We present a class of two-dimensional memristive maps with a cosine memristor. The memristive maps do not have any fixed points, so they belong to the category of nonlinear maps with hidden attractors. The rich dynami...We present a class of two-dimensional memristive maps with a cosine memristor. The memristive maps do not have any fixed points, so they belong to the category of nonlinear maps with hidden attractors. The rich dynamical behaviors of these maps are studied and investigated using different numerical tools, including phase portrait, basins of attraction,bifurcation diagram, and Lyapunov exponents. The two-parameter bifurcation analysis of the memristive map is carried out to reveal the bifurcation mechanism of its dynamical behaviors. Based on our extensive simulation studies, the proposed memristive maps can produce hidden periodic, chaotic, and hyper-chaotic attractors, exhibiting extremely hidden multistability, namely the coexistence of infinite hidden attractors, which was rarely observed in memristive maps. Potentially,this work can be used for some real applications in secure communication, such as data and image encryptions.展开更多
基金Project supported by the National Natural Science Foundation of China (Grant Nos. 11972173 and 12172340)。
文摘We present a class of two-dimensional memristive maps with a cosine memristor. The memristive maps do not have any fixed points, so they belong to the category of nonlinear maps with hidden attractors. The rich dynamical behaviors of these maps are studied and investigated using different numerical tools, including phase portrait, basins of attraction,bifurcation diagram, and Lyapunov exponents. The two-parameter bifurcation analysis of the memristive map is carried out to reveal the bifurcation mechanism of its dynamical behaviors. Based on our extensive simulation studies, the proposed memristive maps can produce hidden periodic, chaotic, and hyper-chaotic attractors, exhibiting extremely hidden multistability, namely the coexistence of infinite hidden attractors, which was rarely observed in memristive maps. Potentially,this work can be used for some real applications in secure communication, such as data and image encryptions.