Next Article in Journal
Morphology-Controlled Single Rock Particle Breakage: A Finite-Discrete Element Method Study with Fractal Dimension Analysis
Previous Article in Journal
The Fractal Characteristics of Pore Networks in Tight Sandstones: A Case Study of Nanpu Sag in Bohai Bay Basin, NE China
Previous Article in Special Issue
Integrating Fractional-Order Hopfield Neural Network with Differentiated Encryption: Achieving High-Performance Privacy Protection for Medical Images
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamic Analysis and FPGA Implementation of a Fractional-Order Memristive Hopfield Neural Network with Hidden Chaotic Dual-Wing Attractors

1
School of Physics and Electronic Science, Changsha University of Science and Technology, Changsha 410114, China
2
School of Information Engineering, Changsha Medical University, Changsha 410219, China
3
College of Computer Science and Electronic Engineering, Hunan University, Changsha 410082, China
*
Author to whom correspondence should be addressed.
Fractal Fract. 2025, 9(9), 561; https://doi.org/10.3390/fractalfract9090561
Submission received: 2 August 2025 / Revised: 24 August 2025 / Accepted: 24 August 2025 / Published: 26 August 2025
(This article belongs to the Special Issue Advances in Fractional-Order Chaotic and Complex Systems)

Abstract

To model the response of neural networks to electromagnetic radiation in real-world environments, this study proposes a memristive dual-wing fractional-order Hopfield neural network (MDW-FOMHNN) model, utilizing a fractional-order memristor to simulate neuronal responses to electromagnetic radiation, thereby achieving complex chaotic dynamics. Analysis reveals that within specific ranges of the coupling strength, the MDW-FOMHNN lacks equilibrium points and exhibits hidden chaotic attractors. Numerical solutions are obtained using the Adomian Decomposition Method (ADM), and the system’s chaotic behavior is confirmed through Lyapunov exponent spectra, bifurcation diagrams, phase portraits, and time series. The study further demonstrates that the coupling strength and fractional order significantly modulate attractor morphologies, revealing diverse attractor structures and their coexistence. The complexity of the MDW-FOMHNN output sequence is quantified using spectral entropy, highlighting the system’s potential for applications in cryptography and related fields. Based on the polynomial form derived from ADM, a field programmable gate array (FPGA) implementation scheme is developed, and the expected chaotic attractors are successfully generated on an oscilloscope, thereby validating the consistency between theoretical analysis and numerical simulations. Finally, to link theory with practice, a simple and efficient MDW-FOMHNN-based encryption/decryption scheme is presented.

1. Introduction

With the development of new-generation information technologies such as cloud computing [1,2,3], big data [4,5,6], central networks [7,8,9], and deep learning [10,11,12], Artificial Neural Network (ANN), as a computing model that mimics the structure and function of biological neural networks, has demonstrated astonishing roles in these fields. The design of ANNs draws inspiration from the operational principles of biological neural systems, particularly the structure and functionality of the human brain. As a highly complex nonlinear system, the human brain exhibits rich chaotic behaviors. Investigating these chaotic behaviors contributes to a deeper understanding of the brain’s information processing mechanisms, holding significant exploratory value and potential applications in neuroscience [13,14,15,16]. Against this backdrop, the Hopfield neural network (HNN), characterized by its nonlinear activation functions and interacting neurons, generates diverse dynamic behaviors, making it a focal point in the fields of neural computation and nonlinear dynamics research [17,18,19]. Notably, in real-world environments, humans and their nervous systems are continuously exposed to various forms of electromagnetic radiation, which may influence neuronal activity and warrant further investigation [20,21,22,23].
The memristor, a nonlinear two-terminal dynamic device, possesses a memristance that depends on the historical profile of charge or magnetic flux passing through it [24,25,26], enabling adaptive resistance adjustments in response to external stimuli [27,28]. Consequently, memristors are regarded as ideal components for modeling the synaptic plasticity of artificial neurons. Neural networks incorporating memristors, known as memristive neural networks (MNNs), exhibit significantly richer dynamic behaviors compared to non-memristive counterparts, including neural bursting [29,30], hyperchaos [31,32], multi-scroll chaotic attractors [33,34], singular attractors [35], and hidden chaotic attractors [36,37,38]. Based on the characteristics of memristors, researchers have developed various applications and computational models, significantly advancing the development of artificial intelligence [39,40,41]. At the microscopic level, memristance variations arise from internal ion migration or physical state changes. Owing to their non-volatile nature, memristors retain their state after power-off until the next power-on. Leveraging this property, memristors effectively simulate the dynamic responses of real neurons under the influence of external electromagnetic radiation, providing a valuable tool for investigating the potential effects of electromagnetic fields on neural networks.
Research on MNNs currently centers on the exploration of novel chaotic attractors and their potential in theoretical applications and hardware implementation, including hidden attractors, multi-scroll attractors, emerging ribbon attractors and multi-wing attractors [42,43,44,45,46]. These attractors have demonstrated significant success in applications such as chaotic encryption [34,47], image classification [48], high-quality random number generation [49], and path planning [50], highlighting their substantial value in industrial contexts. Attractors with wing-shaped structures are more difficult to obtain. From a mathematical perspective, such structures typically require the introduction of cross terms and quadratic terms from the memristor’s state variables to be generated. Notably, hidden attractors, which exist in dynamic systems devoid of equilibrium points, are challenging to detect using conventional equilibrium-based analysis, resulting in limited research. A key limitation in applied studies is that complex nonlinear models of continuous MNNs, when solved using current numerical methods for differential equations, exhibit low computational efficiency, leading to slower outputs. In contrast, discrete chaotic systems offer superior computational efficiency, making them more advantageous for industrial applications [51,52,53,54]. Furthermore, optimizing designs to reduce the number of memristors while achieving comparable or more complex dynamic behaviors can effectively lower hardware costs and energy consumption, meriting further investigation.
The fractional-order system extends integer-order systems by introducing fractional calculus, showcasing non-locality and memory characteristics, thereby achieving higher accuracy in modeling complex system behaviors [55,56,57]. Compared to integer-order systems, fractional-order systems have significant advantages in nonlinear dynamics and long-term memory capture. For instance, Li et al. utilized the long-term memory of fractional calculus and complex chaotic behaviors to achieve faster convergence in solving the classical traveling salesman problem [58]. Hioual et al. revealed diverse dynamic behaviors on variable-order fractional discrete neural networks [59]. There are several methods for solving fractional-order differential equations, such as the predictor-corrector method, the Grünwald-Letnikov (G-L) method, and the Adomian decomposition method (ADM). Among these, the ADM is characterized by rapid convergence and low truncation errors [60]. The discretized results obtained through ADM require only iterative processing, significantly enhancing the feasibility of hardware implementation on field programmable gate arrays (FPGAs) [61]. It is noteworthy that the computation of decomposition terms typically entails high computational complexity. By employing co-design between hardware and software, pre-calculated coefficients can be transmitted to the hardware, significantly reducing computational burdens. The discretized fractional-order MNN is highly similar in system description to the discrete memristor neural network, enabling it to combine the rich dynamic characteristics of fractional-order MNNs with the easy hardware implementation of discrete memristor neural networks, thus holding significant potential for engineering applications.
Inspired by the aforementioned research, this study aims to construct a fractional-order MNN with unique attractor shapes and rich dynamic behaviors, proposing a memristive dual-wing fractional-order Hopfield neural network (MDW-FOMHNN) with hidden attractors. In this work, we adopted the ADM to more accurately capture the complex dynamic behaviors of the MDW-FOMHNN, such as chaos, hidden attractors, and coexisting attractors, thereby ensuring the reliability of simulation results [61]. The main contributions of this research include the following aspects:
1.
A fractional-order memristive neural network with dual-wing attractors is proposed, where the attractor morphology, modulated by internal parameters, can exhibit single-wing or dual-wing states, and such attractors are identified as rare hidden attractors.
2.
Bifurcation diagrams, Lyapunov exponent spectra, and basins of attraction are employed to reveal the influence of fractional-order and memristive coupling strength on the neural network, uncovering significant coexisting attractor behaviors.
3.
The MDW-FOMHNN is analyzed using the Adomian decomposition method, and a feasible FPGA implementation scheme is proposed, with results output to an oscilloscope accurately displaying the attractors.
4.
A simple and effective encryption/decryption algorithm based on the MDW-FOMHNN is proposed, demonstrating its strong encryption capability and robustness against noise.
The remainder of this paper is organized as follows: Section 2 presents the modeling of the MDW-FOMHNN and analyzes its equilibrium points. Section 3 introduces the numerical solution methods employed in this study and conducts a dynamical analysis. Section 4 details the FPGA implementation of MDW-FOMHNN. Section 5 presents the randomness testing of the sequence as well as a preliminary design of the encryption and decryption algorithm. Section 6 provides the conclusion.

2. Modeling and Equilibrium Analysis of the MDW-FOMHNN

2.1. Fractional-Order Memristor Model

Based on classical memristor theory, the behavior of a memristor is governed by external stimuli, internal state variables, and their corresponding state equation [62]. And memristors can be categorized into two types based on the nature of the internal state: flux-controlled and charge-controlled. By incorporating the Caputo fractional derivative operator, a fractional-order memristor model can be developed [61]. This work introduces a fractional-order flux-controlled general memristor model, with its mathematical formulation presented as follows:
i m = W ( ϕ ) v m W ( ϕ ) = 1 ϕ D t 0 q ϕ = 1 γ tan h ( ϕ ) v m 2 ,
where, γ is a positive real number, i m and v m represent the current flowing through the memristor and the externally applied voltage, respectively, ϕ denotes the state variable of the memristor model, and D t 0 q represents the Caputo fractional derivative operator with order q, defined as
D t 0 q x ( t ) = 1 Γ ( 1 q ) t 0 t x ˙ ( τ ) ( t τ ) q d τ , 0 < q < 1 x ˙ ( t ) , q = 1 ,
where Γ ( · ) is the Gamma function.
Under periodic excitation, the memristor model exhibits a pinched hysteresis loop (PHL) with a characteristic “8”-shaped Lissajous curve. The lobe area of the PHL scales positively with the excitation amplitude and inversely with the excitation frequency. As the frequency increases, the PHL progressively collapses toward a single-valued function. In this subsection, the parameters are fixed as α = β = γ = 1 , q = 0.8 , and the initial parameter ϕ ( 0 ) = 1 , with the input voltage defined as v m ( t ) = v 0 sin ( 2 π f t ) .
Figure 1a presents the PHLs obtained for three different excitation amplitudes v 0 = 0.8 V , 1.0 V , 1.2 V at a constant frequency f = 1 Hz , demonstrating the positive correlation between lobe area and excitation amplitude. Figure 1b shows the PHLs for a fixed v 0 = 1 V at frequencies f = 0.5 Hz , 2 Hz , 10 Hz , illustrating the inverse dependence on frequency and the convergence to a nearly linear response at high frequencies. Notably, all the PHLs in Figure 1 are pinched at the origin, confirming the characteristic memristive behavior described by Equation (1).

2.2. MDW-FOMHNN Model

HNN is a class of artificial neural networks exhibiting rich dynamical behaviors, which can be described by the following equation:
C i x ˙ i = x i R i + k = 1 n w i k tan h ( x k ) + I i , i , k N + ,
where x i denotes the membrane potential of the i-th neuron, C i and R i are the corresponding membrane capacitance and membrane resistance, respectively, I i represents the external input current, w i j signifies the synaptic weight from neuron k to neuron i, and tanh ( · ) is the activation function of the neuron. Typically, to simplify calculations, C i and R i are set to 1 and 1, respectively. Memristors inherently possess an inherent ability to retain their resistance state from before power-off until the subsequent power-on, providing a unique advantage for modeling the sustained effects of external electromagnetic radiation on neurons. In this subsection, the potential difference between neuron 3 and neuron 2 serves as the input voltage to drive the memristor proposed in Section 2.1. The resulting output current from the memristor, which represents the effect of electromagnetic radiation on neuron 3. By incorporating the Caputo fractional derivative, the mathematical model of the MDW-FOMHNN is formulated as follows:
D t 0 q x 1 ( t ) = x 1 + w 11 tan h ( x 1 ) + w 12 tan h ( x 2 ) + w 13 tan h ( x 3 ) D t 0 q x 2 ( t ) = x 2 + w 21 tan h ( x 1 ) + w 22 tan h ( x 2 ) + w 23 tan h ( x 3 ) D t 0 q x 3 ( t ) = x 3 + w 31 tan h ( x 1 ) + w 32 tan h ( x 2 ) + w 33 tan h ( x 3 ) + k ( 1 ϕ ) ( x 2 x 3 ) D t 0 q ϕ ( t ) = 1 γ tan h ( ϕ ) ( x 3 x 2 ) 2 ,
where k is the coupling strength between the memristor model and MDW-FOMHNN. To facilitate understanding, Figure 2 illustrates the topology of the MDW-FOMHNN.
For simplicity, γ is fixed at 0.1, as it remains unchanged in subsequent analyses. Furthermore, the synaptic weight matrix in this study is configured as follows:
w 11 w 12 w 13 w 21 w 22 w 23 w 31 w 32 w 33 = 0 0.5 1.5 0.25 0.5 0 0 6 0 .

2.3. Equilibrium Analysis

Stability analysis of integer-order dynamical systems typically commences with the identification of equilibrium points, where the local stability at these points directly influences the global stability of the system. The methodology for determining equilibrium points in fractional-order systems is consistent with that employed for integer-order systems. By setting the left-hand side of Equation (4) to zero and integrating it with Equation (5), the following result is derived:
0 = x 1 + 0.5 tan h ( x 2 ) 1.5 tan h ( x 3 ) 0 = x 2 0.25 tan h ( x 1 ) 0.5 tan h ( x 2 ) 0 = x 3 6 tan h ( x 2 ) + k ( 1 ϕ ) ( x 2 x 3 ) 0 = 1 0.1 tan h ( ϕ ) ( x 2 x 3 ) 2 .
Simplifying further yields two equations E 1 and E 2 , as follows:
E 1 : 0 = atanh ( 4 x 2 + 2 tanh ( x 2 ) ) + 0.5 tan h ( x 2 ) 1.5 tan h ( x 3 ) .
E 2 : 0 = x 3 6 tan h ( x 2 ) + k ( 1 atanh ( 10 ( x 2 x 3 ) 2 10 ) ) ( x 2 x 3 ) .
It is noteworthy that both equations E 1 and E 2 remain invariant under the coordinate transformation ( x 3 , x 2 ) ( x 3 , x 2 ) , indicating odd symmetry in the ( x 3 , x 2 ) plane. For E 1 , variable separation and derivative analysis of its inverse function demonstrate that the curve is monotonically increasing within its domain. Combined with analysis of specific function values, it is determined that the curve corresponding to E 1 lies in the first and third quadrants. For E 2 , given that the domain of atanh ( · ) is ( 1 , 1 ) , its validity requires 9 < 10 ( x 2 x 3 ) 2 < 11 . Under this constraint, when 0 < k < 2 , analysis shows that x 2 and x 3 having opposite signs is a necessary condition for E 2 to hold. Consequently, the curve corresponding to E 2 lies in the second and fourth quadrants. When k > 2 , the graph of E 2 can cross the line x 3 = 0 , but there still exists an interval where it does not intersect the curve represented by E 1 . In summary, when 0 < k < 2 , the curves of E 1 and E 2 do not intersect, implying that Equation (6) has no equilibrium points. In this case, if the MDW-FOMHNN exhibits a chaotic attractor, such an attractor would be a hidden attractor.
To verify the above analysis, the high-precision implicit function plotting function ‘ezplot’ in MATLAB R2021b was employed to plot the curves of E 1 and E 2 for k = 0.1 , 1 , 2 , and 3. The results, shown in Figure 3, are consistent with the theoretical derivation.

3. Numerical Solution and Hidden Dynamics Analysis

From the analysis in the previous section, it is known that when γ = 0.1 and 0 < k < 2 , the MDW-FOMHNN does not possess equilibrium points, and its dynamic behavior can be called hidden dynamics. Therefore, in this section, within this parameter range, phase portraits, time series, Lyapunov exponent (LE) spectra, bifurcation diagrams, and basins of attraction are employed as numerical tools to further investigate the hidden dynamical behaviors of the MDW-FOMHNN. It is noteworthy that the ADM is adopted in this paper to solve Equation (4), the QR-based method is utilized for computing the LEs [63], and the bifurcation diagrams are constructed by plotting the maximum values of the output sequences. The time step is set to 0.01.

3.1. Numerical Solution via the ADM

For the MDW-FOMHNN model, with 0 < q < 1 and X ( t ) = [ x 1 ( t ) ; x 2 ( t ) ; x 3 ( t ) ; ϕ ( t ) ] , the system can be expressed as follows:
D t 0 q X ( t ) = L X ( t ) + N X ( t ) + C ,
where L X ( t ) , N X ( t ) , and C represent the linear, nonlinear, and constant components of X ( t ) , respectively. Coupling it with Equation (5), the linear part of Equation (4) can be expressed as [ L X 1 ( t ) ; L X 2 ( t ) ; L X 3 ( t ) ; L X 4 ( t ) ] = [ x 1 ( t ) ; x 2 ( t ) ; x 3 ( t ) + k ( x 2 ( t ) x 3 ( t ) ) ; 0 ] ; the constant contribution in Equation (4) is given by C = [ 0 ; 0 ; 0 ; 1 ] ; and the nonlinear part can be represented as follows:
N X 1 ( t ) N X 2 ( t ) N X 3 ( t ) N X 4 ( t ) = 0.5 tan h ( x 2 ) 1.5 tan h ( x 3 ) 0.25 tan h ( x 1 ) 0.5 tan h ( x 2 ) 6 tan h ( x 2 ) k ϕ ( x 2 x 3 ) 0.1 tanh ( ϕ ) ( x 2 x 3 ) 2 .
The nonlinear term is decomposed into Adomian polynomials,
N X ( t ) = i = 0 A i ( X 0 , X 1 , , X i ) , A i = 1 i ! d i d λ i N k = 0 i λ k X k λ = 0 .
where the Riemann–Liouville operator J t 0 q is defined as
J t 0 q x ( t ) = 1 Γ ( q ) t 0 t ( t τ ) q 1 x ( τ ) d τ , t > t 0 ,
and this operator has two key properties for handling Equation (9):
J t 0 q ( t t 0 ) γ = Γ ( γ + 1 ) Γ ( γ + 1 + q ) ( t t 0 ) γ + q J t 0 q C = C Γ ( 1 + q ) ( t t 0 ) q .
Therefore, the following decomposition can be performed here:
X 0 = X 1 0 X 2 0 X 3 0 X 4 0 = x 1 ( 0 ) x 2 ( 0 ) x 3 ( 0 ) ϕ ( 0 ) .
X 1 = X 1 1 X 2 1 X 3 1 X 4 1 = ( ( t t 0 ) q ( 0.5 tanh ( X 2 0 ) X 1 0 1.5 tanh ( X 3 0 ) ) ) / Γ ( q + 1 ) ( ( t e t 0 ) q ( X 2 0 + tanh ( X 1 0 ) / 4 + tanh ( X 2 0 ) / 2 ) ) / Γ ( q + 1 ) ( ( t e t 0 ) q ( X 3 0 + 6 t a n h ( X 2 0 ) k ( X 2 0 X 3 0 ) + k X 4 0 ( X 2 0 X 3 0 ) ) ) / Γ ( q + 1 ) ( ( t e t 0 ) q ( tanh ( X 4 0 ) / 10 + ( X 2 0 X 3 0 ) 2 1 ) ) / Γ ( q + 1 ) .
X 2 = X 1 2 X 2 2 X 3 2 X 4 2 = J t 0 q ( X 1 1 + A 1 1 ) J t 0 q ( X 2 1 + A 2 1 ) J t 0 q ( X 3 1 + A 3 1 ) + k ( X 2 1 X 3 1 ) J t 0 q ( 1 A 4 1 ) .
Thus, the j-th component X j of Equation (9) is given by
X j ( t ) = X j ( t 0 + ) + i = 1 N k j i ( t t 0 ) q Γ ( 1 + i q ) , N > 0 X j ( t 0 + ) , N = 0 .
where N denotes the decomposition order, ( t t 0 ) represents the decomposition step size, and k j i is the irreducible polynomial of ( X 1 i 1 ( t 0 ) , X 2 i 1 ( t 0 ) , X 3 i 1 ( t 0 ) ) , X 4 i 1 ( t 0 ) ) . As the decomposition order increases, the number of resulting terms grows exponentially, making direct presentation impractical. Here, only the first three terms are shown. In fact, all numerical simulations in this work employ fourth-order decomposition.
Based on the relationship between the memristor model and the stimulus, one can observe the relationship between ϕ and the neurons x 2 and x 3 . Therefore, by fixing the initial conditions (ICs) ( x 1 , x 2 , x 3 , ϕ ) = ( 0.1 , 0.1 , 0.1 , 0.1 ) , with parameter k = 1.2 and fractional order q = 0.8 , and iterating through 100,000 points, the phase portraits and time series of the attractors for the MDW-FOMHNN after ADM are obtained as shown in Figure 4. Figure 4a,b reveal the presence of a double-wing attractor, while Figure 4c exhibits characteristics of a strange attractor. Moreover, the time series depicted in Figure 4b to Figure 4e all display disordered states. Additionally, the calculation of the four LEs at this stage yields LE 1 = 0.396 , LE1 = 0, LE1 = −1.317, and LE1 = −4.947, among which one LE is significantly positive. Synthesizing the aforementioned discussions, it is determined that the double-wing attractor is indeed chaotic and, more specifically, a hidden attractor.

3.2. Hidden Dynamics

The introduction of fractional-order derivatives and integrals into neural networks enables the description of the system’s present, past, and future states. Compared to integer-order neural networks, fractional-order models are better suited for characterizing biological neural networks and exhibit richer dynamical behaviors. To further investigate the impact of incorporating the fractional-order concept on the dynamics of neural networks, this section will explore the influence of parameter k and the evolution of fractional order q on the MDW-FOMHNN.

3.2.1. Influence of Fractional Order q and Coupling Strength k on Dynamics

In the analysis of memristive neural networks, bifurcation diagrams and LE spectra are two essential numerical tools. In this work, we fixed the initial parameter γ = 0.1 , I C s = ( 0.1 , 0.1 , 0.1 , 0.1 ) , and selected two different coupling strengths, k = 1.2 and k = 1.5 , to investigate their effects on the dynamic behavior of the MDW-FOMHNN model. To ensure data convergence and accuracy, we computed only for the fractional order q [ 0.4 ,   1 ] , obtaining two sets of bifurcation diagrams and LE spectra, as shown in Figure 5. The results confirm that when a positive LE appears, the bifurcation diagrams exhibit corresponding dense point regions, consistent with expectations and validating the simulation’s effectiveness.
Specifically, by examining Figure 5a,c, as the fractional order q increases from q = 0.4 , the MDW-FOMHNN system transitions from a periodic state to a chaotic state. Initially, no positive Lyapunov exponents are observed, and a zero exponent is present, indicating a stable state. When q reaches approximately 0.49, a positive Lyapunov exponent emerges, marking the system’s entry into a chaotic regime through period-doubling bifurcations. Notably, around q 0.54 , the bifurcation diagram shows a distinct morphological change, indicating a transformation in the system’s attractor. A similar transition from periodic to chaotic states is also observed in Figure 5b,d.
The differences between the two sets of bifurcation diagrams suggest that the coupling strength k significantly influences the chaotic dynamics of the MDW-FOMHNN. Further analysis of different k values reveals that, as shown in Figure 5c, at k = 1.2 and q 0.54 , the system exhibits a clear transformation in the chaotic attractor’s structure. In contrast, Figure 5d illustrates the bifurcation behavior at k = 1.5 , clearly displaying a typical period-doubling route to chaos. Comparing the results of Figure 5c,d, differences are evident in the onset points of the chaotic states under the two conditions. Moreover, at k = 1.2 , the system undergoes at least one transition from one type of chaotic attractor to another within the chaotic regime, whereas no such transition is observed at k = 1.5 . This indicates that, under the current parameter conditions, the chaotic behavior at k = 1.2 is more complex. It also suggests that the coupling strength k not only influences the evolution of chaos but also regulates the type and complexity of the system’s attractors, playing a controlling role in the dynamic behavior of the MDW-FOMHNN system.
Bifurcation diagrams, constructed by extracting the maximum values of the system states, characterize the system’s dynamic behavior, where denser point distributions generally indicate higher chaotic complexity. As observed in Figure 5, the density of points in the bifurcation diagrams appears to decrease as the fractional order q increases. To further investigate the influence of the fractional order q on the chaotic complexity of the MDW-FOMHNN, spectral entropy (SE) analysis is employed, with results presented in Figure 6. The SE values shown in Figure 6a,b are in good agreement with the bifurcation diagrams and LE analyses in Figure 5. Taking Figure 6a as an example, within a defined chaotic regime, such as k = 1.2 and q ( 0.54 ,   1 ) , the variation of SE closely follows that of the maximum LE. As q decreases, the SE values increase, indicating enhanced chaotic complexity in the MDW-FOMHNN. This trend is consistent with the denser point distribution observed in the bifurcation diagram of Figure 5c. Therefore, the incorporation of fractional-order dynamics significantly enhances the chaotic complexity of the MDW-FOMHNN.
To systematically explore the impact of the coupling strength parameter k on the dynamic behavior of the MDW-FOMHNN system, numerical simulations are performed with a fixed fractional order q = 0.8 across the interval k ( 0.1 ,   2 ) . The resulting LE spectra and bifurcation diagrams are depicted in Figure 7a,b. The results indicate that within k ( 0.9 ,   1.55 ) , the maximum LE is positive, accompanied by intricate bifurcation patterns, signifying chaotic dynamics. Conversely, in other parameter ranges, the maximum LE is negative or zero, corresponding to periodic or stable states. Remarkably, throughout k [ 0.1 ,   2 ] , the MDW-FOMHNN system lacks any equilibrium points, implying that the chaotic attractors observed in k ( 0.9 ,   1.55 ) are dissociated from unstable equilibrium points, characteristic of hidden chaotic attractors. This phenomenon is uncommon in memristive neural network dynamics, underscoring the special nonlinear attributes of the MDW-FOMHNN.
In conclusion, both the coupling strength k and fractional order q effectively modulate the MDW-FOMHNN system’s transitions between chaotic and periodic states. To corroborate these findings, Figure 8 presents phase portraits of the system’s attractors under six distinct ( k , q ) parameter pairs, vividly illustrating its diverse dynamic evolution and reinforcing the conclusions on parameter effects.

3.2.2. Coexisting Attractors

By varying only the ICs, MNNs can generate attractors with distinct positions, sizes, and shapes, known as coexisting attractors. In MNNs, this property enables the simulation of diverse network responses to different neuronal stimuli. Consequently, MNN systems exhibiting coexistence behavior are highly advantageous for key design in cryptographic applications. With parameters set to k = 1.5 and q = 0.8 , and by altering the ICs of the MDW-FOMHNN, attractors located at different positions are obtained, as shown in Figure 9a. Additionally, the corresponding basins of attraction are presented in Figure 9. Specifically, initial conditions within the green region of the basin generate the blue attractor in Figure 9a, while those in the yellow region produce the pink attractor. Furthermore, adjusting the parameters to k = 0.8 and k = 1.8 reveals distinct periodic coexisting attractors, with their phase portraits and time series displayed in Figure 10. Notably, as the MDW-FOMHNN undergoes a period-doubling bifurcation process, the system generates a variety of morphologically diverse periodic attractors, ultimately transitioning to a chaotic state. During this process, asymmetric periodic attractors and single-wing chaotic attractors both exhibit coexistence phenomena.

4. FPGA Hardware Implementation

Compared to analog circuits, FPGAs serve as a preferred platform for implementing nonlinear systems due to their high programmability, seamless integration, and superior electromagnetic interference resistance [64,65]. For iterative equations derived via the ADM, this work proposes an efficient FPGA-based implementation scheme to generate output attractors of the MDW-FOMHNN. The design workflow, illustrated in Figure 11, involves precomputing ADM polynomial coefficients on a software platform, which are then transferred to dedicated FPGA circuits. The current state is determined by weighted computations, relying solely on the previous state.
This design leverages Xilinx Vivado 2018.3 for development and employs the ALINX AX7020 development board, fitted with the Xilinx XC7Z020-2CLG400I chip, as the hardware platform. The board includes dual-row connectors to transmit chaotic signals to an oscilloscope. To achieve high floating-point accuracy, the floating-point IP core version 7.1 is utilized, enabling operations such as addition, multiplication, division, exponentiation, and floating-point to fixed-point conversions, compliant with the IEEE 754 single-precision format (1 sign bit, 8 exponent bits, 23 mantissa bits). Fixed-point formats are tailored to specific needs—for example, 24-bit resolution for digital-to-analog conversion and 32-bit fixed-point representation during calculations—to reduce precision errors and ensure reliable results.
To validate the output performance of the MDW-FOMHNN, parameters are set as k = 1.2 , fractional order q = 0.54 , and initial conditions I C s = ( 0.1 ,   0.1 ,   0.1 ,   0.1 ) . Dual-wing attractors were observed via an oscilloscope, as shown in Figure 12. Specifically, Figure 12b,d depict the attractor phase portraits in the ( x 3 ϕ ) plane, consistent with the simulation results in Figure 8e, while Figure 12a,c illustrate the phase portraits in the ( x 2 ϕ ) plane, exhibiting distinct dual-wing morphologies. These results demonstrate that the FPGA implementation successfully verified the chaotic behavior of the system and also proved the effectiveness of the proposed implementation scheme.
Furthermore, by configuring q = 0.8 and k = 1.5 and applying initial conditions of ICs = ( 0.1 ,   0.1 ,   0.1 ,   0.1 ) and ICs = ( 0.1 ,   0.1 ,   0.1 ,   0.1 ) , we observed coexisting chaotic attractors, illustrated in Figure 13a and Figure 13b, respectively. These results confirm the successful FPGA implementation of the condition presented in Figure 9a.
Figure 14 shows the power consumption of the system under this condition. Meanwhile, Table 1 lists the resources utilized by the MDW-FOMHNN implemented on the FPGA. Due to the use of the hyperbolic tangent function as the activation function in the traditional Hopfield neural network, the resource consumption during its implementation is not negligible. In this work, the verification process prioritizes high accuracy. Therefore, no simplification or optimization has been applied to computationally expensive functions such as the hyperbolic tangent.

5. Randomness and Image Encryption Results

With fixed parameters k = 1.2 , q = 0.8 , γ = 0.1 , and I C = [ 0.1 ,   0.1 ,   0.1 ,   0.1 ] , this work utilizes the four output sequences generated by the MDW-FOMHNN model, stored sequentially in the sequence S in the order { ,   x 1 ( k ) ,   x 2 ( k ) ,   x 3 ( k ) ,   ϕ ( k ) ,   } . A random number generation module is designed based on this sequence to enhance the implementation of digital image encryption. The simple algorithm for generating the pseudorandom random number sequence (PRNG) is described below.
S P R N G = mod ( floor ( S × 10 10 ) , 256 ) ,
where S P R N G will be used in the diffusion algorithms of the subsequent encryption process, and the results of the randomness test based on NIST SP 800-22 [66] are presented in Table 2. In this work, we set the significance level for randomness testing at 0.01. Based on the p-values and pass rates presented in the table, S P R N G exhibits exceptionally strong randomness characteristics. To further validate the potential of this PRNG in practical applications, we developed a key generation algorithm that integrates the SHA-256 hash function with the plaintext image to produce the initial key, which is then used as the input for the MDW-FOMHNN chaotic source. In the encryption process, pixel diffusion is achieved by reshaping the image data into a vector and performing an XOR operation with a high-quality PRNG sequence of equal length. This approach not only ensures effective encryption but also significantly enhances encryption efficiency. Notably, the encryption and decryption processes are symmetric in terms of operational sequence, meaning the decryption process is the reverse execution of the encryption process. The detailed steps of the encryption and decryption workflows are illustrated in Figure 15.
Figure 16 displays the images with a resolution of 512 × 512 pixels before and after encryption, along with their corresponding histogram information. The encrypted ciphertext image exhibits a noise-like random distribution, rendering the original visual information completely indistinguishable. Moreover, the histogram of the encrypted image is almost flat, showing a very even distribution of pixel values, which effectively hides information and removes statistical patterns. Furthermore, the decrypted image and its histogram are almost identical to those of the original plaintext image, confirming the accuracy and reversibility of the decryption process. In conclusion, the encryption and decryption algorithm proposed in this study successfully achieves the expected encryption performance, demonstrating excellent feasibility and correctness.
To further validate the encryption performance, we use baboon images in Figure 16 with resolutions of 256 × 256 and 512 × 512 as examples for illustration and comparison. The specific evaluation metrics include information entropy, correlation coefficients after encryption, number of pixels change rate (NPCR), unified average changing intensity (UACI), encryption time, and noise resistance performance. These metrics not only reflect the effectiveness of the encryption algorithm but are also closely related to the performance of the experimental hardware. In this section, all encryption experiments are conducted on a laptop equipped with an 11th-generation Intel Core i5-1155G7 processor (base frequency 2.5 GHz) using MATLAB 2021b as the software platform.
The formula for calculating correlation coefficients is as follows:
R x y = cov ( x , y ) D ( x ) D ( y ) cov ( x , y ) = 1 N i = 1 N ( x i E ( x i ) ) ( y i E ( y i ) ) ,
where x i and y i represent the pixel values of each pair of adjacent pixels, N denotes the total number of selected pixel pairs, E ( · ) indicates the average intensity value of the pixels, and D ( · ) represents the variance calculation. The correlation coefficient can also reflect the effect before and after encryption. The smaller the correlation coefficient of the encrypted image, the better the encryption performance. Table 3 presents a comparison of the correlation coefficients of encrypted images between the proposed method and existing studies. It can be observed that the correlation coefficients of the proposed method in the horizontal, vertical, and diagonal directions are all close to zero, indicating a high degree of decorrelation between adjacent pixels in the encrypted images. Compared to existing advanced schemes, the proposed method demonstrates superior performance in suppressing correlation in the diagonal direction, while also showing advantages in the horizontal direction compared to some studies, highlighting the effectiveness of the encryption algorithm.
The formula for calculating information entropy is as follows:
H ( X ) = i = 1 n P ( X i ) × log 2 ( P ( X i ) ) ,
where X i represents the i-th pixel intensity, p ( X i ) denotes the probability of occurrence of that pixel intensity, and n is the total number of pixels in the image. It should be noted that the maximum pixel intensity of the images processed in this study is 256, corresponding to 8-bit grayscale images, which means the ideal information entropy value after encryption is 8. When the information entropy approaches this theoretical maximum, it indicates that the pixel distribution of the ciphertext image is highly uniform, maximizing information uncertainty and thereby enhancing resistance to statistical analysis.
The NPCR and UACI values are used to evaluate the sensitivity of the cipher image to tiny changes in the plain image, and the ideal values are NPCR = 99.6094% and UACI = 33.4635%. The formulas for calculating NPCR and UACI are as follows:
NPCR = i , j D ( i , j ) M × N × 100 % UACI = i , j | C 1 ( i , j ) C 2 ( i , j ) | M × N × 255 × 100 % ,
where D ( i , j ) = 1 if C 1 ( i , j ) C 2 ( i , j ) , otherwise D ( i , j ) = 0 . C 1 ( i , j ) and C 2 ( i , j ) are the pixel values at position ( i , j ) in the two encrypted images.
Table 4 compares the proposed method with existing studies in terms of information entropy, NPCR/UACI, and encryption time. The results demonstrate that the proposed encryption method is simple and effective, with a clear advantage in encryption time. Notably, for images with a resolution of 512 × 512 pixels, the information entropy after encryption reaches 7.9994, very close to the ideal value of 8, outperforming existing studies. Moreover, the NPCR and UACI metrics closely approach their ideal values, robustly demonstrating the method’s excellent resistance to differential attacks.
Figure 17 illustrates the impact of common noise on digital image transmission, using salt-and-pepper noise as an example. Figure 17a to Figure 17d sequentially show the decrypted images after being subjected to salt-and-pepper noise of 0%, 10%, 30%, and 60%, respectively. It can be observed that even under a high noise level of 60%, the decrypted image still retains a significant amount of structural details and information of the plain image, with the overall contours still clearly discernible. This demonstrates that the proposed encryption/decryption algorithm possesses strong resistance to salt-and-pepper noise, indicating its robustness.
Based on the content of this section, it can be concluded that the encryption scheme designed using the MDW-FOMHNN with hidden dynamic behavior achieves reliable encryption performance compared to existing studies.

6. Conclusions

This paper proposes a fractional-order Hopfield neural network model with memristive electromagnetic radiation, termed MDW-FOMHNN, by leveraging the memristor’s capability to emulate electromagnetic radiation received by neurons. Through equilibrium point analysis, it is determined that the MDW-FOMHNN lacks equilibrium points within a certain range of the coupling strength parameter k. Subsequently, the MDW-FOMHNN is numerically solved using the ADM. Tools such as Lyapunov exponents, phase portraits, and time series are employed to identify the system’s current state as exhibiting hidden chaotic dynamics. Furthermore, Lyapunov exponent spectra and bifurcation diagrams reveal the influence of the coupling parameter k and the fractional order q on the MDW-FOMHNN, demonstrating that both parameters significantly affect the morphology of chaotic attractors. Several distinct attractor shapes are presented. Based on these attractor morphologies, the coexisting attractor behavior of the MDW-FOMHNN is further investigated, indicating its potential for practical applications. Then, leveraging the polynomial form of the MDW-FOMHNN derived from the ADM, an FPGA implementation scheme is proposed. The desired attractors are successfully captured and verified using an oscilloscope. Finally, to bridge the gap between theoretical analysis and practical applications, a simple and effective encryption/decryption algorithm based on the MDW-FOMHNN is designed.
Table 5 summarizes the dynamic characteristics of some neural networks in existing studies. The proposed MDW-FOMHNN model exhibits a unique hidden double-wing attractor and employs only a single nonlinear memristive device, demonstrating advantages in both dynamic complexity and theoretical implementation efficiency. Spectral entropy analysis results indicate that by adjusting the fractional order q, MDW-FOMHNN can generate sequences with stronger randomness compared to integer-order systems, achieving the highest spectral entropy (SE) value among the studies listed in the table, reflecting superior chaotic properties.
Future research can fully leverage the excellent randomness of MDW-FOMHNN due to its hidden attractor, focusing on designing more efficient encryption schemes based on memristive neural networks (MNNs) to promote their practical applications in industrial fields such as information security. Additionally, the successful implementation of the fractional-order double-wing attractor in this work validates the feasibility of constructing fractional-order memristive neural networks with multi-wing structures, providing new insights for designing scalable complex chaotic systems. Furthermore, considering that an important direction in current research is to explore the coupling mechanisms between multiple neurons and memristor models, the dynamic behavior of such systems still offers vast potential for further in-depth investigation.

Author Contributions

S.H., conceptualization, methodology, software, validation, investigation, data curation, writing—original draft preparation, writing—review and editing, visualization; F.Y., conceptualization, methodology, software, validation, resources, data curation, writing—original draft preparation, writing—review and editing, project administration, funding acquisition. T.T., formal analysis; M.Z., formal analysis; R.G., investigation, data curation, visualization; J.J., resources, project administration, funding acquisition; C.W., supervision. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Natural Science Foundation of Hunan Province under grant 2025JJ50368, by the Scientific Research Fund of the Hunan Provincial Education Department under grant 24A0248, by the Guiding Science and Technology Plan Project of Changsha City under grant kzd2501129, and by the National Natural Science Foundation of China under grant 62273141.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Lu, J.; Li, W.; Sun, J.; Xiao, R.; Liao, B. Secure and Real-Time Traceable Data Sharing in Cloud-Assisted IoT. IEEE Internet Things J. 2024, 11, 6521–6536. [Google Scholar] [CrossRef]
  2. Golec, M.; Hatay, E.S.; Golec, M.; Uyar, M.; Golec, M.; Gill, S.S. Quantum cloud computing: Trends and challenges. J. Econ. Technol. 2024, 2, 190–199. [Google Scholar] [CrossRef]
  3. Zhou, S.; Yuan, B.; Xu, K.; Zhang, M.; Zheng, W. The impact of pricing schemes on cloud computing and distributed systems. J. Knowl. Learn. Sci. Technol. 2024, 3, 193–205. [Google Scholar] [CrossRef]
  4. Adewusi, A.O.; Okoli, U.I.; Adaga, E.; Olorunsogo, T.; Asuzu, O.F.; Daraojimba, D.O. Business intelligence in the era of big data: A review of analytical tools and competitive advantage. Comput. Sci. Res. J. 2024, 5, 415–431. [Google Scholar]
  5. Ahmadi, S. A comprehensive study on integration of big data and AI in financial industry and its effect on present and future opportunities. Int. J. Curr. Sci. Res. Rev. 2024, 7, 66–74. [Google Scholar] [CrossRef]
  6. Dai, Z.; Guo, X. Investigation of E-Commerce Security and Data Platform Based on the Era of Big Data of the Internet of Things. Mob. Inf. Syst. 2022, 2022, 3023298. [Google Scholar] [CrossRef]
  7. Hu, J.; Zhi, R.; Wang, J. ARS: Adaptive Routing System for Heterogeneous Traffic in Industrial Data Centers. IEEE Trans. Ind. Inform. 2025, 21, 6495–6504. [Google Scholar] [CrossRef]
  8. Hu, J.; Huang, J.; Li, Z.; Li, Y.; Rao, S.; Jiang, W.; Chen, K.; Wang, J.; He, T. Proactive Transport with High Link Utilization Using Opportunistic Packets in Cloud Data Centers. IEEE Trans. Mob. Comput. 2025, 1–16. [Google Scholar] [CrossRef]
  9. Hu, J.; Rao, S.; Zhu, M.; Huang, J.; Wang, J.; Wang, J. SRCC: Sub-RTT Congestion Control for Lossless Datacenter Networks. IEEE Trans. Ind. Inform. 2025, 21, 2799–2808. [Google Scholar] [CrossRef]
  10. Bayoudh, K. A survey of multimodal hybrid deep learning for computer vision: Architectures, applications, trends, and challenges. Inf. Fusion 2024, 105, 102217. [Google Scholar] [CrossRef]
  11. Sun, Q.; Wu, X. A deep learning-based approach for emotional analysis of sports dance. PeerJ Computer Science 2023, 9, e1441. [Google Scholar] [CrossRef]
  12. Zhang, J.; Yang, J.; Qin, Y.; Xiao, Z.; Wang, J. MGNet: RGBT tracking via cross-modality cross-region mutual guidance. Neural Netw. 2025, 190, 107707. [Google Scholar] [CrossRef]
  13. Hua, C.; Cao, X.; Liao, B. Real-Time Solutions for Dynamic Complex Matrix Inversion and Chaotic Control Using ODE-Based Neural Computing Methods. Comput. Intell. 2025, 41, e70042. [Google Scholar] [CrossRef]
  14. Xiang, Q.; Gong, H.; Hua, C. A new discrete-time denoising complex neurodynamics applied to dynamic complex generalized inverse matrices. J. Supercomput. 2024, 81, 159. [Google Scholar] [CrossRef]
  15. Zhang, Z.; He, Y.; Mai, W.; Luo, Y.; Li, X.; Cheng, Y.; Huang, X.; Lin, R. Convolutional Dynamically Convergent Differential Neural Network for Brain Signal Classification. IEEE Trans. Neural Netw. Learn. Syst. 2025, 36, 8166–8177. [Google Scholar] [CrossRef]
  16. Deng, Q.; Wang, C.; Sun, Y.; Cong, X.; Lin, H.; Deng, Z. Memristor-Based Brain Emotional Learning Neural Network With Attention Mechanism and its Application. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2025, 1. [Google Scholar] [CrossRef]
  17. Hopfield, J.J. Neural networks and physical systems with emergent collective computational abilities. Proc. Natl. Acad. Sci. USA 1982, 79, 2554–2558. [Google Scholar] [CrossRef]
  18. Bao, B.; Tang, H.; Bao, H.; Hua, Z.; Xu, Q.; Chen, M. Simplified Discrete Two-Neuron Hopfield Neural Network and FPGA Implementation. IEEE Trans. Ind. Electron. 2025, 72, 4105–4115. [Google Scholar] [CrossRef]
  19. Bao, H.; Xi, M.; Tang, H.; Zhang, X.; Xu, Q.; Bao, B. Discrete Two-Heterogeneous-Neuron HNN and Chaos-Based Hardware Poisson Encoder. IEEE Trans. Ind. Inform. 2025, 21, 1862–1871. [Google Scholar] [CrossRef]
  20. Jin, J.; Wu, M.; Ouyang, A.; Li, K.; Chen, C. A Novel Dynamic Hill Cipher and Its Applications on Medical IoT. IEEE Internet Things J. 2025, 12, 14297–14308. [Google Scholar] [CrossRef]
  21. Deng, Q.; Wang, C.; Yang, G.; Luo, D. Discrete Memristive Delay Feedback Rulkov Neuron Model: Chaotic Dynamics, Hardware Implementation, and Application in Secure Communication. IEEE Internet Things J. 2025, 12, 25559–25567. [Google Scholar] [CrossRef]
  22. Gao, S.; Zhang, Z.; Iu, H.H.C.; Ding, S.; Mou, J.; Erkan, U.; Toktas, A.; Li, Q.; Wang, C.; Cao, Y. A Parallel Color Image Encryption Algorithm Based on a 2-D Logistic-Rulkov Neuron Map. IEEE Internet Things J. 2025, 12, 18115–18124. [Google Scholar] [CrossRef]
  23. Zhu, J.; Jin, J.; Chen, C.; Wu, L.; Lu, M.; Ouyang, A. A New-Type Zeroing Neural Network Model and Its Application in Dynamic Cryptography. IEEE Trans. Emerg. Top. Comput. Intell. 2025, 9, 176–191. [Google Scholar] [CrossRef]
  24. Yu, F.; Tan, B.; He, T.; He, S.; Huang, Y.; Cai, S.; Lin, H. A wide-range adjustable conservative memristive hyperchaotic system with transient quasi-periodic characteristics and encryption application. Mathematics 2025, 13, 726. [Google Scholar] [CrossRef]
  25. Gao, S.; Iu, H.H.C.; Erkan, U.; Simsek, C.; Toktas, A.; Cao, Y.; Wu, R.; Mou, J.; Li, Q.; Wang, C. A 3D Memristive Cubic Map with Dual Discrete Memristors: Design, Implementation, and Application in Image Encryption. IEEE Trans. Circuits Syst. Video Technol. 2025, 1. [Google Scholar] [CrossRef]
  26. Xu, Q.; Wang, K.; Feng, C.; Fan, W.; Wang, N. Dynamical effects of low-frequency and high-frequency current stimuli in a memristive Morris–Lecar neuron model. Chaos Solitons Fractals 2024, 189, 115646. [Google Scholar] [CrossRef]
  27. Strukov, D.B.; Snider, G.S.; Stewart, D.R.; Williams, R.S. The missing memristor found. Nature 2008, 453, 80–83. [Google Scholar] [CrossRef]
  28. Yao, W.; Gao, K.; Wang, Y.; Lin, H.; Wu, H.; Xu, C.; Zhang, X. Generalization and differentiation of affective associative memory circuit based on memristive neural network with emotion transfer. Neural Netw. 2025, 188, 107502. [Google Scholar] [CrossRef]
  29. Yu, F.; He, S.; Yao, W.; Cai, S.; Xu, Q. Bursting Firings in Memristive Hopfield Neural Network with Image Encryption and Hardware Implementation. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2025, 1. [Google Scholar] [CrossRef]
  30. Ding, X.; Feng, C.; Wang, N.; Wu, H.; Xu, Q. Firing activities induced by various stimuli in a memristive ion channel-based bionic circuit. Chaos Solitons Fractals 2025, 199, 116587. [Google Scholar] [CrossRef]
  31. Bao, H.; Chen, Z.; Ma, J.; Xu, Q.; Bao, B. Planar Homogeneous Coexisting Hyperchaos in Bi-Memristor Cyclic Hopfield Neural Network. IEEE Trans. Ind. Electron. 2024, 71, 16398–16408. [Google Scholar] [CrossRef]
  32. Yu, F.; He, D.S.S.; Wu, Y.; Zhang, S.; Yin, H. Resonant tunneling diode cellular neural network with memristor coupling and its application in police forensic digital image protection. Chin. Phys. B 2025, 34, 050502. [Google Scholar] [CrossRef]
  33. Zhang, S.; Peng, X.; Wang, X.; Chen, C.; Zeng, Z. A Novel Memristive Multiscroll Multistable Neural Network With Application to Secure Medical Image Communication. IEEE Trans. Circuits Syst. Video Technol. 2025, 35, 1774–1786. [Google Scholar] [CrossRef]
  34. Zhang, S.; Chen, C.; Zhang, Y.; Cai, J.; Wang, X.; Zeng, Z. Multidirectional Multidouble-Scroll Hopfield Neural Network With Application to Image Encryption. IEEE Trans. Syst. Man Cybern. Syst. 2025, 55, 735–746. [Google Scholar] [CrossRef]
  35. Zhang, S.; Li, Y.; Lu, D.; Li, C. A novel memristive synapse-coupled ring neural network with countless attractors and its application. Chaos Solitons Fractals 2024, 184, 115056. [Google Scholar] [CrossRef]
  36. Chen, C.; Min, F.; Cai, J.; Bao, H. Memristor Synapse-Driven Simplified Hopfield Neural Network: Hidden Dynamics, Attractor Control, and Circuit Implementation. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 71, 2308–2319. [Google Scholar] [CrossRef]
  37. Zhang, S.; Li, Y.; Wang, X.; Zeng, Z. Initial Offset-Boosted Coexisting Hidden Chaos and Firing Multistability in Memristive Ring Neural Network With Hardware Implementation. IEEE Trans. Ind. Electron. 2025, 72, 2024–2033. [Google Scholar] [CrossRef]
  38. Wan, Z.; Pu, Y.F.; Lai, Q. Multiscroll hidden attractor in memristive autapse neuron model and its memristor-based scroll control and application in image encryption. Neural Netw. 2025, 188, 107473. [Google Scholar] [CrossRef] [PubMed]
  39. Peng, Y.; Li, M.; Li, Z.; Ma, M.; Wang, M.; He, S. What is the impact of discrete memristor on the performance of neural network: A research on discrete memristor-based BP neural network. Neural Netw. 2025, 185, 107213. [Google Scholar] [CrossRef]
  40. Xiao, P.; Fang, J.; Wei, Z.; Dong, Y.; Du, S.; Wen, S.; Hong, Q. A Riccati Matrix Equation Solver Design Based Neurodynamics Method and Its Application. IEEE Trans. Autom. Sci. Eng. 2025, 22, 15163–15176. [Google Scholar] [CrossRef]
  41. Hong, Q.; Jiang, H.; Xiao, P.; Du, S.; Li, T. A Parallel Computing Scheme Utilizing Memristor Crossbars for Fast Corner Detection and Rotation Invariance in the ORB Algorithm. IEEE Trans. Comput. 2025, 74, 996–1010. [Google Scholar] [CrossRef]
  42. Lin, H.; Deng, X.; Yu, F.; Sun, Y. Diversified Butterfly Attractors of Memristive HNN With Two Memristive Systems and Application in IoMT for Privacy Protection. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2025, 44, 304–316. [Google Scholar] [CrossRef]
  43. Lai, Q.; Xu, Y.; Fortuna, L. Generating Simple Cyclic Memristive Neural Network Circuit With Controllable Multiscroll Attractors and Multivariable Amplitude Control. IEEE Trans. Neural Netw. Learn. Syst. 2025, 1–10. [Google Scholar] [CrossRef]
  44. Deng, Q.; Wang, C.; Yang, G. Chaotic Dynamics of Memristor-Coupled Tabu Learning Neuronal Network. Int. J. Bifurc. Chaos 2025, 35, 2550053. [Google Scholar] [CrossRef]
  45. Lai, Q.; Chen, Y. Multi-scroll attractor and its broken coexisting attractors in cyclic memristive neural network. Chaos Interdiscip. J. Nonlinear Sci. 2023, 33, 083149. [Google Scholar] [CrossRef] [PubMed]
  46. Bao, H.; Wang, R.; Tang, H.; Chen, M.; Bao, B. Discrete Memristive Hopfield Neural Network With Multi-Stripe/Wave Hyperchaos. IEEE Internet Things J. 2025, 12, 20902–20912. [Google Scholar] [CrossRef]
  47. Yu, F.; Wu, C.; Xu, S.; Yao, W.; Xu, C.; Cai, S.; Wang, C. Color video encryption transmission in IoT based on memristive hopfield neural network. Signal Image Video Process. 2025, 19, 77. [Google Scholar] [CrossRef]
  48. Zhang, S.; He, D.; Li, Y.; Lu, D.; Li, C. Dual Memristor-Coupled Hopfield Neural Network With Any Multi-Scroll Amplitude Control and Its Application for Medical Image Classification. IEEE Trans. Autom. Sci. Eng. 2025, 22, 17828–17840. [Google Scholar] [CrossRef]
  49. Wan, Q.; Chen, C.; Liu, T.; Rao, H.; Dong, J. High-dimensional memristor-coupled multiple neural networks with spatial multi-structure attractors and application in image encryption. Chaos Solitons Fractals 2025, 199, 116716. [Google Scholar] [CrossRef]
  50. Deng, Q.; Wang, C.; Sun, Y.; Yang, G. Delay Difference Feedback Memristive Map: Dynamics, Hardware Implementation, and Application in Path Planning. IEEE Trans. Circuits Syst. I Regul. Pap. 2025, 1–11. [Google Scholar] [CrossRef]
  51. Bao, H.; Fan, J.; Hua, Z.; Xu, Q.; Bao, B. Discrete Memristive Hopfield Neural Network and Application in Memristor-State-Based Encryption. IEEE Internet Things J. 2025, 12, 31843–31855. [Google Scholar] [CrossRef]
  52. Lai, Q.; Yang, L.; Chen, G. Two-Dimensional Discrete Memristive Oscillatory Hyperchaotic Maps With Diverse Dynamics. IEEE Trans. Ind. Electron. 2025, 72, 969–979. [Google Scholar] [CrossRef]
  53. Lai, Q.; Liu, Y. A family of image encryption schemes based on hyperchaotic system and cellular automata neighborhood. Sci. China Technol. Sci. 2025, 68, 1320401. [Google Scholar] [CrossRef]
  54. Deng, Q.; Wang, C.; Sun, Y.; Yang, G. Discrete Memristive Conservative Chaotic Map: Dynamics, Hardware Implementation, and Application in Secure Communication. IEEE Trans. Cybern. 2025, 55, 3926–3934. [Google Scholar] [CrossRef]
  55. Ding, D.; Chen, S.; Zhang, H.; Yang, Z.; Jin, F.; Liu, X. Firing pattern transition of fractional-order memristor-coupled Hindmarsh–Rose neurons model and its medical image encryption for region of interest. Nonlinear Dyn. 2024, 112, 10529–10554. [Google Scholar] [CrossRef]
  56. Feng, W.; Zhang, K.; Zhang, J.; Zhao, X.; Chen, Y.; Cai, B.; Zhu, Z.; Wen, H.; Ye, C. Integrating Fractional-Order Hopfield Neural Network with Differentiated Encryption: Achieving High-Performance Privacy Protection for Medical Images. Fractal Fract. 2025, 9, 426. [Google Scholar] [CrossRef]
  57. Liu, X.; Mou, J.; Wang, J.; Banerjee, S.; Li, P. Dynamical Analysis of a Novel Fractional-Order Chaotic System Based on Memcapacitor and Meminductor. Fractal Fract. 2022, 6, 671. [Google Scholar] [CrossRef]
  58. Li, X.; Yang, X.; Ju, X. A novel fractional-order memristive Hopfield neural network for traveling salesman problem and its FPGA implementation. Neural Netw. 2024, 179, 106548. [Google Scholar] [CrossRef]
  59. Hioual, A.; Ouannas, A.; Oussaeif, T.E.; Grassi, G.; Batiha, I.M.; Momani, S. On variable-order fractional discrete neural networks: Solvability and stability. Fractal Fract. 2022, 6, 119. [Google Scholar] [CrossRef]
  60. He, S.B.; Sun, K.H.; Wang, H.H. Solution of the fractional-order chaotic system based on Adomian decomposition algorithm and its complexity analysis. Acta Phys. Sin. 2014, 63, 030502. [Google Scholar] [CrossRef]
  61. Kong, X.; Yu, F.; Yao, W.; Cai, S.; Zhang, J.; Lin, H. Memristor-induced hyperchaos, multiscroll and extreme multistability in fractional-order HNN: Image encryption and FPGA implementation. Neural Netw. 2024, 171, 85–103. [Google Scholar] [CrossRef]
  62. Chua, L. If it’s pinched it’s a memristor. Semicond. Sci. Technol. 2014, 29, 104001. [Google Scholar] [CrossRef]
  63. Von Bremen, H.F.; Udwadia, F.E.; Proskurowski, W. An efficient QR based method for the computation of Lyapunov exponents. Phys. D Nonlinear Phenom. 1997, 101, 1–16. [Google Scholar] [CrossRef]
  64. Yu, X.; Huang, L.; Bao, H.; Bao, B. A Morris-Lecar model with novel fast-slow structure and its FPGA implementation. Sci. China Technol. Sci. 2025, 68, 1520405. [Google Scholar] [CrossRef]
  65. Wu, H.; Wang, W.; Wang, N.; Chen, M.; Xu, Q. Memristor-regulated multi-scrolls generation method in a cellular neural network. AEU-Int. J. Electron. Commun. 2025, 201, 156000. [Google Scholar] [CrossRef]
  66. Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, A.; et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; NIST Special Publication 800-22; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2022. [Google Scholar]
  67. Sun, J.; Li, C.; Wang, Z.; Wang, Y. A Memristive Fully Connect Neural Network and Application of Medical Image Encryption Based on Central Diffusion Algorithm. IEEE Trans. Ind. Inform. 2024, 20, 3778–3788. [Google Scholar] [CrossRef]
  68. Biamou, A.L.M.; Tamba, V.K.; Tagne, F.K.; Takougang, A.C.N. Fractional-order-induced symmetric multi-scroll chaotic attractors and double bubble bifurcations in a memristive coupled Hopfield neural networks. Chaos Solitons Fractals 2024, 178, 114267. [Google Scholar] [CrossRef]
  69. Deng, Q.; Wang, C.; Sun, Y.; Yang, G. Memristive multi-wing chaotic hopfield neural network for LiDAR data security. Nonlinear Dyn. 2025, 113, 17161–17176. [Google Scholar] [CrossRef]
  70. Anzo-Hernández, A.; Zambrano-Serrano, E.; Platas-Garza, M.A.; Volos, C. Dynamic Analysis and FPGA Implementation of Fractional-Order Hopfield Networks with Memristive Synapse. Fractal Fract. 2024, 8, 628. [Google Scholar] [CrossRef]
  71. Bao, B.; Zhou, C.; Bao, H.; Chen, B.; Chen, M. Heterogeneous Hopfield neural network with analog implementation. Chaos Solitons Fractals 2025, 194, 116234. [Google Scholar] [CrossRef]
Figure 1. Simulated pinched hysteresis loops of the memristor model under sinusoidal excitation v = v 0 sin ( 2 π f t ) : (a) f = 1 Hz , v 0 = 0.8 V , 1.0 V , 1.2 V . (b) v 0 = 1 V , f = 0.5 Hz , 2 Hz , 10 Hz .
Figure 1. Simulated pinched hysteresis loops of the memristor model under sinusoidal excitation v = v 0 sin ( 2 π f t ) : (a) f = 1 Hz , v 0 = 0.8 V , 1.0 V , 1.2 V . (b) v 0 = 1 V , f = 0.5 Hz , 2 Hz , 10 Hz .
Fractalfract 09 00561 g001
Figure 2. Memristive dual-wing fractional-order Hopfield neural network topology.
Figure 2. Memristive dual-wing fractional-order Hopfield neural network topology.
Fractalfract 09 00561 g002
Figure 3. Graphs of equations E 1 (Equation (7), green) and E 2 (Equation (8), blue) corresponding to different k values in the ( x 3 , x 2 ) plane: (a) k = 0.1 . (b) k = 1 . (c) k = 2 . (d) k = 3 .
Figure 3. Graphs of equations E 1 (Equation (7), green) and E 2 (Equation (8), blue) corresponding to different k values in the ( x 3 , x 2 ) plane: (a) k = 0.1 . (b) k = 1 . (c) k = 2 . (d) k = 3 .
Fractalfract 09 00561 g003aFractalfract 09 00561 g003b
Figure 4. Phase portraits and time series of the MDW-FOMHNN after ADM with fixed parameters γ = 0.1 , k = 1.2 , q = 0.8 , and ICs = ( 0.1 , 0.1 , 0.1 , 0.1 ) : (a) Phase portrait in ( x 3 ϕ ) plane. (b) Phase portrait in ( x 2 ϕ ) plane. (c) Phase portrait in ( x 2 x 3 ) plane. (d) Time series of ϕ . (e) Time series of x 3 . (f) Time series of x 2 .
Figure 4. Phase portraits and time series of the MDW-FOMHNN after ADM with fixed parameters γ = 0.1 , k = 1.2 , q = 0.8 , and ICs = ( 0.1 , 0.1 , 0.1 , 0.1 ) : (a) Phase portrait in ( x 3 ϕ ) plane. (b) Phase portrait in ( x 2 ϕ ) plane. (c) Phase portrait in ( x 2 x 3 ) plane. (d) Time series of ϕ . (e) Time series of x 3 . (f) Time series of x 2 .
Fractalfract 09 00561 g004
Figure 5. Bifurcation diagrams and the largest three Lyapunov exponents (LE) spectra for different values of the parameter k with q [ 0.4 ,   1 ] : (a) LE spectrum for k = 1.2 . (b) LE spectrum for k = 1.5 . (c) Bifurcation diagram for k = 1.2 . (d) Bifurcation diagram for k = 1.5 .
Figure 5. Bifurcation diagrams and the largest three Lyapunov exponents (LE) spectra for different values of the parameter k with q [ 0.4 ,   1 ] : (a) LE spectrum for k = 1.2 . (b) LE spectrum for k = 1.5 . (c) Bifurcation diagram for k = 1.2 . (d) Bifurcation diagram for k = 1.5 .
Fractalfract 09 00561 g005
Figure 6. Spectral entropy of MDW-FOMHNN for different values of k with q [ 0.4 ,   1 ] : (a) k = 1.2 . (b) k = 1.5 .
Figure 6. Spectral entropy of MDW-FOMHNN for different values of k with q [ 0.4 ,   1 ] : (a) k = 1.2 . (b) k = 1.5 .
Fractalfract 09 00561 g006
Figure 7. Bifurcation diagram and Lyapunov exponent spectrum for k [ 0.1 ,   2 ] with fractional order q = 0.8 : (a) Lyapunov exponent spectrum. (b) Bifurcation diagram.
Figure 7. Bifurcation diagram and Lyapunov exponent spectrum for k [ 0.1 ,   2 ] with fractional order q = 0.8 : (a) Lyapunov exponent spectrum. (b) Bifurcation diagram.
Fractalfract 09 00561 g007
Figure 8. Phase portraits of MDW-FOMHNN attractors under six ( k ,   q ) pairs in x 3 ϕ plane. (a) Periodic attractor 1 at ( k ,   q ) = ( 1.2 ,   0.4 ) . (b) Period-4 attractor 2 at ( k ,   q ) = ( 1.2 ,   0.42 ) . (c) Periodic attractor 3 at ( k ,   q ) = ( 1.2 ,   0.489 ) . (d) Chaotic attractor 1 at ( k ,   q ) = ( 1.2 ,   0.53 ) . (e) Chaotic attractor 2 at ( k ,   q ) = ( 1.2 ,   0.54 ) . (f) Chaotic attractor 3 at ( k ,   q ) = ( 0.9 ,   0.8 ) .
Figure 8. Phase portraits of MDW-FOMHNN attractors under six ( k ,   q ) pairs in x 3 ϕ plane. (a) Periodic attractor 1 at ( k ,   q ) = ( 1.2 ,   0.4 ) . (b) Period-4 attractor 2 at ( k ,   q ) = ( 1.2 ,   0.42 ) . (c) Periodic attractor 3 at ( k ,   q ) = ( 1.2 ,   0.489 ) . (d) Chaotic attractor 1 at ( k ,   q ) = ( 1.2 ,   0.53 ) . (e) Chaotic attractor 2 at ( k ,   q ) = ( 1.2 ,   0.54 ) . (f) Chaotic attractor 3 at ( k ,   q ) = ( 0.9 ,   0.8 ) .
Fractalfract 09 00561 g008
Figure 9. Coexisting chaotic attractors under different ICs and basins of attraction on different planes with initial parameters k = 1.5 q = 0.8 : (a) Coexisting chaotic attractors. (b) Basin of attraction at ICs = ( x 1 ( i ) ,   0.1 ,   0.1 ,   ϕ ( i ) ) , x 1 ( i ) ,   ϕ ( i ) [ 2 ,   2 ] . (c) Basin of attraction at ICs = ( 0.1 ,   x 2 ( i ) ,   0.1 ,   ϕ ( i ) ) , x 2 ( i ) ,   ϕ ( i ) [ 2 ,   2 ] . (d) Basin of attraction at ICs = ( 0.1 ,   0.1 ,   x 3 ( i ) ,   ϕ ( i ) ) , x 3 ( i ) ,   ϕ ( i ) [ 2 ,   2 ] .
Figure 9. Coexisting chaotic attractors under different ICs and basins of attraction on different planes with initial parameters k = 1.5 q = 0.8 : (a) Coexisting chaotic attractors. (b) Basin of attraction at ICs = ( x 1 ( i ) ,   0.1 ,   0.1 ,   ϕ ( i ) ) , x 1 ( i ) ,   ϕ ( i ) [ 2 ,   2 ] . (c) Basin of attraction at ICs = ( 0.1 ,   x 2 ( i ) ,   0.1 ,   ϕ ( i ) ) , x 2 ( i ) ,   ϕ ( i ) [ 2 ,   2 ] . (d) Basin of attraction at ICs = ( 0.1 ,   0.1 ,   x 3 ( i ) ,   ϕ ( i ) ) , x 3 ( i ) ,   ϕ ( i ) [ 2 ,   2 ] .
Fractalfract 09 00561 g009
Figure 10. Coexisting periodic attractors and their time series of MDW-FOMHNN for different values of parameter k. (a) Phase portraits of attractors at k = 0.8 . (b) Time series at k = 0.8 . (c) Phase portraits of attractors at k = 1.8 . (d) Time series at k = 1.8 .
Figure 10. Coexisting periodic attractors and their time series of MDW-FOMHNN for different values of parameter k. (a) Phase portraits of attractors at k = 0.8 . (b) Time series at k = 0.8 . (c) Phase portraits of attractors at k = 1.8 . (d) Time series at k = 1.8 .
Fractalfract 09 00561 g010aFractalfract 09 00561 g010b
Figure 11. Hardware implementation scheme for the MDW-FOMHNN.
Figure 11. Hardware implementation scheme for the MDW-FOMHNN.
Fractalfract 09 00561 g011
Figure 12. Chaotic attractor phase portraits captured by the oscilloscope when k = 1.2 , q = 0.54 , and initial conditions ICs = ( 0.1 ,   0.1 ,   0.1 ,   0.1 ) . (a) Physical implementation scheme for the ( x 2 ϕ ) plane. (b) Physical implementation scheme for the ( x 3 ϕ ) plane. (c) Attractor phase portrait on the ( x 2 ϕ ) plane. (d) Attractor phase portrait on the ( x 3 ϕ ) plane.
Figure 12. Chaotic attractor phase portraits captured by the oscilloscope when k = 1.2 , q = 0.54 , and initial conditions ICs = ( 0.1 ,   0.1 ,   0.1 ,   0.1 ) . (a) Physical implementation scheme for the ( x 2 ϕ ) plane. (b) Physical implementation scheme for the ( x 3 ϕ ) plane. (c) Attractor phase portrait on the ( x 2 ϕ ) plane. (d) Attractor phase portrait on the ( x 3 ϕ ) plane.
Fractalfract 09 00561 g012
Figure 13. Coexisting attractors captured by the oscilloscope when the initial parameters of MDW-FOMHNN are set to k=1.5, q=0.8: (a) ICs = ( 0.1 ,   0.1 ,   0.1 ,   0.1 ) . (b) ICs = ( 0.1 ,   0.1 ,   0.1 ,   0.1 ) .
Figure 13. Coexisting attractors captured by the oscilloscope when the initial parameters of MDW-FOMHNN are set to k=1.5, q=0.8: (a) ICs = ( 0.1 ,   0.1 ,   0.1 ,   0.1 ) . (b) ICs = ( 0.1 ,   0.1 ,   0.1 ,   0.1 ) .
Fractalfract 09 00561 g013
Figure 14. The power consumption for the FPGA implementation of the MDW-FOMHNN.
Figure 14. The power consumption for the FPGA implementation of the MDW-FOMHNN.
Fractalfract 09 00561 g014
Figure 15. Framework of the encryption and decryption algorithm.
Figure 15. Framework of the encryption and decryption algorithm.
Fractalfract 09 00561 g015
Figure 16. The images with a resolution of 512 × 512 pixels and their histograms before and after encryption. (a) Plain image. (b) Cipher image. (c) Decrypted image. (d) Histogram of the plain image. (e) Histogram of the cipher image. (f) Histogram of the decrypted image.
Figure 16. The images with a resolution of 512 × 512 pixels and their histograms before and after encryption. (a) Plain image. (b) Cipher image. (c) Decrypted image. (d) Histogram of the plain image. (e) Histogram of the cipher image. (f) Histogram of the decrypted image.
Fractalfract 09 00561 g016
Figure 17. Decrypted images after being subjected to salt-and-pepper noise at different levels. (a) Decrypted image with 0% noise. (b) Decrypted image with 10% noise. (c) Decrypted image with 30% noise. (d) Decrypted image with 60% noise.
Figure 17. Decrypted images after being subjected to salt-and-pepper noise at different levels. (a) Decrypted image with 0% noise. (b) Decrypted image with 10% noise. (c) Decrypted image with 30% noise. (d) Decrypted image with 60% noise.
Fractalfract 09 00561 g017
Table 1. Resource utilization of FPGA implementation.
Table 1. Resource utilization of FPGA implementation.
ResourceUtilizationAvailableUtilization (%)
LUT21,76853,20040.92
LUTRAM104917,4006.03
FF29,257106,40027.50
DSP11822053.64
IO3412527.20
BUFG1323.13
Table 2. The randomness test results of S PRNG based on NIST SP 800-22.
Table 2. The randomness test results of S PRNG based on NIST SP 800-22.
No.Statistical Testsp-ValuePass Rate
1Frequency0.27570920/20
2Block Frequency0.53414620/20
3Cumulative Sums0.16260620/20
4Runs0.35048520/20
5Longest Run0.35048520/20
6Rank0.73991820/20
7FFT0.37048520/20
8Non-Overlapping Template0.53414619/20
9Overlapping Template0.03517420/20
10Universal0.91141320/20
11Approximate Entropy0.35048520/20
12Random Excursions0.53414610/10
13Random Excursions Variant0.12232510/10
14Serial0.63711920/20
15Linear Complexity0.21330920/20
Table 3. Comparison of correlation coefficients for encrypted images under different schemes.
Table 3. Comparison of correlation coefficients for encrypted images under different schemes.
ReferenceImage SizeHorizontalVerticalDiagonal
[51] 512 × 512 0.007900
[49] 256 × 256 0.009700−0.004700−0.005000
[49] 512 × 512 −0.0107000.006300−0.004900
[42] 512 × 512 0.0040000.0023000.002700
Proposed 256 × 256 0.002635 0.008996 0.001836
Proposed 512 × 512 0.004994 0.007952 0.001432
Table 4. Performance comparison of encrypted images in terms of information entropy, NPCR/UACI, and encryption time.
Table 4. Performance comparison of encrypted images in terms of information entropy, NPCR/UACI, and encryption time.
Ref.Image SizeEntropyNPCR/UACI (%)Time (s)
[51] 512 × 512 7.999399.6100/33.4500
[49] 512 × 512 99.6100/–
[42] 512 × 512 7.999899.6095/33.4632
[61] 512 × 512 7.999399.6080/33.46210.1496
[67] 320 × 320 7.998299.5900/33.43003.9000
[38] 512 × 512 7.9994–/–0.2810
Proposed 256 × 256 7.997099.6063/33.55050.0936
Proposed 512 × 512 7.999499.6227/33.40240.2430
Table 5. The dynamic characteristics of selected neural networks from existing studies.
Table 5. The dynamic characteristics of selected neural networks from existing studies.
ReferenceMemristive DeviceAttractor ShapeHidden AttractorHardwareMaximum SE Value
[67]OneSingle-scrollNo
[68]OneMulti-scrollNoArduino-Due0.35
[69]TwoMulti-wingNoFPGA0.55
[70]OneScrollNoFPGA0.45
[71]ZeroDouble-scrollNoAnalog Circuit
ProposedOneDual-wingYesFPGA0.62
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

He, S.; Yu, F.; Guo, R.; Zheng, M.; Tang, T.; Jin, J.; Wang, C. Dynamic Analysis and FPGA Implementation of a Fractional-Order Memristive Hopfield Neural Network with Hidden Chaotic Dual-Wing Attractors. Fractal Fract. 2025, 9, 561. https://doi.org/10.3390/fractalfract9090561

AMA Style

He S, Yu F, Guo R, Zheng M, Tang T, Jin J, Wang C. Dynamic Analysis and FPGA Implementation of a Fractional-Order Memristive Hopfield Neural Network with Hidden Chaotic Dual-Wing Attractors. Fractal and Fractional. 2025; 9(9):561. https://doi.org/10.3390/fractalfract9090561

Chicago/Turabian Style

He, Shaoqi, Fei Yu, Rongyao Guo, Mingfang Zheng, Tinghui Tang, Jie Jin, and Chunhua Wang. 2025. "Dynamic Analysis and FPGA Implementation of a Fractional-Order Memristive Hopfield Neural Network with Hidden Chaotic Dual-Wing Attractors" Fractal and Fractional 9, no. 9: 561. https://doi.org/10.3390/fractalfract9090561

APA Style

He, S., Yu, F., Guo, R., Zheng, M., Tang, T., Jin, J., & Wang, C. (2025). Dynamic Analysis and FPGA Implementation of a Fractional-Order Memristive Hopfield Neural Network with Hidden Chaotic Dual-Wing Attractors. Fractal and Fractional, 9(9), 561. https://doi.org/10.3390/fractalfract9090561

Article Metrics

Back to TopTop