Discrete chaotic systems are now a meaningful research area due to their intricate dynamical characteristics. This paper introduces a novel piecewise logistic-like mapping chaotic system and rigorously establishes its Devaney chaoticity through mathematical proofs. Experimental findings demonstrate that, compared to the traditional logistic mapping, the logistic-like mapping exhibits more complex dynamic behaviors, such as bifurcation diagram, Lyapunov exponents, permutation entropy, sensitivity, and distribution of function sequences. Furthermore, in order to implement the suggested new chaotic system, a simulation circuit is designed, and a PSIM simulation model is established to validate feasibility of the simulation circuit.
Citation: Caiwen Chen, Tianxiu Lu, Ping Gao. Chaotic performance and circuitry implement of piecewise logistic-like mapping[J]. Electronic Research Archive, 2025, 33(1): 102-120. doi: 10.3934/era.2025006
[1] | Yi Liu, Lei Gao, Tianxu Zhao . Partially doubly strictly diagonally dominant matrices with applications. Electronic Research Archive, 2023, 31(5): 2994-3013. doi: 10.3934/era.2023151 |
[2] | Yongge Tian . Characterizations of matrix equalities involving the sums and products of multiple matrices and their generalized inverse. Electronic Research Archive, 2023, 31(9): 5866-5893. doi: 10.3934/era.2023298 |
[3] | Zoran Pucanović, Marko Pešović . Analyzing Chebyshev polynomial-based geometric circulant matrices. Electronic Research Archive, 2024, 32(9): 5478-5495. doi: 10.3934/era.2024254 |
[4] | Jiaqi Qi, Yaqiang Wang . Subdirect Sums of $ GSD{D_1} $ matrices. Electronic Research Archive, 2024, 32(6): 3989-4010. doi: 10.3934/era.2024179 |
[5] | Natália Bebiano, João da Providência, Wei-Ru Xu . Approximations for the von Neumann and Rényi entropies of graphs with circulant type Laplacians. Electronic Research Archive, 2022, 30(5): 1864-1880. doi: 10.3934/era.2022094 |
[6] | Daochang Zhang, Dijana Mosić, Liangyun Chen . On the Drazin inverse of anti-triangular block matrices. Electronic Research Archive, 2022, 30(7): 2428-2445. doi: 10.3934/era.2022124 |
[7] | Dongmei Yu, Yifei Yuan, Yiming Zhang . A preconditioned new modulus-based matrix splitting method for solving linear complementarity problem of $ H_+ $-matrices. Electronic Research Archive, 2023, 31(1): 123-146. doi: 10.3934/era.2023007 |
[8] | Jiachen Mu, Duanzhi Zhang . Multiplicity of symmetric brake orbits of asymptotically linear symmetric reversible Hamiltonian systems. Electronic Research Archive, 2022, 30(7): 2417-2427. doi: 10.3934/era.2022123 |
[9] | Zhifu Xie . Remarks on the inverse problem of the collinear central configurations in the $ N $-body problem. Electronic Research Archive, 2022, 30(7): 2540-2549. doi: 10.3934/era.2022130 |
[10] | Keru Wen, Jiaqi Qi, Yaqiang Wang . $ SDD_2 $ tensors and $ B_2 $-tensors. Electronic Research Archive, 2025, 33(4): 2433-2451. doi: 10.3934/era.2025108 |
Discrete chaotic systems are now a meaningful research area due to their intricate dynamical characteristics. This paper introduces a novel piecewise logistic-like mapping chaotic system and rigorously establishes its Devaney chaoticity through mathematical proofs. Experimental findings demonstrate that, compared to the traditional logistic mapping, the logistic-like mapping exhibits more complex dynamic behaviors, such as bifurcation diagram, Lyapunov exponents, permutation entropy, sensitivity, and distribution of function sequences. Furthermore, in order to implement the suggested new chaotic system, a simulation circuit is designed, and a PSIM simulation model is established to validate feasibility of the simulation circuit.
The linear complementarity problem is to find a vector x∈Rn satisfying
x≥0,Ax+q≥0,xT(Ax+q)=0, | (1.1) |
where A is an n×n real matrix, and q∈Rn. Usually, it is denoted by LCP(A,q).
LCP(A,q) arises in many applications such as finding a Nash equilibrium point of a bimatrix game, the network equilibrium problem, the contact problem etc. For details, see [1]. Moreover, it has been shown that the LCP(A,q) has a unique solution for any vector q∈Rn if and only if A is a P-matrix, where an n×n real matrix A is called a P-matrix if all its principal minors are positive. Therefore, the class of P-matrices plays an important role in LCP(A,q); see [2,3,4].
The cases when the matrix A for the LCP(A,q) belongs to P-matrices or some subclasses of P-matrices have been widely studied, such as B-matrices [5,6], SB-matrices [7], DB-matrices [8] and so on [9,10,11,12,13]. The class of B1-matrices is a subclass of P-matrices that contains B-matrices, which was proposed by Pe˜na [14]. However, the error bound for the linear complementarity problem of B1-matrices has not been reported yet.
At the end of this section, the structure of the article is given. Some properties of B1-matrices are given in Section 2. In Section 3, the infinity norm upper bound for the inverse of B1-matrices is obtained. In Section 4, the error bound for the linear complementarity problem corresponding to B1-matrices is proposed.
In this section, some properties for B1-matrices are proposed. To begin with, some notations, definitions and lemmas are listed as follows.
Let n be an integer number, N={1,2,…,n} and Cn×n be the set of all complex matrices of order n.
ri(A)=∑j≠i|aij|,
N1(A)={i∈N:|aii|≤ri(A)},
N2(A)={i∈N:|aii|>ri(A)},
pi(A)=∑j∈N1(A)∖{i}|aij|+∑j∈N2(A)∖{i}rj(A)|ajj||aij|,
r+iA=max{0,aij|i≠j},
B+=(b+ij)1≤i,j≤n=[a11−r+1Aa12−r+1A⋯a1n−r+1Aa21−r+2Aa22−r+2A⋱a2n−r+2A⋮⋱⋮an1−r+nAan2−r+nA⋯ann−r+nA],
pi(B+)=∑j∈N1(A)∖{i}|aij−r+iA|+∑j∈N2(A)∖{i}rj(B+)|ajj−r+jA||aij−r+iA|.
Definition 2.1. [2] A matrix A=(aij)∈Cn×n is a P-matrix if all its principal minors are positive.
Definition 2.2. [14] A matrix A=(aij)∈Cn×n is an SDD1 by rows if for each i∈N1(A),
|aii|>pi(A). | (2.1) |
Definition 2.3. [14] A matrix A=(aij)∈Cn×n is a B1-matrix if for all i∈N,
aii−r+iA>pi(B+). | (2.2) |
Lemma 2.1. [14] If a matrix A=(aij)∈Cn×n is an SDD1 by rows, then it is also a nonsingular H-matrix.
Lemma 2.2. [15] If a matrix A=(aij)∈Cn×n is an H-matrix with positive diagonal entries, then it is also a P-matrix.
In the following, some properties of B1-matrices are derived.
First of all, utilizing Definitions 2.2 and 2.3, Theorems 2.1–2.4 can be easily obtained.
Theorem 2.1. Let matrix A=(aij)∈Cn×n be a B1-matrix. Then, B+ is an SDD1 matrix.
Example 2.1. Let matrix
A=[2−1013−2910110]. |
We write A=B++C, where
B+= [2−1002−3−10100 ], |
and
C= [000111101010 ]. |
By calculation, we have that
N1(B+)={2},N2(B+)={1,3}, |
a11−r+1A=2>1=p1(B+)=|a12−r+1A|+r3(B+)|a33−r+3A||a13−r+1A|, |
a22−r+2A=2>0.0300=p2(B+)=r1(B+)|a11−r+1A||a21−r+2A|+r3(B+)|a33−r+3A||a23−r+2A|, |
and
a33−r+3A=100>0.5000=p3(B+)=|a32−r+3A|+r1(B+)|a11−r+1A||a31−r+3A|. |
From Definition 2.3, it is easy to obtain that A is a B1-matrix, and B+ is an SDD1 matrix since |b+22|=2>0.0300=p2(B+)=r1(B+)|a11−r+1A||a21−r+2A|+r3(B+)|a33−r+3A||a23−r+2A| from Definition 2.2.
However, Theorem 2.1 is not true on the contrary, and the following Example 2.2 illustrates this fact.
Example 2.2. Let us consider the matrix
A=[−311−4−2131−2]. |
We write A=B++C, where
B+= [−400−5−300−2−5 ], |
and
C= [111111333 ]. |
By calculation, we have that
N1(B+)={2},N2(B+)={1,3}. |
From Definitions 2.2 and 2.3, we obtain that B+ is an SDD1 matrix since |b+22|=3>0=p2(B+)=r1(B+)|a11−r+1A||a21−r+2A|+r3(B+)|a33−r+3A||a23−r+2A|, but A is not a B1-matrix since a11−r+1A=−4<0=p1(B+)=|a12−r+1A|+r3(B+)|a33−r+3A||a13−r+1A|.
Motivated by Example 2.2, one can easily obtain Theorem 2.2.
Theorem 2.2. Let matrix A=(aij)∈Cn×n be a B1-matrix if and only if B+ is an SDD1 matrix with positive diagonal entries.
Note that B+ is a Z-matrix with positive diagonal entries from the definition of B+, and it is easy to obtain Theorem 2.3.
Theorem 2.3. Let matrix A=(aij)∈Cn×n be a B1-matrix if and only if B+ is a B1-matrix.
Example 2.3. Let us consider the matrix
A= [757423101512910110 ]. |
We write A=B++C, where
B+= [10−51−230−10100 ], |
and
C= [747474121212101010 ]. |
By calculation, we have that
N1(B+)={1},N2(B+)={2,3}, |
a11−r+1A=1>0.5100=p1(B+)=r2(B+)|a22−r+2A||a12−r+1A|+r3(B+)|a33−r+3A||a13−r+1A|, |
a22−r+2A=3>2=p2(B+)=|a21−r+2A|+r3(B+)|a33−r+3A||a23−r+2A|, |
and
a33−r+3A=100>1=p3(B+)=|a31−r+3A|+r2(B+)|a22−r+2A||a32−r+3A|. |
From Definition 2.3, we get that A is a B1-matrix, and B+ is also a B1-matrix since b+11−r+1B+=1>0.5100=p1(V+), b+22−r+2B+=3>2=p2(V+) and b+33−r+3B+=100>1=p3(V+), where pi(V+)=pi(B+) since r+iB+=0. Consequently, Theorem 2.3 is shown to be valid by the example provided in Example 2.3.
Note that when A is a Z-matrix, we have that r+iA=0 and B+ = A, and therefore, it is easy to obtain Theorem 2.4.
Theorem 2.4. If A=(aij)∈Cn×n is a Z-matrix with positive diagonal entries, then A is a B1-matrix if and only if A is an SDD1 matrix.
Example 2.4. Let us consider the Z-matrix with positive diagonal entries
A= [1−3−2010001 ]. |
We write A=B++C, where
B+= [1−3−2010001 ], |
and
C= [000000000 ]. |
That is, A = B+. By calculation, we have that
N1(B+)={1},N2(B+)={2,3}, |
a11−r+1A=1>0=p1(B+), |
a22−r+2A=1>0=p2(B+), |
and
a33−r+3A=1>0=p3(B+). |
From Definition 2.3, we get that A is a B1-matrix, and A is also an SDD1 matrix since |a11|=1>0=p1(A). Therefore, Example 2.4 illustrates that Theorem 2.4 is valid.
Next, some properties between B1-matrix and nonnegative diagonal matrix, P-matrix are proposed.
Theorem 2.5. If A=(aij)∈Cn×n is a B1-matrix, and D is a nonnegative diagonal matrix of the same order, then A+D is a B1-matrix.
Proof. Let D=diag(d1,d2,…,dn) with di≥0, and C=A+D with C=(cij)∈Cn×n, where
cij={aii+di,i=j,aij,i≠j. |
Next, let us prove cii−r+iC>pi(V+) for all i∈N, where V+=(vij)∈Cn×n with vij=cij−r+iC, and r+iC=max{0,cij|i≠j}=r+iA.
Since A is a B1-matrix, for all i∈N,
cii−r+iC=aii+di−r+iA≥aii−r+iA>pi(B+). | (2.3) |
For i∈N1(V+)⊆N1(B+),
pi(V+)=∑j∈N1(V+)∖{i}|vij|+∑j∉N1(V+)∪{i}rj(V+)|vjj||vij|=∑j∈N1(V+)∖{i}|aij−r+iA|+∑j∉N1(V+)∪{i}rj(B+)|ajj−r+jA+dj||aij−r+iA|≤∑j∈N1(B+)∖{i}|aij−r+iA|+∑j∉N1(B+)∪{i}rj(B+)|ajj−r+jA||aij−r+iA|=pi(B+). |
By (2.3), we deduce that cii−r+iC>pi(B+)≥pi(V+), and this proof is completed.
Example 2.5. Let the matrix
A= [757423101512910110 ], |
and
D= [5000150000 ]. |
By calculation, we have that
N1(B+)={1},N2(B+)={2,3}, |
a11−r+1A=1>0.5100=p1(B+), |
a22−r+2A=3>2=p2(B+), |
and
a33−r+3A=100>1=p3(B+). |
From Definition 2.3, we get that A is a B1-matrix. Further, Theorem 2.5 demonstrates that A+D satisfies the conditions required for a B1-matrix.
Theorem 2.6. If A=(aij)∈Cn×n is a B1-matrix, then we write A as A=B+C, where B is a Z-matrix with positive diagonal entries, and C is a nonnegative matrix of rank 1. In particular, if A is a B1-matrix and Z-matrix, then C is a zero matrix.
Proof. Let us define B=(bij)∈Cn×n with bij=aij−r+iA. Taking into account that bij≤0 from definition of r+iA, and bii>0 since A is a B1-matrix, then B is a Z-matrix with positive diagonal entries.
Let C=(cij)∈Cn×n with cij=r+iA, and obviously C is a nonnegative matrix of rank 1. Hence, A can be decomposed as A=B+C.
Theorem 2.7. If A=(aij)∈Cn×n is a B1-matrix, then B+ is a P-matrix.
Proof. Since A is a B1-matrix, it is easy to obtain that B+ is an H-matrix by Theorem 2.1 and Lemma 2.1. aii−r+iA>pi(B+)≥0, and it is equivalent to b+ii>0 for all i∈N. We conclude that B+ is a P-matrix from Lemma 2.2.
Example 2.6. Let the matrix
A= [10.10.13420.10.11 ]. |
We write A=B++C, where
B+= [0.90001−1000.9 ], |
and
C= [0.10.10.13330.10.10.1 ]. |
By calculation, we have that
N1(B+)={2},N2(B+)={1,3}, |
a11−r+1A=0.9000>0=p1(B+)=|a12−r+1A|+r3(B+)|a33−r+3A||a13−r+1A|, |
a22−r+2A=1>0=p2(B+)=r1(B+)|a11−r+1A||a21−r+2A|+r3(B+)|a33−r+3A||a23−r+2A|, |
and
a33−r+3A=0.9000>0=p3(B+)=|a32−r+3A|+r1(B+)|a11−r+1A||a31−r+3A|. |
From Definition 2.3, we get that A is a B1-matrix, and by Definition 2.1, one can easily verify that B+ is a P-matrix. Therefore, Example 2.6 illustrates that Theorem 2.7 is valid.
Theorem 2.8. If A=(aij)∈Cn×n is a B1-matrix, and C is a nonnegative matrix of the form
C= [c1c1⋯c1c2c2⋯c2⋮⋮⋯⋮cncn⋯cn], |
where C=(cij)∈Cn×n with cij=r+iA, then A+C is a B1-matrix.
Proof. Note that for each i∈N, r+iA+C=r+iA+ci, and moreover, (A+C)+=B+. Since A is a B1-matrix, from Theorem 2.3, we have that B+ is a B1-matrix, and then (A+C)+ is also a B1-matrix. Therefore, A+C is a B1-matrix.
In this section, an infinity norm upper bound for the inverse of B1-matrices is obtained. Before that, some lemmas and theorems are listed.
Lemma 3.1. [10] If P=(p1,…,pn)Te, where e=(1,…,1) and p1,…,pn≥0, then
||(I+P)−1||∞≤n−1, | (3.1) |
where I is the n×n identity matrix.
Theorem 3.1. [16] Let matrix A=(aij)∈Cn×n be an SDD1 matrix, and then
||A−1||∞≤max{1,maxi∈N2(A)pi(A)|aii|+ε}min{mini∈N1(A)Hi,mini∈N2(A)Qi}, | (3.2) |
where
Hi=|aii|−∑j∈N1(A)∖{i}|aij|−∑j∈N2(A)∖{i}(pj(A)|ajj|+ε)|aij|, i∈N1(A),
Qi=ε(|aii|−∑j∈N2(A)∖{i}|aij|)+∑j∈N2(A)∖{i}rj(A)−pj(A)|ajj||aij|, i∈N2(A),
and ε satisfies 0<ε<mini∈N|aii|−pi(A)∑j∈N2(A)∖{i}|aij|.
Theorem 3.2. Let A=(aij)∈Cn×n be a B1-matrix, and then
||A−1||∞≤(n−1)max{1,maxi∈N2(B+)(pi(B+)|aii−r+iA|+ε)}min{mini∈N1(B+)Ti,mini∈N2(B+)Mi}, | (3.3) |
where B+=(b+ij)1≤i,j≤n with b+ij=aij−r+iA,
Ti=|aii−r+iA|−∑j∈N1(B+)∖{i}|aij−r+iA|−∑j∈N2(B+)∖{i}(pj(B+)|ajj−r+jA|+ε)|aij−r+iA|, i∈N1(B+),
Mi=ε(|aii−r+iA|−∑j∈N2(B+)∖{i}|aij−r+iA|)+∑j∈N2(B+)∖{i}rj(B+)−pj(B+)|ajj−r+jA||aij−r+iA|, i∈N2(B+),
and ε satisfies 0<ε<mini∈N|aii−r+iA|−pi(B+)∑j∈N2(A)∖{i}|aij−r+iA|.
Proof. Since A is a B1-matrix, let A=B++C, with B+=(b+ij)∈Cn×n and b+ij=aij−r+iA, C=(cij)∈Cn×n with cij=r+iA. From Theorem 2.1 and Lemma 2.1, B+ is an H-matrix, and it is also a nonsingular M-matrix. Then, B+ has nonnegative inverse. According to A=B++C=B+(I+(B+)−1C), it holds that ||A−1||∞≤||(I+(B+)−1C)−1||∞||(B+)−1||∞. Observe that the matrix C is nonnegative, and (B+)−1≥0. Then, (B+)−1C can be written as (p1,p2,…,pn)Te, where pi≥0 and e=(1,1,…,1), for i=1,2,…,n, and by Lemma 3.1,
||(I+(B+)−1C)−1||∞≤n−1. | (3.4) |
However, B+ is an SDD1 matrix, by Theorem 3.1,
||(B+)−1||∞≤max{1,maxi∈N2(B+)pi(B+)|aii−r+iA|+ε}min{mini∈N1(B+)Ti,mini∈N2(B+)Mi}, | (3.5) |
where
Ti=|aii−r+iA|−∑j∈N1(B+)∖{i}|aij−r+iA|−∑j∈N2(B+)∖{i}(pj(B+)|ajj−r+jA|+ε)|aij−r+iA|, i∈N1(B+),
Mi=ε(|aii−r+iA|−∑j∈N2(B+)∖{i}|aij−r+iA|)+∑j∈N2(B+)∖{i}rj(B+)−pj(B+)|ajj−r+jA||aij−r+iA|, i∈N2(B+),
and ε satisfies 0<ε<mini∈N|aii−r+iA|−pi(B+)∑j∈N2(A)∖{i}|aij−r+iA|.
By (3.4) and (3.5), we get (3.3).
In this section, before an error bound for the linear complementarity problem corresponding to B1-matrices is proposed, some lemmas are listed.
Lemma 4.1. [11] Let γ>0 and η≥0, and then for any x∈[0,1],
11−x+xγ≤1min{γ,1},ηx1−x+xγ≤ηγ. |
Lemma 4.2. [12] Let A=(aij)∈Cn×n be an SDD1 matrix with positive diagonal entries, and then AD=I−D+DA is also an SDD1 matrix, where D=diag(di) with 0≤di≤1.
Theorem 4.1. Let A=(aij)∈Cn×n(n≥2) be an SDD1 matrix with positive diagonal entries, and AD=I−D+DA is also an SDD1 matrix, where D=diag(di) with 0≤di≤1. Then,
||A−1D||∞≤max{1,maxi∈N2(AD)pi(A)|aii|+ε}min{mini∈N1(AD)Li,mini∈N2(AD)Gi}, | (4.1) |
where
Li=|diaii|−∑j∈N1(AD)∖{i}|diaij|−∑j∈N2(AD)∖{i}(pj(A)|ajj|+ε)|diaij|,i∈N1(AD),
Gi=ε(|diaii|−∑j∈N2(AD)∖{i}|diaij|)+∑j∈N2(AD)∖{i}djrj(A)|1−dj+djajj||diaij|−∑j∈N2(AD)∖{i}pj(A)|ajj||diaij|,i∈N2(AD),
and ε satisfies 0<ε<mini∈N|1−di+diaii|−pi(AD)∑j∈N2(AD)∖{i}|diaij|.
Proof. Let AD=I−D+DA be an SDD1 matrix, where
AD={1−di+diaii,i=j,diaij,i≠j. |
By Theorem 3.1,
||A−1D||∞≤max{1,maxi∈N2(AD)pj(AD)|1−dj+djajj|+ε}min{mini∈N1(AD)Hi,mini∈N2(AD)Qi}, | (4.2) |
where
Hi=|1−di+diaii|−∑j∈N1(AD)∖{i}|diaij|−∑j∈N2(AD)∖{i}(pj(AD)|1−dj+djajj|+ε)|diaij|, i∈N1(AD),
Qi=ε(|1−di+diaii|−∑j∈N2(AD)∖{i}|diaij|)+∑j∈N2(AD)∖{i}rj(AD)−pj(AD)|1−dj+djajj||diaij|, i∈N2(AD),
and ε satisfies 0<ε<mini∈N|1−di+diaii|−pi(AD)∑j∈N2(AD)∖{i}|diaij|.
For i∈N1(AD) and from 0≤di≤1, we obtain that
|diaii|≤|1−di+diaii|≤ri(AD)=diri(A), |
which means that i∈N1(A), that is, N1(AD)⊆N1(A). Then,
pi(AD)=∑j∈N1(AD)∖{i}|diaij|+∑j∉N1(AD)⋃{i}djrj(A)|1−dj+djajj||diaij|=di(∑j∈N1(AD)∖{i}|aij|+∑j∉N1(AD)⋃{i}djrj(A)|1−dj+djajj||aij|)≤di(∑j∈N1(A)∖{i}|aij|+∑j∉N1(A)⋃{i}rj(A)|ajj||aij|)=dipi(A). |
By Lemma 4.1,
pi(AD)|1−di+diaii|≤dipi(A)1−di+diaii≤pi(A)|aii|, | (4.3) |
1Hi=1|1−di+diaii|−∑j∈N1(AD)∖{i}|diaij|−∑j∈N2(AD)∖{i}(pj(AD)|1−dj+djajj|+ε)|diaij|≤1|diaii|−∑j∈N1(AD)∖{i}|diaij|−∑j∈N2(AD)∖{i}(pj(A)|ajj|+ε)|diaij|=1Li≤1minLi,i∈N1(AD), | (4.4) |
1Qi=1ε(|1−di+diaii|−∑j∈N2(AD)∖{i}|diaij|)+∑j∈N2(AD)∖{i}rj(AD)−pj(AD)|1−dj+djajj||diaij|≤1ε[|diaii|−∑j∈N2(AD)∖{i}|diaij|]+∑j∈N2(AD)∖{i}djrj(A)|1−dj+djajj||diaij|−∑j∈N2(AD)∖{i}pj(A)|ajj||diaij|=1Gi≤1minGi,i∈N2(AD). | (4.5) |
Then, by (4.2)–(4.5), we get (4.1).
Example 4.1. Let
A= [16−84.18083.11−8820811.258 ], |
and D=diag(di) with di=0.9000. Then, we have
AD=I−D+DA= [14.5−7.23.697.207.32.790.9−7.27.218.17.20.91.084.57.3 ]. |
By calculation, N1(AD)={1,3}, N2(AD)={2,4}, p2(A)=4, p4(A)=6.6150 and 0<ε<0.0541. We choose ε=0.0540. Then, L1=0.3789, L3=0.4689, G2=0.3949 and G4=0.3364. Hence, ||A−1D||∞≤2.9727, and the true value is ||A−1D||∞=0.3188.
Next, an error bound for the linear complementarity problem corresponding to B1-matrices is proposed.
Theorem 4.2. Let A=(aij)∈Cn×n(n≥2) be a B1-matrix satisfying the hypotheses of Theorem 4.1. Then,
maxd∈[0,1]n||(I−D+DA)−1||∞≤maxd∈[0,1]n(n−1)max{1,maxi∈N2(B+D)(pi(B+)|b+ii|+ε)}min{mini∈N1(B+D)Fi,mini∈N2(B+D)Zi}, |
where
B+=(b+ij)∈Cn×n with b+ij=aij−r+iA,
Fi=|dib+ii|−∑j∈N1(B+D)∖{i}|dib+ij|−∑j∈N2(B+D)∖{i}(pj(B+)|b+jj|+ε)|dib+ij|,i∈N1(B+D),
Zi=ε(|dib+ii|−∑j∈N2(B+D)∖{i}|dib+ij|)+∑j∈N2(B+D)∖{i}djrj(B+)|1−dj+djb+jj||dib+ij|−∑j∈N2(B+D)∖{i}pj(B+)|b+jj||dib+ij|,i∈N2(B+D),
and ε satisfies 0<ε<mini∈N|1−di+dib+ii|−pi(B+D)∑j∈N2(B+D)∖{i}|dib+ij|.
Proof. Let A=B++C, where B+=(b+ij)∈Cn×n with b+ij=aij−r+iA, C=(cij)∈Cn×n with cij=r+iA. B+ is an SDD1 matrix with positive diagonal entries. Thus for each diagonal matrix D=diag(di) with 0≤di≤1,
AD=I−D+DA=(I−D+DB+)+DC=B+D+CD, |
where B+D=I−D+DB+ and CD=DC. Similar to the proof of Theorem 3.2,
||A−1D||∞≤||[I+(B+D)−1CD]||∞||(B+D)−1||∞≤(n−1)||(B+D)−1||∞. |
Notice that B+ is an SDD1 matrix, and by Lemma 4.2, B+D=I−D+DB+ is also an SDD1 matrix. Hence, by (4.1), it holds that
||(B+D)−1||∞≤max{1,maxi∈N2(B+D)(pi(B+)|b+ii|+ε)}min{mini∈N1(B+D)Fi,mini∈N2(B+D)Zi}, |
where
Fi=|dib+ii|−∑j∈N1(B+D)∖{i}|dib+ij|−∑j∈N2(B+D)∖{i}(pj(B+)|b+jj|+ε)|dib+ij|,i∈N1(B+D),
Zi=ε(|dib+ii|−∑j∈N2(B+D)∖{i}|dib+ij|)+∑j∈N2(B+D)∖{i}djrj(B+)|1−dj+djb+jj||dib+ij|−∑j∈N2(B+D)∖{i}pj(B+)|b+jj||dib+ij|,i∈N2(B+D),
and ε satisfies 0<ε<mini∈N|1−di+dib+ii|−pi(B+D)∑j∈N2(B+D)∖{i}|dib+ij|.
Example 4.2. Let the matrix
A= [8−2−1−141345−8−815−8−4−4−26 ], |
and
B+= [8−2−1−1−18−10−8−815−8−4−4−26 ], |
where we set D=diag(di) with di=0.7000. Then,
B+D=I−D+DB+= [5.9−1.4−0.7−0.7−0.75.9−0.70−5.6−5.610.8−5.6−2.8−2.8−1.44.5 ]. |
By the definitions of B-matrix and B1-matrix, it is easy to get that A is not a B-matrix but is a B1-matrix. Therefore, the existing bounds (such as the bound (13) in Theorem 4 [10]) cannot be used to compute the error bound for the linear complementarity problem for matrix A. However, the error bound for the linear complementarity problem for matrix A can be computed by Theorem 4.2.
By simple calculation, N1(B+D)={3,4}, N2(B+D)={1,2}, p1(B+)=2.5000, p2(B+)=1.5000 and 0<ε<0.1084. Let ε=0.1083. Then, from our bound in Theorem 4.2, the error bound for the linear complementarity problem for matrix A is given as maxd∈[0,1]n||(I−D+DA)−1||∞≤5.7186, and the true value is ||(I−D+DA)−1||∞=0.3359.
Example 4.3. Consider the matrix
A= [0.5−0.24−0.22−0.050.20.010.01−0.060.2 ], |
and we write A=B++C, where
B+= [0.5−0.24−0.22−0.060.1900−0.070.19 ]. |
It is easy to verify that A is a B-matrix. Then, it is also a B1-matrix [14]. By the bound (13) in Theorem 4 [10], we have
maxd∈[0,1]n||(I−D+DA)−1||∞≤50. |
By simple calculation, we have that
B+D=I−D+DB+= [0.5005−0.2398−0.2198−0.05990.190800−0.06990.1908], |
and p1(B+)=0.1568, p2(B+)=0.0552, p3(B+)=0.0221 and 0<ε<0.8154. Let ε=0.8153, and then from our bound in Theorem 4.2, we get that maxd∈[0,1]n||(I−D+DA)−1||∞≤24.2275<50. Therefore, Example 4.3 shows that the error bound of a B1-matrix is sharper than the error bound of a B-matrix under some cases.
In this paper, some properties for B1-matrices and the infinity norm upper bound for the inverse of B1-matrices are presented. Based on these results, the error bound for the linear complementarity problem of B1-matrices is obtained. Moreover, numerical examples are also presented to illustrate the corresponding results.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
This work was partly supported by the National Natural Science Foundations of China (31600299), Natural Science Basic Research Program of Shaanxi, China (2020JM-622).
The authors declare there is no conflict of interest.
[1] |
R. M. May, Simple mathematical models with very complicated dynamics, Nature, 261 (1976), 459–467. https://doi.org/10.1038/261459a0 doi: 10.1038/261459a0
![]() |
[2] |
T. Buchner, J. J. Zebrowski, Logistic map with a delayed feedback: Stability of a discrete time-delay control of chaos, Phys. Rev. E, 61 (2000), 016210. https://doi.org/10.1103/PhysRevE.63.016210 doi: 10.1103/PhysRevE.63.016210
![]() |
[3] |
C. J. Tian, G. Chen, Stability for delayed generalized 2D discrete logistic systems, Adv. Differ. Equations, 4 (2004), 1–12. https://doi.org/10.1155/S1687183904308101 doi: 10.1155/S1687183904308101
![]() |
[4] |
M. Hénon, A two-dimensional mapping with a strange attractor, Commun. Math. Phys., 50 (1976), 69–77. https://doi.org/10.1007/BF01608556 doi: 10.1007/BF01608556
![]() |
[5] | J. C. Sprott, High-dimensional dynamics in the delayed Hénon map, Electron. J. Theor. Phys., 3 (2006), 19–35. |
[6] |
G. C. Wu, D. Baleanu, Discrete chaos in fractional delayed logistic maps, Nonlinear Dyn., 80 (2015), 1697–1703. https://doi.org/10.1007/s11071-014-1250-3 doi: 10.1007/s11071-014-1250-3
![]() |
[7] |
Y. Wang, Z. L. Liu, J. B. Ma, H. He, A pseudorandom number generator based on piecewise logistic map, Nonlinear Dyn., 83 (2016), 2373–2391. https://doi.org/10.1007/s11071-015-2488-0 doi: 10.1007/s11071-015-2488-0
![]() |
[8] |
R. Rak, Route to chaos in generalized logistic map, Acta Phys. Pol. A, 127 (2015), 113–117. https://doi.org/10.12693/APhysPolA.127.A-113 doi: 10.12693/APhysPolA.127.A-113
![]() |
[9] |
W. S. Sayed, A. G. Radwan, H. A. H. Fahmy, Design of positive, negative, and alternating sign generalized logistic maps, Discrete Dyn. Nat. Soc., 2015 (2015), 586783. https://doi.org/10.1155/2015/586783 doi: 10.1155/2015/586783
![]() |
[10] |
G. C. Wu, D. Baleanu, Discrete fractional logistic map and its chaos, Nonlinear Dyn., 75 (2014), 283–287. https://doi.org/10.1007/s11071-013-1065-7 doi: 10.1007/s11071-013-1065-7
![]() |
[11] | E. D. Leonel, E. D. Leonel, The Logistic-Like Map, in Scaling Laws in Dynamical Systems, Nonlinear Physical Science, Springer, Singapore, 2021. https://doi.org/10.1007/978-981-16-3544-1_4 |
[12] |
N. K. Pareek, V. Patidar, K. K. Sud, Image encryption using chaotic logistic map, Image Vision Comput., 24 (2006), 926–934. https://doi.org/10.1016/j.imavis.2006.02.021 doi: 10.1016/j.imavis.2006.02.021
![]() |
[13] |
Y. Q. Luo, J. Yu, W. R. Lai, L. Liu, A novel chaotic image encryption algorithm based on improved baker map and logistic map, Multimedia Tools Appl., 78 (2019), 22023–22043. https://doi.org/10.1007/s11042-019-7453-3 doi: 10.1007/s11042-019-7453-3
![]() |
[14] |
Y. Wang, Z. Q. Zhang, G. D. Wang, D. Liu, A pseudorandom number generator based on a 4D piecewise logistic map with coupled parameters, Int. J. Bifurcation Chaos, 29 (2019), 1950124. https://doi.org/10.1142/S0218127419501244 doi: 10.1142/S0218127419501244
![]() |
[15] |
X. Y. Wang, X. Chen, M. C. Zhao, A new two-dimensional sine-coupled-logistic map and its application in image encryption, Multimedia Tools Appl., 82 (2023), 35719–35755. https://doi.org/10.1007/s11042-023-14674-w doi: 10.1007/s11042-023-14674-w
![]() |
[16] |
A. Kiani-B, K. Fallahi, N. Pariz, H. Leung, A chaotic secure communication scheme using fractional chaotic systems based on an extended fractional Kalman filter, Commun. Nonlinear Sci. Numer. Simul., 14 (2009), 863–879. https://doi.org/10.1016/j.cnsns.2007.11.011 doi: 10.1016/j.cnsns.2007.11.011
![]() |
[17] |
M. Halimi, K. Kemih, M. Ghanes, Circuit simulation of an analog secure communication based on synchronized chaotic Chua's system, Appl. Math. Inf. Sci., 8 (2014), 1509. https://doi.org/10.12785/amis/080404 doi: 10.12785/amis/080404
![]() |
[18] |
R. L. Filali, M. Benrejeb, P. Borne, On observer-based secure communication design using discrete-time hyperchaotic systems, Commun. Nonlinear Sci. Numer. Simul., 19 (2014), 1424–1432. https://doi.org/10.1016/j.cnsns.2013.09.005 doi: 10.1016/j.cnsns.2013.09.005
![]() |
[19] |
M. Zapateiro, Y. Vidal, L. Acho, A secure communication scheme based on chaotic Duffing oscillators and frequency estimation for the transmission of binary-coded messages, Commun. Nonlinear Sci. Numer. Simul., 19 (2014), 991-1003. https://doi.org/10.1016/j.cnsns.2013.07.029 doi: 10.1016/j.cnsns.2013.07.029
![]() |
[20] |
C. X. Pan, Q. H. Hong, X. P. Wang, A novel memristive chaotic neuron circuit and its application in chaotic neural networks for associative memory, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 40 (2020), 521–532. https://doi.org/10.1109/TCAD.2020.3002568 doi: 10.1109/TCAD.2020.3002568
![]() |
[21] | A. V. Tutueva, D. Pesterev, A. Karimov, D. Butusov, V. Ostrovskii, Adaptive Chirikov map for pseudo-random number generation in chaos-based stream encryption, in 2019 25th Conference of Open Innovations Association (FRUCT), (2019), 333–338. https://doi.org/10.23919/FRUCT48121.2019.8981516 |
[22] |
M. Alawida, A. Samsudin, J. S. Teh, Enhanced digital chaotic maps based on bit reversal with applications in random bit generators, Inf. Sci., 512 (2020), 1155–1169. https://doi.org/10.1016/j.ins.2019.10.055 doi: 10.1016/j.ins.2019.10.055
![]() |
[23] |
A. V. Tutueva, L. Moysis, V. G. Rybin, E. E. Kopets, C. Volos, D. N. Butusov, Fast synchronization of symmetric H¨¦non maps using adaptive symmetry control, Chaos, Solitons Fractals, 155 (2022), 111732. https://doi.org/10.1016/j.chaos.2021.111732 doi: 10.1016/j.chaos.2021.111732
![]() |
[24] |
L. Acho, A discrete-time chaotic oscillator based on the logistic map: A secure communication scheme and a simple experiment using Arduino, J. Franklin Inst., 352 (2015), 3113–3121. https://doi.org/10.1016/j.jfranklin.2015.03.028 doi: 10.1016/j.jfranklin.2015.03.028
![]() |
[25] | R. Devaney, An Introduction to Chaotic Dynamical Systems, CRC press, 1989. https://doi.org/10.4324/9780429502309 |
[26] |
G. Liu, T. X. Lu, X. F. Yang, W. Anwar, Further discussion about transitivity and mixing of continuous maps on compact metric spaces, J. Math. Phys., 61 (2020), 112701. https://doi.org/10.1063/5.0023553 doi: 10.1063/5.0023553
![]() |
[27] |
Y. Lin, C. H. Wang, H. Z. He, L. L. Zhou, A novel four-wing non-equilibrium chaotic system and its circuit implementation, Pramana, 86 (2016), 801–807. https://doi.org/10.1007/s12043-015-1118-1 doi: 10.1007/s12043-015-1118-1
![]() |
[28] |
K. H. Sun, S. B. He, Y. He, L. Z. Yin, Complexity analysis of chaotic pseudo-random sequences based on spectral entropy algorithm, Acta. Phys., 62 (2013), 010501. https://doi.org/10.7498/aps.62.010501 doi: 10.7498/aps.62.010501
![]() |
[29] |
C. Bandt, B. Pompe, Permutation entropy: a natural complexity measure for time series, Phys. Rev. Lett., 88 (2002), 174102. https://doi.org/10.1103/PhysRevLett.88.174102 doi: 10.1103/PhysRevLett.88.174102
![]() |
[30] |
W. Y. Dai, X. L. Xu, X. M. Song, G. Li, Audio encryption algorithm based on chen memristor chaotic system, Symmetry, 14 (2021), 17. https://doi.org/10.3390/sym14010017 doi: 10.3390/sym14010017
![]() |
[31] |
X. L. Xu, G. D. Li, W. Y. Dai, X. M. Song, Multi-direction chain and grid chaotic system based on Julia fractal, Fractals, 29 (2021), 2150245. https://doi.org/10.1142/S0218348X21502455 doi: 10.1142/S0218348X21502455
![]() |
[32] |
J. L. Fan, X. F. Zhang, Piecewise logistic chaotic map and its performance analysis, ACTA Electronica Sinica, 37 (2009), 720–725, in Chinese. https://doi.org/10.3321/j.issn:0372-2112.2009.04.009 doi: 10.3321/j.issn:0372-2112.2009.04.009
![]() |
[33] |
G. D. Li, X. L. Xu, H. Y. Zhong, A image encryption algorithm based on coexisting multi-attractors in a spherical chaotic system, Multimedia Tools Appl., 81 (2022), 32005–32031. https://doi.org/10.1007/s11042-022-12853-9 doi: 10.1007/s11042-022-12853-9
![]() |
[34] |
T. X. Zhang, H. T. Xing, X. L. Xu, Z. Wang, Y. Zhao, Chaos-based coverage path planning framework for mobile robots and its digital signal processing implementation, Phys. Scr., 99 (2024), 125293. https://doi.org/10.1088/1402-4896/ad8f6e doi: 10.1088/1402-4896/ad8f6e
![]() |