1 Introduction

Recently, a large number of applications for memristive oscillator systems have been reported, including nonvolatile memristor memories, digital and analog circuits; see [110]. The models of memristive oscillator systems suggest possible responses of simple intelligences in biomimetics as well as new approaches for bio-inspired reconfigurable circuits. Considerable attention has been devoted to the theoretical properties of memristive oscillator systems, and their relationship to memristor dynamics (see [14, 6, 9, 10] and references therein). A very lower dimensional memristor equation can appear with complex double-loop behavior. Therefore, the memristive system is a complicated system that has strongly nonlinear behavior, as it includes the switched network cluster and shows a high uncertainty [11]. Deep studies of the memristive system are important in various applications due to the important guiding role in memristor-based physical commercially available devices. For example, nonlinear dynamics has been shown to play an important role in the understanding of a wide spectrum of memristor-based technological and biological systems [14, 6, 911].

In this paper, we consider a fourth-order memristive oscillator system described by the following differential equations:

{ φ ˙ ( t ) = v 1 ( t ) , v ˙ 1 ( t ) = 1 C 1 R v 2 ( t ) 1 C 1 R v 1 ( t ) 1 C 1 W ( φ ( t ) ) v 1 ( t ) , v ˙ 2 ( t ) = 1 C 2 R v 1 ( t ) 1 C 2 R v 2 ( t ) 1 C 2 ( t ) , ˙ ( t ) = 1 L v 2 ( t ) ,
(1)

where v 1 (t) and v 2 (t) denote voltages, C 1 and C 2 represent capacitors, W(φ(t)) is a memductance function, and φ(t), (t), R, and L are magnetic flux, current, resistor, and inductor, respectively.

Using the mathematical model of a piecewise-linear memristor [3, 4], the memductance function W(φ) is characterized by

W(φ)= { a 1 , | φ | < 1 , a 2 , | φ | > 1 ,
(2)

where a 1 and a 2 are parameters.

Choose parameters C 1 =5.5nF, C 2 =49.5nF, L=7.07mH, R=1,428Ω, a 1 =0.8× 10 3 , a 2 =0.5× 10 3 , and set the initial condition φ(0)=0.1, v 1 (0)=0.1, v 2 (0)=0.1, (0)=0.1; we can see that system (1) indeed generates chaotic behavior. Simulated results are depicted in Figures 1 and 2. Figure 1 displays the projections of the chaotic attractor of system (1) in the three-dimensional space. To get a better view of this chaotic attractor, Figure 2 shows the projections of the chaotic attractor of system (1) in the two-dimensional space.

Figure 1
figure 1

Phase portraits of the chaotic system ( 1 ) in the three-dimensional space.

Figure 2
figure 2

Phase portraits of the chaotic system ( 1 ) in the two-dimensional space.

To solve the state-dependent nonlinearity of system (1), fuzzy logic has attracted much attention as a powerful tool. The memristive oscillator system (1) can be represented as the following fuzzy model:

Rule 1: If |φ|<1, then

{ φ ˙ ( t ) = v 1 ( t ) , v ˙ 1 ( t ) = 1 C 1 R v 2 ( t ) 1 C 1 R v 1 ( t ) 1 C 1 a 1 v 1 ( t ) , v ˙ 2 ( t ) = 1 C 2 R v 1 ( t ) 1 C 2 R v 2 ( t ) 1 C 2 ( t ) , ˙ ( t ) = 1 L v 2 ( t ) .
(3)

Rule 2: If |φ|>1, then

{ φ ˙ ( t ) = v 1 ( t ) , v ˙ 1 ( t ) = 1 C 1 R v 2 ( t ) 1 C 1 R v 1 ( t ) 1 C 1 a 2 v 1 ( t ) , v ˙ 2 ( t ) = 1 C 2 R v 1 ( t ) 1 C 2 R v 2 ( t ) 1 C 2 ( t ) , ˙ ( t ) = 1 L v 2 ( t ) .
(4)

With a center-average defuzzier, the over-fuzzy system in (3) and (4) is represented as

{ φ ˙ ( t ) = v 1 ( t ) , v ˙ 1 ( t ) = 1 C 1 R v 2 ( t ) 1 C 1 R v 1 ( t ) 1 C 1 ( i = 1 2 η i ( t ) a i ) v 1 ( t ) , v ˙ 2 ( t ) = 1 C 2 R v 1 ( t ) 1 C 2 R v 2 ( t ) 1 C 2 ( t ) , ˙ ( t ) = 1 L v 2 ( t ) ,
(5)

where

η 1 (t)= { 1 , | φ | < 1 , 0 , | φ | > 1 , η 2 (t)= { 0 , | φ | < 1 , 1 , | φ | > 1 .

Notwithstanding the vast literature on nonlinear dynamical systems, the majority of the existing studies focus on memristive oscillator systems whose inner mechanisms have never been thoroughly studied and expounded. This can mainly be attributed to the memristor nonlinearity. One such challenge in the memristive system is a state-dependent nonlinear network cluster [11]. As a result, the monitoring, control, and optimization in memristive systems will be extremely difficult.

An important research problem is to develop some rigorous algorithm theories and design tactics for solving memristive oscillator systems. Algorithm theories represent the structure common to a class of algorithms, which can provide the basis for designing tactics-specialized methods for analyzing memristive oscillator systems. The memristive differential system which is described by a state-dependent nonlinear network cluster presents a difficulty in numerical integration, since the conventional processing approaches make it hard to achieve satisfactory results. In general, solving these problems requires overcoming a number of theoretically challenging issues and even developing entirely new analytical methods. A key open problem is how to devise effective algorithms for dealing with the characteristics of memristive system. Generally, to the best of our knowledge, no relevant work as regards the algorithms and their convergence for memristive oscillator systems has been reported.

The objective of this paper is to develop some algorithms and analyze their corresponding convergence properties. This consideration does not only have theoretical value but also practical meaning. For the numerical solution of complex systems and networks, of the many methods available, a parallel algorithm and a partial difference method show good feasibility and advantages. Thus, these two algorithms are chosen for memristive oscillator systems. The constructive proofs in this paper are able to fully demonstrate that the parallel algorithm and the partial difference method have a general applicability that can make them popular in a wide variety of cases. We believe the basic algorithm and convergence in theory for memristive systems should be a significant research topic due to the potential in a variety of emerging applications.

2 Parallel algorithm

In this section, we give a constructive proof on the parallel algorithm and its convergence for system (1).

By the theories of differential inclusions and set-valued maps, from (5), it follows that

{ φ ˙ ( t ) = v 1 ( t ) , v ˙ 1 ( t ) 1 C 1 R v 2 ( t ) 1 C 1 R v 1 ( t ) 1 C 1 ( co { a 1 , a 2 } ) v 1 ( t ) , v ˙ 2 ( t ) = 1 C 2 R v 1 ( t ) 1 C 2 R v 2 ( t ) 1 C 2 ( t ) , ˙ ( t ) = 1 L v 2 ( t ) ,
(6)

where co{ a 1 , a 2 } denotes a closure of the convex hull generated by real numbers a 1 and a 2 .

Transform (6) into the compact form as follows:

Θ ˙ ( 0 1 0 0 0 1 C 1 R 1 C 1 co { a 1 , a 2 } 1 C 1 R 0 0 1 C 2 R 1 C 2 R 1 C 2 0 0 1 L 0 ) Θ:=AΘ,
(7)

where the vector Θ= ( φ ( t ) , v 1 ( t ) , v 2 ( t ) , ( t ) ) T ,

matrixA= ( 0 1 0 0 0 1 C 1 R 1 C 1 co { a 1 , a 2 } 1 C 1 R 0 0 1 C 2 R 1 C 2 R 1 C 2 0 0 1 L 0 ) .

In (7), split the matrix A into matrices B and C, i.e., A=B+C, where

B = ( 0 0 0 0 0 1 C 1 R 1 C 1 co { a 1 , a 2 } 0 0 0 0 1 C 2 R 0 0 0 0 0 ) , C = ( 0 1 0 0 0 0 1 C 1 R 0 0 1 C 2 R 0 1 C 2 0 0 1 L 0 ) .

Obviously, according to the Jacobi iterative scheme,

{ y ˙ = B y + C Θ k , y ( 0 ) = Θ ( 0 ) , Θ k + 1 = Θ k + ω ( y Θ k ) ,
(8)

where y=y(t)= ( y 1 ( t ) , y 2 ( t ) , y 3 ( t ) , y 4 ( t ) ) T , Θ k = Θ k (t)= ( φ k ( t ) , v 1 k ( t ) , v 2 k ( t ) , k ( t ) ) T , ω0 is a constant.

Let t 0 =0, t n = t 0 +nh, denote y n =y( t n )= ( y 1 ( t n ) , y 2 ( t n ) , y 3 ( t n ) , y 4 ( t n ) ) T , Θ n k = Θ k ( t n )= ( φ k ( t n ) , v 1 k ( t n ) , v 2 k ( t n ) , k ( t n ) ) T , and applying the Euler polygonal method, by (8), it follows that

{ y n y n 1 h = B y n + C Θ n k , Θ n k + 1 = Θ n k + ω ( y n Θ n k ) ,
(9)

then

{ ( I h B ) y n = y n 1 + h C Θ n k , Θ n k + 1 = ( 1 ω ) Θ n k + ω y n ,
(10)

where I is the 4×4 identity matrix.

Through the first equation of (10),

y n = ( I h B ) 1 y n 1 +h ( I h B ) 1 C Θ n k =D y n 1 +hDC Θ n k ,
(11)

where matrix D= ( I h B ) 1 . Besides, for (11), if the matrix IhB is invertible, then D= ( I h B ) 1 is the general inverse matrix, otherwise D= ( I h B ) 1 is the generalized inverse matrix.

Substitute (11) into the second equation of (10),

Θ n k + 1 = ( 1 ω ) Θ n k + ω ( D y n 1 + h D C Θ n k ) = [ ( 1 ω ) I + ω h D C ] Θ n k + ω D y n 1 = F Θ n k + ω D y n 1 ,
(12)

where the matrix F=(1ω)I+ωhDC. Therefore, we get

Θ 1 k + 1 =F Θ 1 k +ωD y 0 ,when n=1,
(13)
Θ 2 k + 1 =F Θ 2 k +ωD y 1 ,when n=2.
(14)

On the other hand, by (11),

y 1 =D y 0 +hDC Θ 1 k ,
(15)

thus

Θ 2 k + 1 =F Θ 2 k +ωD ( D y 0 + h D C Θ 1 k ) =F Θ 2 k +ωh D 2 C Θ 1 k +ω D 2 y 0 ,
(16)

through using the method of induction, and then

Θ n k + 1 =F Θ n k +ωh D 2 C Θ n 1 k ++ωh D n C Θ 1 k +ω D n y 0 .
(17)

In fact, it is not difficult to find that

F = ( 1 ω ) I + ω h D C = ( 1 ω ) I + ω h ( I h B ) 1 C = ( 1 ω ) I + ω h ( 1 0 0 0 0 1 + h C 1 R + h C 1 co { a 1 , a 2 } 0 0 0 0 1 + h C 2 R 0 0 0 0 1 ) 1 ( 0 1 0 0 0 0 1 C 1 R 0 0 1 C 2 R 0 1 C 2 0 0 1 L 0 ) = ( 1 ω ) I + ω h ( 1 0 0 0 0 1 1 + h C 1 R + h C 1 co { a 1 , a 2 } 0 0 0 0 1 1 + h C 2 R 0 0 0 0 1 ) ( 0 1 0 0 0 0 1 C 1 R 0 0 1 C 2 R 0 1 C 2 0 0 1 L 0 ) = ( 1 ω ) I + ω h ( 0 1 0 0 0 0 1 1 + h C 1 R + h C 1 co { a 1 , a 2 } 1 C 1 R 0 0 1 1 + h C 2 R 1 C 2 R 0 1 1 + h C 2 R 1 C 2 0 0 1 L 0 ) = ( 1 ω ) I + ( 0 ω h 0 0 0 0 1 1 + h C 1 R + h C 1 co { a 1 , a 2 } ω h C 1 R 0 0 1 1 + h C 2 R ω h C 2 R 0 1 1 + h C 2 R ω h C 2 0 0 ω h L 0 ) = ( 1 ω ω h 0 0 0 1 ω 1 1 + h C 1 R + h C 1 co { a 1 , a 2 } ω h C 1 R 0 0 1 1 + h C 2 R ω h C 2 R 1 ω 1 1 + h C 2 R ω h C 2 0 0 ω h L 1 ω ) .
(18)

Clearly, by the iterative scheme (17), we can draw the conclusion of Theorem 1.

Theorem 1 If ρ(F)<1, then the iterative scheme (17) is convergent, i.e., (17) converges to a fixed state, where ρ(F) denotes spectral radius of the matrix F.

Theorem 2 If F<1, then the iterative scheme (17) is convergent, i.e., (17) converges to a fixed state, where F denotes the norm of the matrix F.

Proof Since ρ(F)F<1, according to Theorem 1, it follows that Theorem 2 holds. □

Theorem 3 The fixed state of iterative scheme (17) is the solution of system (1).

Proof When lim k + Θ k = Θ , take the limit of (8), then

{ y ˙ = B y + C Θ , Θ = Θ + ω ( y Θ ) ,

thus y= Θ , which satisfies (1). □

3 Partial difference method

In this section, we present a constructive proof to illustrate the partial difference method and the related convergence analysis for system (1).

Through the theories of the Taylor formula and the partial difference method, from (5), it follows that

φ ( t k + h ) = φ ( t k ) + h φ ˙ ( t k ) + h 2 2 φ ¨ ( t k ) = φ ( t k ) + h v 1 ( t k ) + h 2 2 d v 1 ( t ) d t | t = t k φ ( t k + h ) = φ ( t k ) + h v 1 ( t k ) + h 2 [ h d v 1 ( t ) d t | t = t k ] φ ( t k + h ) = φ ( t k ) + h v 1 ( t k ) + h 2 [ v 1 ( t k + h ) v 1 ( t k ) ] ,
(19)
v 1 ( t k + h ) = v 1 ( t k ) + h v ˙ 1 ( t k ) + h 2 2 v ¨ 1 ( t k ) v 1 ( t k + h ) = v 1 ( t k ) + h [ 1 C 1 R v 2 ( t k ) 1 C 1 R v 1 ( t k ) 1 C 1 ( i = 1 2 η i ( t k ) a i ) v 1 ( t k ) ] v 1 ( t k + h ) = + h 2 2 [ 1 C 1 R d v 2 ( t ) d t | t = t k 1 C 1 R d v 1 ( t ) d t | t = t k 1 C 1 ( i = 1 2 η i ( t k ) a i ) d v 1 ( t ) d t | t = t k ] v 1 ( t k + h ) = v 1 ( t k ) + h [ 1 C 1 R v 2 ( t k ) 1 C 1 R v 1 ( t k ) 1 C 1 ( i = 1 2 η i ( t k ) a i ) v 1 ( t k ) ] v 1 ( t k + h ) = + h 2 [ 1 C 1 R ( v 2 ( t k + h ) v 2 ( t k ) ) 1 C 1 R ( v 1 ( t k + h ) v 1 ( t k ) ) v 1 ( t k + h ) = 1 C 1 ( i = 1 2 η i ( t k ) a i ) ( v 1 ( t k + h ) v 1 ( t k ) ) ] ,
(20)
v 2 ( t k + h ) = v 2 ( t k ) + h v ˙ 2 ( t k ) + h 2 2 v ¨ 2 ( t k ) v 2 ( t k + h ) = v 2 ( t k ) + h [ 1 C 2 R v 1 ( t k ) 1 C 2 R v 2 ( t k ) 1 C 2 ( t k ) ] v 2 ( t k + h ) = + h 2 2 [ 1 C 2 R d v 1 ( t ) d t | t = t k 1 C 2 R d v 2 ( t ) d t | t = t k 1 C 2 d ( t ) d t | t = t k ] v 2 ( t k + h ) = v 2 ( t k ) + h [ 1 C 2 R v 1 ( t k ) 1 C 2 R v 2 ( t k ) 1 C 2 ( t k ) ] v 2 ( t k + h ) = + h 2 [ 1 C 2 R ( v 1 ( t k + h ) v 1 ( t k ) ) 1 C 2 R ( v 2 ( t k + h ) v 2 ( t k ) ) v 2 ( t k + h ) = 1 C 2 ( ( t k + h ) ( t k ) ) ] ,
(21)
( t k + h ) = ( t k ) + h ˙ ( t k ) + h 2 2 ¨ ( t k ) = ( t k ) + h 1 L v 2 ( t k ) + h 2 2 [ 1 L d v 2 ( t ) d t | t = t k ] ( t k + h ) = ( t k ) + h L v 2 ( t k ) + h 2 L [ h d v 2 ( t ) d t | t = t k ] ( t k + h ) = ( t k ) + h L v 2 ( t k ) + h 2 L [ v 2 ( t k + h ) v 2 ( t k ) ] ,
(22)

where h0 is a constant.

Equations (19)-(22) are a generic form of a first-order partial difference method for system (5). When h>0, (19)-(22) are said to be the forward partial difference method for system (5). When h<0, (19)-(22) are said to be the backward partial difference method for system (5).

In the following, we consider the convergence of the first-order partial difference method for system (5).

By (19)-(22), we obtain

φ( t k +h) h 2 v 1 ( t k +h)=φ( t k )+ h 2 v 1 ( t k ),
(23)
[ 1 + h 2 C 1 R + h 2 C 1 ( i = 1 2 η i ( t k ) a i ) ] v 1 ( t k + h ) h 2 C 1 R v 2 ( t k + h ) = h 2 C 1 R v 2 ( t k ) + [ 1 h 2 C 1 R h 2 C 1 ( i = 1 2 η i ( t k ) a i ) ] v 1 ( t k ) ,
(24)
h 2 C 2 R v 1 ( t k + h ) + ( 1 + h 2 C 2 R ) v 2 ( t k + h ) + h 2 C 2 ( t k + h ) = h 2 C 2 R v 1 ( t k ) + ( 1 h 2 C 2 R ) v 2 ( t k ) h 2 C 2 ( t k ) ,
(25)
( t k +h) h 2 L v 2 ( t k +h)=( t k )+ h 2 L v 2 ( t k ).
(26)

Transform (23)-(26) into the compact form as follows:

( 1 h 2 0 0 0 1 + h 2 C 1 R + h 2 C 1 ( i = 1 2 η i ( t k ) a i ) h 2 C 1 R 0 0 h 2 C 2 R 1 + h 2 C 2 R h 2 C 2 0 0 h 2 L 1 ) ( φ ( t k + h ) v 1 ( t k + h ) v 2 ( t k + h ) ( t k + h ) ) = ( 1 h 2 0 0 0 1 h 2 C 1 R h 2 C 1 ( i = 1 2 η i ( t k ) a i ) h 2 C 1 R 0 0 h 2 C 2 R 1 h 2 C 2 R h 2 C 2 0 0 h 2 L 1 ) ( φ ( t k ) v 1 ( t k ) v 2 ( t k ) ( t k ) ) ,
(27)

then we have

( φ ( t k + h ) v 1 ( t k + h ) v 2 ( t k + h ) ( t k + h ) ) =Ξ ( φ ( t k ) v 1 ( t k ) v 2 ( t k ) ( t k ) ) ,
(28)

where

Ξ = ( 1 h 2 0 0 0 1 + h 2 C 1 R + h 2 C 1 ( i = 1 2 η i ( t k ) a i ) h 2 C 1 R 0 0 h 2 C 2 R 1 + h 2 C 2 R h 2 C 2 0 0 h 2 L 1 ) 1 × ( 1 h 2 0 0 0 1 h 2 C 1 R h 2 C 1 ( i = 1 2 η i ( t k ) a i ) h 2 C 1 R 0 0 h 2 C 2 R 1 h 2 C 2 R h 2 C 2 0 0 h 2 L 1 ) .
(29)

Let

Ξ ˜ = ( 1 h 2 0 0 0 1 + h 2 C 1 R + h 2 C 1 co { a 1 , a 2 } h 2 C 1 R 0 0 h 2 C 2 R 1 + h 2 C 2 R h 2 C 2 0 0 h 2 L 1 ) 1 × ( 1 h 2 0 0 0 1 h 2 C 1 R h 2 C 1 co { a 1 , a 2 } h 2 C 1 R 0 0 h 2 C 2 R 1 h 2 C 2 R h 2 C 2 0 0 h 2 L 1 ) ,
(30)

where co{ a 1 , a 2 } denotes the closure of the convex hull generated by the real numbers a 1 and a 2 .

Obviously, by the iterative scheme (28), we can draw the conclusions of Theorems 4 and 5.

Theorem 4 If ρ( Ξ ˜ )=1, and the eigenvalues of M( Ξ ˜ )=1 only correspond to the elementary divisors of the matrix Ξ ˜ , then the iterative scheme (28) is convergent, i.e., (28) converges to a fixed state, where ρ( Ξ ˜ ) and M( Ξ ˜ ) denote the spectral radius and matrix module of Ξ ˜ , respectively.

Theorem 5 If ρ( Ξ ˜ )<1, then the iterative scheme (28) is convergent, i.e., (28) converges to a fixed state, where ρ( Ξ ˜ ) denotes spectral radius of the matrix Ξ ˜ .

Theorem 6 If Ξ ˜ <1, then the iterative scheme (28) is convergent, i.e., (28) converges to a fixed state, where Ξ ˜ denotes the norm of the matrix Ξ ˜ .

Proof Since ρ( Ξ ˜ ) Ξ ˜ <1, according to Theorem 5, it follows that Theorem 6 holds. □

Remark 1 In fact, in Theorems 5 and 6, according to the theory of stability for discrete dynamical systems, we find that the iterative scheme (28) is exponentially convergent when ρ( Ξ ˜ )<1 or Ξ ˜ <1.

4 Conclusion

The area of memristive oscillator systems is ripe with open problems and challenges, and more exploratory analyses will encourage and motivate researchers to enter this exciting field of research. In this paper, we investigate the convergence analysis of two types of algorithms for solving a class of memristive oscillator systems. Some preliminary results have been shown. We hope that such theoretical analysis in this area will contribute to further ignition of interest and promotion of multi-discipline studies.