Skip to main content

ORIGINAL RESEARCH article

Front. Neurorobot., 17 October 2022

Fixed/Predefined-time synchronization of memristor-based complex-valued BAM neural networks for image protection

\nAidi Liu&#x;Aidi Liu1Hui Zhao*&#x;Hui Zhao1*Qingjie WangQingjie Wang1Sijie NiuSijie Niu1Xizhan GaoXizhan Gao1Zhen SuZhen Su2Lixiang LiLixiang Li3
  • 1Shandong Provincial Key Laboratory of Network Based Intelligent Computing, School of Information Science and Engineering, University of Jinan, Jinan, China
  • 2College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, China
  • 3State Key Laboratory of Networking and Switching Technology, Information Security Center, Beijing University of Posts and Telecommunications, Beijing, China

This paper investigates the fixed-time synchronization and the predefined-time synchronization of memristive complex-valued bidirectional associative memory neural networks (MCVBAMNNs) with leakage time-varying delay. First, the proposed neural networks are regarded as two dynamic real-valued systems. By designing a suitable feedback controller, combined with the Lyapunov method and inequality technology, a more accurate upper bound of stability time estimation is given. Then, a predefined-time stability theorem is proposed, which can easily establish a direct relationship between tuning gain and system stability time. Any predefined time can be set as controller parameters to ensure that the synchronization error converges within the predefined time. Finally, the developed chaotic MCVBAMNNs and predefined-time synchronization technology are applied to image encryption and decryption. The correctness of the theory and the security of the cryptographic system are verified by numerical simulation.

1. Introduction

After entering the twenty-first century, brain-like intelligence and neural network have developed rapidly. With the support of technologies such as artificial intelligence, deep learning, and cloud computing, corresponding achievements have emerged in an endless stream (Su et al., 2021; Wen and Su, 2022), which also poses greater challenges to the large-scale information processing capacity of computing systems. Many researchers have explored the direction of brain-like research (Rubinov and Sporns, 2010; Zhao H. et al., 2021), trying to get inspiration from the structure of the human brain and the way of information processing. Associative memory is one of the most active behaviors in the human brain, and it simulates the ability of the real nervous system to process information. In 1988, Kosko extended the traditional Hopfield neural networks and established bidirectional associative memory (BAM) neural networks (Kosko, 1988). The networks have a relatively complex structure, and their neurons are distributed in two layers. Each neuron in each layer is connected to all neurons in the other layer, while all neurons in the same layer are not connected to each other. At present, with the rapid development of artificial intelligence, the synchronous control and stability analysis of BAM neural networks has become the mainstream research direction. Researchers have invested a lot of time and energy to explore BAM neural networks, which provides a new research idea for the theoretical analysis of complex networks (Ke and Miao, 2013; Zhang et al., 2014; Qi et al., 2015; Zhang and Quan, 2015; Zhang and Yang, 2020; Zhao Y. et al., 2021; Liu et al., 2022).

In recent years, the development of many industrial products has involved complex signal problems. The introduction of complex signals extends the state variables of the controlled system from the real domain to the complex domain, which leads to an upsurge of research on complex-valued neural networks. The state variables, connection weights, and activation functions of complex-valued neural networks are complex numbers, which can solve problems that cannot be solved by real-valued neural networks, such as XOR and symmetry detection. The complex-valued neural networks have more advantages in network learning ability and self-organization. At present, some interesting results have been proposed (Liu et al., 2017; Zhang et al., 2018; Li and Mu, 2019; You et al., 2020).

The memristor was originally predicted by Chua (1971). HP laboratory first developed the memristor components of nanometer size in 2008 (Strukov et al., 2008). The resistance of the memristor will vary with the charge flow and can remain unchanged after power failure. In addition, the memristor is considered to be a perfect device for simulating synapses due to its advantages of nanometer size, low power consumption, and easy large-scale integration. There has been much interesting research on the dynamics of memristive neural networks (Li and Cao, 2016; Wang et al., 2017; Yang et al., 2020). Compared with traditional artificial neural networks, memristor neural networks can better simulate the structure and function of the human brain.

As one of the dynamic behaviors, synchronization behavior describes the cooperative consistency in a group, which is manifested in the network as the cooperative and consistent relationship after the interaction of node states. Fixed-time synchronization is a special kind of finite-time synchronization. The corresponding synchronization time has a certain upper bound, which is not dependent on the initial value of the system but only related to the system parameters and the controller. At present, there are some research results on fixed-time synchronization. Cao and Li (2017) studied a fixed-time synchronization control method based on memristor and recurrent neural networks with time delay and estimated the settling time of fixed-time synchronization. Chen et al. (2019) derived a new fixed-time stability theorem, and sufficient conditions were derived to guarantee the fixed-time synchronization of neural networks. Yang et al. (2019) investigated the fixed-time synchronization of memristor-based neural networks with time-delay and coupling. The research of fixed-time stability promotes the development of many practical applications. In some practical engineering applications, the system is required to reach the origin in the specified time, but the main disadvantage of fixed-time stability is that the relationship between the system parameters and the convergence time is not clear. Then, Sanchez-Torres et al. (2014) proposed the definition of predefined-time stability, which could be solved by adjusting the parameters in the process of controller design. Therefore, the system can achieve stability before the predefined-time Tc. Predefined-time stability is the result of fixed-time stability optimization. At present, there are some research results on predefined-time synchronization. Lin et al. (2020) proposed a predefined-time stability theorem based on a piecewise Lyapunov function, in which the Lyapunov function should satisfy the inequality: V(t)-GcTc(αVp(t)+c) with α, c, p > 0, Gc is the minimum upper bound for fixed-time stability and Tc is a custom parameter. Aldana-Lopez et al. (2019) studied more relaxed predefined time stability conditions, where the Lyapunov function should satisfy the inequality V(t)-GcTc(αVp(t)+βVq(t)) with α, β > 0, p> 1 and 0 < q < 1. Anguiano-Gijon et al. (2019) introduced Gc into inequality in the form of V(t)-πqTc(V1-q2(t)+V1+q2) with 0 < q < 1. The predefined-time stability theorem proposed in this paper is more general than (Aldana-Lopez et al., 2019; Anguiano-Gijon et al., 2019; Lin et al., 2020). Synchronization has important applications in many fields, such as secure communication, nonlinear control systems, pattern recognition, and information processing (Alimi et al., 2019; Ouyang et al., 2020). Synchronization also plays an important role in laser systems, superconducting materials, and conventional bus dispatching (Gkiotsalitis et al., 2020; Wang et al., 2021). In addition, Su et al. (2020) studied the manipulator control based on an improved recurrent neural network. The ultimate end-effector tracking error can reach asymptotic convergence, which is also a concrete manifestation of synchronous control.

This paper also studies the image encryption scheme based on MCVBAMNNs. As we all know, the research results of brain-like neural networks have shown great power in practical applications. Memristor-based neural networks, which are more similar to the structure of human synapses, also show unique functions and values in the application. The digital image is an important way to represent information, research on image data privacy protection based on a general memristor-based neural network learning mode has broad application prospects. However, there are still few studies on image data privacy protection using memristor-based artificial neural networks and their network behavior characteristics. As an ideal tool to simulate human neural networks, memristor-based neural networks can be used to maximize the ability of the human brain to recognize and classify, which shows the potential of memristor-based neural networks in pattern recognition. Recognition and classification of sensitive areas of digital images and proposing appropriate privacy protection solutions can give full play to the advantages of memory-based neural networks in recognition and classification and have a wide range of applications.

Motivated by the above discussions, we investigated the fixed-time synchronization and the predefined-time synchronization of MCVBAMNNs with leakage time-varying delay. The innovations of this paper are presented as follows: First, based on the appropriate fixed-time stability lemma, the feedback controller is designed, and the fixed-time synchronization problem of MCVBAMNNs is studied. By comparison, the results of this paper are less conservative. Second, a new predefined-time stability theorem is introduced, where the predefined time is set more flexibly and in a more general form. Thirdly, a more simple and effective discontinuous controller is designed, and sufficient conditions for MCVBAMNNs to achieve predefined-time synchronization are obtained. The synchronization time does not depend on the initial value and can be adjusted according to the controller parameters. Finally, an image encryption and decryption scheme based on predefined-time synchronization is presented, and the predefined time can be used as the secret key. Numerical simulation verifies the validity of the theoretical results and the feasibility of the encryption scheme.

Notations: In this study, ℝ, ℂ, ℝn, and ℂn represent the real field, complex field, n-dimensional real space, and n-dimensional complex space, respectively. u = R + Ii ∈ ℂ, where i meets i=-1.

2. Problem formulation and preliminaries

We consider the following MCVBAMNNs as the drive system, which is given as:

{x˙1iu(t)=-ηiu(x1iu(t-τ(t)))x1iu(t-τ(t))+j=1majiu(x1iu(t))fju(x2ju(t))                  +j=1mbjiu(x1iu(t-τ(t)))fju(x2ju(t-σ(t))),x˙2ju(t)=-ξju(x2ju(t-σ(t)))x2ju(t-σ(t))+i=1nciju(x2ju(t))giu(x1iu(t))                  +i=1ndiju(x2ju(t-σ(t)))giu(x1iu(t-τ(t))),    (1)

where i = 1, 2, ..., n, j = 1, 2, ...m; x1iu(t),x2ju(t) represent the voltage of the capacitor ith and jth nodes at time t. The initial values of the system (1) are x1u(0)=φ1u(s) and x2u(0)=φ2u(s), s ∈ ℝ; fju(·) and giu(·): ℂ → ℂ are complex-valued activation functions; τ(t) and σ(t) are the leakage time-varying delays satisfying 0 < τ(t) < σ(t) < C (C is a constant); ηiu>0 and ξju>0 are the rates of neuron self-inhibition; ajiu, bjiu, ciju, diju are the memristive connection weights.

The parameters signification and performance of MCVBAMNNs are described as:

ηiu(x1iu(t-τ(t)))=1C1i[j=1m(Maji+Mbji)signji+1R1i],
ξju(x2ju(t-σ(t)))=1C2j[i=1n(Mcij+Mdij)signij+1R2j],
ajiu(x1iu(t))=signjiC1iMaji,   bjiu(x1iu(t-τ(t)))=signjiC1iMbji,
ciju(x2ju(t))=signijC2jMcij,   diju(x2ju(t-σ(t)))=signijC2jMdij.

The memristor-based BAM neural networks model can be implemented by very large-scale integration (VLSI) circuits as shown in Figure 1. Taking a real-valued system as an example, where signij = signij = 1 if ij, otherwise signij = signij = −1, x1i(·) and x2j(·) represent the state of the subsystems, fj(·) and gi(·) are amplifiers, Maji is the connection memristor between the amplifier fj(x2j(t)) and state x1i(t), Mbji is the connection memristor between the amplifier fj(x2j(t−σ(t))) and state x1i(t), Mcij is the connection memristor between the amplifier gi(x1i(t)) and state x2j(t), Mdij is the connection memristor between the amplifier gi(x1i(t−τ(t))) and state x2j(t), Rij and Cij are the resistor and capacitor.

FIGURE 1
www.frontiersin.org

Figure 1. Circuit of memristor-based BAMNNs.

Figure 2 illustrates the simplified current- voltage characteristics of the memristor, we define the neuron self-inhibition and connection weight as the following state correlation functions:

ηiR(x)={ η^iR,|x| Ti,η̬iR,|x| <Ti,        ηiI(x)={ η^iI,|x| Ti,η̬iI,|x| <Ti,             ξjR(x)={ ξ^jR,|x| Tj ,ξ̬jR,|x| <Tj ,  
ξjI(x)={ξ^jI,|x| Tj ,ξ̬jI,|x| <Tj ,      ajiR(x)={ÂjiR,|x| i,ĂjiR,|x| <i,         ajiI(x)={ÂjiI,|x| i,ĂjiI,|x| <i,
bjiR(x)={ B^jiR,| x| i ,B̬jiR,|x| <i ,     bjiI(x)={ B^jiI,|x|  i ,B̬jiI,|x|  <i ,     cijR(x)={ C^ijR,|x|  ϖj,ČijR,|x|  <ϖj,
cijI(x)={ C^ijI,|x| ϖj,ČijI,|x| <ϖj,      dijR(x)={ D^ijR,|x| ϖj ,ĎijR,|x| <ϖj ,      dijI(x)={ D^ijI,|x| ϖj ,ĎijI,|x| <ϖj ,

where the switching jumps Ti,Tj ,i,i ,ϖj,ϖj >0.

FIGURE 2
www.frontiersin.org

Figure 2. Typical current-voltage characteristic of a memristor.

System (1) is called the drive system, the response system can be described as follows:

{1iu(t)=-ηiu(y1iu(t-τ(t)))y1iu(t-τ(t))+j=1majiu(y1iu(t))fju(y2ju(t))+j=1mbjiu(y1iu(t-τ(t)))fju(y2ju(t-σ(t)))+uiu(t),2ju(t)=-ξju(y2ju(t-σ(t)))y2ju(t-σ(t))+i=1nciju(y2ju(t))giu(y1iu(t))+i=1ndiju(y2ju(t-σ(t)))giu(y1iu(t-τ(t)))+vju(t),    (2)

where i = 1, 2, ..., n, j = 1, 2, ...m; y1iu(t),y2ju(t). The initial values of the system (2) are y1u(0)=ϕ1u(s) and y2u(0)=ϕ2u(s). uiu(t) and vju(t) are denoted as controllers. The remaining parameters are similar to those of the drive system. To better understand the following work, Figure 3 is the flow chart of the system.

FIGURE 3
www.frontiersin.org

Figure 3. Flow chart of the system.

Definition 1. Filippov (1999) consider dynamical systems with discontinuous right-hand side ẋ(t) = F(t, x), x(t) is a solution of the differential system on [0,T) in Filippov's sense, if x(t) is absolutely continuous and satisfies the differential inclusion of

x˙(t)K[F](t,x),

where

K[F](t,x)=δ>0μ(N)=0cō[F(B(x,δ)\N),t],

where cō[·] is the convex closure hull of a set, B(x, δ) = {y:∥yx∥ ≤ δ} is the ball centered at x(t) with radius δ, and μ(N) is the Lebesgue measure of set N.

Definition 2. Hu et al. (2017) the MCVBAMNNs (1) and (2) are said to achieve fixed-time synchronization if there exists a fixed-time Tmax>0, which is independent of the initial values but may be relevant with some parameters of MCVBAMNNs and controller, and a settling time function T(e(0)) ≤ Tmax such that limtT(e(0))e(t)2=0 and ∥e(t)∥2 ≡ 0 for ∀t > T(e(0)).

Definition 3. Anguiano-Gijon et al. (2019) if the settling time T(e(0)) of fixed-time stability can be predicted by adjusting the constant Tc, it means that the drive-response systems can achieve globally predefined-time stability, where T(e(0)) ≤ Tc, ∀e(0) ∈ ℝn.

Remark 1. Predefined-time synchronization is a special kind of fixed-time synchronization. The problem of predefined-time synchronization of drive-response systems can be converted into the predefined-time stability of the error systems. The purpose of this paper is to design an appropriate controller to stabilize the error systems in the expected time by adjusting the controller parameter Tc.

Based on Definition 1 and the theory of differential inclusion, the drive system (1) can be written as

{x˙1iu(t)=-cō(ηiu(x1iu(t-τ(t))))x1iu(t-τ(t))+j=1mcō(ajiu(x1iu(t)))fju(x2ju(t))                 +j=1mcō(bjiu(x1iu(t-τ(t))))fju(x2ju(t-σ(t))),x˙2ju(t)=-cō(ξju(x2ju(t-σ(t))))x2ju(t-σ(t))+i=1ncō(ciju(x2ju(t)))giu(x1iu(t))                 +i=1ncō(diju(x2ju(t-σ(t))))giu(x1iu(t-τ(t))).    (3)

The response system (2) is represented as

{1iu(t)=-cō(ηiu(y1iu(t-τ(t))))y1iu(t-τ(t))+j=1mcō(ajiu(y1iu(t)))fju(y2ju(t))                 +j=1mcō(bjiu(y1iu(t-τ(t))))fju(y2ju(t-σ(t)))+uiu(t),2ju(t)=-cō(ξju(y2ju(t-σ(t))))y2ju(t-σ(t))+i=1ncō(ciju(y2ju(t)))giu(y1iu(t))                 +i=1ncō(diju(y2ju(t-σ(t))))giu(y1iu(t-τ(t)))+vju(t).    (4)

To obtain the synchronization criteria by set-valued mapping, let

η˜iR=max{|η^iR|,|η̌iR|},              η˜iI=max{|η^iI|,|η̌iI|};ξ˜jR=max{|ξ^jR|,|ξ̌jR|},              ξ˜jI=max{|ξ^jI|,|ξ̌jI|};ãjiR=max{|ÂjiR|,|ĂjiR|},         ãjiI=max{|ÂjiI|,|ĂjiI|};b˜jiR=max{|B^jiR|,|B̌jiR|},        b˜jiI=max{|B^jiI|,|B̌jiI|};c˜ijR=max{|C^ijR|,|ČijR|},          c˜ijI=max{|C^ijI|,|ČijI|};d˜ijR=max{|D^ijR|,|ĎijR|},       d˜ijI=max{|D^ijI|,|ĎijI|};

The synchronization errors are defined as e1iu(t)=y1iu(t)-x1iu(t), e2ju(t)=y2ju(t)-x2ju(t), we can conclude that

{e˙1iR(t)=P(t)+WiR(t)+uiR(t),e˙1iI(t)=P^(t)+WiI(t)+uiI(t),e˙2jR(t)=H(t)+QjR(t)+vjR(t),e˙2jI(t)=H^(t)+QjI(t)+vjI(t),    (5)

where i = 1, 2, ..., n, j = 1, 2, ..., m; the initial values of error system (5) are e1R(s)=ϕ1R(s)-φ1R(s), e1I(s)=ϕ1I(s)-φ1I(s), e2R(s)=ϕ2R(s)-φ2R(s), e2I(s)=ϕ2I(s)-φ2I(s). We define P(t), P^(t), H(t), Ĥ(t), WiR(t), WiI(t), QjR(t), QjI(t) as follows:

P(t)=-[η~iRy1iR(t-τ(t))-η~iIy1iI(t-τ(t))]+[η~iRx1iR(t-τ(t))-η~iIx1iI(t-τ(t))],    (6)
P^(t)=-[η~iRy1iI(t-τ(t))+η~iIy1iR(t-τ(t))]+[η~iRx1iI(t-τ(t))+η~iIx1iR(t-τ(t))],    (7)
H(t)=-[ξ~jRy2jR(t-σ(t))-ξ~jIy2jI(t-σ(t))]+[ξ~jRx2jR(t-σ(t))-ξ~jIx2jI(t-σ(t))],    (8)
H^(t)=-[ξ~jRy2jR(t-σ(t))+ξ~jIy2jR(t-σ(t))]+[ξ~jRx2jI(t-σ(t))+ξ~jIx2jR(t-σ(t))],    (9)
WiR(t)=j=1m{ãjiRfjR(y2jR(t))-ãjiRfjR(x2jR(t))+ãjiIfjI(x2jI(t))-ãjiIfjI(y2jI(t))}                   +j=1m{b~jiRfjR(y2jR(t-σ(t)))-b~jiRfjR(x2jR(t-σ(t)))}                   +j=1m{b~jiIfjI(x2jI(t-σ(t)))-b~jiIfjI(y2jI(t-σ(t)))},    (10)
WiI(t)=j=1m{ãjiRfjI(y2jI(t))-ãjiRfjI(x2jI(t))+ãjiIfjR(y2jR(t))-ãjiIfjR(x2jR(t))}                 +j=1m{b~jiRfjI(y2jI(t-σ(t)))-b~jiRfjI(x2jI(t-σ(t)))}                 +j=1m{b~jiIfjR(y2jR(t-σ(t)))-b~jiIfjR(x2jR(t-σ(t)))},    (11)
QjR(t)=i=1n{c~ijRgiR(y1iR(t))-c~ijRgiR(x1iR(t))+c~ijIgiI(x1iI(t))-c~ijIgiI(y1iI(t))}                 +i=1n{d~ijRgiR(y1iR(t-τ(t)))-d~ijIgiR(x1iI(t-τ(t)))}                 -i=1n{d~ijIgiI(y1iI(t-τ(t)))-d~ijIgiI(x1iI(t-τ(t)))},    (12)
QjI(t)=i=1n{c~ijIgiR(y1iR(t))-c~ijIgiR(x1iR(t))+c~ijRgiI(y1iI(t))-c~ijRgiI(x1iI(t))}                 +i=1n{d~ijRgiI(y1iI(t-τ(t)))-d~ijRgiI(x1iI(t-τ(t)))}                 +i=1n{d~ijIgiR(y1iR(t-τ(t)))-d~ijIgiR(x1iR(t-τ(t)))}.    (13)

Assumption 1. Suppose the activation functions satisfy |fjR|MjR, |fjI|MjI, |giR|NiR, |giI|NiI, for MjR,MjI,NiR,NiI are positive constants, i = 1, 2, ..., n, j = 1, 2..., m.

Lemma 1. Guo et al. (2020) the following inequality holds: |WiR(t)|ΛiR, |WiI(t)|ΛiI, |QjR(t)|ΩiR, |QjI(t)|ΩiI for

ΛiR=2j=1m[MjR(ãjiR+b˜jiR)+MjI(ãjiI+b˜jiI)];     ΛiI=2j=1m[MjR(ãjiI+b˜jiI)+MjI(ãjiR+b˜jiR)];  ΩiR=2i=1n[NiR(c˜ijR+d˜ijR)+NiI(c˜ijI+d˜ijI)];                                                                                                  ΩiI=2i=1n[NiR(c˜ijI+d˜ijI)+NiI(c˜ijR+d˜ijR)].

Lemma 2. Hardy et al. (1952) if α1, α2, ..., αn ≥ 0, 0 < ρ ≤ 1, ζ > 1, then we have

i=1nαiρ(i=1nαi)ρ,        i=1nαiζ n1ζ(i=1nαi)ζ.

Lemma 3. Chen et al. (2020) suppose the continuous and positive definite function V(t) satisfies the following two conditions:

(i) V(t) = 0 ⇔ t = 0;

(ii) Any solution t of system V(t) satisfies

V˙(t)aVρ(t)bVζ(t)cV(t),

for a, b, c > 0, 0 < ρ < 1, and ζ > 1. Then the origin of the system V(t) is fixed-time stable and the settling time is estimated by

Tmax1=1c(1-ρ)ln(1+ca)+1c(ζ-1)ln(1+cb).

Lemma 4. Polyakov (2012) suppose the continuous and positive definite function V(t) satisfies the following two conditions:

(i) V(t) = 0 ⇔ t = 0;

(ii) Any solution t of system V(t) satisfies

D+V(t)-aVρ(t)-bVζ(t),

for a, b > 0, 0 < ρ < 1, and ζ > 1, where D+V(t) denotes the upper right-hand Dini derivative of V(t). Then the origin of the system V(t) is fixed-time stable and the settling time is estimated by

Tmax2=1a(1-ρ)+1b(ζ-1).

Lemma 5. Hu et al. (2017) suppose the continuous and positive definite function V(t) satisfies the following two conditions:

(i) V(t) = 0 ⇔ t = 0;

(ii) Any solution t of system V(t) satisfies

V(t)-aVρ(t)-bVζ(t),

for a, b > 0, 0 < ρ < 1, and ζ > 1. Then the origin of the system V(t) is fixed-time stable and the settling time is estimated by

Tmax3=1a·(ab)1-ρζ-ρ(11-ρ+1ζ-1).

Lemma 6. Parsegov et al. (2013) suppose the continuous and positive definite function V(t) satisfies the following two conditions:

(i) V(t) = 0 ⇔ t = 0;

(ii) Any solution t of system V(t) satisfies

D+V(t))aVρ(t))bVζ(t)

for a,b>0,ρ=1-12d, and ζ=1+12d, where d > 1. Then the origin of the system V(t) is fixed-time stable, and the settling time is estimated by

Tmax4=πdab.

Remark 2. If m > 0, ln(1 + m) < m. Since ca>0,cb>0, we have ln(1+ca)<ca, ln(1+cb)<cb, then 1c(1-ρ)ln(1+ca)+1c(ζ-1)ln(1+cb)<1a(1-ρ)+1b(ζ-1). Therefore, Lemma 3 can give a more accurate Tmax than Lemma 4.

Remark 3. Most of the designed controllers are discontinuous. To ensure the solution existence of the error system, the Dini derivative is introduced to guarantee continuity at breakpoints.

3. Main results

3.1. Fixed-time synchronization analysis

We design the following controller:

{ uiR(t)=wisign(e1iR(t))λ1iR(e1iR(tτ(t))λ1iI(e1iI(tτ(t)))                sign(e1iR(t))[λ2i|e1iR(t)|+λ3i|e1iR(t)|α+λ4i|e1iR(t)|β],uiI(t)= kisign(e1iI(t))w1iR(e1iR(tτ(t))w1iI(e1iI(tτ(t)))                sign(e1iI(t)))[λ2i|e1iI(t)|+λ3i|e1iI(t)|α+λ4i|e1iI(t)|β],vjR(t)=pjsign(e2jR(t))k1jR(e2jR(tσ(t))k1jI(e2jI(tσ(t)))               sign(e2jR(t)))[k2j|e2jR(t)|+k3j|e2jR(t)|α+k4j|e2jR(t)|β],vjI(t)= qjsign(e2jI(t))p1jR(e2jR(tσ(t))p1jI(e2jI(tσ(t)))                sign(e2jI(t)))[k2j|e2jI(t)|+k3j|e2jI(t)|α+ k4j|e2jI(t)|β],     (14)

where i = 1, 2, ..., n, j = 1, 2, ..., m, and the constants wi, λ1iR, λ1iI, ki, w1iR, w1iI, pj, k1jR, k1jI, qj, pijR, p1jI should be determined later. Meanwhile, λ2i, λ3i, λ4i, k2j, k3j, k4j are any positive constants, and 0 < α < 1, β > 1.

Theorem 1. If λ1iRη~iR, λ1iIη~iI, w1iRη~iR, w1iIη~iI, k1jRξ~iR, k1jIξ~iI, p1jRξ~iR, p1jIξ~iI, wiΛiR, kiΛiI, pjΩiR, qjΩiI, i = 1, 2, ..., n, j = 1, 2, ..., m, then systems (1) and (2) can achieve the fixed-time synchronization under the controller (14). Additionally, the settling time is Tmax1=1c(1-ρ)ln(1+ca)+1c(ζ-1)ln(1+cb), where a=λ·2α+12, ρ=α+12, b = 2μ, ζ=1+β2, c = 2ω, λ=min{mini(λ3i),minj(k3j)}, μ=min{mini(λ4i)·n1-β2,minj(k4j)·m1-β2}, ω=min{mini(λ2i),minj(k2j)}.

Proof 1. To prove this theorem, we construct the Lyapunov function as follows:

Vu(t)=V1u(t)+V2u(t),            =V1R(t)+V1I(t)+V2R(t)+V2I(t),

where V1R(t)=12i=1n(e1iR(t))2, V1I(t)=12i=1n(e1iI(t))2, V2R(t)=12j=1m(e2jR(t))2, V2I(t)=12j=1m(e2jI(t))2.

We calculate the derivative of V1R(t):

V1R(t)=i=1ne1iR(t)ė1iR(t),           =i=1n|e1iR(t)|sign(e1iR(t)){P(t)+WiR(t)+uiR(t)},           i=1n{η~iR|e1iR(t)||e1iR(t-τ(t))|+η~iI|e1iR(t)||e1iI(t-τ(t))|}+i=1n|e1iR(t)||WiR(t)|                 +i=1n|e1iR(t)|sign(e1iR(t)){-wisign(e1iR(t))-λ1iR(e1iR(t-τ(t)))-λ1iI(e1iI(t-τ(t)))}                 +i=1n|e1iR(t)|sign(e1iR(t)){-sign(e1iR(t))[λ2i|e1iR(t)|+λ3i|e1iR(t)|α+λ4i|e1iR(t)|β]}.

According to Assumption 1 and Lemma 1, we have

V1R(t)-i=1n[λ2i|e1iR(t)|2+λ3i|e1iR(t)|α+1+λ4i|e1iR(t)|β+1]+i=1n(ΛiR-wi)|e1iR(t)|                 +i=1n{(η~iR-λ1iR)|e1iR(t)||e1iR(t-τ(t))|}+i=1n{(η~iI-λ1iI)|e1iR(t)||e1iI(t-τ(t))|}.           -i=1n[λ2i|e1iR(t)|2+λ3i|e1iR(t)|α+1+λ4i|e1iR(t)|β+1],           -mini(λ2i)i=1n|e1iR(t)|2-mini(λ3i)i=1n|e1iR(t)|α+1-mini(λ4i)i=1n|e1iR(t)|β+1,           -mini(λ2i)(i=1n|e1iR(t)|2)-mini(λ3i)(i=1n|e1iR(t)|2)α+12-n1-β2·mini(λ4i)(i=1n|e1iR(t)|2)β+12,           -2mini(λ2i)·V1R(t)-2α+12mini(λ3i)·(V1R(t))α+12-n1-β2·2β+12mini(λ4i)·(V1R(t))β+12.

The proofs of V1I(t), V2R(t), and V2I(t) are similar with that of V1R(t):

V1I(t)-2mini(λ2i)·V1I(t)-2α+12mini(λ3i)·(V1I(t))α+12-n1-β2·2β+12mini(λ4i)·(V1I(t))β+12,V2R(t)-2minj(k2j)·V2R(t)-2α+12minj(k3j)·(V2R(t))α+12-m1-β2·2β+12minj(k4j)·(V2R(t))β+12,V2I(t)-2minj(k2j)·V2I(t)-2α+12minj(k3j)·(V2I(t))α+12-m1-β2·2β+12minj(k4j)·(V2I(t))β+12.

According to the analysis above, we can obtain that

V˙u(t)2·{mini(λ2i)(V1R(t))+mini(λ2i)(V1I(t))                +minj(k2j)(V2R(t))+minj(k2j)(V2I(t))}                 2α+12·{mini(λ3i)(V1R(t))α+12+mini(λ3i)(V1I(t))α+12                +minj(k3j)(V2R(t))α+12+ minj(k3j)(V2I(t))α+12}                 2β+12·{n1β2· mini(λ4i)(V1R(t))β+12+ ​n1β2· mini(λ4i)(V2I(t))β+12                +m1β2· minj(k4j)(V2R(t))β+12+m1β2· minj(k4j)(V2I(t))β+12}.

Therefore, we get

V˙u(t)2 ·{mini(λ2i)·[V1R(t)​ +​ V1I(t)]+minj(k2j)· [V1R(t)​ +​ V1I(t)]}                 2α+12·{mini(λ3i)[ V1R(t)​ +​ V1I(t) ]α+12+minj(k3j)[ V2R(t)​ +​ V2I(t) ]α+12}                     2β+12·{n1β2· mini(λ4i)·[ V1R(t)​ +​ V1I(t) ]β+12+m1β2· minj(k4j)· [ V2R(t)​ + ​V2I(t) ]β+12},              2α+12λ· [(V1u(t))1+α2+(V2u(t))1+α2]2β+12μ·[(V1u(t))1+β2+(V2u(t))1+β2]                   2ω·[V1u(t)+V2u(t)],              2α+12λ·(Vu(t))1+α22μ ·(Vu(t))1+β22ω · Vu(t).

According to the above results and referring to Lemma 3, it can be obtained that the systems (1) and (2) have achieved fixed-time synchronization under controller (14). Then the settling time Tmax1=1c(1-ρ)ln(1+ca)+1c(ζ-1)ln(1+cb), and a=λ·2α+12, ρ=α+12, b = 2μ, ζ=1+β2, c = 2ω, where λ=min{mini(λ3i),minj(k3j)}, μ=min{mini(λ4i)·n1-β2,minj(k4j)·m1-β2}, ω=min{mini(λ2i),minj(k2j)}.

Corollary 1. If λ1iRη~iR, λ1iIη~iI, w1iRη~iR, w1iIη~iI, k1jRξ~iR, k1jIξ~iI, p1jRξ~iR, p1jIξ~iI, wiΛiR, kiΛiI, pjΩiR, qjΩiI, i = 1, 2, ..., n, j = 1, 2, ..., m, then the systems (1) and (2) can achieve fixed-time synchronization under the controller (14). Furthermore, Tmax2=1a(1-ρ)+1b(ζ-1), where a=λ·2α+12, ρ=α+12, b = 2μ, ζ=1+β2.

Proof 2. Similarly, it can be proved that

Vu(t)-a(Vu(t))1+α2-b(Vu(t))1+β2-cVu(t),

where a=2α+12λ, b = 2μ, c = 2ω, λ=min{mini(λ3i),minj(k3j)}, μ=min{mini(λ4i)·n1-β2,minj(k4j)·m1-β2}. Since the Lyapunov function Vu(t) is derivable, we have D+Vu(t)=Vu(t). Therefore,

D+Vu(t)-a(Vu(t))1+α2-b(Vu(t))1+β2-cVu(t),-a(Vu(t))1+α2-b(Vu(t))1+β2.

According to Lemma 4, the origin of system (5) can achieve fixed-time stability.

Corollary 2. If λ1iRη~iR, λ1iIη~iI, w1iRη~iR, w1iIη~iI, k1jRξ~iR, k1jIξ~iI, p1jRξ~iR, p1jIξ~iI, wiΛiR, kiΛiI, pjΩiR, qjΩiI, i = 1, 2, ..., n, j = 1, 2, ..., m. According to Lemma 5, systems (1) and (2) can achieve fixed-time synchronization under the controller (14). Furthermore, Tmax3=1a·(ab)1-ρζ-ρ(11-ρ+1ζ-1). where a=λ·2α+12, ρ=α+12, b = 2μ, ζ=1+β2, λ=min{mini(λ3i),minj(k3j)}, μ=min{mini(λ4i)·n1-β2,minj(k4j)·m1-β2}. The proof process is similar to Corollary 1, so it is omitted here.

Corollary 3. If λ1iRη~iR, λ1iIη~iI, w1iRη~iR, w1iIη~iI, k1jRξ~iR, k1jIξ~iI, p1jRξ~iR, p1jIξ~iI, wiΛiR, kiΛiI, pjΩiR, qjΩiI, i = 1, 2, ..., n, j = 1, 2, ..., m. According to Lemma 6, systems (1) and (2) can achieve fixed-time synchronization under the controller (14). Furthermore, Tmax4=πdab. where a=λ·2α+12, b = 2μ, λ=min{mini(λ3i),minj(k3j)}, μ=min{mini(λ4i)·n1-β2,minj(k4j)·m1-β2}. The proof process is similar to Corollary 1, so it is omitted here.

3.2. Predefined-time synchronization analysis

Theorem 2. For system (5), if there exists a continuous and positive definite function V(e(t)):ℂn → ℝ, Tc is a user-defined parameter, and the following conditions hold:

(i) V(e(t)) = 0 ⇔ e(t) = 0;

(ii) For any V(e(t)) > 0, there exist a, b, c > 0, 0 < p < 1, q > 1 satisfying

V(e(t))-GcTc(aVp(e(t))+bVq(e(t))+cV(e(t))),

then the origin of system (5) is predefined-time stable within predefined time Tc, in which

Gc=1c(1-p)ln(1+ca)+1c(q-1)ln(1+cb).

Proof 3. For any V(e(t)) > 0, the corresponding analysis is shown as follows:

V(e(t))-GcTc(aVp(e(t))+bVq(e(t))+cV(e(t))).

The setting time function is given as follows:

T(e(0))=0T(e(0))dt.

Then we have

T(e(0))=0T(e(0))dt,               0V(e(0))TcGc1aVp+bVq+cVdV,             01TcGc1aVp+bVq+cVdV+1+TcGc1aVp+bVq+cVdV.

Let W = V1−p, dW = (1−p)VpdV, V=W11-p, then we have

01TcGc1aVp+bVq+cVdV01TcGc1aVp+cVdV,                                                      =01TcGc11-pVpaVp+cVdW,                                                      =01TcGc11-p1a+cWdW,                                                      =TcGc1c(1-p)ln(1+ca).

Let Z = V1−q, dZ = (1−q)VqdV, V=Z11-q, then we have

1+TcGc1aVp+bVq+cVdV1+TcGc1bVq+cVdV,                                                         =01TcGc1q-1VqbVq+cVdZ,                                                         =01TcGc1q-11b+cZdZ,                                                         =TcGc1c(q-1)ln(1+cb).

Therefore, we have

T(e(0))TcGc(1c(1-p)ln(1+ca)+1c(q-1)ln(1+cb)),               Tc.

In order to realize the predefined-time synchronization of systems (1) and (2), we designed the following controller:

{ uiR(t)=wisign(e1iR(t))λ1iR(e1iR(tτ(t))λ1iI(e1iI(tτ(t)))                sign(e1iR(t))GcTc[λ2i|e1iR(t)|+λ3i|e1iR(t)|α+λ4i|e1iR(t)|β],uiI(t)=kisign(e1iI(t))w1iR(e1iR(tτ(t))w1iI(e1iI(tτ(t)))                sign(e1iI(t)))GcTc[λ2i|e1iI(t)|+λ3i|e1iI(t)|α+λ4i|e1iI(t)|β],vjR(t)=pjsign(e2jR(t))k1jR(e2jR(tσ(t))k1jI(e2jI(tσ(t)))                sign(e2jR(t)))GcTc[k2j|e2jR(t)|+k3j|e2jR(t)|α+k4j|e2jR(t)|β],vjI(t)=qjsign(e2jI(t))p1jR(e2jR(tσ(t))p1jI(e2jI(tσ(t)))                sign(e2jI(t)))GcTc[k2j|e2jI(t)|+k3j|e2jI(t)|α+k4j|e2jI(t)|β].     (15)

Theorem 3. If λ1iRη~iR, λ1iIη~iI, w1iRη~iR, w1iIη~iI, k1jRξ~iR, k1jIξ~iI, p1jRξ~iR, p1jIξ~iI, wiΛiR, kiΛiI, pjΩiR, qjΩiI, i = 1, 2, ..., n, j = 1, 2, ..., m, Gc=1c(1-ρ)ln(1+ca)+1c(ξ-1)ln(1+cb), systems (1) and (2) can achieve the predefined-time synchronization within predefined time Tc and the controller (15), where a=λ·2α+12, b = 2μ, c = 2ω, ρ=α+12, ζ=1+β2, λ=min{mini(λ3i),minj(k3j)}, μ=min{mini(λ4i)·n1-β2,minj(k4j)·m1-β2}, ω=min{mini(λ2i),minj(k2j)}.

Proof 4. To prove this theorem, we construct the Lyapunov function as follows:

Vu(t)=V1u(t)+V2u(t),            =V1R(t)+V1I(t)+V2R(t)+V2I(t),

where V1R(t)=12i=1n(e1iR(t))2, V1I(t)=12i=1n(e1iI(t))2, V2R(t)=12j=1m(e2jR(t))2, V2I(t)=12j=1m(e2jI(t))2.

We calculate the derivative of V1R(t) as follows:

V˙1R(t)=i=1ne1iR(t)e˙1iR(t),           =i=1n|e1iR(t)|sign(e1iR(t)){P(t)+WiR(t)+uiR(t)},           i=1n{η˜iR|e1iR(t)||e1iR(tτ(t))|​ + ​η˜iI|e1iR(t)||e1iI(tτ(t))|}+i=1n|e1iR(t)||WiR(t)|              +i=1n|e1iR(t)|sign(e1iR(t)){wisign(e1iR(t))λ1iR(e1iR(tτ(t))λ1iI(e1iI(tτ(t)))}             +i=1n|e1iR(t)|sign(e1iR(t)){sign(e1iR(t))GcTc[λ2i|e1iR(t)|+λ3i|e1iR(t)|α+λ4i|e1iR(t)|β]}.

According to Assumption 1 and Lemma 1, we have

V1R(t)-i=1nGcTc[λ2i|e1iR(t)|2+λ3i|e1iR(t)|α+1+λ4i|e1iR(t)|β+1]+i=1n(ΛiR-wi)|e1iR(t)|                 +i=1n{(η~iR-λ1iR)|e1iR(t)||e1iR(t-τ(t))|}+i=1n{(η~iI-λ1iI)|e1iR(t)||e1iI(t-τ(t))|}           -i=1nGcTc[λ2i|e1iR(t)|2+λ3i|e1iR(t)|α+1+λ4i|e1iR(t)|β+1],           -GcTc[mini(λ2i)(i=1m|e1iR(t)|2)+mini(λ3i)(i=1m|e1iR(t)|2)α+12+n1-β2·mini(λ4i)(i=1m|e1iR(t)|2)β+12],           -GcTc[2mini(λ2i)·V1R(t)+2α+12mini(λ3i)·(V1R(t))α+12+n1-β2·2β+12mini(λ4i)·(V1R(t))β+12].

The proofs of V1I(t), V2R(t) and V2I(t) are similar with that of V1R(t). Additionally, we have

V˙1I(t)GcTc[2mini(λ2i)·V1I(t)+2α+12mini(λ3i)·(V1I(t))α+12                  +n1β2·2β+12mini(λ4i)·(V1I(t))β+12],V˙2R(t)GcTc[2mini(k2j)·V2R(t)+2α+12mini(k3j)·(V2R(t))α+12                 +m1β2·2β+12mini(k4j)·(V2R(t))β+12],V˙2I(t)GcTc[2mini(k2j)·V2I(t)+2α+12mini(k3j)·(V2I(t))α+12                +m1β2·2β+12minj(k4j)·(V2I(t))β+12].

According to the analysis above, we can obtain that

V˙u(t)2GcTc{mini(λ2i)(V1R(t))+mini(λ2i)(V1I(t))                 +minj(k2j)·(V2R(t))+minj(k2j)(V2I(t))}                  2α+12GcTc{mini(λ3i)(V1R(t))α+12+mini(λ3i)(V1I(t))α+12                 +minj(k3j)(V2I(t))α+12+minj(k3j)(V2R(t))α+12}                 2β+12GcTc{n1β2·mini(λ4i)(V1R(t))β+12+n1β2·mini(λ4i)(V1I(t))β+12                 +m1β2·minj(k4j)(V2R(t))β+12+m1β2·minj(k4j)(V2I(t))β+12},

Therefore,

Vu(t)-2GcTc{mini(λ2i)[V1R(t)+V1I(t)]+minj(k2j)·[V1R(t)+V1I(t)]}                 -2α+12GcTc{mini(λ3i)[V1R(t)+V1I(t)]α+12+minj(k3j)[V2R(t)+V2I(t)]α+12}                 -2β+12GcTc{mini(λ4i)·n1-β2·[V1R(t)+V1I(t)]β+12+mini(k4j)·m1-β2·[V2R(t)+V2I(t)]β+12},            -2α+12λ·GcTc·[(V1u(t))α+12+(V2u(t))α+12]-2ω·GcTc·[V1u(t)+V2u(t)]                 -2β+12μ·GcTc·[(V1u(t))β+12+(V2u(t))β+12],            -GcTc[2α+12λ·(Vu(t))α+12+2μ·(Vu(t))β+12+2ω·(Vu(t))],

where a=λ·2α+12, ρ=α+12, b = 2μ, ζ=1+β2, c = 2ω, λ=min{mini(λ3i),minj(k3j)}, μ=min{mini(λ4i)·n1-β2,minj(k4j)·m1-β2}, ω=min{mini(λ2i),minj(k2j)}.Under Theorem 2, the drive system (1) and the response system (2) can achieve predefined-time synchronization under the controller (15). The proof is completed.

Remark 4. In Theorems 2 and 3, the error system (5) can achieve predefined-time stability, in which Gc can be considered as the minimum upper bound Tmax of the stability time in fixed-time stability. In addition, the theorem also provides a tuning parameter Tc to adjust the stability time to the expected value.

4. Numerical examples

Three examples are shown in this section. Example 1 demonstrates the effects of Theorem 1, Example 2 verifies the validity of the predefined-time synchronization in Theorems 2 and 3, and Example 3 is an application of image encryption and decryption.

Example 1. The simulation model is a two-dimensional MCVBAMNNs with time-varying delays, and it is shown as follows:

{x˙1iu(t)=-ηiu(x1iu(t-τ(t)))x1iu(t-τ(t))+j=12ajiu(x1iu(t))fju(x2ju(t))                +j=12bjiu(x1iu(t-τ(t)))fju(x2ju(t-σ(t))),x˙2ju(t)=-ξju(x2ju(t-σ(t)))x2ju(t-σ(t))+i=12ciju(x2ju(t))giu(x1iu(t))                +i=12diju(x2ju(t-σ(t)))giu(x1iu(t-τ(t))).    (16)

The response system is

{1iu(t)=-ηiu(y1iu(t-τ(t)))y1iu(t-τ(t))+j=12ajiu(y1iu(t))fju(y2ju(t))+j=12bjiu(y1iu(t-τ(t)))fju(y2ju(t-σ(t)))+uiu(t),2ju(t)=-ξju(y2ju(t-σ(t)))y2ju(t-σ(t))+i=12ciju(y2ju(t))giu(y1iu(t))+i=12diju(y2ju(t-σ(t)))giu(y1iu(t-τ(t)))+vju(t),    (17)

where i = 1, 2, j = 1, 2; Ti=Tj =ϖj=ϖj =0, i=i =1; ηiu=ξju=1+i; fju(z)=sin(|z|), giu(z)=cos(|z|-1); τ(t) = t+0.1sin(t), σ(t) = t−0.1cos(t). The initial values of system (16) are φ1R(s) = (1, 2.1)T, φ1I(s) = (1.3, −1)T, φ2R(s) = (0.4, 1.2)T, φ2I(s) = (1, 0.25)T. The initial values of system (17) are ϕ1R(s) = (0.9, −1)T, ϕ1I(s) = (1.1, 0.75)T, ϕ2R(s) = (0.5, −0.8)T, ϕ2I(s) = (−0.6, 1.4)T. The memristor-based connection weights are listed as follows:

ÂR=(0.8-0.30.50.1),   ǍR=(-0.50.2-0.6-1),   ÂI=(-0.80.5-0.8-1.2),   
ǍI=(0.80.1-0.1-1.1),   B^R=(0.30.20.7-0.6),   B̬R=(0.40.20.3-0.4),   
B^I=(-0.90.7-0.20.7),   B̬I=(-1.20.8-0.40.9),   ĈR=(-10.50.8-1.3),   
ČR=(-1.80.81.2-1.5),   ĈI=(-1.10.21.1-1.3),   ČI=(-1.30.51.0-1.2),   
D^R=(-1.50.40.3-2),   ĎR=(-1.80.50.1-1.5),   D^I=(-1.00.30.2-1.5),   
ĎI=(-1.20.60.5-1.8).

Some real and imaginary parts phase plots of the drive system (16) are shown in Figure 4. We choose wi = 1.5, ki = 1, pj = 1.3, qj = 1; λ1iR=λ1iI=w1iR=w1iI=k1jR=k1jI=p1jR=p1jI=1; λ2i = 12, k2j = 20; λ3i = λ4i = 0.4; k3j = k4j = 0.6. Errors of the drive system (16) and the response system (17) without and with feedback controller (14) are shown in Figures 5A,B, respectively.

FIGURE 4
www.frontiersin.org

Figure 4. Real part and imaginary part phase plots of the drive system (16). (A) Phase plot of real part with initial conditions x11R(0)=1, x12R(0)=2.1. (B) Phase plot of imaginary part with initial conditions x11I(0)=1.3, x12I(0)=-1. (C) Phase plot of real part with initial conditions x21R(0)=0.4, x22R(0)=1.2. (D) Phase plot of imaginary part with initial conditions x21I(0)=1, x22I(0)=0.25.

FIGURE 5
www.frontiersin.org

Figure 5. Error system trajectories of the drive system (16) and response system (17). (A) Synchronization errors without control. (B) Synchronization errors under control.

Table 1 shows that Tmax1 is much smaller than Tmax2-4 with the same controller parameters. In Table 1, Tmax1 is derived by Theorem 1 and Lemma 3, Tmax2 is derived by Corollary 1 and Lemma 4, Tmax3 is derived by Corollary 2 and Lemma 5, and Tmax4 is derived by Corollary 3 and Lemma 6. Therefore, compared with Corollaries 1-3, Theorem 1 provides a more strict upper bound estimation formula.

TABLE 1
www.frontiersin.org

Table 1. The comparisons among Tmax1, Tmax2, Tmax3, and Tmax4.

Example 2. According to Theorems 2-3, the settling time of the error system (5) can be adjusted by a tuning parameter Tc.

We set two initial values:

(1) Initial value 1: φ1R(s) = (1, 2.1)T, φ1I(s) = (1.3, −1)T, φ2R(s) = (0.4, 1.2)T, φ2I(s) = (1, 0.25)T. ϕ1R(s) = (0.9, −1)T, ϕ1I(s) = (1.1, 0.75)T, ϕ2R(s) = (0.5, −0.8)T, ϕ2I(s) = (−0.6, 1.4)T;

(2) Initial value 2: φ1R(s) = (0.5, 2.5)T, φ1I(s) = (1.3, −1.5)T, φ2R(s) = (2, 1.25)T, φ2I(s) = (1.5, 0.25)T. ϕ1R(s) = (0.9, −1.5)T, ϕ1I(s) = (1.1, −1.2)T, ϕ2R(s) = (0.5, −1.8)T, ϕ2I(s) = (−0.6, 1.4)T.

Figure 6 is the synchronization error diagram when Tc = 5. Figures 6A,B show that different initial values can achieve synchronization within a given time. Figure 7 is the synchronization error diagram when Tc = 0.5. From Figures 6, 7, it can be seen that the actual synchronization time is changed according to Tc. We can set the ideal synchronization time Tc in the controller, which is that the system can achieve predefined-time stability.

FIGURE 6
www.frontiersin.org

Figure 6. Synchronization errors with Tc = 5. (A) Synchronization errors with initial value 1. (B) Synchronization errors with initial value 2.

FIGURE 7
www.frontiersin.org

Figure 7. Synchronization errors with Tc = 0.5. (A) Synchronization errors with initial value 1. (B) Synchronization errors with initial value 2.

Example 3. We use the predefined-time stability and chaotic characters of the drive system (16) and response system (17) to achieve image encryption and decryption. The proposed image encryption algorithm consists of pixel scrambling and diffusion.

We choose Tc = 0.2, and the other parameters are the same as in Example 1. According to the drive system (16), our encryption algorithm is designed as follows.

Step 1. Enter the color original image “Lena” with the size of M × N × 3, where M = 256, N = 256.

Step 2. According to x11u(t) of the drive system (16), we can get the real part sequence and imaginary part sequence x11(k1)R=[x11(1)R,x11(2)R,...,x11(M×N/2)R], x11(k2)I=[x11(1)I,x11(2)I,...,x11(M×N/2)I]. Based on the descending order of chaotic sequences x11(k1)R and x11(k2)I, the index of the sequences ϱ1 and ϱ2 is obtained.

ϱ1=sort(round(x11(k1)R,3),descens),ϱ2=sort(round(x11(k2)I,3),descens).

ϱ1 is used to scramble half of the original image, and ϱ2 is used to scramble the other half of the original image.

Step 3. Scramble the pixels of R, G, B channels and compose new R~,G~,B~ channels.

R˜=reshape(R,M,N);G˜=reshape(G,M,N);                        B˜=reshape(B,M,N).

Step 4. Converts x12(k)R and x12(k)I of the drive system (16) into M×N dimension matrices z1(i, j) and z2(i, j). Encrypt the R~ channel as follows. For even-row pixels,

z1(i,j)=mod(108(z1(k)floor(z1(k))),256);   newR(i,j)=bitxor(R˜(i,j),floor(z1(i,j)));

for odd-row pixels,

z2(i,j)=mod(108(z2(k)floor(z2(k))),256);   newR(i,j)=bitxor(R˜(i,j),floor(z2(i,j)));

use x21 and x22 to encrypt G~,B~ channels according to the above method, respectively.

The original picture is shown in Figure 8A. We use a chaotic sequence to scramble the pixels in the encrypted area, as shown in Figure 8B. The final encrypted image is shown in Figure 8C. When the drive system (16) and the response system (17) reach predefined-time synchronization, decryption is the opposite process of encryption, and the decrypted picture is shown in Figure 8D.

FIGURE 8
www.frontiersin.org

Figure 8. Original encryption and decryption pictures. (A) Original picture “Lena.” (B) Pixel scrambling picture. (C) The encrypted picture. (D) The decrypted picture (This image is taken from a public database).

According to MCVBAMNNs and predefined-time synchronization, the flow charts of image encryption and decryption are shown in Figures 9, 10. We use the controller (15) to flexibly set the parameter Tc, then the chaotic sequence can be selected in a controllable range, which ensures the effectiveness of the encryption and decryption algorithm. In this scheme, Tc = 0.2 is chosen as the secret key, and the wrong secret key will affect the decryption result.

FIGURE 9
www.frontiersin.org

Figure 9. Flow chart of the encryption algorithm.

FIGURE 10
www.frontiersin.org

Figure 10. Flow chart of the decryption algorithm.

The histograms of the original and encrypted image are shown in Figures 11, 12, which shows that the histograms of the encryption image become highly disordered. In a digital image, there is a high correlation between each pixel. Therefore, the pixel adjacency correlation of encrypted images generated by a reasonable encryption algorithm should be close to zero. The horizontal correlation coefficients of the original and the encryption image in the R are shown in Figures 13, 14. The correlation coefficient of the encryption image becomes much lower. Table 2 lists the correlation coefficients of the encryption algorithm and the comparisons with others, which indicates our algorithm has good results1.

FIGURE 11
www.frontiersin.org

Figure 11. Histograms of RGB for the original picture.

FIGURE 12
www.frontiersin.org

Figure 12. Histograms of RGB for the encrypted picture.

FIGURE 13
www.frontiersin.org

Figure 13. R-channel correlation coefficients of the original image (From left to right: Horizontal Correlation Coefficient of R: 0.95722; Vertical Correlation Coefficient of R: 0.9789; Diagonal Correlation Coefficient of R: 0.92933).

FIGURE 14
www.frontiersin.org

Figure 14. R-channel correlation coefficients of encryption image (from left to right:Horizontal Correlation Coefficient of R:-0.0059807; Vertical Correlation Coefficient of R: -0.0025902; Diagonal Correlation Coefficient of R: 0.0014835).

TABLE 2
www.frontiersin.org

Table 2. Comparison of correlation coefficients of encryption “Lena.”

Remark 5. Digital images can convey information intuitively and effectively and are widely used. A considerable part of images in daily life and work contains sensitive data and belong to sensitive areas. If the sensitive block data is not protected, it may cause some losses to individuals or other objects. Therefore, the image encryption and decryption scheme based on the predefined-time synchronization of MCVBAMNNs in this paper has important application value for the privacy protection of image blocks with uncertain size without losing image availability. For example, Figure 15 is a picture containing employee information. In order to avoid privacy disclosure, important information such as ID numbers or mobile phone numbers can be encrypted.

FIGURE 15
www.frontiersin.org

Figure 15. Employee information diagram of a company. (Encrypted ID Number).

Remark 6. At present, most of the neural network dynamics achievements are still in the theoretical stage, and the research on relevant practical applications is not extensive enough. But fortunately, researchers are aware of this problem and are trying to explore its future research direction, such as its application in human-computer interaction (Su et al., 2022).

5. Conclusion

In this paper, the fixed-time and predefined-time stability of MCVBAMNNs with leakage time-varying delay is studied. Based on differential inclusion and set-valued mapping theory, an effective discontinuous controller is designed, sufficient conditions for conservative smaller fixed-time synchronization are obtained, and a more general predefined-time stability theorem is proposed. By adjusting the controller parameters, the MCVBAMNNs can achieve synchronization within a predetermined time. On this basis, we design an effective image encryption scheme. Through comparative analysis, the algorithm proposed in this paper has good results. Inspired by Feng et al. (2020), in the future, we will consider the method of complex-valued nonseparation and propose more general predefined-time stability conditions, which will be an interesting and challenging job.

Data availability statement

The original contributions presented in the study are included in the article/supplementary material, further inquiries can be directed to the corresponding author/s.

Author contributions

AL: formal analysis, validation, and writing—original draft. HZ: data curation and funding acquisition. QW: data curation. SN: funding acquisition and supervision. XG, ZS, and LL: funding acquisition and supervision. All authors contributed to the article and approved the submitted version.

Funding

This study is supported by the National Natural Science Foundation of China (Grant Nos. 62103165, 62032002, 62101213, and 61902048), the Natural Science Foundation of Shandong Province (Grant No. ZR2020QF107), the Natural Science Foundation of Beijing Municipality (Grant No. M21034), the Chongqing High Tech Research Program (Grants No. cstc2018jcyjAX0279), and Development Program Project of Youth Innovation Team of Institutions of Higher Learning in Shandong Province.

Conflict of interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Publisher's note

All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.

Footnotes

1. ^Code is available at: https://github.com/Liu-aidi/MCVBAMNNs.

References

Aldana-Lopez, R., Gomez-Gutierrez, D., Jimenez-Rodriguez, E., Sanchez-Torres, J., and Defoort, M. (2019). Enhancing the settling time estimation of a class of fixed-time stable systems. Int. J. Robust Nonlinear Control 29, 4135–4148. doi: 10.1002/rnc.4600

CrossRef Full Text | Google Scholar

Alimi, A., Aouiti, C., and Assali, E. (2019). Finite-time and fixed-time synchronization of a class of inertial neural networks with multi-proportional delays and its application to secure communication. Neurocomputing 332, 29–43. doi: 10.1016/j.neucom.2018.11.020

CrossRef Full Text | Google Scholar

Anguiano-Gijon, C., Munoz-Vazquez, A., Sanchez-Torres, J., Romero-Galvan, G., and Martinez-Reyes, F. (2019). On predefined-time synchronization of chaotic systems. Chaos Solitons Fractals 122, 172–178. doi: 10.1016/j.chaos.2019.03.015

PubMed Abstract | CrossRef Full Text | Google Scholar

Cao, J., and Li, R. (2017). Fixed-time synchronization of delayed memristor-based recurrent neural networks. Sci. China 60, 108–122. doi: 10.1007/s11432-016-0555-2

CrossRef Full Text | Google Scholar

Chen, C., Li, L., Peng, H., Yang, Y., Mi, L., and Wang, L. (2019). A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks. Neurocomputing 349, 290–300. doi: 10.1016/j.neucom.2019.03.040

CrossRef Full Text | Google Scholar

Chen, C., Li, L., Peng, H., Yang, Y., Mi, L., and Zhao, H. (2020). A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks. Neural Netw. 123, 412–419. doi: 10.1016/j.neunet.2019.12.028

PubMed Abstract | CrossRef Full Text | Google Scholar

Chen, W., Luo, S., and Zheng, W. (2016). Impulsive synchronization of reactiondiffusion neural networks with mixed delays and its application to image encryption. IEEE Trans. Neural Netw. Learn. Syst. 27, 2696–2710. doi: 10.1109/TNNLS.2015.2512849

PubMed Abstract | CrossRef Full Text | Google Scholar

Chua, L. (1971). Memristor-the missing circuit element. IEEE Trans. Circ. Theory 18, 507–519. doi: 10.1109/TCT.1971.1083337

CrossRef Full Text | Google Scholar

Feng, L., Yu, Y., Hu, C., Yang, C., and Jiang, H. (2020). Nonseparation methosd-based finite/fixed-time synchronization of fully complex-valued discontinuous neural networks. IEEE Trans. Cybern. 99, 1–12. doi: 10.1109/TCYB.2020.2980684

PubMed Abstract | CrossRef Full Text | Google Scholar

Filippov, A. (1999). Differential equations with diacontinuous right-hand side. J. Matemat. Anal. Appl. 154, 99–128.

Google Scholar

Gkiotsalitis, K., Eikenbroek, O., and Cats, O. (2020). Robust network-wide bus scheduling with transfer synchronizations. IEEE Trans. Intell. Transport. Syst. 21, 4582–4592. doi: 10.1109/TITS.2019.2941847

CrossRef Full Text | Google Scholar

Guo, Y., Luo, Y., Wang, W., and Luo, X. (2020). Fixed-time synchronization of complex-valued memristive bam neural network and applications in image encryption and decryption. Int. J. Control Autom. Syst. 18, 462–476. doi: 10.1007/s12555-018-0676-7

CrossRef Full Text | Google Scholar

Hardy, G., Littlewood, J., and Polya, G. (1952). Inequalities. Cambridge: Cambridge University Press.

Google Scholar

Hu, C., Yu, J., Chen, Z., Jiang, H., and Huang, T. (2017). Fixed-time stability of dynamical systems and fixed-time synchronization of coupled discontinuous neural networks. Neural Netw. 89, 74–83. doi: 10.1016/j.neunet.2017.02.001

PubMed Abstract | CrossRef Full Text | Google Scholar

Ke, Y., and Miao, C. (2013). Stability and existence of periodic solutions in inertial bam neural networks with time delay. Neural Comput. Appl. 23, 1089–1099. doi: 10.1007/s00521-012-1037-8

CrossRef Full Text | Google Scholar

Kosko, B. (1988). Bidirectional associative memories. IEEE Trans. Syst. Man Cybern. 18, 49–60. doi: 10.1109/21.87054

CrossRef Full Text | Google Scholar

Li, L., and Mu, G. (2019). Synchronization of coupled complex-valued impulsive neural networks with time delays. Neural Process. Lett. 50, 2515–2527. doi: 10.1007/s11063-019-10028-6

CrossRef Full Text | Google Scholar

Li, N., and Cao, J. (2016). Lag synchronization of memristor-based coupled neural networks via ω-measure. IEEE Trans. Neural Netw. Learn. Syst. 27, 686–697. doi: 10.1109/TNNLS.2015.2480784

PubMed Abstract | CrossRef Full Text | Google Scholar

Lin, L., Wu, P., Chen, Y., and He, B. (2020). Enhancing the settling time estimation of fixed-time stability and applying it to the predefined-time synchronization of delayed memristive neural networks with external unknown disturbance. Chaos 30, 083110. doi: 10.1063/5.0010145

PubMed Abstract | CrossRef Full Text | Google Scholar

Liu, A., Zhao, H., aand, S., Niu, Q. W., Gao, X., Chen, C., et al. (2022). A new predefined-time stability theorem and its application in the synchronization of memristive complex-valued bam neural networks. Neural Netw. 153, 152–163. doi: 10.1016/j.neunet.2022.05.031

PubMed Abstract | CrossRef Full Text | Google Scholar

Liu, D., Zhu, S., and Ye, E. (2017). Synchronization stability of memristor-based complex-valued neural networks with time delays. Neural Netw. 96, 115–127. doi: 10.1016/j.neunet.2017.09.008

PubMed Abstract | CrossRef Full Text | Google Scholar

Liu, X., Song, Y., and Jiang, G. (2019). Hierarchical bit-level image encryption based on chaotic map and feistel network. Int. J. Bifurcat. Chaos 29, 1950016. doi: 10.1142/S0218127419500160

CrossRef Full Text | Google Scholar

Ouyang, D., Shao, J., Jiang, H., Nguang, S., and Shen, H. (2020). Impulsive synchronization of coupled delayed neural networks with actuator saturation and its application to image encryption. Neural Netw. 128, 158–171. doi: 10.1016/j.neunet.2020.05.016

PubMed Abstract | CrossRef Full Text | Google Scholar

Parsegov, S., Polyakov, A., and Shcherbakov, P. (2013). Nonlinear fixed-time control protocol for uniform allocation of agents on a segment. Doklady Math. 87, 133–136. doi: 10.1134/S106456241301033X

CrossRef Full Text | Google Scholar

Polyakov, A. (2012). Nonlinear feedback design for fixed-time stabilization of linear control systems. IEEE Trans. Automat. Contr. 57, 2106–2110. doi: 10.1109/TAC.2011.2179869

CrossRef Full Text | Google Scholar

Qi, J., Li, C., and Huang, T. (2015). Stability of inertial bam neural network with time varying delay via impulsive control. Neurocomputing 161, 162–167. doi: 10.1016/j.neucom.2015.02.052

CrossRef Full Text | Google Scholar

Rubinov, M., and Sporns, O. (2010). Complex network measures of brain connectivity: uses and interpretations. Neuroimage 52, 1059–1069. doi: 10.1016/j.neuroimage.2009.10.003

PubMed Abstract | CrossRef Full Text | Google Scholar

Sanchez-Torres, J., Sanchez, E., and Loukianov, A. (2014). “A discontinuous recurrent neural network with predefined time convergence for solution of linear programming,” in 2014 IEEE Symposium on Swarm Intelligence (Orlando, FL: IEEE), 1–4.

Google Scholar

Strukov, D., Snider, G., Stewart, D., and Williams, R. (2008). The missing memristor found. Nature 453, 80–83. doi: 10.1038/nature06932

PubMed Abstract | CrossRef Full Text | Google Scholar

Su, H., Hu, Y., Karimi, H., Knoll, A., Ferrigno, G., and Momi, E. (2020). Improved recurrent neural network-based manipulator control with remote center of motion constraints: experimental results. Neural Netw. 131, 291–299. doi: 10.1016/j.neunet.2020.07.033

PubMed Abstract | CrossRef Full Text | Google Scholar

Su, H., Qi, W., Li, Z., Chen, Z., Ferrigno, G., and Momi, E. (2021). Deep neural network approach in emg-based force estimation for human-robot interaction. IEEE Trans. Artif. Intell. 2, 404–412. doi: 10.1109/TAI.2021.3066565

CrossRef Full Text | Google Scholar

Su, H., Qi, W., Schmirander, Y., Ovur, S., Cai, S., and Xiong, X. (2022). A human activity-aware shared control solution for medical human-robot interaction. Assembly Automat. 42, 388–394. doi: 10.1108/AA-12-2021-0174

CrossRef Full Text | Google Scholar

Wang, H., Duan, S., Huang, T., Wang, L., and Li, C. (2017). Exponential stability of complex-valued memristive recurrent neural networks. IEEE Trans. Neural Netw. Learn. Syst. 28, 766–771. doi: 10.1109/TNNLS.2015.2513001

PubMed Abstract | CrossRef Full Text | Google Scholar

Wang, Z., Wu, W., Zhu, T., Hua, K., Chang, S., annd, F., et al. (2021). High-power synchronous multi-wavelength solitons from a multimode mode-locked fiber laser system. Opt. Lett. 46, 118–121. doi: 10.1364/OL.412739

PubMed Abstract | CrossRef Full Text | Google Scholar

Wen, Q., and Su, H. (2022). A cybertwin based multimodal network for ecg patterns monitoring using deep learning. IEEE Trans. Ind. Inform. 18, 6663–6670. doi: 10.1109/TII.2022.3159583

CrossRef Full Text | Google Scholar

Wu, X., Kan, H., and Kurths, J. (2015). A new color image encryption scheme basedon dna sequences and multiple improved 1d chaotic maps. Appl. Soft. Comput. 37, 24–39. doi: 10.1016/j.asoc.2015.08.008

CrossRef Full Text | Google Scholar

Xu, Y., Wang, H., Li, Y., and Pei, B. (2014). Image encryption based on synchronization of fractional chaotic systems. Commun. Nonlinear Sci. Num. Simulat. 19, 3735–3744. doi: 10.1016/j.cnsns.2014.02.029

PubMed Abstract | CrossRef Full Text | Google Scholar

Yang, C., Huang, L., and Cai, Z. (2019). Fixed-time synchronization of coupled memristor-based neural networks with time-varying delays. Neural Netw. 116, 101–109. doi: 10.1016/j.neunet.2019.04.008

PubMed Abstract | CrossRef Full Text | Google Scholar

Yang, N., Yu, Y., Zhong, S., Wang, X., Shi, K., and Cai, J. (2020). Exponential synchronization of stochastic delayed memristive neural networks via a novel hybrid control. Neural Netw. 131, 242–250. doi: 10.1016/j.neunet.2020.07.034

PubMed Abstract | CrossRef Full Text | Google Scholar

You, X., Song, Q., and Zhao, Z. (2020). Global mittag-leffler stability and synchronization of discrete-time fractional-order complex-valued neural networks with time delay. Neural Netw. 122, 382–394. doi: 10.1016/j.neunet.2019.11.004

PubMed Abstract | CrossRef Full Text | Google Scholar

Zhang, L., and Yang, Y. (2020). Finite time impulsive synchronization of fractional order memristive bam neural networks. Neurocomputing 384, 213–224. doi: 10.1016/j.neucom.2019.12.056

CrossRef Full Text | Google Scholar

Zhang, W., Cao, J., Chen, D., and Alsaadi, F. (2018). Synchronization in fractional-order complex-valued delayed neural networks. Entropy 20, 54. doi: 10.3390/e20010054

PubMed Abstract | CrossRef Full Text | Google Scholar

Zhang, Z., Cao, J., and Zhou, D. (2014). Novel lmi-based condition on global asymptotic stability for a class of cohen-grossberg bam networks with extended activation functions. IEEE Trans. Neural Netw. Learn. Syst. 25, 1161–1172. doi: 10.1109/TNNLS.2013.2289855

CrossRef Full Text | Google Scholar

Zhang, Z., and Quan, Z. (2015). Global exponential stability via inequality technique for inertial bam neural networks with time delays. Neurocomputing 151, 1316–1326. doi: 10.1016/j.neucom.2014.10.072

CrossRef Full Text | Google Scholar

Zhao, H., Liu, A., Wang, Q., Zheng, M., Chen, C., Niu, S., et al. (2021). Predefined-time stability/synchronization of coupled memristive neural networks with multi-links and application in secure communication. Front. Neurorobot. 15, 783809. doi: 10.3389/fnbot.2021.783809

PubMed Abstract | CrossRef Full Text | Google Scholar

Zhao, Y., Ren, S., and Kurths, J. (2021). Synchronization of coupled memristive competitive bam neural networks with different time scales. Neurocomputing 427, 110–117. doi: 10.1016/j.neucom.2020.11.023

CrossRef Full Text | Google Scholar

Keywords: fixed-time synchronization, predefined-time synchronization, bidirectional associative memory, image encryption and decryption, complex-valued neural networks

Citation: Liu A, Zhao H, Wang Q, Niu S, Gao X, Su Z and Li L (2022) Fixed/Predefined-time synchronization of memristor-based complex-valued BAM neural networks for image protection. Front. Neurorobot. 16:1000426. doi: 10.3389/fnbot.2022.1000426

Received: 22 July 2022; Accepted: 26 September 2022;
Published: 17 October 2022.

Edited by:

Hang Su, Fondazione Politecnico di Milano, Italy

Reviewed by:

Zi-Ming Wang, Shandong Normal University, China
Robert W. Newcomb, University of Maryland, College Park, United States
Xiaotong He, Jilin University, China

Copyright © 2022 Liu, Zhao, Wang, Niu, Gao, Su and Li. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

*Correspondence: Hui Zhao, aHpfcGFwZXImI3gwMDA0MDsxNjMuY29t

These authors have contributed equally to this work and share first authorship

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.