Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,820)

Search Parameters:
Keywords = chaotic system

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 90648 KiB  
Article
An Image Encryption Method Based on a Two-Dimensional Cross-Coupled Chaotic System
by Caiwen Chen, Tianxiu Lu and Boxu Yan
Symmetry 2025, 17(8), 1221; https://doi.org/10.3390/sym17081221 (registering DOI) - 2 Aug 2025
Abstract
Chaotic systems have demonstrated significant potential in the field of image encryption due to their extreme sensitivity to initial conditions, inherent unpredictability, and pseudo-random behavior. However, existing chaos-based encryption schemes still face several limitations, including narrow chaotic regions, discontinuous chaotic ranges, uneven trajectory [...] Read more.
Chaotic systems have demonstrated significant potential in the field of image encryption due to their extreme sensitivity to initial conditions, inherent unpredictability, and pseudo-random behavior. However, existing chaos-based encryption schemes still face several limitations, including narrow chaotic regions, discontinuous chaotic ranges, uneven trajectory distributions, and fixed pixel processing sequences. These issues substantially hinder the security and efficiency of such algorithms. To address these challenges, this paper proposes a novel hyperchaotic map, termed the two-dimensional cross-coupled chaotic map (2D-CFCM), derived from a newly designed 2D cross-coupled chaotic system. The proposed 2D-CFCM exhibits enhanced randomness, greater sensitivity to initial values, a broader chaotic region, and a more uniform trajectory distribution, thereby offering stronger security guarantees for image encryption applications. Based on the 2D-CFCM, an innovative image encryption method was further developed, incorporating efficient scrambling and forward and reverse random multidirectional diffusion operations with symmetrical properties. Through simulation tests on images of varying sizes and resolutions, including color images, the results demonstrate the strong security performance of the proposed method. This method has several remarkable features, including an extremely large key space (greater than 2912), extremely high key sensitivity, nearly ideal entropy value (greater than 7.997), extremely low pixel correlation (less than 0.04), and excellent resistance to differential attacks (with the average values of NPCR and UACI being 99.6050% and 33.4643%, respectively). Compared to existing encryption algorithms, the proposed method provides significantly enhanced security. Full article
(This article belongs to the Special Issue Symmetry in Chaos Theory and Applications)
Show Figures

Figure 1

22 pages, 7609 KiB  
Article
Bidirectional Conservative–Dissipative Transitions in a Five-Dimensional Fractional Chaotic System
by Yiming Wang, Fengjiao Gao and Mingqing Zhu
Mathematics 2025, 13(15), 2477; https://doi.org/10.3390/math13152477 - 1 Aug 2025
Abstract
This study investigates a modified five-dimensional chaotic system by incorporating structural term adjustments and Caputo fractional-order differential operators. The modified system exhibits significantly enriched dynamic behaviors, including offset boosting, phase trajectory rotation, phase trajectory reversal, and contraction phenomena. Additionally, the system exhibits bidirectional [...] Read more.
This study investigates a modified five-dimensional chaotic system by incorporating structural term adjustments and Caputo fractional-order differential operators. The modified system exhibits significantly enriched dynamic behaviors, including offset boosting, phase trajectory rotation, phase trajectory reversal, and contraction phenomena. Additionally, the system exhibits bidirectional transitions—conservative-to-dissipative transitions governed by initial conditions and dissipative-to-conservative transitions controlled by fractional order variations—along with a unique chaotic-to-quasiperiodic transition observed exclusively at low fractional orders. To validate the system’s physical realizability, a signal processing platform based on Digital Signal Processing (DSP) is implemented. Experimental measurements closely align with numerical simulations, confirming the system’s feasibility for practical applications. Full article
(This article belongs to the Special Issue Nonlinear Dynamics and Chaos Theory, 2nd Edition)
Show Figures

Figure 1

31 pages, 9514 KiB  
Article
FPGA Implementation of Secure Image Transmission System Using 4D and 5D Fractional-Order Memristive Chaotic Oscillators
by Jose-Cruz Nuñez-Perez, Opeyemi-Micheal Afolabi, Vincent-Ademola Adeyemi, Yuma Sandoval-Ibarra and Esteban Tlelo-Cuautle
Fractal Fract. 2025, 9(8), 506; https://doi.org/10.3390/fractalfract9080506 (registering DOI) - 31 Jul 2025
Abstract
With the rapid proliferation of real-time digital communication, particularly in multimedia applications, securing transmitted image data has become a vital concern. While chaotic systems have shown strong potential for cryptographic use, most existing approaches rely on low-dimensional, integer-order architectures, limiting their complexity and [...] Read more.
With the rapid proliferation of real-time digital communication, particularly in multimedia applications, securing transmitted image data has become a vital concern. While chaotic systems have shown strong potential for cryptographic use, most existing approaches rely on low-dimensional, integer-order architectures, limiting their complexity and resistance to attacks. Advances in fractional calculus and memristive technologies offer new avenues for enhancing security through more complex and tunable dynamics. However, the practical deployment of high-dimensional fractional-order memristive chaotic systems in hardware remains underexplored. This study addresses this gap by presenting a secure image transmission system implemented on a field-programmable gate array (FPGA) using a universal high-dimensional memristive chaotic topology with arbitrary-order dynamics. The design leverages four- and five-dimensional hyperchaotic oscillators, analyzed through bifurcation diagrams and Lyapunov exponents. To enable efficient hardware realization, the chaotic dynamics are approximated using the explicit fractional-order Runge–Kutta (EFORK) method with the Caputo fractional derivative, implemented in VHDL. Deployed on the Xilinx Artix-7 AC701 platform, synchronized master–slave chaotic generators drive a multi-stage stream cipher. This encryption process supports both RGB and grayscale images. Evaluation shows strong cryptographic properties: correlation of 6.1081×105, entropy of 7.9991, NPCR of 99.9776%, UACI of 33.4154%, and a key space of 21344, confirming high security and robustness. Full article
Show Figures

Figure 1

20 pages, 8878 KiB  
Article
Identification Method for Resistance Coefficients in Heating Networks Based on an Improved Differential Evolution Algorithm
by Enze Zhou, Yaning Liu, Minjia Du, Junli Yu and Wenxiao Xu
Buildings 2025, 15(15), 2701; https://doi.org/10.3390/buildings15152701 (registering DOI) - 31 Jul 2025
Viewed by 41
Abstract
The intelligent upgrade of heating systems faces the challenge of accurately identifying high-dimensional pipe-network resistance coefficients; difficulties in accomplishing this can lead to hydraulic imbalance and redundant energy consumption. To address the limitations of traditional Differential Evolution (DE) algorithms under high-dimensional operating conditions, [...] Read more.
The intelligent upgrade of heating systems faces the challenge of accurately identifying high-dimensional pipe-network resistance coefficients; difficulties in accomplishing this can lead to hydraulic imbalance and redundant energy consumption. To address the limitations of traditional Differential Evolution (DE) algorithms under high-dimensional operating conditions, this paper proposes an Improved Differential Evolution Algorithm (SDEIA) incorporating chaotic mapping, adaptive mutation and crossover strategies, and an immune mechanism. Furthermore, a multi-constrained identification model is constructed based on Kirchhoff’s laws. Validation with actual engineering data demonstrates that the proposed method achieves a lower average relative error in resistance coefficients and exhibits a more concentrated error distribution. SDEIA provides a high-precision tool for multi-heat-source networking and dynamic regulation in heating systems, facilitating low-carbon and intelligent upgrades. Full article
(This article belongs to the Section Building Energy, Physics, Environment, and Systems)
Show Figures

Figure 1

19 pages, 5262 KiB  
Article
A Conservative Four-Dimensional Hyperchaotic Model with a Center Manifold and Infinitely Many Equilibria
by Surma H. Ibrahim, Ali A. Shukur and Rizgar H. Salih
Modelling 2025, 6(3), 74; https://doi.org/10.3390/modelling6030074 (registering DOI) - 29 Jul 2025
Viewed by 191
Abstract
This paper presents a novel four-dimensional autonomous conservative model characterized by an infinite set of equilibrium points and an unusual algebraic structure in which all eigenvalues of the Jacobian matrix are zero. The linearization of the proposed model implies that classical stability analysis [...] Read more.
This paper presents a novel four-dimensional autonomous conservative model characterized by an infinite set of equilibrium points and an unusual algebraic structure in which all eigenvalues of the Jacobian matrix are zero. The linearization of the proposed model implies that classical stability analysis is inadequate, as only the center manifolds are obtained. Consequently, the stability of the system is investigated through both analytical and numerical methods using Lyapunov functions and numerical simulations. The proposed model exhibits rich dynamics, including hyperchaotic behavior, which is characterized using the Lyapunov exponents, bifurcation diagrams, sensitivity analysis, attractor projections, and Poincaré map. Moreover, in this paper, we explore the model with fractional-order derivatives, demonstrating that the fractional dynamics fundamentally change the geometrical structure of the attractors and significantly change the system stability. The Grünwald–Letnikov formulation is used for modeling, while numerical integration is performed using the Caputo operator to capture the memory effects inherent in fractional models. Finally, an analog electronic circuit realization is provided to experimentally validate the theoretical and numerical findings. Full article
Show Figures

Figure 1

27 pages, 1601 KiB  
Article
A Lightweight Authentication Method for Industrial Internet of Things Based on Blockchain and Chebyshev Chaotic Maps
by Zhonghao Zhai, Junyi Liu, Xinying Liu, Yanqin Mao, Xinjun Zhang, Jialin Ma and Chunhua Jin
Future Internet 2025, 17(8), 338; https://doi.org/10.3390/fi17080338 - 28 Jul 2025
Viewed by 107
Abstract
The Industrial Internet of Things (IIoT), a key enabler of Industry 4.0, integrates advanced communication technologies with the industrial economy to enable intelligent manufacturing and interconnected systems. Secure and reliable identity authentication in the IIoT becomes essential as connectivity expands across devices, systems, [...] Read more.
The Industrial Internet of Things (IIoT), a key enabler of Industry 4.0, integrates advanced communication technologies with the industrial economy to enable intelligent manufacturing and interconnected systems. Secure and reliable identity authentication in the IIoT becomes essential as connectivity expands across devices, systems, and domains. Blockchain technology presents a promising solution due to its decentralized, tamper-resistant, and traceable characteristics, facilitating secure and transparent identity verification. However, current blockchain-based cross-domain authentication schemes often lack a lightweight design, rendering them unsuitable for latency-sensitive and resource-constrained industrial environments. This paper proposes a lightweight cross-domain authentication scheme that combines blockchain with Chebyshev chaotic mapping. Unlike existing schemes relying heavily on Elliptic Curve Cryptography or bilinear pairing, our design circumvents such computationally intensive primitives entirely through the algebraic structure of Chebyshev polynomials. A formal security analysis using the Real-Or-Random (ROR) model demonstrates the scheme’s robustness. Furthermore, performance evaluations conducted with Hyperledger Fabric and the MIRACL cryptographic library validate the method’s effectiveness and superiority over existing approaches in terms of both security and operational efficiency. Full article
Show Figures

Figure 1

10 pages, 3514 KiB  
Article
General Construction Method and Proof for a Class of Quadratic Chaotic Mappings
by Wenxia Xu, Xiangkun Chen, Ziwei Zhou, Guodong Li and Xiaoming Song
Mathematics 2025, 13(15), 2409; https://doi.org/10.3390/math13152409 - 26 Jul 2025
Viewed by 194
Abstract
The importance of chaotic systems as the main pseudo-random cryptographic generator of encryption algorithms in the field of communication secrecy cannot be overstated, but in practical applications, researchers often choose to build upon traditional chaotic maps, such as the logistic map, for study [...] Read more.
The importance of chaotic systems as the main pseudo-random cryptographic generator of encryption algorithms in the field of communication secrecy cannot be overstated, but in practical applications, researchers often choose to build upon traditional chaotic maps, such as the logistic map, for study and application. This approach provides attackers with more opportunities to compromise the encryption scheme. Therefore, based on previous results, this paper theoretically investigates discrete chaotic mappings in the real domain, constructs a general method for a class of quadratic chaotic mappings, and justifies its existence based on a robust chaos determination theorem for S single-peaked mappings. Based on the theorem, we construct two chaotic map examples and conduct detailed analysis of their Lyapunov exponent spectra and bifurcation diagrams. Subsequently, comparative analysis is performed between the proposed quadratic chaotic maps and the conventional logistic map using the 0–1 test for chaos and SE complexity metrics, validating their enhanced chaotic properties. Full article
Show Figures

Figure 1

19 pages, 704 KiB  
Article
Semi-Analytical Solutions for the Shimizu–Morioka Dynamical System
by Remus-Daniel Ene, Nicolina Pop and Rodica Badarau
Axioms 2025, 14(8), 580; https://doi.org/10.3390/axioms14080580 - 26 Jul 2025
Viewed by 94
Abstract
The Shimizu–Morioka dynamical system is analytically investigated in this paper by means of the Optimal Auxiliary Functions Method (OAFM). This system has a chaotic dynamical behavior, specified for more physical applications as chaos synchronization, an attractive phenomenon involving various real-life processes. Semi-analytical solutions [...] Read more.
The Shimizu–Morioka dynamical system is analytically investigated in this paper by means of the Optimal Auxiliary Functions Method (OAFM). This system has a chaotic dynamical behavior, specified for more physical applications as chaos synchronization, an attractive phenomenon involving various real-life processes. Semi-analytical solutions for the Shimizu–Morioka system are provided. A comparative analysis between the obtained results via the OAFM method and the corresponding numerical solution highlights the accuracy and efficiency of the involved method. The choice of the OAFM method is justified by the performance in comparison with the iterative method with 7–10 iterations. The physical parameters’ influence is investigated on damped oscillations and periodical behaviors of the obtained solutions. Full article
Show Figures

Figure 1

23 pages, 16115 KiB  
Article
Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos
by Zhiyu Xie, Weihong Xie, Xiyuan Cheng, Zhengqin Yuan, Wenbin Cheng and Yiting Lin
Entropy 2025, 27(8), 790; https://doi.org/10.3390/e27080790 - 25 Jul 2025
Viewed by 147
Abstract
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to [...] Read more.
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences. Subsequently, the input image is subjected to a light scrambling process at the bit level. The Q matrix generated by the Fibonacci sequence is then employed to diffuse the obtained intermediate cipher image. The final ciphertext image is then generated by random direction confusion. Throughout the encryption process, plaintext correlation mechanisms are employed. Consequently, due to the feedback loop of the plaintext, this algorithm is capable of resisting known-plaintext attacks and chosen-plaintext attacks. Theoretical analysis and empirical results demonstrate that the algorithm fulfils the cryptographic requirements of confusion, diffusion, and avalanche effects, while also exhibiting a robust password space and excellent numerical statistical properties. Consequently, the security enhancement mechanism based on Fibonacci interleaved diffusion and non-degenerate chaotic system proposed in this paper effectively enhances the algorithm’s resistance to cryptographic attacks. Full article
Show Figures

Figure 1

20 pages, 11438 KiB  
Article
Investigating Chaotic Techniques and Wave Profiles with Parametric Effects in a Fourth-Order Nonlinear Fractional Dynamical Equation
by Jan Muhammad, Ali H. Tedjani, Ejaz Hussain and Usman Younas
Fractal Fract. 2025, 9(8), 487; https://doi.org/10.3390/fractalfract9080487 - 24 Jul 2025
Viewed by 257
Abstract
In this article, we investigate the fractional soliton solutions as well as the chaotic analysis of the fourth-order nonlinear Ablowitz–Kaup–Newell–Segur wave equation. This model is considered an intriguing high-order nonlinear partial differential equation that integrates additional spatial and dispersive effects to extend the [...] Read more.
In this article, we investigate the fractional soliton solutions as well as the chaotic analysis of the fourth-order nonlinear Ablowitz–Kaup–Newell–Segur wave equation. This model is considered an intriguing high-order nonlinear partial differential equation that integrates additional spatial and dispersive effects to extend the concepts to more intricate wave dynamics, relevant in engineering and science for understanding complex phenomena. To examine the solitary wave solutions of the proposed model, we employ sophisticated analytical techniques, including the generalized projective Riccati equation method, the new improved generalized exponential rational function method, and the modified F-expansion method, along with mathematical simulations, to obtain a deeper insight into wave propagation. To explore desirable soliton solutions, the nonlinear partial differential equation is converted into its respective ordinary differential equations by wave transforms utilizing β-fractional derivatives. Further, the solutions in the forms of bright, dark, singular, combined, and complex solitons are secured. Various physical parameter values and arrangements are employed to investigate the soliton solutions of the system. Variations in parameter values result in specific behaviors of the solutions, which we illustrate via various types of visualizations. Additionally, a key aspect of this research involves analyzing the chaotic behavior of the governing model. A perturbed version of the system is derived and then analyzed using chaos detection techniques such as power spectrum analysis, Poincaré return maps, and basin attractor visualization. The study of nonlinear dynamics reveals the system’s sensitivity to initial conditions and its dependence on time-decay effects. This indicates that the system exhibits chaotic behavior under perturbations, where even minor variations in the starting conditions can lead to drastically different outcomes as time progresses. Such behavior underscores the complexity and unpredictability inherent in the system, highlighting the importance of understanding its chaotic dynamics. This study evaluates the effectiveness of currently employed methodologies and elucidates the specific behaviors of the system’s nonlinear dynamics, thus providing new insights into the field of high-dimensional nonlinear scientific wave phenomena. The results demonstrate the effectiveness and versatility of the approach used to address complex nonlinear partial differential equations. Full article
(This article belongs to the Section Mathematical Physics)
Show Figures

Figure 1

20 pages, 5416 KiB  
Article
A Novel One-Dimensional Chaotic System for Image Encryption Through the Three-Strand Structure of DNA
by Yingjie Su, Han Xia, Ziyu Chen, Han Chen and Linqing Huang
Entropy 2025, 27(8), 776; https://doi.org/10.3390/e27080776 - 23 Jul 2025
Viewed by 253
Abstract
Digital images have been widely applied in fields such as mobile devices, the Internet of Things, and medical imaging. Although significant progress has been made in image encryption technology, it still faces many challenges, such as attackers using powerful computing resources and advanced [...] Read more.
Digital images have been widely applied in fields such as mobile devices, the Internet of Things, and medical imaging. Although significant progress has been made in image encryption technology, it still faces many challenges, such as attackers using powerful computing resources and advanced algorithms to crack encryption systems. To address these challenges, this paper proposes a novel image encryption algorithm based on one-dimensional sawtooth wave chaotic system (1D-SAW) and the three-strand structure of DNA. Firstly, a new 1D-SAW chaotic system was designed. By introducing nonlinear terms and periodic disturbances, this system is capable of generating chaotic sequences with high randomness and initial value sensitivity. Secondly, a new diffusion rule based on the three-strand structure of DNA is proposed. Compared with the traditional DNA encoding and XOR operation, this rule further enhances the complexity and anti-attack ability of the encryption process. Finally, the security and randomness of the 1D-SAW and image encryption algorithms were verified through various tests. Results show that this method exhibits better performance in resisting statistical attacks and differential attacks. Full article
(This article belongs to the Topic Recent Trends in Nonlinear, Chaotic and Complex Systems)
Show Figures

Figure 1

18 pages, 1750 KiB  
Article
Delayed Feedback Chaos Control on a Cournot Game with Relative Profit Maximization
by Kosmas Papadopoulos, Georges Sarafopoulos and Evangelos Ioannidis
Mathematics 2025, 13(15), 2328; https://doi.org/10.3390/math13152328 - 22 Jul 2025
Viewed by 167
Abstract
This article concerns a Cournot duopoly game with homogeneous expectations. The cost functions of the two players are assumed to be asymmetric to capture possible asymmetries in firms’ technologies or firms’ input costs. Large values of the speed of adjustment of the players [...] Read more.
This article concerns a Cournot duopoly game with homogeneous expectations. The cost functions of the two players are assumed to be asymmetric to capture possible asymmetries in firms’ technologies or firms’ input costs. Large values of the speed of adjustment of the players destabilize the Nash Equilibrium (N.E.) and cause the appearance of a chaotic trajectory in the Discrete Dynamical System (D.D.S.). The scope of this article is to control the chaotic dynamics that appear outside the stability field, assuming asymmetric cost functions of the two players. Specifically, one player uses linear costs, while the other uses nonlinear costs (quadratic or cubic). The cubic cost functions are widely used in the Economic Dispatch Problem. The delayed feedback control method is applied by introducing a new control parameter at the D.D.S. It is shown that larger values of the control parameter keep the N.E. locally asymptotically stable even for higher values of the speed of adjustment. Full article
(This article belongs to the Special Issue Latest Advances in Mathematical Economics)
Show Figures

Figure 1

26 pages, 9566 KiB  
Article
How Does Energy Harvesting from a Fluttering Foil Influence Its Nonlinear Dynamics?
by Dilip Thakur, Faisal Muhammad and Muhammad Saif Ullah Khalid
Energies 2025, 18(15), 3897; https://doi.org/10.3390/en18153897 - 22 Jul 2025
Viewed by 216
Abstract
This study investigates the nonlinear aeroelastic behavior and energy harvesting performance of a two-degrees-of-freedom NACA 0012 airfoil under varying reduced velocities and electrical load resistances. The system exhibits a range of dynamic responses, including periodic and chaotic states, governed by strong fluid–structure interactions. [...] Read more.
This study investigates the nonlinear aeroelastic behavior and energy harvesting performance of a two-degrees-of-freedom NACA 0012 airfoil under varying reduced velocities and electrical load resistances. The system exhibits a range of dynamic responses, including periodic and chaotic states, governed by strong fluid–structure interactions. Nonlinear oscillations first appear near the critical reduced velocity Ur*=6, with large-amplitude limit-cycle oscillations emerging around Ur*=8 in the absence of the electrical loading. As the load resistance increases, this transition shifts to higher Ur*, reflecting the damping effect of the electrical load. Fourier spectra reveal the presence of odd and even superharmonics in the lift coefficient, indicating nonlinearities induced by fluid–structure coupling, which diminishes at higher resistances. Phase portraits and Poincaré maps capture transitions across dynamical regimes, from periodic to chaotic behavior, particularly at a low resistance. The voltage output correlates with variations in the lift force, reaching its maximum at an intermediate resistance before declining due to a suppressing nonlinearity. Flow visualizations identify various vortex shedding patterns, including single (S), paired (P), triplet (T), multiple-pair (mP) and pair with single (P + S) that weaken at higher resistances and reduced velocities. The results demonstrate that nonlinearity plays a critical role in efficient voltage generation but remains effective only within specific parameter ranges. Full article
(This article belongs to the Section A3: Wind, Wave and Tidal Energy)
Show Figures

Figure 1

45 pages, 11380 KiB  
Article
Application of Multi-Strategy Controlled Rime Algorithm in Path Planning for Delivery Robots
by Haokai Lv, Qian Qian, Jiawen Pan, Miao Song, Yong Feng and Yingna Li
Biomimetics 2025, 10(7), 476; https://doi.org/10.3390/biomimetics10070476 - 19 Jul 2025
Viewed by 407
Abstract
As a core component of automated logistics systems, delivery robots hold significant application value in the field of unmanned delivery. This research addresses the robot path planning problem, aiming to enhance delivery efficiency and reduce operational costs through systematic improvements to the RIME [...] Read more.
As a core component of automated logistics systems, delivery robots hold significant application value in the field of unmanned delivery. This research addresses the robot path planning problem, aiming to enhance delivery efficiency and reduce operational costs through systematic improvements to the RIME optimization algorithm. Through in-depth analysis, we identified several major drawbacks in the standard RIME algorithm for path planning: insufficient global exploration capability in the initial stages, a lack of diversity in the hard RIME search mechanism, and oscillatory phenomena in soft RIME step size adjustment. These issues often lead to undesirable phenomena in path planning, such as local optima traps, path redundancy, or unsmooth trajectories. To address these limitations, this study proposes the Multi-Strategy Controlled Rime Algorithm (MSRIME), whose innovation primarily manifests in three aspects: first, it constructs a multi-strategy collaborative optimization framework, utilizing an infinite folding Fuch chaotic map for intelligent population initialization to significantly enhance the diversity of solutions; second, it designs a cooperative mechanism between a controlled elite strategy and an adaptive search strategy that, through a dynamic control factor, autonomously adjusts the strategy activation probability and adaptation rate, expanding the search space while ensuring algorithmic convergence efficiency; and finally, it introduces a cosine annealing strategy to improve the step size adjustment mechanism, reducing parameter sensitivity and effectively preventing path distortions caused by abrupt step size changes. During the algorithm validation phase, comparative tests were conducted between two groups of algorithms, demonstrating their significant advantages in optimization capability, convergence speed, and stability. Further experimental analysis confirmed that the algorithm’s multi-strategy framework effectively suppresses the impact of coordinate and dimensional differences on path quality during iteration, making it more suitable for delivery robot path planning scenarios. Ultimately, path planning experimental results across various Building Coverage Rate (BCR) maps and diverse application scenarios show that MSRIME exhibits superior performance in key indicators such as path length, running time, and smoothness, providing novel technical insights and practical solutions for the interdisciplinary research between intelligent logistics and computer science. Full article
Show Figures

Figure 1

19 pages, 638 KiB  
Article
Delayed Taxation and Macroeconomic Stability: A Dynamic IS–LM Model with Memory Effects
by Ciprian Panzaru, Sorin Belea and Laura Jianu
Economies 2025, 13(7), 208; https://doi.org/10.3390/economies13070208 - 19 Jul 2025
Viewed by 245
Abstract
This study develops a dynamic IS-LM macroeconomic model that incorporates delayed taxation and a memory-dependent income effect, and calibrates it to quarterly data for Romania (2000–2023). Within this framework, fiscal policy lags are modelled using a “memory” income variable that weights past incomes, [...] Read more.
This study develops a dynamic IS-LM macroeconomic model that incorporates delayed taxation and a memory-dependent income effect, and calibrates it to quarterly data for Romania (2000–2023). Within this framework, fiscal policy lags are modelled using a “memory” income variable that weights past incomes, an approach grounded in distributed lag theory to capture how historical economic conditions influence current dynamics. The model is analysed both analytically and through numerical simulations. We derive stability conditions and employ bifurcation analysis to explore how the timing of taxation influences macroeconomic equilibrium. The findings reveal that an immediate taxation regime yields a stable adjustment toward a unique equilibrium, consistent with classical IS-LM expectations. In contrast, delayed taxation, where tax revenue depends on past income, can destabilise the system, giving rise to cycles and even chaotic fluctuations for parameter values that would be stable under immediate collection. In particular, delays act as a destabilising force, lowering the threshold of the output-adjustment speed at which oscillations emerge. These results highlight the critical importance of policy timing: prompt fiscal feedback tends to stabilise the economy, whereas lags in fiscal intervention can induce endogenous cycles. The analysis offers policy-relevant insights, suggesting that reducing fiscal response delays or counteracting them with other stabilisation tools is crucial for macroeconomic stability. Full article
Show Figures

Figure 1

Back to TopTop