of controller has not been applied in FNNs. For delayed FNNs, achieving exponential synchronization is challenging due to the distinct principles of fractional derivatives compared to integer-order derivatives. To address this, we present an inequality to handle delay terms and study exponential synchronization problems of FMFCNNs.
Moreover, in practical applications, chaotic synchronization can be utilized in secure communications. For example, the authors of [38] considered the synchronization problems of the MNNs and achieved encryption and decryption. Due to the enriched dynamical behaviors and the expanded parameter spaces of FO systems, the neural networks represented by FO calculus have more unpredictable dynamics. These characteristics make secure communication problems based on FO systems more complicated [39]. The study reported in [40] exhibits the robustness of FO systems, implying that such systems can ensure the stability and reliability of secure communication, even in unstable communication environments and under external interference. Inspired by the above discussion, this paper designs an intermittent-hold controller of FO systems and applies the synchronization results to secure communication problems.
The exponential synchronization of the FMFCNNs is achieved in this paper, and a novel intermittent-hold controller is designed. The main contributions are summarized as follows:
(1)
In this paper, a novel intermittent-hold controller is designed. The controller can chose control time flexibly with less control loss. Furthermore, adaptive control is integrated with intermittent-hold control to handle more complicated situations such as uncertainties and chaos.
(2)
A new inequality is introduced to provide the exponential stability condition for fractional-order (FO) systems, overcoming the challenges in constructing Lyapunov functions for FO systems. Based on this novel inequality, the exponential synchronization of FMFCNNs is achieved.
(3)
Some examples are provided to demonstrate the effectiveness of the proposed conditions. The control time and resting time can be chosen as required, and larger delays can be tackled by using the proposed conditions and controller, as shown in simulations.
(4)
The conditions can be applied to secure communication problems, as shown in Example 3. The chaotic signal generated by the FO drive system is mixed with the original signal for encryption. The decrypted signal is recovered through synchronized response systems.
The remainder of this paper is structured as follows. Some lemmas, definitions and models used in this paper are described in Section 2. Two types of intermittent-hold controllers are designed and some new lemmas and theorems are provided in Section 3. Three examples of three-dimensional and two-dimensional cases, as well as secure communications, are presented in Section 4. The last part discusses future work and our proposed conclusions.

2. Preliminaries and Models

This section contains a description of FMFCNNs and introduces some lemmas used in this paper.

2.1. Model Description

Consider the following fuzzy cellular FMNNs:
D t α 0 x i ( t ) = c i x i ( t ) + j = 1 n a i j ( x i ( t ) ) f j ( x j ( t ) ) + j = 1 n b i j ( x i ( t ) ) g j ( x j ( t τ ) ) + j = 1 m d i j ν j + j = 1 n α i j g j ( x j ( t τ ) ) + j = 1 n T i j ν j + j = 1 n S i j ν j + j = 1 n β i j g j ( x j ( t τ ) ) + I i ,
where ϕ ( s ) C ( [ τ , 0 ] , R n ) denotes the initial condition, c i is the self-feedback coefficient, and a i j ( x i ( t ) ) and b i j ( x i ( t ) ) are the memristor’s connective weights. τ is the time delay, and f j and g j are feedback functions. In the fuzzy cellular neural network model, α i j and β i j are elements of fuzzy feedback, α i j is MIN and other is MAX. The MIN of a fuzzy feed-forward neural network is T i j , and MAX is S i j . ν j , ⋀ and ⋁ are bias of the ith neuron and fuzzy AND and OR, respectively. The memristive weights of a i j ( x i ( t ) ) and b i j ( x i ( t ) ) are satisfied as follows:
a i j ( x i ( t ) ) = A ^ i j , | x i ( t ) | T i A ˇ i j , | x i ( t ) | > T i , b i j ( x i ( t ) ) = B ^ i j , | x i ( t ) | T i B ˇ i j , | x i ( t ) | > T i ,
where T i > 0 is a switching jump and A ˆ i j , A ˇ i j , B ^ i j and B ˇ i j represent memristance-related constants.
Regarding (1) as drive systems, the response systems of fuzzy cellular FMNNs can be described as follows:
D t α 0 y i ( t ) = c i y i ( t ) + j = 1 n a i j ( y i ( t ) ) f j ( y j ( t ) ) + j = 1 n b i j ( y i ( t ) ) g j ( y j ( t τ ) ) + j = 1 m d i j ν j + j = 1 n α i j g j ( y j ( t τ ) ) + j = 1 n T i j ν j + j = 1 n S i j ν j + j = 1 n β i j g j ( y j ( t τ ) ) + I i + u i ( t ) ,
where the initial condition is φ ( s ) C ( [ τ , 0 ] , R n ) , and u i ( t ) is the intermittent hold controller. The memristor’s connection weights ( a i j ( y i ( t ) ) and b i j ( y i ( t ) ) ) are denoted as follows:
a i j ( y i ( t ) ) = A ^ i j , | y i ( t ) | T i A ˇ i j , | y i ( t ) | > T i , b i j ( y i ( t ) ) = B ^ i j , | y i ( t ) | T i B ˇ i j , | y i ( t ) | > T i .
According to Filippov and differential inclusion theories, there exist measurable functions, i.e., a i j * c o ¯ [ a ̲ i j , a ¯ i j ] , b i j * c o ¯ [ b ̲ i j , b ¯ i j ] , where a ̲ i j represents the minimum of { A ^ i j , A ˇ i j } , a ¯ i j denotes the maximum of { A ^ i j , A ˇ i j } and b ̲ i j and b ¯ i j stand for min { B ^ i j , B ˇ i j } and max { B ^ i j , B ˇ i j } , respectively. Then the FO neural networks (1) can be rewritten as follows:
D t α 0 x i ( t ) = c i x i ( t ) + j = 1 n a i j * f j ( x j ( t ) ) + j = 1 n b i j * g j ( x j ( t τ ) ) + j = 1 m d i j ν j + j = 1 n α i j g j ( x j ( t τ ) ) + j = 1 n T i j ν j + j = 1 n S i j ν j + j = 1 n β i j g j ( x j ( t τ ) ) + I i .
There exist measurable functions, i.e., a i j * * c o ¯ [ a ̲ i j , a ¯ i j ] , b i j * * c o ¯ [ b ̲ i j , b ¯ i j ] , where a ̲ i j represents the minimum of { A ^ i j , A ˇ i j } and a ¯ i j denotes the maximum of { A ^ i j , A ˇ i j } . b ̲ i j and b ¯ i j stand for min { B ^ i j , B ˇ i j } and max { B ^ i j , B ˇ i j } , respectively. The response systems can be described as follows:
D t α 0 y i ( t ) = c i y i ( t ) + j = 1 n a i j * * f j ( y j ( t ) ) + j = 1 n b i j * * g j ( y j ( t τ ) ) + j = 1 m d i j ν j + j = 1 n α i j g j ( y j ( t τ ) ) + j = 1 n T i j ν j + j = 1 n S i j ν j + j = 1 n β i j g j ( y j ( t τ ) ) + I i + u i ( t ) .
The error is denoted as e i ( t ) = y i ( t ) x i ( t ) , and the error system of (5) and (6) is expressed as follows:
D t α 0 e i ( t ) = c i e i ( t ) + j = 1 n [ a i j * * f j ( y j ( t ) ) a i j * f j ( x j ( t ) ) + ( b i j * * g j ( y j ( t τ ) ) b i j * g j ( x j ( t τ ) ) ] + j = 1 n α i j g j ( y j ( t τ ) ) g j ( x j ( t τ ) ) + j = 1 n β i j g j ( y j ( t τ ) ) g j ( x j ( t τ ) ) + u i ( t ) .
When the error system is stable under controller u i ( t ) , systems (5) and (6) can achieve synchronization. Therefore, the subsequent sections focus on designing controllers and investigating the synchronization problems.

2.2. Preliminaries

In this subsection, some useful assumption and lemmas are presented, along with the definition of a Caputo derivative. The models proposed in this paper are described using the Caputo derivative.
Definition 1 
([41]). For n + 1 -order continuous differentiable functions ( f C n + 1 ( [ t 0 , + ] ) ), the Caputo fractional-order derivative is defined as follows:
D t α 0 f ( t ) = 1 Γ ( n α ) t 0 t ( t s ) n α 1 f ( n ) ( s ) d s ,
where n 1 α < n and n > 0 is an integer.
Assumption A1. 
Activation functions f j and g j satisfy the following for all j = 1 , 2 , , n , x , y R , x y :
( 1 ) f j ( 0 ) = g j ( 0 ) = 0 , ( 2 ) | f j ( y ) f j ( x ) | F j | y x | , | g j ( y ) g j ( x ) | G j | y x | ,
where F j and G j > 0 are Lipschitz constants.
Lemma 1 
([42]). Based on Assumption 1, for measurable functions ( a i j * , a i j * * c o ¯ [ a ̲ i j , a ¯ i j ] , b i j * , b i j * * c o ¯ [ b ̲ i j , b ¯ i j ] ), then
| a i j * * f j ( y j ( t ) ) a i j * f j ( x j ( t ) ) | γ i j * F j | y j ( t ) x j ( t ) | , | b i j * * g j ( y j ( t ) ) b i j * g j ( x j ( t ) ) | δ i j * G j | y j ( t ) x j ( t ) | ,
where γ i j * = max { | A ^ i j | , | A ˇ i j | } , δ i j * = max { | B ^ i j | h , | B ˇ i j | } .
Lemma 2 
([16]). For system (5), we have the following:
| j = 1 n α i j g j ( y j ( t ) ) g j ( x j ( t ) ) | j = 1 n G j | α i j | | y j ( t ) x j ( t ) | , | j = 1 n β i j g j ( y j ( t ) ) g j ( x j ( t ) ) | j = 1 n G j | β i j | | y j ( t ) x j ( t ) | ,
where x j ( t ) and y j ( t ) are states of system (5).
Lemma 3 
([43]). For a continuous function ( V ( t ) ), for 0 < α < 1 , there exist constants (ρ and δ) such that
D t α 0 V ( t ) ρ V ( t ) + δ , t 0 .
Then, we can obtain
D t α 0 V ( t ) δ ρ ( V ( 0 ) δ ρ ) e ρ Γ ( α + 1 ) t α .

3. Main Results

A novel intermittent-hold controller is designed and the control strategies are given in this section. Feedback control and adaptive control are integrated with intermittent-hold control. Some sufficient conditions for achieving exponential synchronization of FO systems are provided in this part.

3.1. Controller Design

Consider following intermittent controller:
u i ( t ) = u ˜ i ( t ) , t [ t k , t k 1 ) , u ˜ i ( t k ) , t [ t k 1 , t k 2 ) , 0 , t [ t k 2 , t k + 1 ) ,
In contrast with traditional intermittent control, the intermittent-hold control strategy remains the last received state information of the system instead of stopping control input. By selecting the appropriate holding interval, drive and response systems can achieve synchronization faster. In addition, the intermittent-hold control strategy is less conservative than traditional intermittent control and can achieve synchronization even with shorter communication intervals [44]. The time intervals are t k + 1 t k = T , t k 1 t k = θ 1 , t k 2 t k 1 = θ 2 and t k + 1 t k 2 = θ 3 . The controller can be designed as follows:
u i ( t ) = k i e i ( t ) η i | e i ( t τ ) | , t [ t k , t k 1 ) , k i e i ( t k 1 ) η i | e i ( t k 1 τ ) | , t [ t k 1 , t k 2 ) , 0 , t [ t k 2 , t k + 1 ) ,
where the control gains ( k i and η i ) need to be designed later. Controller (14) can be designed as an adaptive intermittent-hold controller as follows:
u i ( t ) = k i e i ( t ) 1 2 ξ i λ i ( t ) , t [ t k , t k 1 ) , k i e i ( t k 1 ) ξ i λ i ( t k 1 ) , t [ t k 1 , t k 2 ) , 0 , t [ t k 2 , t k + 1 ) ,
where λ i ( t ) = 1 e i ( t ) e i 2 ( t τ ) , D t α 0 k i = k ^ i e i 2 ( t ) 1 2 k ^ i q 1 k i , D t α 0 ξ i = ξ ^ i e i 2 ( t τ ) 1 2 ξ ^ i q 2 ξ i and k ^ i , ξ ^ i , q 1 , q 2 > 0 are constants.
Remark 1. 
Controller (14) adopts an intermittent-hold control strategy, allowing for flexible selection of control time and holding time. By using this controller, larger delays can be tackled as shown in Figure 8. Controller (15) is feedback-based, and controller (16) is adaptive-based so that it can handle more complex situations. The design of control gains is addressed subsequently.
Remark 2. 
The use of an adaptive controller is an intelligent control strategy. The control law includes an update rule to adjust the control parameters. These parameters are dynamically updated based on errors and state changes between drive and response systems. The design of control parameters k ^ i and ξ ^ i needs to be determined by the conditions outlined in Theorem 2.

3.2. Exponential Synchronization of FMNNs with Fuzzy Cellular Neural Networks

In this subsection, a lemma for a delayed FO system is presented that addresses the exponential stability and synchronization problems. The results for FMFCNNs with two kinds of intermittent-hold control are reported.
Lemma 4. 
For following delayed FO system with V ( t ) > 0 , V ( t ) is exponentially stable if ρ 1 > 0 , ρ 2 > 0 and V ( 0 ) is bounded:
D t α 0 V ( t ) ρ 1 V ( t ) + ρ 2 V ( t τ ) + δ .
Then, there exist positive constants (b and σ 1 ) such that
V ( t ) b e ρ 2 σ 1 t α .
Proof of Lemma 4. 
For a positive function ( m ( t ) ), we have
D t α 0 V ( t ) = ρ 1 V ( t ) + ρ 2 V ( t τ ) + δ m ( t ) ,
and, taking the FO integral of (17), we can obtain
V ( t ) = V ( 0 ) + D t α 0 ( ρ 1 V ( t ) + ρ 2 V ( t τ ) + δ m ( t ) ) .
Then, taking the Laplace transform of (18), we derive the following equation:
V ¯ ( s ) = s 1 V ( 0 ) + s α ( ρ 1 V ¯ ( s ) ) + s α ( ρ 2 V ¯ ( s τ ) ) + s α δ s 1 s α m ¯ ( s ) ,
where L { V ( t ) ; s } = V ¯ ( s ) , L { m ( t ) ; s } = m ¯ ( s ) . From (19), we have
V ¯ ( s ) = s 1 1 + s α ρ 1 V ( 0 ) + s α 1 + s α ρ 1 ( ρ 2 V ¯ ( s τ ) ) + s α 1 1 + s α ρ 1 δ s α 1 + s α ρ 1 m ¯ ( s ) ,
Then, taking the inverse Laplace transform of (20), we can obtain
V ( t ) V ( 0 ) E α ( ρ 1 t α ) + δ t α E α , α + 1 ( ρ 1 t α ) + ρ 2 0 t ( t s ) α 1 E α , α ( ρ 1 ( t s ) α ) V ( s τ ) d s .
According to [45], we have 0 < E α ( ρ 1 t α ) < 1 , and 0 < t α E α , α + 1 ( ρ 1 t α ) < 1 ρ 1 . Then, we can obtain
V ( t ) V ( 0 ) + δ ρ 1 + ρ 2 0 t ( t s ) α 1 E α , α ( ρ 1 ( t s ) α ) V ( s τ ) d s .
Letting σ * = sup τ s t { V ( s τ ) + V ( s ) } , we have
V ( t ) V ( 0 ) + δ + σ * ρ 2 ρ 1 ρ 2 0 t ( t s ) α 1 E α , α ( ρ 1 ( t s ) α ) V ( s ) d s .
By utilizing grown-wall inequality we obtain
V ( t ) b e ρ 2 t α E α , α + 1 ( ρ 1 t α ) ,
where b = V ( 0 ) + δ + σ * ρ 2 ρ 1 and, because of t α E α , α + 1 ( ρ 1 t α ) > 0 , there exists σ 1 > 0 such that E α , α + 1 ( ρ 1 t α ) > σ 1 . Therefore, we can obtain
V ( t ) b e ρ 2 σ 1 t α .
Remark 3. 
When FO systems satisfy the requirements of Lemma 4, V ( t ) decays exponentially. If V ( t ) is a Lyapunov functional, the results of exponential stability or exponential synchronization can be obtained under Lemma 4.
Theorem 1. 
Under the assumption 1, if there exists a positive control gain ( k i ) such that
ρ = min i { c i + k i j = 1 n γ j i * F i } > 0 ,
ρ 1 * = min i { 2 c i j = 1 n ( γ i j * F j + γ j i * F i ) ρ 2 } > 0 ,
ρ 2 = max i { j = 1 n ( δ j i * + | α j i | + | β j i | ) G i } > 0
and
η i = j = 1 n ( δ j i * + | α i j | + | β i j | ) G i
hold, where i = 1 , 2 , , n and other constants are previously defined system parameters, fuzzy cellular FMNNs (5) and (6) can achieve exponential synchronization with controller (15).
The proof of Theorem 1 is shown in Appendix A.
If controller (15) is changed into an adaptive intermittent-hold controller as (16), a different synchronization result can be obtained.
Theorem 2. 
Fuzzy cellular FMNNs (5) and (6) can achieve exponential synchronization with adaptive intermittent-hold controller (16) if there exist control gains ( k ^ i , ξ ^ i and k i ) ξ i such that
ρ = min i { 2 c i + 2 k ^ i j = 1 n γ i j * F j + γ j i * F i j = 1 n δ i j * + | α i j | + | β i j | G j } > 0 ,
ρ 1 = min i { 2 c i + k i + 1 2 ξ i j = 1 n γ i j * F j + γ j i * F i j = 1 n δ i j * + | α i j | + | β i j | G j } > 0 ,
j = 1 n δ j i * + | α j i | + | β j i | G i ξ ^ i 0 ,
and assumption 1 holds, where i = 1 , 2 , , n and other constants are previously defined system parameters.
The proof of Theorem 2 is given in Appendix B.
Remark 4. 
The gains of controllers are determined by the conditions of theorems. For controller (15), the gains ( k i ( i = 1 , 2 , , n ) ) need to satisfy the conditions of Theorem 1, and η i ( i = 1 , 2 , , n ) are given in (29). For controller (16), the k ^ i , ξ ^ i ( i = 1 , 2 , , n ) of adaptive laws need to satisfy the conditions of Theorem 2. When inequalities in theorems are satisfied with system parameters and control gains, the drive and response systems can achieve synchronization.

4. Simulation

Example 1. 
Consider a three-dimensional FMNN with a fuzzy cellular neural network with the following parameters:
a 11 ( x 1 ( t ) ) = 2 , | x 1 ( t ) | 1 1.9 , | x 1 ( t ) | > 1 , a 12 ( x 1 ( t ) ) = 1.3 , | x 1 ( t ) | 1 1.1 , | x 1 ( t ) | > 1 , a 13 ( x 1 ( t ) ) = 0.2 , | x 1 ( t ) | 1 0.2 , | x 1 ( t ) | > 1 , a 21 ( x 2 ( t ) ) = 1.8 , | x 2 ( t ) | 1 1.8 , | x 2 ( t ) | > 1 , a 22 ( x 2 ( t ) ) = 1.7 , | x 2 ( t ) | 1 1.72 , | x 2 ( t ) | > 1 , a 23 ( x 2 ( t ) ) = 1.1 , | x 2 ( t ) | 1 1.2 , | x 2 ( t ) | > 1 , a 31 ( x 3 ( t ) ) = 4.8 , | x 3 ( t ) | 1 4.7 , | x 3 ( t ) | > 1 , a 32 ( x 3 ( t ) ) = 0.5 , | x 3 ( t ) | 1 0.5 , | x 3 ( t ) | > 1 , a 33 ( x 3 ( t ) ) = 1 , | x 3 ( t ) | 1 1.2 , | x 3 ( t ) | > 1 , b 11 ( x 1 ( t ) ) = 0.1 , | x 1 ( t ) | 1 0.3 , | x 1 ( t ) | > 1 , b 12 ( x 1 ( t ) ) = 0.25 , | x 1 ( t ) | 1 0.35 , | x 1 ( t ) | > 1 , b 13 ( x 1 ( t ) ) = 0.5 , | x 1 ( t ) | 1 0.5 , | x 1 ( t ) | > 1 , b 21 ( x 2 ( t ) ) = 0.25 , | x 2 ( t ) | 1 0.15 , | x 2 ( t ) | > 1 , b 22 ( x 2 ( t ) ) = 0.18 , | x 2 ( t ) | 1 0.2 , | x 2 ( t ) | > 1 , b 23 ( x 2 ( t ) ) = 0.15 , | x 2 ( t ) | 1 0.15 , | x 2 ( t ) | > 1 , b 31 ( x 3 ( t ) ) = 0.15 , | x 3 ( t ) | 1 0.7 , | x 3 ( t ) | > 1 , b 32 ( x 3 ( t ) ) = 0.2 , | x 3 ( t ) | 1 0.2 , | x 3 ( t ) | > 1 , b 33 ( x 1 ( t ) ) = 0.28 , | x 3 ( t ) | 1 0.12 , | x 3 ( t ) | > 1 ,
where c 1 = c 2 = c 3 = 2 , τ = 0.1 , α = 0.9 and k 1 = k 2 = k 3 = 5 and the activation functions are f i ( x ) = g i ( x ) = 1 2 ( | 1 + x | + | 1 x | ) .
Other parameters are denoted as follows:
( α i j ) 3 × 3 = 0.1 0.01 0.1 0.2 0.1 0.1 0.04 0.2 0.4 , ( β i j ) 3 × 3 = 0.1 0.01 0.3 0.1 0.2 0.2 0.1 0.2 0.3 , D = ( d i j ) 3 × 3 = 0.1 0.1 0.1 0.1 0.1 0.2 0.2 0.1 0.2 , T = ( T i j ) 3 × 3 = 0.2 0.1 0.2 0.2 0.2 0.1 0.1 0.1 0.2 , S = ( S i j ) 3 × 3 = 0.2 0.1 0.2 0.3 0.1 0.2 0.1 0.1 0.2 , V = ( ν j ) 3 × 1 = 1 2 1 .
Let F i = 0.1 and G i = 1 ; then, according to Lemma 2 and the above parameters, we can obtain
( δ i j * ) 3 × 3 = 0.3 0.35 0.5 0.25 0.2 0.15 0.7 0.2 0.28 , ( γ i j * ) 3 × 3 = 2 1.3 0.2 1.8 1.72 1.2 4.8 0.5 1.2 .
We can calculate that ρ 2 = max i { j = 1 n ( δ j i * + | α j i | + | β j i | ) G i } = 2.37 > 0 , ρ 1 * = min i { 2 c i j = 1 n ( γ i j * F j + γ j i * F i ) ρ 2 } = 0.42 > 0 and ρ = min i { c i + k i j = 1 n γ j i * F i } = 6.4 > 0 for i = 1 , 2 , 3 and that η i = j = 1 n ( δ j i * + | α i j | + | β i j | ) G i , η 1 = 1.87 , η 2 = 1.65 and η 3 = 2.17 . The control gains of controller (15) satisfy the conditions of Theorem 1 with the above system parameters. Therefore, the drive and response systems can achieve synchronization.
Figure 1 shows that the trajectories of x 1 ( t ) and y 1 ( t ) can achieve synchronization under intermittent-hold controller (15) with initial values of x 1 ( 0 ) = 0.8626 and y 1 ( 0 ) = 0.9978 . Figure 2 shows that the error systems can converge to zero with initial values of x ( 0 ) = ( x 1 ( 0 ) , x 2 ( 0 ) , x 3 ( 0 ) ) T = ( 0.8626 , 0.0387 , 0.1755 ) T and y ( 0 ) = ( y 1 ( 0 ) , y 2 ( 0 ) , y 3 ( 0 ) ) T = ( 0.9978 , 1.1277 , 0.3095 ) T .
Letting t k + 1 t k = 0.1 , the control time is chosen as θ 1 = 0.05 , the holding time is θ 2 = 0.025 and the rest time is θ 3 = 0.025 , as represented in Figure 3 and Figure 4. Furthermore, by selecting a delay of τ = 1 , FMNs (5) and (6) with controller (15) can achieve exponential synchronization, which is illustrated in Figure 5. The trajectories of error between FMNs (5) and (6) are below 3.4 * e x p ( 1.085 x ) , which is consistent with the results of Theorem 1.
To compare the performance of intermittent-hold control with that of traditional intermittent control, we compare convergence time using three different sets of initial values. The first set of initial values is x ( 0 ) = ( 0.3175 , 2.5191 , 0.1228 ) T and y ( 0 ) = ( 1.0146 , 1.7545 , 0.3030 ) T . The second set is x ( 0 ) = ( 0.5871 , 0.2314 , 0.1870 ) T and y ( 0 ) = ( 0.5449 , 0.2592 , 0.9586 ) T . The third set is x ( 0 ) = ( 0.9639 , 0.4034 , 0.4632 ) T and y ( 0 ) = ( 0.5931 , 0.6637 , 0.8803 ) T . The intermittent-hold controller becomes a traditional intermittent controller when the holding time is θ 2 = 0 , letting t k + 1 t k = 0.5 , τ = 0.2 and τ = 1.5 .
Table 1 show that the intermittent-hold control strategy achieves a faster convergence rate than traditional intermittent control. Moreover, the intermittent-hold controller performs better than the traditional one when dealing with large time delays.
Remark 5. 
Based on the FO system parameters in Example 2 in [46], we can calculate that ρ 2 = 5.72 > 0 , ρ 1 * = 1.33 > 0 , k i = 10 , η 1 = 4.44 , η 2 = 5.9 and η 3 = 3.74 , indicating that the presented results still work under the parameters reported in [46]. Figure 6 shows the synchronized states ( x 1 ( t ) and y 1 ( t ) ), along with the trajectories of error between two states. Under the parameters of Example 1 in [28], the theorems proposed in this paper are also valid. Moreover, the proposed results can be applied to handle larger delays, such as τ = 1.5 . Therefore, the results obtained in this paper are less conservative.
Example 2. 
Consider a two-dimensional FMNN with a fuzzy cellular neural network with the following parameters:
a 11 ( x 1 ( t ) ) = 1 , a 22 ( x 2 ( t ) ) = 1.8 , a 12 ( x 1 ( t ) ) = 7 , | x 1 ( t ) | 1 5 , | x 1 ( t ) | > 1 , a 21 ( x 2 ( t ) ) = 0.8 , | x 1 ( t ) | 1 1 , | x 1 ( t ) | > 1 , b 11 ( x 1 ( t ) ) = 1.5 , | x 1 ( t ) | 1 1.2 , | x 1 ( t ) | > 1 , b 12 ( x 1 ( t ) ) = 1 , | x 1 ( t ) | 1 0.8 , | x 1 ( t ) | > 1 , b 21 ( x 2 ( t ) ) = 0.8 , | x 1 ( t ) | 1 1 , | x 1 ( t ) | > 1 , b 22 ( x 2 ( t ) ) = 1.4 , | x 1 ( t ) | 1 1.6 , | x 1 ( t ) | > 1 ,
where c 1 = c 2 = 2 , τ = 0.8 , α = 0.98 and k ^ i = 4 and the activation functions are f i ( x ) = g i ( x ) = 1 2 ( | 1 + x | + | 1 x | ) . Other parameters are denoted as follows:
( α i j ) 2 × 2 = 1.6 0.2 0.4 2.8 , ( β i j ) 2 × 2 = 1.2 0.4 0.1 2.4 , D = ( d i j ) 2 × 2 = 0.1 0.1 0.1 0.1 , T = ( T i j ) 2 × 2 = 0.2 0.1 0.2 0.2 , S = ( S i j ) 2 × 2 = 0.2 0.1 0.3 0.1 , V = ( ν j ) 2 × 1 = 0.5 0.5 .
Let F i = 0.1 and G i = 1 ; then, according to Lemma 2 and the above parameters, we can obtain
( δ i j * ) 2 × 2 = 1.5 1 1 1.6 , ( γ i j * ) 2 × 2 = 1 7 1 1.8 .
We can calculate that ρ = min i { 2 c i + 2 k ^ i j = 1 n γ i j * F j + γ j i * F i j = 1 n δ i j * + | α i j | + | β i j | G j } = 2.54 > 0 and j = 1 n δ j i * + | α j i | + | β j i | G i ξ ^ i 0 , for i = 1 , 2 , ξ ^ 1 0.58 , ξ ^ 2 0.84 . The control gains of controller (16) satisfy the conditions of Theorem 2 with the above system parameters. Therefore, the drive and response systems can achieve synchronization.
According to Theorem 2, we find that ρ 1 * = 1.38 > 0 , ρ > 0 , η 1 = 1.18 and η 2 = 1.46 . Figure 7 shows a control time of θ 1 = 0.07 , a holding time of θ 2 = 0.015 and a rest time of θ 3 = 0.015 . To demonstrate the trajectory and effectiveness of the controller, we select three sets of states ( x ( t ) and y ( t ) ) with different initial values of x 1 ( 0 ) = ( 1.0292 , 2.6821 ) T , y 1 ( 0 ) = ( 1.6697 , 0.5007 ) T , x 2 ( 0 ) = ( 1.8612 , 0.9289 ) T , y 2 ( 0 ) = ( 0.2962 , 0.3957 ) T , x 3 ( 0 ) = ( 0.4037 , 0.5386 ) T and y 3 ( 0 ) = ( 0.6360 , 0.8386 ) T . Figure 8 shows the results obtain using the intermittent-hold controller integrated with an adaptive strategy and a delay of τ = 0.8 .
Figure 9 presents the error between drive and response systems based on three sets of states ( x ( t ) and y ( t ) ) with different initial values. e i is the first dimension of y i ( t ) x i ( t ) . Figure 9 shows that the conservation of Theorem 2 is reduced due to the application of intermittent-hold controller (16). In this simulation, we use three different initial values, with delays set to τ = 0.1 , τ = 0.5 , τ = 1 and τ = 1.5 . The errors between drive and response systems can converge to zero, which means that the results are applicable even in situations with larger delays.
Figure 10 shows the trajectories of controller (16) with four different delays. The lager the time delays, the larger the controller adjustment range. Comparisons of convergence times for three sets of initial values are provided. The first set of initial values is x ( 0 ) = ( 0.1873 , 0.4373 ) T and y ( 0 ) = ( 1.5822 , 0.9426 ) T . The second set is x ( 0 ) = ( 0.0323 , 0.0224 ) T and y ( 0 ) = ( 0.6654 , 1.2561 ) T . The third set is x ( 0 ) = ( 0.3669 , 1.2666 ) T and y ( 0 ) = ( 0.3175 , 0.3563 ) T . Figure 11 shows a comparison between an intermittent-hold controller and a traditional intermittent controller. The delays are set as τ = 1.5 , t k + 1 t k = 0.5 , and Figure 11a shows that FMNs (5) and (6) can achieve synchronization, while Figure 11b displays the errors between two states under intermittent-hold control and intermittent control. Table 2 demonstrates that the intermittent-hold control strategy can converge faster than the traditional intermittent control.
Example 3. 
Memristive neural networks can exhibit chaotic behaviors. Therefore, the results reported in this paper can be employed in secure communication problems.
System (1) can be degenerated as follows:
D t α 0 x i ( t ) = c i x i ( t ) + j = 1 n a i j ( x i ( t ) ) f j ( x j ( t ) ) + j = 1 n b i j ( x i ( t ) ) g j ( x j ( t τ ) ) + I i ,
The memristive weights can be described as uncertainties, for instance, A + A ( t ) = ( a i j ( x i ( t ) ) ) n × n , A ( t ) = E F M , F T F I . The parameters are set as
A = 2 1.2 0 1.8 1.71 1.15 4.75 0 1.1 , B = 10 10 0 28 1 0 0 0 8 3 ,
and f j ( x ) = 1 2 ( | 1 + x | + | 1 x | ) , g j ( x ) = c o s ( x ) , c i = 2 ( i = 1 , 2 , 3 ) , τ = 0.1 , k ^ i = 3 ( i = 1 , 2 , 3 ) , θ 1 = 0.5 , θ 2 = θ 3 = 0.25 .
The response system has the same parameters. In the following simulation, the synchronization results are applied to the secure communication problem. First, the transmitter and receiver construct the same memristive neural networks to achieve signal synchronization. Based on Figure 12, we conclude that synchronization can be achieved by using controller (16). The transmitter combines the information signal with fractional-order MNN signals for encryption. The transmitted signal described as S ( t ) = s i n ( t ) + s i n ( 5 t ) + s i n ( 7 t ) is shown in Figure 13a. The encryption function is Φ 1 ( x , s ) = ( φ 1 ( x ) + φ 2 ( x ) ) S , where φ 1 ( x ) = x 2 x 3 and φ 2 ( x ) = x 2 + x 3 . The mixed signal is shown in Figure 13b.
In this way, we can obtain the encryption signal ( S E ). The receiver uses the synchronized signal to recover the original signal as S d = Φ 2 ( y , S E ) . Figure 14 shows that the signal can be decoded successfully.
Remark 6. 
In the process of encryption and decryption through the use of the synchronization method, the initial errors are usually caused by the time required for the transmitter and receiver to establish synchronization. However, the two systems gradually adjust, reducing errors over time. These initial errors usually do not affect the long-term decryption effect because once the systems are synchronized, encryption and decryption can be proceed accurately, ensuring the security and reliability of information transmission.

5. Conclusions

In this paper, the exponential synchronization problems of FMFCNNs are investigated. A novel lemma is introduced to tackle the delay terms of FO systems via inequality techniques and the FO Laplace transform method. A new intermittent-hold controller is designed to address the synchronization problems. Furthermore, to handle more complicated situations, an intermittent-hold controller integrated with an adaptive control strategy is proposed. Additionally, two significant theorems are obtained on the basis of the proposed lemma and the two controllers. The simulation results confirm that the two proposed controllers can achieve exponential synchronization and effectively handle larger time delays. Compared with the traditional intermittent controllers, the proposed controllers have a faster convergence rate. Moreover, an application in secure communication is exhibited, which demonstrates the effectiveness of the results. For in future works, we will concentrate on the chaotic synchronization problems of FO systems.

Author Contributions

Conceptualization, X.Y.; Methodology, X.Y.; Writing—original draft, X.Y.; Data curation, J.S.; Software, J.S.; Validation, Y.D.; Supervision, S.Z.; Writing—review and editing, S.Z. and Y.D. All authors have read and agreed to the published version of the manuscript.

Funding

This work was financially supported by the Natural Science Foundation of Sichuan Province (Nos. 2023NSFSC1362 and 2023NSFSC0071), the Foundation of Chengdu University of Information Technology (No. KYTZ2022148), the 2023 Chengdu University of Information Technology Science and Technology Innovation Capability Enhancement Plan Innovation Team Key Project (KYTD202322) and the National Natural Science Foundation of China (No. 12101090).

Data Availability Statement

The generated datasets supporting the findings of this article are obtainable from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A. Proof of Theorem 1

The proof is divided with three cases.
Case 1: 
t [ t k , t k 1 )
Consider the following Lyapunov function:
V ( e ( t ) ) = i = 1 n | e i ( t ) | .
Then, taking the FO derivative of (A1), we have
D t α 0 V ( e ( t ) ) i = 1 n s i g n ( e i ( t ) ) D t α 0 e i ( t ) = i = 1 n s i g n ( e i ( t ) ) { c i e i ( t ) + j = 1 n [ a i j * * f j ( y j ( t ) ) a i j * f j ( x j ( t ) ) + b i j * * g j ( y j ( t τ ) ) b i j * g j ( x j ( t τ ) ] + j = 1 n α i j g j ( y j ( t τ ) ) g j ( x j ( t τ ) ) + j = 1 n β i j g j ( y j ( t τ ) ) g j ( x j ( t τ ) ) + u i ( t ) } .
According to Lemma 1 and Lemma 2, we can obtain
D t α 0 V ( e ( t ) ) i = 1 n [ c i | e i ( t ) | + s i g n ( e i ( t ) ) j = 1 n γ i j * F j | e j ( t ) | + s i g n ( e i ( t ) ) j = 1 n δ i j * G j | e j ( t τ ) | + s i g n ( e i ( t ) ) j = 1 n ( | α i j | + | β i j | ) G j | e j ( t τ ) | k i | e i ( t ) | η i s i g n ( e i ( t ) ) | e i ( t τ ) | ] .
Together with the conditions of Theorem 1 ( η i = j = 1 n ( δ j i * + | α i j | + | β i j | ) G i ), we can obtain
D t α 0 V ( e ( t ) ) i = 1 n ( c i k i + j = 1 n γ j i * F i ) | e i ( t ) | + i = 1 n ( j = 1 n ( δ j i * + | α i j | + | β i j | ) G i η i ) s i g n ( e i ( t ) ) | e i ( t τ ) | = ρ V ( e ( t ) ) ,
where ρ = min i { c i + k i j = 1 n γ j i * F i } > 0 . According to Lemma 3, we have
V ( e ( t ) ) V ( e ( 0 ) ) e ρ Γ ( α + 1 ) t α ,
that is,
e ( t ) V ( e ( t ) ) e ( 0 ) e ρ Γ ( α + 1 ) ( t t k ) α .
Case 2: 
t [ t k 1 , t k 2 )
Consider the following Lyapunov function:
V ( e ( t ) ) = i = 1 n e i 2 ( t ) .
Together with Lemma 1 and Lemma 2, taking the FO derivative of (A7), we can obtain
D t α 0 V ( e ( t ) ) 2 i = 1 n e i ( t ) D t α 0 e i ( t ) 2 i = 1 n { c i e i 2 ( t ) + j = 1 n e i ( t ) [ γ i j * F j | e j ( t ) | + δ i j * G j | e j ( t τ ) | + ( | α i j | + | β i j | ) G j e j ( t τ ) ] k i e i ( t ) e ( t k 1 ) η i e i ( t ) e i ( t k 1 τ ) } ,
And we have following inequalities:
2 i = 1 n j = 1 n γ i j * F j e i ( t ) | e j ( t ) | i = 1 n j = 1 n γ i j * F j e i 2 ( t ) + i = 1 n j = 1 n γ i j * F j e j 2 ( t ) ,
2 i = 1 n j = 1 n ( δ i j * + | α i j | + | β i j | ) G j e i ( t ) | e j ( t τ ) | i = 1 n j = 1 n ( δ i j * + | α i j | + | β i j | ) G j ( e i 2 ( t ) + e j 2 ( t τ ) ) .
Substituting (A9) and (A10) into (A8), we can obtain
D t α 0 V ( e ( t ) ) i = 1 n [ 2 c i + j = 1 n γ i j * F j + γ j i * F i + j = 1 n [ δ i j * + | α i j | + | β i j | ] G j ] e i 2 ( t ) + i = 1 n j = 1 n δ j i * + | α j i | + | β j i | G i e i 2 ( t τ ) i = 1 n k i e i ( t ) e ( t k 1 ) i = 1 n η i e i ( t ) e i ( t k 1 τ ) .
There exist ε 1 and ε 2 such that
i = 1 n k i e i ( t ) e ( t k 1 ) 1 2 i = 1 n k i e i 2 ( t ) i = 1 n ( 1 2 ε 1 ) k i e i 2 ( t k ) , i = 1 n η i e i ( t ) e ( t k 1 τ ) 1 2 i = 1 n η i e i 2 ( t ) i = 1 n ( 1 2 ε 2 ) η i e i 2 ( t k τ ) .
Therefore, we have
D t α 0 V ( e ( t ) ) ρ 1 V ( e ( t ) ) + ρ 2 V ( e ( t τ ) ) + δ ,
where ρ 1 = min i { 2 c i + k i + η i j = 1 n ( γ i j * F j + γ j i * F i ) ρ 2 } > 0 , ρ 2 = max i { j = 1 n ( δ j i * + | α j i | + | β j i | ) G i } > 0 and
δ = 0 , ε 1 , ε 2 1 2 , i = 1 n [ ( 1 2 ε 1 ) e i 2 ( t k ) + ( 1 2 ε 2 ) e i 2 ( t k τ ) ] , o t h e r s .
According to Lemma 4 and the conditions of Theorem 1, we have
V ( e ( t ) ) b 1 e ρ 2 σ 1 t α ,
where b 1 = e ( 0 ) 2 + 1 ρ 1 ( δ + σ * ρ 2 ) , σ 1 = inf t { E α , α + 1 ( ρ 1 t α ) } , σ * = sup τ s t { V ( s ) + V ( s τ ) } , that is,
e ( t ) 2 V ( e ( t ) ) b 1 e ρ 2 σ 1 t α b 1 e ρ 2 σ 1 ( t t k 1 ) α .
Case 3: 
t [ t k 2 , t k + 1 )
By using the same Lyapunov function, we have
D t α 0 V ( e ( t ) ) ρ 1 * V ( e ( t ) ) + ρ 2 V ( e ( t τ ) ) ,
where ρ 1 * = min i { 2 c i j = 1 n ( γ i j * F j + γ j i * F i ) ρ 2 } . Then, according to Lemma 4, we can obtain
V ( e ( t ) ) b 2 e ρ 2 σ 1 t α ,
where b 2 = e ( 0 ) 2 + 1 ρ 1 ( σ * ρ 2 ) , that is,
e ( t ) 2 V ( e ( t ) ) b 2 e ρ 2 σ 1 t α b 2 e ρ 2 σ 1 ( t t k 2 ) α ,
Now, we can find that e ( t ) is bounded by an exponential decay function. For each time interval [ t k , t k + 1 ] , we only need the minimum of e ( t ) for t [ t k + 1 , t k + 1 , 1 ) to be smaller than the minimum of e ( t ) for t [ t k 2 , t k + 1 ) , that is,
e ( t ) 2 e 2 ρ Γ ( α + 1 ) ( t k + 1 , 1 t k + 1 ) α b 2 e ρ 2 σ 1 ( t k + 1 t k 2 ) α .
For ρ 2 ρ 2 ρ 1 θ 1 α Γ ( α + 1 ) , we can find that the zero point of (7) is exponentially stable. This completes the proof.

Appendix B. Proof of Theorem 2

The proof is divided into three parts.
Case 1: 
t [ t k , t k 1 )
Consider the following Lyapunov function:
V ( e ( t ) ) = V 1 ( e ( t ) ) + V 2 ( e ( t ) ) + V 3 ( e ( t ) ) ,
where
V 1 ( e ( t ) ) = i = 1 n e i 2 ( t ) , V 2 ( e ( t ) ) = i = 1 n 1 k ^ i ( k i k ^ i ) 2 , V 3 ( e ( t ) ) = i = 1 n 1 2 ξ ^ i ( ξ i ξ ^ i ) 2 .
Because the controller used here is adaptive, the control gains are included in the construction of V 2 ( e ( t ) ) and V 3 ( e ( t ) ) . Then, taking the FO derivative of V 1 ( e ( t ) ) , according to the the proof of Theorem 1, we can obtain
D t α 0 V 1 ( e ( t ) ) 2 i = 1 n e i ( t ) D t α 0 e i ( t ) i = 1 n ( 2 c i 2 k i + j = 1 n γ i j * F j + γ j i * F i + j = 1 n ( δ i j * + | α i j | + | β i j | ] G j ] e i 2 ( t ) + i = 1 n j = 1 n δ j i * + | α j i | + | β j i | G i e i 2 ( t τ ) i = 1 n ξ i e i 2 ( t τ ) .
Furthermore, we can find that
D t α 0 V 1 ( e ( t ) ) i = 1 n [ 2 c i 2 k ^ i + j = 1 n γ i j * F j + γ j i * F i + j = 1 n [ δ i j * + | α i j | + | β i j | ] G j ] e i 2 ( t ) + i = 1 n j = 1 n δ j i * + | α j i | + | β j i | G i ξ ^ i × e i 2 ( t τ ) 2 i = 1 n ( k i k ^ i ) e i 2 ( t ) i = 1 n ( ξ i ξ ^ i ) e i 2 ( t τ ) .
Taking the derivatives of V 2 ( e ( t ) ) and V 2 ( e ( t ) ) , we have
D t α 0 V 2 ( e ( t ) ) 2 i = 1 n 1 k ^ i ( k i k ^ i ) D t α 0 k i = 2 i = 1 n ( k i k ^ i ) e i 2 ( t ) q 1 i = 1 n ( k i k ^ i ) k i 2 i = 1 n ( k i k ^ i ) e i 2 ( t ) q 1 2 i = 1 n ( k i k ^ i ) 2 + q 1 2 i = 1 n k ^ i 2 ,
and
D t α 0 V 3 ( e ( t ) ) i = 1 n 1 ξ ^ i ( ξ i ξ ^ i ) D t α 0 ξ i i = 1 n ( ξ i ξ ^ i ) e i 2 ( t ) q 2 4 i = 1 n ( ξ i ξ ^ i ) 2 + q 2 4 i = 1 n ξ ^ i 2 ,
respectively.
According to (A23) to (A25) and the conditions of Theorem 2, we can obtain
D t α 0 V ( e ( t ) ) i = 1 n [ 2 c i 2 k ^ i + j = 1 n γ i j * F j + γ j i * F i + j = 1 n [ δ i j * + | α i j | + | β i j | ] G j ] e i 2 ( t ) q 1 2 i = 1 n ( k i k ^ i ) 2 q 2 4 i = 1 n ( ξ i ξ ^ i ) 2 + q 1 2 i = 1 n k ^ i 2 + q 2 4 i = 1 n ξ ^ i 2 ρ V 1 ( e ( t ) ) q 1 k ^ i 2 V 2 ( e ( t ) ) q 2 ξ ^ i 2 V 3 ( e ( t ) ) + δ ,
where ρ = min i { 2 c i + 2 k ^ i j = 1 n γ i j * F j + γ j i * F i j = 1 n δ i j * + | α i j | + | β i j | G j } , j = 1 n δ j i * + | α j i | + | β j i | G i ξ ^ i 0 , δ = q 1 2 i = 1 n k ^ i 2 + q 2 4 i = 1 n ξ ^ i 2 . Let ρ * = min { ρ , q 1 k ^ i 2 , q 1 ξ ^ i 2 } ; then, we have
D t α 0 V ( e ( t ) ) ρ * V ( e ( t ) ) + δ .
According to Lemma 3, we can obtain
V ( e ( t ) ) ( V ( e ( 0 ) ) δ ρ * ) e ρ 8 Γ ( α + 1 ) t α + δ ρ * .
Case 2: 
t [ t k 1 , t k 2 )
Consider the following Laypunov function:
V ( e ( t ) ) = i = 1 n e i 2 ( t ) ,
Then, we can obtain
D t α 0 V ( e ( t ) ) 2 i = 1 n e i ( t ) D t α 0 e i ( t ) i = 1 n [ 2 c i + j = 1 n γ i j * F j + γ j i * F i + j = 1 n [ δ i j * + | α i j | + | β i j | ] G j ] e i 2 ( t ) + i = 1 n j = 1 n δ j i * + | α j i | + | β j i | G i e i 2 ( t τ ) 2 i = 1 n e i ( t ) k i e i ( t k 1 ) i = 1 n e i ( t ) ξ i 1 e i ( t k 1 ) e i 2 ( t k 1 τ ) .
There exist ε 1 and ε 2 such that
2 i = 1 n e i ( t ) k i e i ( t k 1 ) i = 1 n k i e i 2 ( t ) 2 i = 1 n ( 1 2 ε 1 ) k i e i 2 ( t k 1 ) , i = 1 n e i ( t ) ξ i 1 e i ( t k 1 ) e i 2 ( t k 1 τ ) 1 2 i = 1 n ξ i e i 2 ( t ) i = 1 n ( 1 2 ε 1 ) ξ i e i 2 ( t k 1 τ ) .
Substituting (A31) into (A30), we have
D t α 0 V ( e ( t ) ) i = 1 n [ 2 c i k i 1 2 ξ i + j = 1 n γ i j * F j + γ j i * F i + j = 1 n [ δ i j * + | α i j | + | β i j | ] G j ] e i 2 ( t ) + i = 1 n j = 1 n δ j i * + | α j i | + | β j i | G i e i 2 ( t τ ) + δ 1 ρ 1 V ( e ( t ) ) + ρ 2 V ( e ( t τ ) ) + δ 1 ,
where ρ 1 = min i { 2 c i + k i + 1 2 ξ i j = 1 n γ i j * F j + γ j i * F i j = 1 n δ i j * + | α i j | + | β i j | G j } , ρ 2 = max i { j = 1 n δ j i * + | α j i | + | β j i | G i e i 2 ( t τ ) } . According to Lemma 4, we can obtain
V ( e ( t ) ) b 1 e ρ 2 σ 1 t α ,
where b 1 = V ( e ( 0 ) ) + 1 ρ 1 ( δ 1 + σ k 1 * ρ 2 ) , σ 1 = inf t { E α , α + 1 ( ρ 1 t α ) } , σ k 1 * = sup τ s t k 1 { V ( s ) + V ( s τ ) } .
Case 3: 
t [ t k 2 , t k + 1 )
By choosing the same Lyapunov function as (A29), we can obtain
D t α 0 V ( e ( t ) ) ρ 1 * V ( e ( t ) ) + ρ 2 V ( e ( t τ ) ) ,
According to Lemma 4, we can obtain
V ( e ( t ) ) b 2 e ρ 2 σ 2 t α ,
where b 2 = V ( e ( 0 ) ) + 1 ρ 1 σ k 2 * ρ 2 , σ k 2 * = sup τ s t k 2 { V ( s ) + V ( s τ ) } , σ 1 = inf t { E α , α + 1 ( ρ 1 t α ) } . In the same way as Theorem 1, we can find that e ( t ) is bounded by an exponential decay function. This completes the proof.

References

  1. Chua, L.O. Memristor-The missing circuit element. IEEE Trans. Circuit Theory 1971, 18, 507–519. [Google Scholar] [CrossRef]
  2. Strukov, D.; Snider, G.; Stewart, D.; Williams, R. The missing memristor found. Nature 2008, 453, 80–83. [Google Scholar] [CrossRef] [PubMed]
  3. Patro, P.; Kumar, K.; Kumar, G.S. Cellular Neural Network, Fuzzy Cellular Neural Networks and its Applications. Int. J. Control Theory Appl. 2017, 10, 161–167. [Google Scholar]
  4. Wu, Z.; Zhang, C.; Zou, J.; Peng, C.; Wu, X. Threshold switching memristor-based voltage regulative circuit. IEEE Trans. Circuits Syst. II Express Briefs 2023, 70, 1034–1038. [Google Scholar] [CrossRef]
  5. Min, F.; Xue, L. Routes toward chaos in a memristor-based shinriki circuit. Chaos 2023, 33, 023122. [Google Scholar] [CrossRef]
  6. Bao, H.; Liu, W.; Hu, A. Coexisting multiple firing patterns in two adjacent neurons coupled by memristive electromagnetic induction. Nonlinear Dyn. 2019, 95, 43–56. [Google Scholar] [CrossRef]
  7. Lin, H.; Wang, C.; Hong, Q.; Sun, Y. A multi-stable memristor and its application in a neural network. IEEE Trans. Circuits Syst. II Express Briefs 2020, 67, 3472–3476. [Google Scholar] [CrossRef]
  8. Qin, X.; Wang, C.; Li, L.; Peng, H.; Ye, L. Finite-time lag synchronization of memristive neural networks with multi-links via adaptive control. IEEE Access 2020, 8, 55398–55410. [Google Scholar] [CrossRef]
  9. Qi, A.; Zhu, B.; Wang, G. Complex dynamic behaviors in hyperbolic-type memristor-based cellular neural network. Chin. Phys. B 2022, 31, 020502. [Google Scholar] [CrossRef]
  10. Lin, H.; Wang, C.; Sun, J.; Zhang, X.; Sun, Y.; Iu, H. Memristor-coupled asymmetric neural networks: Bionic modeling, chaotic dynamics analysis and encryption application. Chaos Solitons Fractals 2023, 166, 112905. [Google Scholar] [CrossRef]
  11. Chua, L.O.; Yang, L. Cellular Neural Network: Theory. IEEE Trans. Circuits Syst. 1988, 35, 1257–1272. [Google Scholar] [CrossRef]
  12. Wang, P.; Li, X.; Wang, N.; Li, Y.; Shi, K.; Lu, J. Almost periodic synchronization of quaternion-valued fuzzy cellular neural networks with leakage delays. Fuzzy Sets Syst. 2022, 426, 46–65. [Google Scholar] [CrossRef]
  13. Guo, Y.; Ge, S.; Arbi, A. Stability of traveling waves solutions for nonlinear cellular neural networks with distributed delays. J. Syst. Sci. Complex. 2022, 35, 18–31. [Google Scholar] [CrossRef]
  14. Kashkynbayev, A.; Issakhanov, A.; Otkel, M.; Kurths, J. Finite-time and fixed-time synchronization analysis of shunting inhibitory memristive neural networks with time-varying delays. Chaos Solitons Fractals 2022, 156, 111866. [Google Scholar] [CrossRef]
  15. Yang, T.; Yang, L.; Wu, C.; Chua, L.O. Fuzzy cellular neural networks: Theory. In Proceedings of the 1996 Fourth IEEE International Workshop on Cellular Neural Networks and Their Applications Proceedings (CNNA-96), Seville, Spain, 24–26 June 1996; pp. 181–186. [Google Scholar]
  16. Yang, T.; Yang, L. The global stability of fuzzy cellular neural network. IEEE Trans. Circuits Syst. I 1966, 43, 880–883. [Google Scholar] [CrossRef]
  17. Liu, D.; Wang, L.; Pan, Y.; Ma, H. Mean square exponential stability for discrete-time stochastic fuzzy neural networks with mixed time-varying delay. Neurocomputing 2016, 171, 1622–1628. [Google Scholar] [CrossRef]
  18. Guo, Z.; Wang, J.; Yan, Z. Attractivity Analysis of Memristor-Based Cellular Neural Networks With Time-Varying Delays. IEEE Trans. Neural Netw. Learn. Syst. 2013, 25, 704–717. [Google Scholar] [CrossRef]
  19. Zheng, M.; Li, L.; Peng, H.; Xiao, J.; Yang, Y.; Zhang, Y. Fixed-time synchronization of memristive fuzzy BAM cellular neural networks with time-varying delays based on feedback controllers. IEEE Access 2018, 6, 12085–12102. [Google Scholar] [CrossRef]
  20. Zheng, M.; Li, L.; Peng, H.; Xiao, J.; Yang, Y.; Zhang, Y.; Zhao, H. Fixed-time synchronization of memristor-based fuzzy cellular neural network with time-varying delay. J. Frankl. Inst. 2018, 355, 6780–6809. [Google Scholar] [CrossRef]
  21. Kaslik, E.; Sivasundaram, S. Dynamics of fractional-order neural networks. In Proceedings of the 2011 International Joint Conference on Neural Networks, San Jose, CA, USA, 31 July–5 August 2011; pp. 611–618. [Google Scholar]
  22. Radwan, A.; Emira, A.; AbdelAty, A.; Azar, A. Modeling and analysis of fractional order DC-DC converter. ISA Trans. 2018, 82, 184–199. [Google Scholar] [CrossRef]
  23. Stamova, I.; Stamov, G. Mittag-leffler synchronization of fractional neural networks with time-varying delays and reaction–diffusion terms using impulsive and linear controllers. Neural Netw. 2017, 96, 22–32. [Google Scholar] [CrossRef] [PubMed]
  24. Arena, P.; Caponetto, R.; Fortuna, L.; Porto, D. Bifurcation and chaos in noninteger order cellular neural networks. Int. J. Bifurc. Chaos 1998, 8, 1527–1539. [Google Scholar] [CrossRef]
  25. Ma, W.; Li, C.; Wu, Y.; Wu, Y. Synchronization of fractional fuzzy cellular neural networks with interactions. Chaos Interdiscip. J. Nonlinear Sci. 2017, 27, 103106. [Google Scholar] [CrossRef] [PubMed]
  26. Petráš, I. Fractional-order memristor-based chua’s circuit. IEEE Trans. Circuits Syst. II Express Briefs 2010, 57, 975–979. [Google Scholar]
  27. Syed, A.; Narayanan, G.; Saroha, S.; Priya, B.; Thakur, G. Finite-time analysis of fractional-order memristive fuzzy cellular networks with time delay and leakage term. Math. Comput. Simul. 2021, 185, 468–485. [Google Scholar] [CrossRef]
  28. Zheng, M.; Li, L.; Peng, H.; Xiao, J.; Yang, Y.; Zhang, Y.; Zhao, H. Finite-time stability and synchronization of memristor-based fractional-order fuzzy cellular neural networks. Commun. Nonlinear Sci. Numer. Simul. 2018, 59, 272–291. [Google Scholar] [CrossRef]
  29. Sun, Y.; Liu, Y. Fixed-time synchronization of delayed fractional-order memristor-based fuzzy cellular neural networks. IEEE Access 2020, 8, 165951–165962. [Google Scholar] [CrossRef]
  30. Saifia, D.; Chadli, M.; Labiod, S.; Cuerra, T. Robust H static output-feedback control for discrete-time fuzzy systems with actuator saturation via fuzzy Lyapunov functions. Asian J. Control 2020, 22, 611–623. [Google Scholar] [CrossRef]
  31. Li, D.; Liu, Y.; Tong, S.; Chen, C.; Li, D. Neural networks-based adaptive control for nonlinear state constrained systems with input delay. IEEE Trans. Cybern. 2018, 49, 1249–1258. [Google Scholar] [CrossRef]
  32. Zhang, T.; Zhou, J.; Liao, Y. Exponentially stable periodic oscillation and Mittag–Leffler stabilization for fractional-order impulsive control neural networks with piecewise Caputo derivatives. IEEE Trans. Cybern. 2021, 52, 9670–9683. [Google Scholar] [CrossRef]
  33. Zhou, Y.; Zhang, H.; Zeng, Z. Synchronization of memristive neural networks with unknown parameters via event-triggered adaptive control. Neural Netw. 2021, 139, 255–264. [Google Scholar] [CrossRef] [PubMed]
  34. Cheng, L.; Qiu, J.; Chen, X.; Zhang, A.; Yang, C.; Chen, X. Adaptive aperiodically intermittent control for pinning synchronization of directed dynamical networks. Int. J. Robust Nonlinear Control 2019, 29, 1909–1925. [Google Scholar] [CrossRef]
  35. Fan, Y.; Huang, X.; Li, Y.; Xia, J.; Chen, G. Aperiodically intermittent control for quasi-synchronization of delayed memristive neural networks: An interval matrix and matrix measure combined method. IEEE Trans. Syst. Man Cybern. Syst. 2018, 49, 2254–2265. [Google Scholar] [CrossRef]
  36. Chen, T.; Wang, F.; Xia, C.; Chen, Z. Leader-following consensus of second-order multi-agent systems with intermittent communication via persistent-hold control. Neurocomputing 2022, 471, 183–193. [Google Scholar] [CrossRef]
  37. Liu, C.; Zhang, Y.; Chen, Y. Persistent-hold consensus control of First-order multi-agent systems with intermittent communication. In Proceedings of the 23rd International Symposium on Mathematical Theory of Networks and Systems, Hong Kong, China, 16–20 July 2018. [Google Scholar]
  38. Xiu, C.; Zhou, R.; Liu, Y. New chaotic memristive cellular neural network and its application in secure communication system. Chaos Solitons Fractals 2020, 141, 110316. [Google Scholar] [CrossRef]
  39. Kekha Javan, A.A.; Zare, A.; Alizadehsani, R.; Balochian, S. Robust multi-mode synchronization of chaotic fractional order Systems in the Presence of disturbance, time delay and uncertainty with application in secure communications. Big Data Cogn. Comput. 2022, 6, 51. [Google Scholar] [CrossRef]
  40. Gokyildirim, A.; Akgul, A.; Calgan, H.; Demirtas, M. Parametric fractional-order analysis of Arneodo chaotic system and microcontroller-based secure communication implementation. Int. J. Electron. Commun. 2024, 175, 155080. [Google Scholar] [CrossRef]
  41. Podlubny, I. Fractional Differential Equations; Academic Press: San Diego, CA, USA, 1999. [Google Scholar]
  42. Chen, J.; Zeng, Z.; Jiang, P. Global Mittag-Leffer stability and synchronization of memristor-based fractional-order neural networks. Neural Netw. 2014, 51, 1–8. [Google Scholar]
  43. Jian, J.; Wan, P. Lagrange α-exponential stability and α-exponential convergence for fractional-order complex-valued neural networks. Neural Netw. 2017, 91, 1–10. [Google Scholar] [CrossRef]
  44. Liu, C.; Liu, S.; Zhang, Y.; Chen, Y. Consensus seeking of multi-agent systems with intermittent communication: A persistent-hold control strategy. Int. J. Control 2020, 93, 2161–2167. [Google Scholar] [CrossRef]
  45. Wang, D.; Xiao, A. Dissipativity and contractivity for fractional-order systems. Nonlinear Dyn. 2015, 80, 287–294. [Google Scholar] [CrossRef]
  46. Chen, L.; Cao, J.; Wu, R.; Tenreiro Machado, J.A.; Lopes, A.M.; Yang, H. Stability and sychronization of fractional-order memristive neural networks with multiple delays. Neural Netw. 2017, 94, 76–85. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Trajectories of x 1 ( t ) and y 1 ( t ) under controller (15) with with initial values of x 1 ( 0 ) = 0.8626 and y 1 ( 0 ) = 0.9978 .
Figure 1. Trajectories of x 1 ( t ) and y 1 ( t ) under controller (15) with with initial values of x 1 ( 0 ) = 0.8626 and y 1 ( 0 ) = 0.9978 .
Fractalfract 08 00519 g001
Figure 2. Trajectories of error between FMNs (5) and (6) under controller (15).
Figure 2. Trajectories of error between FMNs (5) and (6) under controller (15).
Fractalfract 08 00519 g002
Figure 3. The time interval with a control time of θ 1 = 0.05 , holding time of θ 2 = 0.025 and rest time of θ 3 = 0.025 .
Figure 3. The time interval with a control time of θ 1 = 0.05 , holding time of θ 2 = 0.025 and rest time of θ 3 = 0.025 .
Fractalfract 08 00519 g003
Figure 4. Trajectories of controller (15) with a control time of θ 1 = 0.05 , holding time of θ 2 = 0.025 and rest time of θ 3 = 0.025 . (a) u 1 ( t ) ; (b) u 2 ( t ) and u 3 ( t ) .
Figure 4. Trajectories of controller (15) with a control time of θ 1 = 0.05 , holding time of θ 2 = 0.025 and rest time of θ 3 = 0.025 . (a) u 1 ( t ) ; (b) u 2 ( t ) and u 3 ( t ) .
Fractalfract 08 00519 g004
Figure 5. The norm of error between FMNs (5) and (6) with τ = 1 .
Figure 5. The norm of error between FMNs (5) and (6) with τ = 1 .
Fractalfract 08 00519 g005
Figure 6. Trajectories of states under the parameters reported in [46] with intermittent-hold control. (a) Trajectories of x 1 ( t ) and y 1 ( t ) ; (b) trajectories of error.
Figure 6. Trajectories of states under the parameters reported in [46] with intermittent-hold control. (a) Trajectories of x 1 ( t ) and y 1 ( t ) ; (b) trajectories of error.
Fractalfract 08 00519 g006
Figure 7. The time interval with a control time of θ 1 = 0.07 , a holding time of θ 2 = 0.015 and a rest time of θ 3 = 0.015 .
Figure 7. The time interval with a control time of θ 1 = 0.07 , a holding time of θ 2 = 0.015 and a rest time of θ 3 = 0.015 .
Fractalfract 08 00519 g007
Figure 8. Trajectories of controller (16) with three sets of states with different initial values and τ = 0.8 . (a) u 1 ( t ) ; (b) u 2 ( t ) and u 3 ( t ) .
Figure 8. Trajectories of controller (16) with three sets of states with different initial values and τ = 0.8 . (a) u 1 ( t ) ; (b) u 2 ( t ) and u 3 ( t ) .
Fractalfract 08 00519 g008
Figure 9. The error between FMNs (5) and (6) under controller (16) with different delays. (a) Delay of τ = 0.1 ; (b) delay of τ = 0.5 ; (c) delay of τ = 1 ; (d) delay of τ = 1.5 .
Figure 9. The error between FMNs (5) and (6) under controller (16) with different delays. (a) Delay of τ = 0.1 ; (b) delay of τ = 0.5 ; (c) delay of τ = 1 ; (d) delay of τ = 1.5 .
Fractalfract 08 00519 g009
Figure 10. Trajectories of controller (16) with different delays. (a) Delay of τ = 0.1 ; (b) delay of τ = 0.5 ; (c) delay of τ = 1 ; (d) delay of τ = 1.5 .
Figure 10. Trajectories of controller (16) with different delays. (a) Delay of τ = 0.1 ; (b) delay of τ = 0.5 ; (c) delay of τ = 1 ; (d) delay of τ = 1.5 .
Fractalfract 08 00519 g010
Figure 11. Comparison of intermittent-hold control with traditional control ( τ = 1.5 ). (a) The trajectories of x ( t ) and y ( t ) with an intermittent hold controller; (b) the trajectories of error ( e 1 ( t ) ) with and without holding time.
Figure 11. Comparison of intermittent-hold control with traditional control ( τ = 1.5 ). (a) The trajectories of x ( t ) and y ( t ) with an intermittent hold controller; (b) the trajectories of error ( e 1 ( t ) ) with and without holding time.
Fractalfract 08 00519 g011
Figure 12. States trajectory and synchronization. (a) The trajectories of x ( t ) ; (b) the trajectories of error with an intermittent hold controller.
Figure 12. States trajectory and synchronization. (a) The trajectories of x ( t ) ; (b) the trajectories of error with an intermittent hold controller.
Fractalfract 08 00519 g012
Figure 13. The transmitted and encrypted information signals. (a) The transmitted information signal; (b) the mixed signal.
Figure 13. The transmitted and encrypted information signals. (a) The transmitted information signal; (b) the mixed signal.
Fractalfract 08 00519 g013
Figure 14. The signal decrypted using the synchronization method.
Figure 14. The signal decrypted using the synchronization method.
Fractalfract 08 00519 g014
Table 1. The error convergence time with different intermittent holding times and an error bound of 0.02 .
Table 1. The error convergence time with different intermittent holding times and an error bound of 0.02 .
Time DelayInitial Value SetControl StrategyConvergence Time (s)
τ = 0.2 first set θ 1 = 0.25 , θ 2 = 0.175 , θ 3 = 0.075 2.18
θ 1 = 0.25 , θ 3 = 0.25 (without hold)4.05
second set θ 1 = 0.25 , θ 2 = 0.175 , θ 3 = 0.075 2.36
θ 1 = 0.25 , θ 3 = 0.25 (without hold)4.06
third set θ 1 = 0.25 , θ 2 = 0.175 , θ 3 = 0.075 2.37
θ 1 = 0.25 , θ 3 = 0.25 (without hold)4.03
τ = 1.5 first set θ 1 = 0.25 , θ 2 = 0.125 , θ 3 = 0.125 3.76
θ 1 = 0.25 , θ 3 = 0.25 (without hold)5.07
second set θ 1 = 0.25 , θ 2 = 0.125 , θ 3 = 0.125 5.01
θ 1 = 0.25 , θ 3 = 0.25 (without hold)5.08
third set θ 1 = 0.25 , θ 2 = 0.125 , θ 3 = 0.125 4.95
θ 1 = 0.25 , θ 3 = 0.25 (without hold)5.06
Table 2. The error converge time with different intermittent holding times and an error bound of 0.02 .
Table 2. The error converge time with different intermittent holding times and an error bound of 0.02 .
Time DelayInitial Value SetControl StrategyConvergence Time (s)
τ = 0.2 first set θ 1 = 0.25 , θ 2 = 0.125 , θ 3 = 0.125 1.01
θ 1 = 0.25 , θ 3 = 0.25 (without hold)1.11
second set θ 1 = 0.25 , θ 2 = 0.125 , θ 3 = 0.125 0.87
θ 1 = 0.25 , θ 3 = 0.25 (without hold)1.09
third set θ 1 = 0.25 , θ 2 = 0.125 , θ 3 = 0.125 0.62
θ 1 = 0.25 , θ 3 = 0.25 (without hold)0.95
τ = 1.5 first set θ 1 = 0.25 , θ 2 = 0.125 , θ 3 = 0.125 5.11
θ 1 = 0.25 , θ 3 = 0.25 (without hold)7.12
second set θ 1 = 0.25 , θ 2 = 0.125 , θ 3 = 0.125 5.01
θ 1 = 0.25 , θ 3 = 0.25 (without hold)7.03
third set θ 1 = 0.25 , θ 2 = 0.125 , θ 3 = 0.125 4.01
θ 1 = 0.25 , θ 3 = 0.25 (without hold)6.52
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yao, X.; Shi, J.; Zhong, S.; Du, Y. Synchronization for Delayed Fractional-Order Memristive Neural Networks Based on Intermittent-Hold Control with Application in Secure Communication. Fractal Fract. 2024, 8, 519. https://doi.org/10.3390/fractalfract8090519

AMA Style

Yao X, Shi J, Zhong S, Du Y. Synchronization for Delayed Fractional-Order Memristive Neural Networks Based on Intermittent-Hold Control with Application in Secure Communication. Fractal and Fractional. 2024; 8(9):519. https://doi.org/10.3390/fractalfract8090519

Chicago/Turabian Style

Yao, Xueqi, Jingxi Shi, Shouming Zhong, and Yuanhua Du. 2024. "Synchronization for Delayed Fractional-Order Memristive Neural Networks Based on Intermittent-Hold Control with Application in Secure Communication" Fractal and Fractional 8, no. 9: 519. https://doi.org/10.3390/fractalfract8090519

APA Style

Yao, X., Shi, J., Zhong, S., & Du, Y. (2024). Synchronization for Delayed Fractional-Order Memristive Neural Networks Based on Intermittent-Hold Control with Application in Secure Communication. Fractal and Fractional, 8(9), 519. https://doi.org/10.3390/fractalfract8090519

Article Metrics

Back to TopTop