Next Article in Journal
The Calculus of Names—The Legacy of Jan Łukasiewicz
Next Article in Special Issue
Stability and Hopf Bifurcation of Fractional-Order Quaternary Numerical Three-Neuron Neural Networks with Different Types of Delays
Previous Article in Journal
Exponential Stability for a Degenerate/Singular Beam-Type Equation in Non-Divergence Form
Previous Article in Special Issue
First and Second Integrals of Hopf–Langford-Type Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

New μ-Synchronization Criteria for Nonlinear Drive–Response Complex Networks with Uncertain Inner Couplings and Variable Delays of Unknown Bounds

1
College of Computer, Chengdu University, Chengdu 610106, China
2
Guangdong Provincial Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security, Shenzhen University, Shenzhen 518060, China
3
The Training Center, Shenzhen Polytechnic University, Shenzhen 518055, China
4
School of Undergraduate Education, Shenzhen Polytechnic University, Shenzhen 518055, China
*
Authors to whom correspondence should be addressed.
Axioms 2025, 14(3), 161; https://doi.org/10.3390/axioms14030161
Submission received: 7 February 2025 / Revised: 18 February 2025 / Accepted: 20 February 2025 / Published: 23 February 2025
(This article belongs to the Special Issue Complex Networks and Dynamical Systems)

Abstract

:
Since the research of μ -synchronization helps to explore how complex networks (CNs) work together to produce complex behaviors, the μ -synchronization task for uncertain time-delayed CNs is studied in our work. Especially, bounded external perturbations and variable delays of unknown bounds containing coupling delays, internal delays, and pulse delays are all taken into consideration, making the model more general. Through the μ -stable theory together with the hybrid impulsive control technique, the problems caused by uncertain inner couplings, time-varying delays, and perturbations can be solved, and novel synchronization criteria are gained for the μ -synchronization of the considered CNs. Different from traditional models, it is not necessary for the coupling matrices to meet the zero-row-sum condition, and the control protocol relaxes the constraint of time delays on impulse intervals. Moreover, numerical experiments and image encryption algorithms are carried out to verify our theoretical results’ effectiveness.

1. Introduction

Complex networks (CNs) are very common in daily life [1,2], such as social networks, retrieval systems of the scientific literature, power networks, commercial networks, biological neural networks (NNs), and cellular NNs. CNs, as carriers of information dissemination, exhibit diverse synchronization phenomena. In fact, the ability of the network to achieve synchronization lies on the network’s topology and the dynamic properties of the nodes, as well as the strength of the external control. By studying the phenomenon of synchronization, we can better understand the evolution process of complex networks over time and their potential in engineering applications.

1.1. The Background and Related Works

Various categories of synchronization have been presented, such as phase synchronization [3,4], complete synchronization [5], generalized synchronization [6], finite-time synchronization [7,8,9], projective synchronization [10], and μ -synchronization [11,12,13,14]. μ -Synchronization is a generalized synchronization associated with the μ -function that can be converted to an exponential or logarithmic synchronization and has thus received focused attention from researchers. The μ -synchronization of CNs is particularly valuable in scenarios that are affected by noise, uncertainties, or other disturbances. Its applications span a wide range of fields, including secure communication, distributed computing, control systems, coupled oscillators, etc. There are several control methods for the synchronization of CNs, such as pinning control [15,16], optimal control [17], adaptive control [18], decentralized control [19], event-triggered control [20,21], and impulsive control [11,12,13,14,22]. Impulsive control only applies brief control inputs at specific time instants, rather than continuous control, which can significantly reduce the overall energy consumption. For achieving the μ -synchronization of multi-link CNs, a distributed delayed impulsive controller is presented by establishing a Halanay-like inequality [11]. By combining the benefits of two control theories, namely, pulse control theory and event-driven control theory, Zhang et al. [12] presented an impulsive control approach aiming for the μ -synchronization tasks of CNs. The μ -synchronization task of coupled NNs was investigated via the integration method based on pulse effects [13]. By means of an impulsive delay inequality approach, Guan et al. studied the μ -stabilization and μ -synchronization tasks of CNs with variable time delays [14]. In [22], utilizing the average impulsive interval approach, a secure impulsive controller was introduced to ensure the bounded synchronization of dynamic networks.
In many actual CNs, there exist inherent time delays in the information interactions among nodes, which significantly impact their synchronization task. Based on the decomposing technique, Liu et al. [23] investigated the anti-synchronization issue for coupled complex CNs with asynchronous variable time delays. Luo et al. [24] solved the finite-time synchronization problems of the uncertain variable time-delayed CNs by a feedback controller. Tan et al. [25] dealt with the synchronization task of CNs affected by time delays with a discrete distribution. Han et al. [26] explored complex function projective synchronization issues for CNs, in which coupling delays were considered. Intermittent control strategies were applied in [27] to achieve finite-time synchronization for delayed fuzzy CNs. The preassigned-time synchronization tasks were investigated for fuzzy memristive NNs with variable delays by putting forward a general controller in [28]. Through the Lyapunov–Krasovskii theory, the synchronization of Markovian jumping chaotic NNs with distributed time-varying delays was analyzed in [29]. Xing et al. presented the double-ring NN model with multiple bounded time delays and discussed its stability using the Coates flow graph method in [30]. In the above synchronization results, the time delay is assumed to be bounded, and the change rate of the time delay is restricted to a limited range of intervals.
In addition, there exist parameter uncertainties caused by factors such as system modeling errors, time delays, and external disturbances in practical complex networks. Parameter uncertainties including inner coupling states, node dynamics, and outer coupling topologies can affect the system’s synchronization behavior. He et al. [31] investigated the n-dimensional multi-time delayed fractional order NNs with parameter uncertainty by adopting an active control strategy, in which the parameter uncertainty involved belonged to uncertain outer couplings. Gu et al. [32] considered the synchronization tasks for memristor-based dynamical CNs with parameter uncertainty through a comparison principle and the Lyapunov method, in which parameter uncertainty describes the synaptic connection weight among different nodes. Fan et al. [33] investigated synchronization in multi-weighted CNs with parameter uncertainties that were added to the weight constant matrices of the node’s state vector. Selvaraj et al. [34] investigated the synchronization of non-linear uncertainty CNs in view of a feedback control strategy. Mirshamsi et al. [35] proposed a bounded control approach for linear time-invariant systems that considered time-varying uncertainty in state and input matrices. However, the μ -synchronization of CNs with internal coupling parameter uncertainty has been rarely studied.
Further, unknown external disturbances [36,37,38] can generally affect the synchronization behaviors between the drive–response CNs. Through a simple error feedback control strategy, Du et al. studied the function projective synchronization (FPS) task for CNs subjected to external perturbations [39]. In [40], by introducing the stability theory, Du et al. presented a new control method for addressing the issue of modified FPS for fractional order CNs with external perturbations. With the help of the Lyapunov stability theory and comparison criteria, the mean square exponential synchronization of CNs with stochastic perturbations was explored in [41]. By introducing a disturbance observer, the asymptotical synchronization task was focused on nonidentical CNs affected by unknown external perturbations in [42]. Liang et al. explored the synchronization task of switched duplex NNs under external stochastic disturbances by introducing channel matrices [43]. Research on the fixed-time synchronization task for delayed CNs in the presence of stochastic perturbations using the impulsive pinning control was studied in [44]. Shukla et al. [45] presented the condition for the El Niño chaotic system to achieve function matrix projective synchronization under the controller, which uses the functional projective matrix information. However, to date, few works consider how to design specific controllers for the μ -synchronization of uncertain CNs with unknown external perturbations and unbounded time delays, especially in the case where the coupling topology is not limited by dissipative coupling. This is also the main research motivation for this article.

1.2. The Research Aim and Highlights

Since studying μ -synchronization helps to shed light on how CNs work together to produce complex behaviors and cognitive functions, our goal is to achieve μ -synchronization for the considered CNs. The research question is how to design a controller to achieve μ -synchronization for the uncertain time-delayed CNs. Given by the aforementioned discussions, to achieve μ -synchronization for a type of unbounded time-delayed CNs with external disturbances and uncertainties of inner couplings, new synchronization criteria are derived. The highlights of this article contain the following aspects: (1) The time-delayed CNs that include uncertain couplings and external perturbations are modeled. In particular, all time delays, namely, coupling delays, internal delays, and pulse sampling delays, have non-metrizable bounds. (2) Unlike the pulse control protocols in [46,47,48], the hybrid pulse controllers in this paper allow the sampling delay to be unbounded, and new synchronization conditions are obtained for the uncertain time-delayed networks studied. (3) There is no need for the model’s external coupling matrices to meet the condition of dissipative coupling, and the control protocol relaxes the constraint of time delays on pulse intervals.
Notations: I denotes the unit matrix with a certain dimension. B ¯ > 0 denotes a positive definite matrix. ∀ Λ 1 R , Λ 2 R m , 1 m n , C 1 ( Λ 1 , Λ 2 ) = { o : Λ 1 Λ 2 } , in which o is continuously differentiable. P C ( Λ 1 , Λ 2 ) = { o * : Λ 1 Λ 2 } stands for the space of all piecewise continuous functions from Λ 1 to Λ 2 , with the segmentation points satisfying o * ( t + ) = o * ( t ) , and o * ( t ) exists. Let P C B r = { o ¯ P C ( [ r , 0 ] , R n ) , r > 0 , with the norm | o ¯ | = sup r s 0 o ¯ ( s ) . λ m a x ( Υ ) and λ m i n ( Υ ) are the maximum and minimum eigenvalues of the matrix Υ individually. X = { μ ( t ) C 1 ( R + , [ 1 , + ) ) } denotes the family of all non-decreasing functions on [ 0 , + ) , which satisfies μ ( t ) as t .

2. Model and Background Description

In view of the delay and uncertainty phenomena in neural networks, the CNs considered in this article are formulated as
x ˙ i ( t ) = D ¯ x i ( t ) + A ¯ ϕ ( x i ( t ) ) + B ¯ h ( x i ( t v 1 ( t ) ) ) + c 1 j = 1 N H ˜ i j ( Γ 1 + Δ Γ 1 ( t ) ) ψ ( x j ( t ) ) + c 2 j = 1 N G ˜ i j ( Γ 2 + Δ Γ 2 ( t ) ) ψ ( x j ( t v 2 ( t ) ) ) , t > 0 , x i ( s ) = ε i ( s ) , s ( , 0 ] ,
where x i ( t ) = ( x 1 i ( t ) , x 2 i ( t ) , , x n i ( t ) ) T refers to the node’s state values, i = 1 , 2 , , N. A ¯ , B ¯ , and D ¯ R n × n are known weight matrices, and ψ ( · ) R n is the function that stands for the coupling behavior among nodes. ϕ ( · ) , h ( · ) R n are the functions that describe the nodes’ nonlinear behavior. c 1 and c 2 denote the coupling strengths, in which c 1 > 0 , c 2 > 0 . H ˜ , G ˜ R N × N denote the outer coupling matrices between different coupled nodes. It is mentioned that H ˜ i j > 0 and G ˜ i j > 0 if there is a coupling between nodes i and j; otherwise, H ˜ i j = G ˜ i j = 0 . Γ 1 + Δ Γ 1 ( t ) , Γ 2 + Δ Γ 2 ( t ) R n × n are the matrices reflecting the inner-coupling situations, where Γ 1 and Γ 2 denote certainty coupling matrices, and Δ Γ 1 ( t ) and Δ Γ 2 ( t ) denote the uncertainty parts. v 1 ( t ) and v 2 ( t ) are the unbounded delays with 0 v i ( t ) ( i = 1 , 2 ) , and ε i ( s ) P C B r is the original condition of node i.
We treat the CNs (1) as the drive system, and then take the response system with external disturbances and controllers as the following form:
y ˙ i ( t ) = D ¯ y i ( t ) + A ¯ ϕ ( y i ( t ) ) + B ¯ h ( y i ( t v 1 ( t ) ) ) + c 1 j = 1 N H ˜ i j ( Γ 1 + Δ Γ 1 ( t ) ) ψ ( y j ( t ) ) + c 2 j = 1 N G ˜ i j ( Γ 2 + Δ Γ 2 ( t ) ) ψ ( y j ( t v 2 ( t ) ) ) + η i ( t ) + u i ( t ) , t t k , e i ( t ) = Θ e i ( t ϑ k ) , t = t k , k Z + , y i ( s ) = φ i ( s ) , s ( , 0 ) ,
where y i ( t ) = ( y 1 i ( t ) , y 2 i ( t ) , , y n i ( t ) ) T is the node’s response state values, i = 1 , 2 , , N. φ i ( · ) P C B r is the original condition of node i in response networks. η i ( t ) R n is the bounded external disturbance vector in the response system, which satisfies η i ( t ) w i . Here, η i ( t ) stands for the modulus of vector η i ( t ) .
To accomplish the synchronization task, the controller in this paper contains information feedback techniques and impulse sampling schemes. e i ( t ) = y i ( t ) x i ( t ) denotes the system synchronization error, and the controller employing the feedback information is further designed as below:
u i t = d ˜ 1 sgn ( e i ( t ) ) / e i ( t ) 1 ,
in which s g n ( · ) refers to the sign vector function, and d ˜ 1 = 1 2 N i = 1 N w i 2 is the control gains. The delayed impulsive controller of the response CNs is designed as
e i ( t ) = Θ e i ( t ϑ k ) , t = t k , k Z + ,
in which Θ with size n × n denotes the gain matrix of the controller, and ϑ k denotes the impulsive delay satisfying 0 ϑ k . Let F ( T ) be the set consisting of pulse instants, namely, F ( T ) = { t k | t k t k 1 T , k Z + , T > 0 } , in which t k as k .
Remark 1.
The uncertain time-delayed CNs studied in this article take into account multiple factors, such as the uncertain inner couplings, the nonlinear external couplings, the unbounded internal delays, the unbounded coupling delays, and the unbounded impulsive delays, which are more general in the real world. Moreover, the bounded external disturbance vector and the hybrid controller of the error signal are considered in the response system, further enhancing the practicality and generality of the model.
On the basis of CNs (1) and (2), the error system is derived as
e ˙ i ( t ) = D ¯ e i ( t ) + A ¯ ϕ ( e i ( t ) ) + B ¯ h ( e i ( t v 1 ( t ) ) ) + c 1 j = 1 N H ˜ i j ( Γ 1 + Δ Γ 1 ( t ) ) ψ ( e j ( t ) ) + c 2 j = 1 N G ˜ i j ( Γ 2 + Δ Γ 2 ( t ) ) ψ ( e j ( t v 2 ( t ) ) ) + η i ( t ) d ˜ 1 sgn ( e i ( t ) ) / e i ( t ) 1 , t t k , e i ( t ) = Θ e i ( t ϑ k ) , t = t k , k Z + , e i ( s ) = φ i ( s ) ε i ( s ) , s ( , 0 ] .
Note ϕ ( e i ( t ) ) = ϕ ( y i ( t ) ) ϕ ( x i ( t ) ) , h ( e i ( t v 1 ( t ) ) ) = h ( y i ( t v 1 ( t ) ) ) h ( x i ( t v 1 ( t ) ) ) and ψ ( e j ( t v 2 ( t ) ) ) = ψ ( y j ( t v 2 ( t ) ) ) ψ ( x j ( t v 2 ( t ) ) ) , i = 1 , 2 , , N. Then, the synchronization task of the drive–response CNs can be regarded as the μ -stable objective for the error network.
Assumption 1.
For the functions ϕ ( · ) , h ( · ) , and ψ ( · ) , the three conditions
ϕ ( ϱ ) ϕ ( θ ) l ϕ ϱ θ , h ( ϱ ) h ( θ ) l h ϱ θ , ψ ( ϱ ) ψ ( θ ) l ψ ϱ θ
hold, ∀ϱ, θ R n , l ϕ > 0 , l h > 0 , and l ψ > 0 .
Assumption 2.
For the matrices H ˜ and G ˜ , which describe the network’s topological structure, the two conditions
j = 1 N ( H ˜ i j ) 2 L H ˜ , j = 1 N ( G ˜ i j ) 2 L G ˜
hold, in which L H ˜ > 0 , L G ˜ > 0 .
Assumption 3.
Δ Γ 1 ( t ) and Δ Γ 2 ( t ) denote the uncertainty parts of internal coupling, which are norm-bounded and could be described as
Δ Γ 1 ( t ) = E Γ 1 Ω ( t ) F Γ 1 , Δ Γ 2 ( t ) = E Γ 2 Ω ( t ) F Γ 2 ,
in which E Γ 1 , E Γ 2 , F Γ 1 , a n d   F Γ 2 are constant matrices, and the uncertainty matrix Ω ( t ) is bounded by Ω T ( t ) Ω ( t ) I .
Assumption 4.
The inequality conditions with regard to μ ( t )
μ ( t k ) μ ( t k 1 ) μ p ˜ , μ ( t ) μ ˜ ( t v 1 ( t ) ) μ 1 , μ ( t ) μ ˜ ( t v 2 ( t ) ) μ 2 , , μ ( t ) μ ˜ ( t v n ( t ) ) μ n , μ ( t k ) μ ˜ ( t k ϑ k ) μ q ˜ ,
can be satisfied if μ i 1 ( i = 1 , 2 , , n ) , μ p ˜ 1 , μ q ˜ 1 , and μ ˜ t = 1 , i f t < 0 , μ ( t ) , e l s e .

3. Synchronization Analysis Results

Then, according to the assumptions in Section 2 and the Lemmas in Appendix A, the μ -synchronization for uncertain time-delayed CNs with external disturbances is explored. Sufficient conditions are calculated to reach the μ -synchronization for CNs (1) and (2). By Definition A1 in Appendix A, the error dynamical system (5) reaching μ -stable is equivalent to our ultimate synchronization task.
Theorem 1.
The μ-synchronization of CNs (1) and (2) under Assumptions 1–4 and the hybrid impulsive controller can be reached if
(i)
ln μ p ˜ + [ a + γ ( b 1 μ 1 + b 2 μ 2 ) ] T < ln γ ,
(ii)
R D ¯ D ¯ T R + ξ 1 R A ¯ A ¯ T R + ξ 1 1 l ϕ 2 I + ς 1 R B ¯ B ¯ T R + c 1 σ 1 L H ˜ R Γ 1 Γ 1 T R + c 1 σ 2 L H ˜ R E Γ 1 E Γ 1 T R + c 2 σ 3 L G ˜ R Γ 2 Γ 2 T R + c 2 σ 4 L G ˜ R E Γ 2 E Γ 2 T R + c 1 ( σ 1 1 + σ 2 1 λ max ( F Γ 1 T F Γ 1 ) ) l ψ 2 N I + ν 1 R R a R ,
(iii)
ς 1 1 l h 2 I b 1 R ,
(iv)
c 2 ( σ 3 1 + σ 4 1 λ max ( F Γ 2 T F Γ 2 ) ) l ψ 2 N I b 2 R ,
(v)
ν 1 1 λ min ( R ) ,
(vi)
1 γ μ q ˜ R Q Q T R 0 ,
in which μ ( t ) X , matrix Q is with size n × n , γ > 1 , and ξ 1 , ς 1 , σ 1 , σ 2 , σ 3 , σ 4 , ν 1 , a, b 1 , b 2 > 0 . Moreover, the control gain matrix is set as Θ = R 1 Q T .
Proof. 
We establish a proper form of Lyapunov function as
W ( t ) = i = 1 N e i T ( t ) R e i ( t ) .
When t t k , calculating the derivative of W ( t ) along the solution of error system (5), it can be obtained that
D + W ( t ) = 2 i = 1 N e i T ( t ) R e ˙ i ( t ) = 2 i = 1 N e i T ( t ) R [ D ¯ e i ( t ) + A ¯ ϕ ( e i ( t ) ) + B ¯ h ( e i ( t v 1 ( t ) ) ) + c 1 j = 1 N H ˜ i j ( Γ 1 + Δ Γ 1 ( t ) ) ψ ( e j ( t ) ) + c 2 j = 1 N G ˜ i j ( Γ 2 + Δ Γ 2 ( t ) ) ψ ( e j ( t v 2 ( t ) ) ) + η i ( t ) d ˜ 1 sgn ( e i ( t ) ) / e i ( t ) 1 ] .
According to the operation rule of matrix quadratic form, one has
2 i = 1 N e i T ( t ) R ( D ¯ ) e i ( t ) = i = 1 N e i T ( t ) ( R D ¯ D ¯ T R ) e i ( t ) .
By Lemma A1 and Assumption 1, it can be obtained that
2 i = 1 N e i T ( t ) R A ¯ ϕ ( e i ( t ) ) i = 1 N ξ 1 e i T ( t ) R A ¯ A ¯ T R e i ( t ) + i = 1 N ξ 1 1 ϕ ( e i ( t ) ) 2 i = 1 N ξ 1 e i T ( t ) R A ¯ A ¯ T R e i ( t ) + i = 1 N ξ 1 1 l ϕ 2 e i T ( t ) e i ( t ) .
Similarly, by Lemma A1 and Assumption 1, it is easy to obtain that
2 i = 1 N e i T ( t ) R B ¯ h ( e i ( t v 1 ( t ) ) ) i = 1 N ς 1 e i T ( t ) R B ¯ B ¯ T R e i ( t ) + i = 1 N ς 1 1 h ( e i ( t v 1 ( t ) ) ) 2 i = 1 N ς 1 e i T ( t ) R B ¯ B ¯ T R e i ( t ) + i = 1 N ς 1 1 l h 2 e i T ( t v 1 ( t ) ) e i ( t v 1 ( t ) ) .
By Lemma A1 and Assumptions 1–3, one can obtain that
2 i = 1 N e i T ( t ) R [ c 1 j = 1 N H ˜ i j ( Γ 1 + Δ Γ 1 ( t ) ) ψ ( e j ( t ) ) ] c 1 σ 1 i = 1 N j = 1 N e i T ( t ) R Γ 1 Γ 1 T ( H ˜ i j ) 2 R e i ( t ) + c 1 σ 1 1 i = 1 N j = 1 N ψ ( e j ( t ) ) 2 + c 1 σ 2 i = 1 N j = 1 N e i T ( t ) R E Γ 1 E Γ 1 T ( H ˜ i j ) 2 R e i ( t ) + c 1 σ 2 1 i = 1 N j = 1 N ψ T ( e j ( t ) ) F Γ 1 T F Γ 1 ψ ( e j ( t ) ) c 1 σ 1 L H ˜ i = 1 N e i T ( t ) R Γ 1 Γ 1 T R e i ( t ) + c 1 σ 1 1 l ψ 2 N i = 1 N e i T ( t ) e i ( t ) + c 1 σ 2 L H ˜ i = 1 N e i T ( t ) R E Γ 1 E Γ 1 T R e i ( t ) + c 1 σ 2 1 i = 1 N j = 1 N λ max ( F Γ 1 T F Γ 1 ) ψ T ( e j ( t ) ) ψ ( e j ( t ) ) c 1 σ 1 L H ˜ i = 1 N e i T ( t ) R Γ 1 Γ 1 T R e i ( t ) + c 1 ( σ 1 1 + σ 2 1 λ max ( F Γ 1 T F Γ 1 ) ) l ψ 2 N i = 1 N e i T ( t ) e i ( t ) + c 1 σ 2 L H ˜ i = 1 N e i T ( t ) R E Γ 1 E Γ 1 T R e i ( t ) .
Similarly, by Lemma A1 and Assumptions 1–3, one can obtain
2 i = 1 N e i T ( t ) R [ c 2 j = 1 N G ˜ i j ( Γ 2 + Δ Γ 2 ( t ) ) ψ ( e j ( t v 2 ( t ) ) ) ] c 2 σ 3 i = 1 N j = 1 N e i T ( t ) R Γ 2 Γ 2 T ( G ˜ i j ) 2 R e i ( t ) + c 2 σ 3 1 i = 1 N j = 1 N ψ ( e j ( t v 2 ( t ) ) ) 2 + c 2 σ 4 i = 1 N j = 1 N e i T ( t ) R E Γ 2 E Γ 2 T ( G ˜ i j ) 2 R e i ( t ) + c 2 σ 4 1 i = 1 N j = 1 N ψ T ( e j ( t v 2 ( t ) ) ) F Γ 2 T F Γ 2 ψ ( e j ( t v 2 ( t ) ) ) c 2 σ 3 L G ˜ i = 1 N e i T ( t ) R Γ 2 Γ 2 T R e i ( t ) + c 2 σ 3 1 l ψ 2 N i = 1 N e i T ( t v 2 ( t ) ) e i ( t v 2 ( t ) ) + c 2 σ 4 L G ˜ i = 1 N e i T ( t ) R E Γ 2 E Γ 2 T R e i ( t ) + c 2 σ 4 1 i = 1 N j = 1 N λ max ( F Γ 2 T F Γ 2 ) ψ T ( e j ( t v 2 ( t ) ) ) ψ ( e j ( t v 2 ( t ) ) ) c 2 σ 3 L G ˜ i = 1 N e i T ( t ) R Γ 2 Γ 2 T R e i ( t ) + c 2 σ 4 L G ˜ i = 1 N e i T ( t ) R E Γ 2 E Γ 2 T R e i ( t ) + c 2 ( σ 3 1 + σ 4 1 λ max ( F Γ 2 T F Γ 2 ) ) l ψ 2 N i = 1 N e i T ( t v 2 ( t ) ) e i ( t v 2 ( t ) ) .
By Lemma A1, it is calculated that
2 i = 1 N e i T ( t ) R [ η i ( t ) d ˜ 1 sgn ( e i ( t ) ) / e i ( t ) 1 ] ν 1 i = 1 N e i T ( t ) R R T e i ( t ) + ν 1 1 i = 1 N η i ( t ) 2 2 λ min ( R ) i = 1 N e i T ( t ) d 1 ˜ sgn ( e i ( t ) ) / e i ( t ) 1 ν 1 i = 1 N e i T ( t ) R R T e i ( t ) + ν 1 1 i = 1 N w i 2 2 λ min ( R ) d ˜ 1 · N = ν 1 i = 1 N e i T ( t ) R R T e i ( t ) + ( ν 1 1 λ min ( R ) ) i = 1 N w i 2 ν 1 i = 1 N e i T ( t ) R R e i ( t ) .
Based on conditions (i)–(vi), bringing together (7)–(13), one has
D + W ( t ) i = 1 N e i T ( t ) [ R D ¯ D ¯ T R + ξ 1 R A ¯ A ¯ T R + ξ 1 1 l ϕ 2 I + ς 1 R B ¯ B ¯ T R + c 1 σ 1 L H ˜ R Γ 1 Γ 1 T R + c 1 σ 2 L H ˜ R E Γ 1 E Γ 1 T R + c 1 ( σ 1 1 + σ 2 1 λ max ( F Γ 1 T F Γ 1 ) ) l ψ 2 N I + c 2 σ 3 L G ˜ R Γ 2 Γ 2 T R + c 2 σ 4 L G ˜ R E Γ 2 E Γ 2 T R + ν 1 R R ] e i ( t ) + i = 1 N e i T ( t v 1 ( t ) ) ( ς 1 1 l h 2 I ) e i ( t v 1 ( t ) ) + i = 1 N e i T ( t v 2 ( t ) ) c 2 ( σ 3 1 + σ 4 1 λ max ( F Γ 2 T F Γ 2 ) ) l ψ 2 N I e i ( t v 2 ( t ) ) a W ( t ) + b 1 W ( t v 1 ( t ) ) + b 2 W ( t v 2 ( t ) ) .
Let e ( t ) = [ e 1 T ( t ) , e 2 T ( t ) , , e N T ( t ) ] T ; when t = t k , k Z + , we have
W ( t k ) = i = 1 N e i T ( t k ) R e i ( t k ) = i = 1 N [ Θ e i ( t k ϑ k ) ] T R [ Θ e i ( t k ϑ k ) ] = i = 1 N e i T ( t k ϑ k ) Θ T R Θ e i ( t k ϑ k ) .
In the light of Lemma A2, it can be concluded that
Θ T R Θ 1 γ μ q ˜ R 0 .
Thus, the following inequality holds:
W ( t k ) 1 γ μ q ˜ i = 1 N e i T ( t k ϑ k ) R e i ( t k ϑ k ) = 1 γ μ q ˜ W ( t k ϑ k ) .
By Lemma A3, combining (14)–(16) with (17), we have
W ( t ) γ μ ( 0 ) sup < s 0 W ( s ) μ ( t ) , t 0 ,
and the relationship below can be derived:
e ( t ) γ μ ( 0 ) λ m a x ( R ) | e ( 0 ) | 2 λ m i n ( R ) μ ( t ) .
According to the comparison principle, the objective of the μ -synchronization of CNs (1) and (2) can be obtained. Due to μ ( t ) as t , then e ( t ) 0 as t , the error NNs become μ -stable. The above process completes the proof. □
Remark 2.
The network model in [11] has uncertainty in system dynamics, while the parameter uncertainty of the network model in this paper is reflected in the inner coupling matrix. For these two different types of parameter uncertainty, different inequality analysis methods, assumptions, and lemmas are used in the proof process of the Theorem. Additionally, the controllers used in the two articles are different. In [11], it only adopts a distributed pulse controller, while this paper designs a hybrid controller that includes a feedback controller and a time-delay pulse controller.
Remark 3.
The global μ-synchronization task for nonlinear CNs was studied in [49] by adopting a delayed impulsive control approach. In our article, to achieve the synchronization of the drive–response CNs, a hybrid impulsive controller containing both information feedback of error signals and impulse sampling factors is proposed. In contrast, the control scheme in this paper makes the results more applicable under external disturbances.
Remark 4.
In [50,51], the impulsive interval T was set considering the factor of the bound of time delays. From condition (i) of Theorem 1, it can be seen that the pulse interval T is not affected by the values of time delays in this article. Therefore, the constraint on the impulsive interval T is relaxed in the proposed model. Moreover, in [52], the synchronization for semi-Markov impulsive coupled NNs was reached under the state feedback controller, yet the time-varying delays were bounded parameters. In [53], the synchronization algorithm for nonlinear NNs with variable topology was proposed, yet the change rate of the time delay was within a bounded interval. In this article, CNs (1) and (2) can reach synchronization even if the proposed model has unbounded time delays.
Remark 5.
The synchronization task of CNs with parameter uncertainty was investigated in [31,33,34,54]. The parameter uncertainty involved belonged to the outer coupling matrices [31,54], the connection weight matrices [33], and the nonlinear dynamics state of nodes [34]. In our article, the model considers the uncertainty of inner-coupling matrices, and novel μ-synchronization criteria of complex systems are derived. In addition, in [55], the impulsive synchronization of randomly coupled CNs was explored, in which the outer coupling matrices should satisfy the zero-row-sum condition. However, there is no need for the external coupling matrices in the proposed model to satisfy the dissipative coupling condition.
Based on Theorem 1, three specific cases are shown below, which indicates that the synchronization under the sense of power, log, and exponential can be achieved by our impulsive control scheme.
Corollary 1.
Supposing that Assumptions 1–3 and situations (ii)–(v) hold, let μ ( t ) = ( 1 + κ t ) ρ , v 1 ( t ) = ι 1 t , v 2 ( t ) = ι 2 t , and ϑ k = ι 3 t k , in which κ > 0 , ρ > 0 , and 0 ι 1 , ι 2 , ι 3 < 1 . If γ > 1 , T > 0 , such that the two inequalities
ρ ln ( 1 + κ T ) + a T + γ [ b 1 ( 1 ι 1 ) ρ + b 2 ( 1 ι 2 ) ρ ] T < ln γ ,
and
( 1 ι 3 ) ρ γ R Q Q T R 0 .
hold. Then, it can be well recognized that CNs (1) and (2) further reach synchronization in the power sense using the control matrix Θ = R 1 Q T .
Proof. 
Comparing the conditions of Theorem 1 and Corollary 1, if Assumption 4 holds, the conclusion of Corollary 1 is correct. Clearly, when t 0 , it is calculated that
μ ( t k ) μ ( t k 1 ) = 1 + κ t k 1 + κ t k 1 ρ = 1 + κ t k 1 + κ ( t k t k 1 ) 1 + κ t k 1 ρ ( 1 + κ T ) ρ , μ ( t ) μ ˜ ( t v 1 ( t ) ) = 1 + κ t 1 + κ ( 1 ι 1 ) t ρ = 1 1 + κ ( 1 ι 1 ) t 1 + κ t ρ 1 ( 1 ι 1 ) ρ , μ ( t ) μ ˜ ( t v 2 ( t ) ) = 1 + κ t 1 + κ ( 1 ι 2 ) t ρ = 1 1 + κ ( 1 ι 2 ) t 1 + κ t ρ 1 ( 1 ι 2 ) ρ , μ ( t k ) μ ˜ ( t k ϑ k ) = 1 + κ t k 1 + κ ( 1 ι 3 ) t k ρ = 1 1 + κ ( 1 ι 3 ) t k 1 + κ t k ρ 1 ( 1 ι 3 ) ρ .
Let μ p ˜ = ( 1 + κ T ) ρ , μ 1 = 1 ( 1 ι 1 ) ρ , μ 2 = 1 ( 1 ι 2 ) ρ , and μ q ˜ = 1 ( 1 ι 3 ) ρ ; according to the proof strategy of Theorem 1, it shows that CNs (1) and (2) reach power synchronization. □
Corollary 2.
Provided that Assumptions 1–3 and situations (ii)–(v) hold true, let μ ( t ) = ln ( e + α t ) , v 1 ( t ) = t + [ e ( t + e ) ρ 1 ] / α , v 2 ( t ) = t + [ e ( t + e ) ρ 2 ] / α , and ϑ k = ι t k , in which 0 < α , ρ 1 , ρ 2 < 1 , and 0 ι < 1 . If γ > 1 , T > 0 , such that the two inequalities
ln [ 1 + ln ( 1 + α T e ) ] + [ a + γ ( b 1 ρ 1 + b 2 ρ 2 ) ] T < ln γ ,
and
1 γ [ 1 ln ( 1 ι ) ] R Q Q T R 0 .
hold, then CNs (1) and (2) are log-synchronized under the existence of the control matrix Θ = R 1 Q T .
Proof. 
When t 0 , one can obtain that
μ ( t k ) μ ( t k 1 ) = ln ( e + α t k ) ln ( e + α t k 1 ) = 1 + ln [ 1 + α ( t k t k 1 ) e + α t k 1 ] ln ( e + α t k 1 ) 1 + ln ( 1 + α T / e ) , μ ( t ) μ ˜ ( t v 1 ( t ) ) = ln ( e + α t ) μ ˜ [ ( ( t + e ) ρ 1 e ) / α ] = ln ( e + α t ) ρ 1 ln ( e + t ) 1 ρ 1 , μ ( t ) μ ˜ ( t v 2 ( t ) ) = ln ( e + α t ) μ ˜ [ ( ( t + e ) ρ 2 e ) / α ] = ln ( e + α t ) ρ 2 ln ( e + t ) 1 ρ 2 , μ ( t k ) μ ˜ ( t k ϑ k ) = ln ( e + α t k ) ln ( e + α ( 1 ι ) t k ) = 1 + ln [ e + α t k e + α ( 1 ι ) t k ] ln [ e + α ( 1 ι ) t k ] 1 ln ( 1 ι ) .
Select μ p ˜ = 1 + ln ( 1 + α T / e ) , μ 1 = 1 ρ 1 , μ 2 = 1 ρ 2 , and μ q ˜ = 1 ln ( 1 ι ) ; according to the analysis strategy of Theorem 1, it indicates that CNs (1) and (2) reach log synchronization. □
Corollary 3.
Given that Assumptions 1–3 and situations (ii)–(v) hold, let μ ( t ) = exp ( β t ) , 0 v 1 ( t ) , v 2 ( t ) v , 0 ϑ k η , in which β > 0 , v < , and η < . If γ > 1 , T > 0 , such that the two inequalities
β T + [ a + γ ( b 1 + b 2 ) exp ( β v ) ] T < ln γ ,
and
1 γ exp ( β η ) R Q Q T R 0 .
hold. In this case, CNs (1) and (2) achieve synchronization in the exponential sense by employing the hybrid pulse controller, where the matrix Θ = R 1 Q T .
Proof. 
When t 0 , one has
μ ( t k ) μ ( t k 1 ) = exp ( β t k ) exp ( β t k 1 ) = exp [ β ( t k t k 1 ) ] exp ( β T ) , μ ( t ) μ ˜ ( t v 1 ( t ) ) = exp ( β t ) exp [ β ( t v 1 ( t ) ) ] = exp [ β v 1 ( t ) ] exp ( β v ) , μ ( t ) μ ˜ ( t v 2 ( t ) ) = exp ( β t ) exp [ β ( t v 2 ( t ) ) ] = exp [ β v 2 ( t ) ] exp ( β v ) , μ ( t k ) μ ˜ ( t k ϑ k ) = exp ( β t k ) exp [ β ( t k ϑ k ) ] = exp ( β ϑ k ) exp ( β η ) .
Choosing μ p ˜ = exp ( β T ) , μ 1 = exp ( β v ) , μ 2 = exp ( β v ) , and μ q ˜ = exp ( β η ) , according to the strategy of Theorem 1, it shows that CNs (1) and (2) reach exponential synchronization. □

4. Numerical Simulations

The experiments in this section are conducted to verify the correctness of the theoretical results in Section 3. The correctness of the conditions in Theorem 1 is verified through two numerical experiments.
Example 1.
First, the drive NNs containing 6 nodes with unbounded changeable delays and inner couplings of uncertainty are considered as
x ˙ i ( t ) = D ¯ x i ( t ) + A ¯ ϕ ( x i ( t ) ) + B ¯ h ( x i ( t v 1 ( t ) ) ) + c 1 j = 1 6 H ˜ i j ( Γ 1 + Δ Γ 1 ( t ) ) ψ ( x j ( t ) ) + c 2 j = 1 6 G ˜ i j ( Γ 2 + Δ Γ 2 ( t ) ) ψ ( x j ( t v 2 ( t ) ) )
in which x i ( t ) = ( x i 1 ( t ) , x i 2 ( t ) ) T , c 1 = 0.1 , c 2 = 0.15 , v 1 ( t ) = 0.03 t , v 2 ( t ) = 0.04 t . The nonlinear functions are set as ϕ ( x i ( t ) ) = h ( x i ( t ) ) = ψ ( x i ( t ) ) = 1 / 8 ( tanh ( x i 1 ( t ) ) , tanh ( x i 2 ( t ) ) ) T . It can be obtained that l ϕ = l h = l ψ = 1 / 8 through a simple calculation, such that Assumption 1 holds. The response system is depicted as
y ˙ i ( t ) = D ¯ y i ( t ) + A ¯ ϕ ( y i ( t ) ) + B ¯ h ( y i ( t v 1 ( t ) ) ) + c 1 j = 1 6 H ˜ i j ( Γ 1 + Δ Γ 1 ( t ) ) ψ ( y j ( t ) ) + c 2 j = 1 6 G ˜ i j ( Γ 2 + Δ Γ 2 ( t ) ) ψ ( y j ( t v 2 ( t ) ) ) + η i ( t ) d ˜ 1 sgn ( e i ( t ) ) / e i ( t ) 1 , t t k , e i ( t ) = Θ e i ( t ϑ k ) , t = t k , k Z + ,
The constant matrices D ¯ , A ¯ , B ¯ are set, respectively, as
D ¯ = 1 0 0 1 , A ¯ = 2.2 0.2 3.2 1.6 , B ¯ = 1.0 0.2 0.3 1.5 .
The certainty inner coupling matrices are set, respectively, as
Γ 1 = 0.9 0 0 0.2 , Γ 2 = 0.3 0 0 0.8 .
The parametric uncertainties of internal coupling are selected, respectively, as
Δ Γ 1 ( t ) = E Γ 1 Ω ( t ) F Γ 1 = 0.1 0 0 0.1 sin ( t ) 0 0 cos ( t ) 0.1 0 0 0.1 ,
Δ Γ 2 ( t ) = E Γ 2 Ω ( t ) F Γ 2 = 0.3 0 0 0.3 sin ( t ) 0 0 cos ( t ) 0.3 0 0 0.3 .
The topological matrices H ˜ and G ˜ are selected, respectively, as
H ˜ = 1 0 1 0 1 0 0 1 1 0 0 0 0 0 1 1 0 0 0 0 2 1 0 0 0 0 1 0 1 0 0 0 0 1 0 2 , G ˜ = 1 0 1 0 0 0 0 2 1 0 0 0 0 0 2 0 0 0 0 0 0 1 0 1 0 0 0 1 1 0 0 0 0 1 0 1 .
Assumption 2 is satisfied with L H ˜ = L G ˜ = 5 . Due to Ω T ( t ) Ω ( t ) I , Assumption 3 holds. The function μ ( t ) and the delay parameter ϑ k in Assumption 4 are set, respectively, as μ ( t ) = 1 + 5 t , ϑ k = t k / 50 , k Z + . Let ξ 1 = 2 , ς 1 = 4 , σ 1 = 1 , σ 2 = 0.5 , σ 3 = 5 , σ 4 = 0.1 , ν 1 = 3 , a = 1000 , b 1 = 0.01 , b 2 = 1.005 , γ = 10 , and T = 0.001 . Then, it can be obtained that μ p ˜ = 1.0025 , μ q ˜ = 1.0102 , μ 1 = 1.0153 , μ 2 = 1.0206 by calculation. According to the proof process of Corollary 1, Assumption 4 holds.
To satisfy the remaining conditions in Corollary 1, the following feasible solutions are obtained by using the Matlab LMI toolbox:
R = 8.1506 0 0 12.0142 , Q = 1.28 0 0.24 0.95 .
Hence, the control matrix Θ is set as
Θ = 0.1570 0.0294 0 0.0791 .
We randomly choose the initial values for six nodes from [ 50 , 50 ] . The state trajectories of e i ( t ) converging to 0 with respect to a proper value of Θ are presented in Figure 1a, which implies that CNs (20) and (21) have achieved synchronization. Figure 1b is a description of the non-synchronization result under an improper value of Θ * = Θ + 0.2 I due to the state trajectories of e i ( t ) not converging to 0. That is, CNs (20) and (21) cannot reach synchronization with respect to the changed value of matrix Θ * since the inequality condition in Corollary 1 no longer holds.
Remark 6.
By selecting a series of parameters whose values conform to the conditions in Theorem 1 through calculation, for example, the values of the parameters μ p ˜ , a, γ, b 1 , b 2 , μ 1 , μ 2 , and T in the experiment conform to condition (i); the values of the parameters D ¯ , A ¯ , B ¯ , Γ 1 , Γ 2 , E Γ 1 , F Γ 1 , E Γ 2 , L H ˜ , L G ˜ , R , ξ 1 , ς 1 , c 1 , c 2 , σ 1 , σ 2 , σ 3 , σ 4 , l ϕ , l ψ , ν 1 , a, and N in the experiment conform to condition (ii); the values of the parameters ς 1 , l h , b 1 , and R in the experiment conform to condition (iii); and the values of the parameters γ, μ q ˜ , Q, and R in the experiment conform to condition (vi). Additionally, the correctness of the conditions in Theorem 1 is verified from the experimental results in Figure 1. Theoretical results and numerical experiments jointly demonstrate that uncertain time-delayed CNs can achieve μ-synchronization under the designed hybrid controller.
The changes in system parameters will significantly affect the synchronization stability of CNs. Our focus is on discussing two different types of time delays, namely, internal delays and impulsive delays. The total synchronization error of CNs (20) and (21) is defined as E t = 1 N i = 1 N y i t x i t 2 . First, we study the effect of fine-tuning the internal delay v 1 ( t ) while keeping other network parameters unchanged. The internal delay gradually changes with 0.03 t as the initial value and 0.02 t as the step size, and the variation of the synchronization speeds can be seen in Figure 2a. Second, the impulsive delays ϑ k are set to t k / 52 , t k / 50 , and t k / 48 , while the remaining parameters are kept unchanged. As can be seen in Figure 2b, the black, red, and blue curves denote the time evolution of the total synchronization error under the influence of different impulsive delays. Overall, the total synchronization error curves indicate that the efficiency of network synchronization slows down as the internal or impulsive delay increases.
Example 2.
Consider a complex nonlinear network composed of six neuron nodes, where each decoupled node satisfies the following chaotic system:
x ˙ i ( t ) = D ¯ x i ( t ) + A ¯ ϕ ( x i ( t ) ) + B ¯ h ( x i ( t v 1 ( t ) ) )
where x i t = x i 1 t , x i 2 t is the state vector of the i-th node, and the bounded delay is set as v 1 t = e t / ( 1 + e t ) .
The weight matrices are set as D ¯ = 1 0 0 1 , A ¯ = 1 + π 4 20 0.1 1 + π 4 , B ¯ = 13 2 π 40 0.1 0.1 13 2 π 40 .
The nonlinear activation functions are set as
ϕ ( x i ( t ) ) = h ( x i ( t ) ) = ( 1 2 ( | x i 1 ( t ) + 1 | | x i 1 ( t ) 1 | ) , 1 2 ( | x i 2 ( t ) + 1 | | x i 2 ( t ) 1 | ) ) .
When the initial value of each node in this system is 0 , 0.5 , the behavior of the system exhibits chaos [13]. For neural networks (22) that include both external and internal couplings, the external coupling function is set as
ψ ( x i ( t ) ) = ( 1 8 ( | x i 1 ( t ) + 1 | | x i 1 ( t ) 1 | ) , 1 8 ( | x i 2 ( t ) + 1 | | x i 2 ( t ) 1 | ) ) .
It can be obtained that l ϕ = l h = 1 , l ψ = 1 / 4 using the inequality scaling principle, such that Assumption 1 holds.
Let the certainty inner coupling matrices be
Γ 1 = 0.3 0 0 0.4 , Γ 2 = 0.3 0 0 0.5 .
The uncertainties of internal coupling are set, respectively, as
Δ Γ 1 ( t ) = E Γ 1 Ω ( t ) F Γ 1 = 0.2 0 0 0.3 sin ( t ) 0 0 cos ( t ) 0.2 0 0 0.3 ,
Δ Γ 2 ( t ) = E Γ 2 Ω ( t ) F Γ 2 = 0.1 0 0 0.1 sin ( t ) 0 0 cos ( t ) 0.4 0 0 0.2 .
The values for the outer topological matrices H ˜ and G ˜ are set, respectively, as
H ˜ = 1 0 1 0 1 0 0 1 1 0 0 0 0 0 1 1 0 0 0 1 2 1 0 0 1 1 1 0 1 0 0 0 0 1 0 2 , G ˜ = 1 0 1 0 0 0 0 2 1 0 1 0 0 0 2 0 0 0 0 1 0 1 0 1 1 0 0 1 1 0 0 2 0 1 0 1 .
Let L H ˜ = L G ˜ = 6 ; then Assumption 2 is satisfied. Similarly as before, Ω T ( t ) Ω ( t ) I ; then Assumption 3 is satisfied. The function μ ( t ) and the delay parameter ϑ k in Assumption 4 are set, respectively, as μ ( t ) = exp 0.2 t , ϑ k = t k / 40 , k Z + . Let ξ 1 = 0.2 , ς 1 = 12 , σ 1 = 1 , σ 2 = 0.5 , σ 3 = 5 , σ 4 = 0.1 , ν 1 = 3 , a = 1200 , b 1 = 0.02 , b 2 = 1.015 , γ = 10 , η = 3 , T = 0.001 , and v = 1 . Then, we can obtain μ p ˜ = 1.0002 , μ q ˜ = 1.8221 , μ 1 = 1.2214 , and μ 2 = 1.2214 . Through the proof process of Corollary 3, Assumption 4 is satisfied.
To make the remaining conditions in Corollary 3 hold true, the following feasible solutions are obtained by using the Matlab LMI toolbox:
R = 4.8563 0 0 8.2438 , Q = 0.72 0 0.81 0.68 .
Then, the control gain matrix Θ is set as
Θ = 0.1483 0.1668 0 0.0825 .
First, the conditions of Corollary 3 are satisfied by validation. Then, in Figure 3a, it can be observed that the state trajectories of e i ( t ) under the useful matrix Θ converge to 0, which means that CNs (20) and (21) have achieved synchronization. On the other hand, Figure 3b is a display of the non-synchronization situation between CNs (20) and (21) through plotting the state trajectories of e i ( t ) . The reason is that the value of the control matrix is changed to Θ * = Θ 0.2 I so that the conditions of Corollary 3 are no longer met. Furthermore, synchronization is not achieved with the time evolution of e i ( t ) not converged to 0.
Next, network synchronization will be used for image encryption and decryption. A flowchart of the image encryption and decryption algorithm is shown in Figure 4. This scheme divides digital color images into three two-dimensional matrices by image channel. Divide each two-dimensional matrix into several sub-blocks and perform the Arnold transformation on pixel positions within each sub-block. Then, create a key using the sequence generated by the chaotic system, and encrypt each sub-block by the key. Finally, merge each of the three channels to obtain a color encrypted image.
Let the colored digital image I with size M × N be the image to be encrypted. The encryption steps are as follows:
Step 1: Divide I into three two-dimensional matrices, I 1 , I 2 , and I 3 , corresponding to channels R, G, and B, respectively.
Step 2: To enhance the universality of the algorithm, pad the three matrices I 1 , I 2 , and I 3 with values 0 so that their dimensions meet Equation (23).
mod M , = 0 ; mod ( N , ) = 0 .
Here, is the block size. The dimensions of the zero-padded image are M and N . According to Equation (23), the matrices I 1 , I 2 , and I 3 can be evenly divided into blocks of size × . Therefore, each two-dimensional matrix can be divided into n ¯ = M × N / 2 blocks after padding.
Step 3: The spatial position of image pixels can be changed by the discrete Arnold transformation, which is a two-dimensional reversible mapping and is often used as a permutation method in the image encryption field. Taking I 1 as an example, perform the discrete Arnold transformation on the position coordinates of the pixels in the image, that is,
i x i y = A n i x i y ( mod ) , A = 1 a ˜ b ˜ a ˜ b ˜ + 1
where A is the transformation matrix, and a ˜ , b ˜ R , n represents the number of iterations. i x , i y T is the pixel coordinate in the i-th block of I 1 . Let I R be the image after the Arnold transformation, and i x , i y T is the coordinate of the corresponding pixel in the i-th block of I R . Similarly, by performing the Arnold transformation on the pixel coordinates in I 2 and I 3 , the images I G and I B can be obtained with changed pixel coordinates, respectively.
Step 4: Assume that two chaotic sequences generated by the chaotic system in the encryptor are as follows:
X 1 = ( x ˜ 1 ( 1 ) , x ˜ 1 ( 2 ) , , x ˜ 1 ( n ^ ) )
where n ^ = 2 , and the encrypted key sequence is calculated as
K e y ( n ˜ ) = mod ( f l o o r ( X 1 ( n ˜ ) × 10 r ¯ ) , 256 )
where r ¯ is an adjustable integer, and n ˜ = 1 , 2 , , n ^ .
Step 5: After Arnold transformation, each of the pixel values in I R , I G , and I B ranges from 0 to 255, which can be represented by an 8-bit binary number. By performing a bitwise XOR operation between the pixel values of each sub-block of I R , I G and I B with K e y ( n ˜ ) , we can obtain the encrypted image in channels R, G, and B, respectively, as follows:
I R 1 i ( i x , i y ) = I R i ( i x , i y ) K e y ( n ˜ ) I G 1 i ( i x , i y ) = I G i ( i x , i y ) K e y ( n ˜ ) I B 1 i ( i x , i y ) = I B i ( i x , i y ) K e y ( n ˜ )
where denotes the XOR operation, and I R 1 i , I G 1 i , and I B 1 i denote the i-th block of images I R 1 , I G 1 , and I B 1 , respectively.
Step 6: The encrypted images from the three channels are merged to obtain the final encrypted image called I E .
The decryption process involves performing the reverse operation on the encrypted image, which is completely opposite to the encryption process. The image decryption process is as follows:
Step 1: Divide I E into three two-dimensional matrices, referred to as I ˜ 1 , I ˜ 2 , and I ˜ 3 , which correspond to channels R, G, and B, respectively.
Step 2: The decrypted chaotic sequence generated by the chaotic system in the decryptor is as follows:
Y 1 = ( y ˜ 1 ( 1 ) , y ˜ 1 ( 2 ) , , y ˜ 1 ( n ^ ) ) .
Additionally, the decrypted key sequence is calculated as
K e y 1 ( n ˜ ) = mod ( f l o o r ( Y 1 ( n ˜ ) × 10 r ¯ ) , 256 )
where r ¯ is an adjustable integer, and n ˜ = 1 , 2 , , n ^ .
Step 3: Decrypt the encrypted images of three channels using the key sequence K e y 1 ( n ˜ ) as follows:
I R 2 i ( i x , i y ) = I ˜ 1 i ( i x , i y ) K e y 1 ( n ˜ ) I G 2 i ( i x , i y ) = I ˜ 2 i ( i x , i y ) K e y 1 ( n ˜ ) I B 2 i ( i x , i y ) = I ˜ 3 i ( i x , i y ) K e y 1 ( n ˜ )
where I ˜ 1 i , I ˜ 2 i , and I ˜ 3 i are the i-th block of images I ˜ 1 , I ˜ 2 , and I ˜ 3 , respectively. I R 2 , I G 2 , and I B 2 denote the decrypted images of the channels R, G, and B in the first stage, respectively. I R 2 i , I G 2 i , and I B 2 i are the i-th block of images I R 2 , I G 2 , and I B 2 , respectively.
Step 4: The position coordinates of the pixels in the images I R 2 , I G 2 , and I B 2 are carried out by the inverse Arnold transformation as follows:
i x i y = A n i x i y mod , A 1 = a ˜ b ˜ + 1 a ˜ b ˜ 1
where A 1 denotes the inverse transformation matrix, a ˜ , b ˜ R , n represents the number of iterations, and i x , i y T denotes the pixel’s position coordinate of the i-th block in the images I R 2 , I G 2 , and I B 2 . Let I ˜ R , I ˜ G , and I ˜ B be the decrypted images after the inverse Arnold transformation in channels R, G, and B, respectively. i x , i y T denotes the position coordinate of the pixel in the i-th block of the images I ˜ R , I ˜ G , and I ˜ B .
Step 5: Remove the zero pixels of the images I ˜ R , I ˜ G , and I ˜ B padded during the encryption process; then the results are referred to as I ˜ R 1 , I ˜ G 1 , and I ˜ B 1 , respectively.
Step 6: By merging three channels of the decrypted images I ˜ R 1 , I ˜ G 1 , and I ˜ B 1 , we obtain the final decrypted image called I D .
Remark 7.
The decryption process must use exactly the same key as the encryption process to obtain the correct decrypted image. In other words, the response system and the driving system must be synchronized so that the chaotic sequences generated by the encryption and decryption ends are the same. Since the encryption key and the decryption key are identical, the decrypted image is indistinguishable from the original image.
Use a 512 × 512 × 3 color digital image “Parrot” as the image to be encrypted, as shown in Figure 5a. The encryption and decryption algorithm is simulated and verified on the Matlab R2024a platform in the Windows 10 operating system environment. Figure 5a–c show the original image, ciphertext image, and correctly decrypted image, respectively. From a visual perspective, the ciphertext image does not have a correlation with the original image.
(1)
Histogram analysis.
In the image histogram, the horizontal axis ranges from 0 to 255, and the vertical axis represents the frequency of the value of each pixel appearing in the entire image. Therefore, the distribution of pixel values in the image can be reflected through the histogram. Figure 6a–f show the histograms of the R, G, and B channels of the image before and after encryption, respectively. From Figure 6, it can be seen that the histograms of channels R, G, and B in the original image fluctuate, while the histograms of the three channels in the ciphertext image are evenly distributed and have pseudo-random properties, which can hide the statistical characteristics of the original image and effectively resist histogram-based statistical attacks on images.
(2)
Correlation of pixel values between adjacent positions.
The ability of an image to resist attacks is inversely proportional to the correlation between its adjacent pixel values. To test the resistance of the image to attacks, 5000 pairs of adjacent pixels are randomly selected in the horizontal, vertical, and diagonal directions for correlation analysis. To compare the correlation of pixel values between adjacent positions of images before and after encryption more intuitively, a point graph is drawn in Figure 7, with the horizontal axis representing the pixel values of random point positions and the vertical axis representing the pixel values of adjacent positions.
Figure 7a–b show the correlation coefficient plots of pixel values between adjacent positions of images before and after encryption in the horizontal direction, respectively. Figure 7c–d show the correlation coefficient plots of pixel values between adjacent positions of images before and after encryption in the vertical direction, respectively. Figure 7e–f show the correlation coefficient plots of pixel values between adjacent positions of images before and after encryption in the diagonal direction, respectively. It can be seen that the pixel values of adjacent positions in all three directions of the original image have strong correlation, and the distribution of pixel points shows a linear relationship. The correlation between adjacent pixel values in all three directions in the ciphertext image is almost zero, and the distribution of pixel points is completely random. Therefore, there is no correlation between the distribution of adjacent pixel values in the ciphertext image, whether in horizontal, vertical, or diagonal directions. This encryption algorithm completely changes the pixel values and shuffles pixel positions of the original image, and thus has strong resistance to attacks.
(3)
Information entropy analysis.
Information entropy represents the degree of confusion of information in a system; therefore, in an image, information entropy represents the confusion degree of the pixel values in the image. It is defined as follows:
H ( x ) = i = 0 255 p ˜ ( x i ) log 2 p ˜ ( x i )
where p ˜ ( x i ) represents the proportion of pixel value x i in the image. According to Equation (32), the maximum theoretical information entropy of an image is 8. After calculation, the information entropy of the original image is 6.3918 , and the information entropy of the ciphertext image is 7.9998 . It can be seen that the information entropy of the ciphertext image is very close to the maximum theoretical information entropy value, indicating that the degree of chaos in the ciphertext image is approaching the theoretical limit. Therefore, this encryption algorithm can effectively resist attacks based on image information entropy.
(4)
Analysis of key capacity.
A good encryption algorithm requires a sufficiently large key space, generally not less than 2 128 . In this scheme, the size of the key space is simply estimated as
Ω ˜ = 100 × 10 x ˜ 3 N ˜
where N ˜ denotes the number of nodes in the network and N ˜ = 6 in the experiment. x ˜ is a positive integer related to the precision of computer floating-point numbers, with a value of 14. It can be obtained that the key space of the proposed scheme is much larger than 2 128 , which can effectively resist brute-force attacks.

5. Conclusions

With the purpose of achieving μ -synchronization for the proposed CNs, our work studies the μ -synchronization task for CNs subjected to uncertain inner couplings, unbounded time delays, and external disturbances. For the CNs studied, there is no need for the coupling topology to satisfy the zero-row-sum condition, allowing for the application of the network more widespread. The three types of time delays are unbounded, which makes the model and results better applied to real engineering scenarios, such as image encryption. Several milder sufficient conditions are gained utilizing the new hybrid pulse control technique, under which the considered CNs can reach μ -synchronization. To sum up, we adopt the hybrid pulse controller containing both the error feedback information and the pulse control factor to make the proposed CNs achieve μ -synchronization by the Lyapunov method. In the future, one field of focus will be the finite-time synchronization of fuzzy CNs with high-order topologies via adaptive event-triggering impulsive control.

Author Contributions

Conceptualization, A.Z., C.Y. (Chengbo Yi) and H.F.; methodology, A.Z., C.Y. (Chongming Yang) and C.Y. (Chengbo Yi); software, A.Z. and H.F.; writing—original draft, A.Z. and H.F.; writing—review and editing, A.Z., C.Y. (Chongming Yang), C.Y. (Chengbo Yi) and H.F.; Funding acquisition, C.Y. (Chongming Yang). All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Guangdong Provincial Key Laboratory (Grant 2023B1212060076), the High-Level Talent Initiation Project of Shenzhen Polytechnic University (Grant 6024330003K), the R&D Center for CNOOC Equipment (Shenzhen) Offshore Engineering Technology, Shenzhen Polytechnic University (Grant 602331006PQ), and the Research Projects of Department of Education of Guangdong Province (Grant 2024KQNC034).

Data Availability Statement

The data that support the findings of this study are available within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Appendix A

Definition A1
([49]). If the inequality
e i ( t ) J μ ( t ) , J > 0 , μ ( t ) X
holds, then CNs (1) and (2) are said to achieve μ-synchronization, which is equivalently converted to the μ stability of the error network (5).
Remark A1.
μ ( t ) acts as a bridge to obtain different types of synchronization. By selecting different μ ( t ) , the μ synchronization can be converted to other synchronizations. Considering setting different μ functions, for example, if μ ( t ) is set to ( 1 + κ t ) ρ , exp ( β t ) and ln ( e + α t ) , respectively, then the μ-synchronizations are correspondingly turned into power synchronization, exponential synchronization, and logarithmic synchronization, in which κ > 0 , ρ > 0 , β > 0 , 0 < α < 1 .
Lemma A1
([11]). There exist real matrix M R n × n > 0 and ϱ , θ R n such that
2 ϱ T θ ϱ T M ϱ + θ T M 1 θ .
Lemma A2
([13]). The matrix inequality below
B 11 B 12 B 12 T B 22 < 0
holds, if the matrices B 11 , B 12 , and B 22 satisfy one of the following conditions,
( a ) B 11 < 0 , B 22 B 12 T B 11 1 B 12 < 0 ;
( b ) B 22 < 0 , B 11 B 12 B 22 1 B 12 T < 0 ,
where B 11 T = B 11 and B 22 T = B 22 .
Lemma A3
([49]). The two inequality conditions with regard to p ( t )
D + p ( t ) a p ( t ) + b 1 p ( t v 1 ( t ) ) + b 2 p ( t v 2 ( t ) ) + . . . + b n p ( t v n ( t ) ) , t t k , p ( t ) d k p ( t ϑ k ) , t = t k , k Z + ,
are assumed to be satisfied under Assumption 4, in which p ( t ) P C ( R , R + ) , d k R + , a R , b i R + , 0 v i ( t ) , i = 1 , 2 , , n, 0 ϑ k . If there are constants γ > 1 , T > 0 satisfying
ln μ p ˜ + [ | a | + γ ( b 1 μ 1 + b 2 μ 2 + . . . + b n μ n ) ] T < ln γ ,
and
γ μ q ˜ d k 1 , k Z + ,
then the following relationship with respect to p ( t ) can be gained
p ( t ) γ μ ( 0 ) p ¯ ( 0 ) μ ( t ) , t 0 ,
in which p ¯ ( 0 ) is the supremum of p ( s ) in the interval , 0 .

References

  1. Zhu, S.; Zhou, J.; Chen, G.; Lu, J.A. A new method for topology identification of complex dynamical networks. IEEE Trans. Cybern. 2021, 51, 2224–2231. [Google Scholar] [CrossRef] [PubMed]
  2. Wang, S.; Shi, K.; Wang, J.; Yu, Y.; Wen, S.; Yang, J.; Han, S. Synchronization sampled-data control of uncertain neural networks under an asymmetric Lyapunov-Krasovskii functional method. Expert Syst. Appl. 2024, 239, 122475. [Google Scholar] [CrossRef]
  3. Dorfler, F.; Bullo, F. Synchronization in complex networks of phase oscillators: A survey. Automatica 2014, 50, 1539–1564. [Google Scholar] [CrossRef]
  4. Sultornsanee, S.; Radhakrishnan, S.; Falco, D.; Zeid, A.; Kamarthi, S. Phase synchronization approach to construction and analysis of stock correlation network. Procedia Comput. Sci. 2011, 6, 52–56. [Google Scholar] [CrossRef]
  5. Chen, W.W.; Li, H.L. Complete synchronization of delayed discrete-time fractional-order competitive neural networks. Appl. Math. Comput. 2024, 479, 128872. [Google Scholar] [CrossRef]
  6. Shen, Y.; Liu, X.Z. Generalized synchronization of delayed complex-valued dynamical networks via hybrid control. Commun. Nonlinear Sci. Numer. Simul. 2023, 118, 107057. [Google Scholar] [CrossRef]
  7. Gao, L.; Cai, Y. Finite-time stability of time-delay switched systems with delayed impulse effects. Circuits Syst. Signal Process. 2016, 35, 3135–3151. [Google Scholar] [CrossRef]
  8. Liu, X.; Chen, T. Finite-time and fixed-time cluster synchronization with or without pinning control. IEEE Trans. Cybern. 2018, 48, 240–252. [Google Scholar] [CrossRef] [PubMed]
  9. Fan, H.G.; Chen, X.J.; Shi, K.B.; Liang, Y.H.; Wang, Y.; Wen, H. Mittag-Leffler synchronization in finite time for uncertain fractional-order multi-delayed memristive neural networks with time-varying perturbations via information feedback. Fractal Fract. 2024, 8, 422. [Google Scholar] [CrossRef]
  10. Fan, H.G.; Rao, Y.; Shi, K.B.; Wen, H. Time-varying function matrix projection synchronization of Caputo fractional-order uncertain memristive neural networks with multiple delays via mixed open loop feedback control and impulsive control. Fractal Fract. 2024, 8, 301. [Google Scholar] [CrossRef]
  11. Fan, H.G.; Chen, X.J.; Shi, K.B.; Wen, H. Distributed delayed impulsive control for μ-synchronization of multi-link structure networks with bounded uncertainties and time-varying delays of unmeasured bounds: A novel Halanay impulsive inequality approach. Chaos Solitons Fractals 2024, 186, 115226. [Google Scholar] [CrossRef]
  12. Zhang, W.; Xiao, J.; Gong, B.Y. Global μ-synchronization for coupling delayed complex dynamical networks via event-triggered delayed impulsive control. ISA Trans. 2024, 145, 124–131. [Google Scholar] [CrossRef] [PubMed]
  13. Fan, H.G.; Xiao, Y.; Shi, K.B.; Wen, H.; Zhao, Y. μ-synchronization of coupled neural networks with hybrid delayed and non-delayed impulsive effects. Chaos Solitons Fractals 2023, 173, 113620. [Google Scholar] [CrossRef]
  14. Guan, K.Z.; Cai, Z.W. Impulsive μ-stabilization and μ-synchronization for delayed network systems with any time-varying delays. Neurocomputing 2020, 411, 498–509. [Google Scholar] [CrossRef]
  15. Chen, H.B.; Shi, P.; Lim, C.C. Pinning impulsive synchronization for stochastic reaction-diffusion dynamical networks with delay. Neural Netw. 2018, 106, 281–293. [Google Scholar] [CrossRef]
  16. Liang, J.C.; Liu, J.; Tse, C.K.; Liu, M.X. Observer-based aperiodically intermittent pinning synchronization of complex-valued dynamical networks with time-varying delay. Phys. A 2024, 635, 129516. [Google Scholar] [CrossRef]
  17. Fan, H.G.; Shi, K.B.; Guo, Z.Z.; Zhou, A.R. Finite-time synchronization criteria for Caputo fractional-order uncertain memristive neural networks with fuzzy operators and transmission delay under communication feedback. Fractal Fract. 2024, 8, 619. [Google Scholar] [CrossRef]
  18. Jiang, G.H.; Wang, L.M.; Hu, X.F.; Li, H.Y.; Zong, X.F. Semiglobal fixed/preassigned-time synchronization of stochastic neural networks with random delay via adaptive control. Neurocomputing 2024, 593, 127832. [Google Scholar] [CrossRef]
  19. Zhang, S.; Xu, J.J.; Zhang, H.S. Decentralized control of forward and backward stochastic difference system with nested asymmetric information. Appl. Math. Comput. 2024, 478, 128834. [Google Scholar] [CrossRef]
  20. Wang, S.; Shi, K.; Cao, J.; Wen, S. Fuzzy adaptive event-triggered synchronization control mechanism for T-S fuzzy RDNNs under deception attacks. Commun. Nonlinear Sci. Numer. Simul. 2024, 134, 107985. [Google Scholar] [CrossRef]
  21. Ruan, Z.Y.; Li, Y.Y.; Hu, J.H.; Mei, J.; Xia, D. Finite-time synchronization of the drive-response networks by event-triggered aperiodic intermittent control. Neurocomputing 2022, 485, 89–102. [Google Scholar] [CrossRef]
  22. Zhang, L.Z.; Lu, J.Q.; Jiang, B.X.; Zhong, J. Impulsive synchronization control for dynamic networks subject to double deception attacks. Expert Syst. Appl. 2024, 251, 124000. [Google Scholar] [CrossRef]
  23. Liu, X.W.; Li, Z.H. Finite time anti-synchronization of complex-valued neural networks with bounded asynchronous time-varying delays. Neurocomputing 2020, 387, 129–138. [Google Scholar] [CrossRef]
  24. Luo, Y.P.; Yao, Y.J. Finite-time synchronization of uncertain complex dynamic networks with time-varying delays. Adv. Differ. Equ. 2020, 32, 32. [Google Scholar] [CrossRef]
  25. Tan, Y.X.; Huang, Z.K. Synchronization of drive-response networks with delays on time scales. IEEE/CAA J. Autom. Sin. 2024, 11, 1063–1065. [Google Scholar] [CrossRef]
  26. Han, M.; Zhang, Y.M. Complex function projective synchronization in drive-response complex-variable dynamical networks with coupling time delays. J. Frankl. Inst. 2016, 353, 1742–1758. [Google Scholar] [CrossRef]
  27. Wang, L.M.; Hu, Y.Q.; Hu, C.; Zhou, Y.J.; Wen, S.P. Finite-time synchronization of delayed fuzzy inertial neural networks via intermittent control. Neurocomputing 2024, 574, 127288. [Google Scholar] [CrossRef]
  28. Wang, L.M.; Li, H.Y.; Hu, C.; Hu, J.H.; Wang, Q.Y. Synchronization and settling-time estimation of fuzzy memristive neural networks with time-varying delays: Fixed-time and preassigned-time control. Fuzzy Sets Syst. 2023, 470, 108654. [Google Scholar] [CrossRef]
  29. Rakkiyappan, R.; Chandrasekar, A.; Petchiammal, G. Non-fragile robust synchronization for Markovian jumping chaotic neural networks of neutral-type with randomly occurring uncertainties and mode-dependent time-varying delays. ISA Trans. 2014, 53, 1760–1770. [Google Scholar] [CrossRef] [PubMed]
  30. Xing, R.T.; Xiao, M.; Zhang, Y.Z.; Qiu, J.L. Stability and Hopf bifurcation analysis of an (n plus m)-neuron double-ring neural network model with multiple time delays. J. Syst. Sci. Complex. 2022, 35, 159–178. [Google Scholar] [CrossRef]
  31. He, J.M.; Pei, L.J. Function matrix projection synchronization for the multi-time delayed fractional order memristor-based neural networks with parameter uncertainty. Appl. Math. Comput. 2023, 454, 128110. [Google Scholar] [CrossRef]
  32. Gu, Y.J.; Yu, Y.G.; Wang, H. Synchronization for fractional-order time-delayed memristor-based neural networks with parameter uncertainty. J. Frankl. Inst. 2016, 353, 3657–3684. [Google Scholar] [CrossRef]
  33. Fan, H.G.; Shi, K.B.; Wen, H.; Zhao, Y. Synchronization of multi-weighted complex networks with mixed variable delays and uncertainties via impulsive pinning control. Phys. D 2023, 456, 133935. [Google Scholar] [CrossRef]
  34. Selvaraj, P.; Kwon, O.M.; Sakthivel, R. Disturbance and uncertainty rejection performance for fractional-order complex dynamical networks. Neural Netw. 2019, 112, 73–84. [Google Scholar] [CrossRef] [PubMed]
  35. Mirshamsi, A.; Nobakhti, A. Uncertainty disturbance estimator control for delayed linear systems with input constraint. Automatica 2024, 167, 111763. [Google Scholar] [CrossRef]
  36. Wen, G.; Yu, X.; Yu, W.; Lu, J. Coordination and control of complex network systems with switching topologies: A survey. IEEE Trans. Syst. Man Cybern. Syst. 2020, 51, 6342–6357. [Google Scholar] [CrossRef]
  37. Wu, Y.; Wang, Y.; Gunasekaran, N.; Vadivel, R. Almost sure consensus of multi-agent systems: An intermittent noise. IEEE Trans. Circuits Syst. II 2022, 69, 2897–2901. [Google Scholar] [CrossRef]
  38. Tirandaz, H. Adaptive modified projective synchronization of gyroscopes with unknown parameters and external disturbances. ICIC Express Lett. 2018, 12, 287–294. [Google Scholar]
  39. Du, H.Y. Function projective synchronization in complex dynamical networks with or without external disturbances via error feedback control. Neurocomputing 2016, 173, 1443–1449. [Google Scholar] [CrossRef]
  40. Du, H.Y. Modified function projective synchronization between two fractional-order complex dynamical networks with unknown parameters and unknown bounded external disturbances. Phys. A 2019, 526, 120997. [Google Scholar] [CrossRef]
  41. Ze, T.; Park, J.H.; Lee, T.H.; Feng, J.W. Mean square exponential synchronization for impulsive coupled neural networks with time-varying delays and stochastic disturbances. Complexity 2016, 21, 190–202. [Google Scholar]
  42. Zhao, Y.S.; Li, X.D.; Rao, R.F. Synchronization of nonidentical complex dynamical networks with unknown disturbances via observer-based sliding mode control. Neurocomputing 2021, 454, 441–447. [Google Scholar] [CrossRef]
  43. Liang, T.; Zhang, W.L.; Yang, D.G. Fixed-time synchronization of switched duplex networks with stochastic disturbances and limited communication. Commun. Nonlinear Sci. Numer. Simul. 2023, 121, 107227. [Google Scholar] [CrossRef]
  44. Ren, H.W.; Shi, P.; Deng, F.Q.; Peng, Y.J. Fixed-time synchronization of delayed complex dynamical systems with stochastic perturbation via impulsive pinning control. J. Frankl. Inst. 2020, 357, 12308–12325. [Google Scholar] [CrossRef]
  45. Shukla, V.K.; Joshi, M.C.; Mishra, P.K.; Xu, C.J. Mechanical analysis and function matrix projective synchronization of El-Nino chaotic system. Phys. Scr. 2025, 100, 015255. [Google Scholar] [CrossRef]
  46. Liu, X.Z.; Zhang, K.X. Synchronization of linear dynamical networks on time scales: Pinning control via delayed impulses. Automatica 2016, 72, 147–152. [Google Scholar] [CrossRef]
  47. Li, X.D.; Song, S.J.; Wu, J.H. Exponential stability of nonlinear systems with delayed impulses and applications. IEEE Trans. Autom. Control 2019, 64, 4024–4034. [Google Scholar] [CrossRef]
  48. Zhang, L.; Yang, X.S.; Xu, C.; Feng, J.W. Exponential synchronization of complex-valued complex networks with time-varying delays and stochastic perturbations via time-delayed impulsive control. Appl. Math. Comput. 2017, 306, 22–30. [Google Scholar] [CrossRef]
  49. Fan, H.G.; Shi, K.B.; Zhao, Y. Global μ-synchronization for nonlinear complex networks with unbounded multiple time delays and uncertainties via impulsive control. Phys. A 2022, 599, 127484. [Google Scholar] [CrossRef]
  50. Liu, L.F.; Liu, K.; Xiang, H.Y.; Liu, Q. Pinning impulsive cluster synchronization of complex dynamical networks. Phys. A 2020, 545, 123580. [Google Scholar] [CrossRef]
  51. Peng, D.X.; Li, X.D. Leader-following synchronization of complex dynamic networks via event-triggered impulsive control. Neurocomputing 2020, 412, 1–10. [Google Scholar] [CrossRef]
  52. Karthick, S.A.; Sakthivel, R.; Alzahrani, F.; Leelamani, A. Synchronization of semi-Markov coupled neural networks with impulse effects and leakage delay. Neurocomputing 2020, 386, 221–231. [Google Scholar] [CrossRef]
  53. Furtat, I.B. Robust synchronization of the structural uncertainty nonlinear network with delay and disturbances. IFAC Proc. Vol. 2013, 46, 227–232. [Google Scholar] [CrossRef]
  54. Jia, T.Y.; Chen, X.Y.; He, L.P.; Zhao, F.; Qiu, J.L. Finite-time synchronization of uncertain fractional-order delayed memristive neural networks via adaptive sliding mode control and its application. Fractal Fract. 2022, 6, 502. [Google Scholar] [CrossRef]
  55. Chandrasekar, A.; Rakkiyappan, R.; Cao, J.D. Impulsive synchronization of Markovian jumping randomly coupled neural networks with partly unknown transition probabilities via multiple integral approach. Neural Netw. 2015, 70, 27–38. [Google Scholar] [CrossRef] [PubMed]
Figure 1. (a) State trajectories of e i ( t ) , ( i = 1 , 2 , 3 , 4 , 5 , 6 ) under a proper value of Θ = [ 0.1570 , 0.0294 , 0 , 0.0791 ] , which means that CNs (20) and (21) reach synchronization. (b) State trajectories of e i ( t ) , ( i = 1 , 2 , 3 , 4 , 5 , 6 ) under the changed value of Θ * = Θ + 0.2 I , which shows that CNs (20) and (21) are not synchronized.
Figure 1. (a) State trajectories of e i ( t ) , ( i = 1 , 2 , 3 , 4 , 5 , 6 ) under a proper value of Θ = [ 0.1570 , 0.0294 , 0 , 0.0791 ] , which means that CNs (20) and (21) reach synchronization. (b) State trajectories of e i ( t ) , ( i = 1 , 2 , 3 , 4 , 5 , 6 ) under the changed value of Θ * = Θ + 0.2 I , which shows that CNs (20) and (21) are not synchronized.
Axioms 14 00161 g001
Figure 2. (a) Time evolution of E ( t ) under different internal delays v 1 ( t ) . (b) Time evolution of E ( t ) under different impulsive delays ϑ k .
Figure 2. (a) Time evolution of E ( t ) under different internal delays v 1 ( t ) . (b) Time evolution of E ( t ) under different impulsive delays ϑ k .
Axioms 14 00161 g002
Figure 3. (a) State trajectories of e i ( t ) , ( i = 1 , 2 , 3 , 4 , 5 , 6 ) under a proper value of Θ = [ 0.1483 , 0.1668 , 0 , 0.0825 ] , which means that CNs (20) and (21) reach synchronization. (b) State trajectories of e i ( t ) , ( i = 1 , 2 , 3 , 4 , 5 , 6 ) under the changed value of Θ * = Θ 0.2 I , which shows that CNs (20) and (21) are not synchronized.
Figure 3. (a) State trajectories of e i ( t ) , ( i = 1 , 2 , 3 , 4 , 5 , 6 ) under a proper value of Θ = [ 0.1483 , 0.1668 , 0 , 0.0825 ] , which means that CNs (20) and (21) reach synchronization. (b) State trajectories of e i ( t ) , ( i = 1 , 2 , 3 , 4 , 5 , 6 ) under the changed value of Θ * = Θ 0.2 I , which shows that CNs (20) and (21) are not synchronized.
Axioms 14 00161 g003
Figure 4. Flowchart of image encryption and decryption.
Figure 4. Flowchart of image encryption and decryption.
Axioms 14 00161 g004
Figure 5. The results of encrypting and decrypting for the color digital image “Parrot”. (a) The original image; (b) the ciphertext image; (c) the decrypted image.
Figure 5. The results of encrypting and decrypting for the color digital image “Parrot”. (a) The original image; (b) the ciphertext image; (c) the decrypted image.
Axioms 14 00161 g005
Figure 6. Histogram of image “Parrot” in three channels before and after encryption. (a) Histogram of R component before encryption; (b) histogram of encrypted R component; (c) histogram of G component before encryption; (d) histogram of encrypted G component; (e) histogram of B component before encryption; (f) histogram of encrypted B component.
Figure 6. Histogram of image “Parrot” in three channels before and after encryption. (a) Histogram of R component before encryption; (b) histogram of encrypted R component; (c) histogram of G component before encryption; (d) histogram of encrypted G component; (e) histogram of B component before encryption; (f) histogram of encrypted B component.
Axioms 14 00161 g006
Figure 7. Correlation between adjacent pixel values of images before and after encryption. (a) Correlation between horizontally adjacent pixels in the original image; (b) correlation between horizontally adjacent pixels in the ciphertext image; (c) correlation between vertically adjacent pixels in the original image; (d) correlation between vertically adjacent pixels in the ciphertext image; (e) correlation between adjacent pixels in the diagonal direction of the original image; (f) correlation between adjacent pixels in the diagonal direction of the ciphertext image.
Figure 7. Correlation between adjacent pixel values of images before and after encryption. (a) Correlation between horizontally adjacent pixels in the original image; (b) correlation between horizontally adjacent pixels in the ciphertext image; (c) correlation between vertically adjacent pixels in the original image; (d) correlation between vertically adjacent pixels in the ciphertext image; (e) correlation between adjacent pixels in the diagonal direction of the original image; (f) correlation between adjacent pixels in the diagonal direction of the ciphertext image.
Axioms 14 00161 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhou, A.; Yang, C.; Yi, C.; Fan, H. New μ-Synchronization Criteria for Nonlinear Drive–Response Complex Networks with Uncertain Inner Couplings and Variable Delays of Unknown Bounds. Axioms 2025, 14, 161. https://doi.org/10.3390/axioms14030161

AMA Style

Zhou A, Yang C, Yi C, Fan H. New μ-Synchronization Criteria for Nonlinear Drive–Response Complex Networks with Uncertain Inner Couplings and Variable Delays of Unknown Bounds. Axioms. 2025; 14(3):161. https://doi.org/10.3390/axioms14030161

Chicago/Turabian Style

Zhou, Anran, Chongming Yang, Chengbo Yi, and Hongguang Fan. 2025. "New μ-Synchronization Criteria for Nonlinear Drive–Response Complex Networks with Uncertain Inner Couplings and Variable Delays of Unknown Bounds" Axioms 14, no. 3: 161. https://doi.org/10.3390/axioms14030161

APA Style

Zhou, A., Yang, C., Yi, C., & Fan, H. (2025). New μ-Synchronization Criteria for Nonlinear Drive–Response Complex Networks with Uncertain Inner Couplings and Variable Delays of Unknown Bounds. Axioms, 14(3), 161. https://doi.org/10.3390/axioms14030161

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop