Fast speed convergent stability of TS fuzzy sliding-mode control and disturbance observer for a secure communication of chaos-based system
This article presents the fast convergent stability of disturbance observer (DO) and sliding
mode control (SMC) for a secure communication of fractional-order chaotic-based system …
mode control (SMC) for a secure communication of fractional-order chaotic-based system …
Wireless Secure Communication of Chaotic Systems Based on Takagi–Sugeno Fuzzy Optimal Time Varying Disturbance Observer and Sliding Mode Control
This paper presents a new application of the secure communication system (SCS) of the
chaotic systems with experimentally verification of wireless devices together with a new …
chaotic systems with experimentally verification of wireless devices together with a new …
Wavelet interval type-2 Takagi-Kang-Sugeno hybrid controller for time-series prediction and chaotic synchronization
This paper presents a new hybrid neural network controller for time series prediction and
chaotic synchronization. The proposed controller is called as a wavelet interval type-2 …
chaotic synchronization. The proposed controller is called as a wavelet interval type-2 …
Design of Missile Guidance Law Using Takagi-Sugeno-Kang (TSK) Elliptic Type-2 Fuzzy Brain Imitated Neural Networks
The exploiting of missile guidance law is one of the most important issue of defense
systems. However, it is a complex nonlinear guidance control problem. In recent years …
systems. However, it is a complex nonlinear guidance control problem. In recent years …
Fixed-time supper twisting disturbance observer and sliding mode control for a secure communication of fractional-order chaotic systems
This paper proposed a new disturbance observer (DO) based on the fixed-time supper-
twisting algorithm (FTSTA) for rejecting perturbations of secure communication of the …
twisting algorithm (FTSTA) for rejecting perturbations of secure communication of the …
An optimal homogenous stability-based disturbance observer and sliding mode control for secure communication system
To prevent the loss of data or distortion of the real sent data in the secure communication,
the disturbance and uncertainty rejection is very important technique. Especially, the secure …
the disturbance and uncertainty rejection is very important technique. Especially, the secure …
Text message secure communication based on fractional-order chaotic systems with Takagi–Sugeno fuzzy disturbance observer and sliding mode control
VN Giap - International Journal of Dynamics and Control, 2023 - Springer
This paper proposes a fixed-time stability (FTS) disturbance observer based-on an adaptive
sliding mode control for the secure communication of chaos-based system. Firstly, the …
sliding mode control for the secure communication of chaos-based system. Firstly, the …
Disturbance observer based on sliding mode control for secure communication of chaotic circuits
To prevent the distortion of the data transmission, the disturbance compensation method is
highly required in the communication system. Therefore, the variations of parameters on …
highly required in the communication system. Therefore, the variations of parameters on …
[HTML][HTML] Optimal Design of Takagi-Sugeno-Kang Fuzzy Neural Network Based on Balancing Composite Motion Optimization for Chaotic Synchronization with …
VT Nguyen, DH Pham, H Nguyen-Xuan… - Results in Engineering, 2025 - Elsevier
In this paper, we propose an improved Takagi-Sugeno-Kang fuzzy neural network based on
balancing composite motion optimization (BCMO-ITSKFNN) for a chaotic synchronization …
balancing composite motion optimization (BCMO-ITSKFNN) for a chaotic synchronization …
[HTML][HTML] Optimal algorithm for color medical encryption and compression images based on DNA coding and a hyperchaotic system in the moments
Currently, visual data security plays a significant role in various fields, especially in medical
imaging. Addressing the challenges associated with limited key space and vulnerability to …
imaging. Addressing the challenges associated with limited key space and vulnerability to …