Lazaros Moysis

ORCID: 0000-0002-5652-2532
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos control and synchronization
  • Chaos-based Image/Signal Encryption
  • Mathematical Dynamics and Fractals
  • Quantum chaos and dynamical systems
  • Nonlinear Dynamics and Pattern Formation
  • Cellular Automata and Applications
  • Stability and Control of Uncertain Systems
  • Neural Networks Stability and Synchronization
  • Fractal and DNA sequence analysis
  • Music and Audio Processing
  • Robotic Path Planning Algorithms
  • Neural Networks and Applications
  • Control and Dynamics of Mobile Robots
  • Adaptive Control of Nonlinear Systems
  • Gene Regulatory Network Analysis
  • Advanced Differential Equations and Dynamical Systems
  • Music Technology and Sound Studies
  • Speech Recognition and Synthesis
  • Matrix Theory and Algorithms
  • Advanced Control Systems Optimization
  • stochastic dynamics and bifurcation
  • Control Systems and Identification
  • Mathematical Biology Tumor Growth
  • Fault Detection and Control Systems
  • Speech and Audio Processing

Aristotle University of Thessaloniki
2016-2025

University of Western Macedonia
2022-2025

The discipline of Deep Learning has been recognized for its strong computational tools, which have extensively used in data and signal processing, with innumerable promising results. Among the many commercial applications Learning, Music Signal Processing received an increasing amount attention over last decade. This work reviews most recent developments processing. Two main that are discussed Information Retrieval, spans a plethora applications, Generation, can fit range musical styles....

10.1109/access.2023.3244620 article EN cc-by IEEE Access 2023-01-01

A modification of the classic logistic map is proposed, using fuzzy triangular numbers. The resulting analysed through its Lyapunov exponent (LE) and bifurcation diagrams. It shows higher complexity compared to showcases phenomena, like antimonotonicity crisis. then applied problem pseudo random bit generation, a simple rule generate sequence. generator (RBG) successfully passes National Institute Standards Technology (NIST) statistical tests, it image encryption.

10.3390/e22040474 article EN cc-by Entropy 2020-04-20

Currently, chaotic cryptography is mainly concentrated on image encryption. Once-popular stream-encryption algorithms, e.g., textual data, are now rarely considered. This article studies how image-encryption algorithms can be used to encrypt text. The proposed approach this problem consists of two stages: in the first stage, text message intended for encryption into an image; second step, selected algorithm used. An example illustrates efficiency method. In addition, presents measures...

10.3390/electronics11193156 article EN Electronics 2022-10-01

Abstract In this work, the use of false chaotic attractors in enhancing security chaos-based encryption applications will be explored. False result by rearranging solution trajectories a nonlinear dynamical system, leading to novel shapes 3D space. This way, single trajectory system can used generate numerous new trajectories. Examples such are provided for Lorenz and with line equilibrium from Moysis et al. (2019). By formalizing method constructing attractors, generalizing it adding series...

10.1088/1402-4896/ada9cb article EN cc-by Physica Scripta 2025-01-13

Abstract In this work, the use of false chaotic attractors in enhancing security chaos-based encryption applications will be explored. False result by rearranging solution trajectories a nonlinear dynamical system, leading to novel shapes 3D space. This way, single trajectory system can used generate numerous new trajectories. Examples such are provided for Lorenz and with line equilibrium from Moysis et al. (2019). By formalizing method constructing attractors, generalizing it adding series...

10.1088/1402-4896/ada9b6 article EN Physica Scripta 2025-01-14

In this work, a comparison of Greek Orthodox religious chants is performed using fuzzy entropy. Using dataset chant performances, each recitation segmented into overlapping time windows, and the entropy window in frequency domain computed. We introduce novel audio fingerprinting framework by comparing variations resulting vector for dataset. For purpose, we use correlation coefficient as measure dynamic warping. Thus, it possible to match performances same with high probability. The proposed...

10.3390/computers14020039 article EN cc-by Computers 2025-01-27

This work proposes a generalization of the family chaotic maps without fixed points, proposed by Jafari et al.; 2016 and termed Vertigo maps. The original map is parameterized four control parameters, which can be used to scale function as seed its domain. Several theoretical results are provided regarding existence periodic cycles, Lyapunov exponents Furthermore, two examples based on logistic tent functions, then studied using series numerical tools, like phase portraits, bifurcation...

10.1142/s0218127425300125 article EN International Journal of Bifurcation and Chaos 2025-03-14

This work proposes a modified logistic map based on the system previously proposed by Han in 2019. The constructed exhibits interesting chaos related phenomena like antimonotonicity, crisis, and coexisting attractors. In addition, Lyapunov exponent of can achieve higher values, so behavior is overall more complex compared to original. then successfully applied problem random bit generation using techniques comparison between maps, X O R , reversal. algorithm passes all NIST tests, shows good...

10.3390/sym12050829 article EN Symmetry 2020-05-18

In this work, a chaotification technique is proposed for increasing the complexity of chaotic maps. The consists adding remainder multiple scalings map’s value next iteration, so that most- and least-significant digits are combined. By appropriate parameter tuning, resulting map can achieve higher Lyapunov exponent value, result was first proven theoretically then showcased through numerical simulations collection As application transformed maps, encryption B-spline curves patches...

10.3390/sym15030726 article EN Symmetry 2023-03-14

Chaos-based random bit generators are abundantly used in chaos-based encryption and security applications, as a fast, deterministic source of randomness, to perform actions like permutation substitution. The chaotic map randomness though may heavily affect the generator's statistical key space, speed. Thus, any given generator not be equally efficient for all maps seed. Motivated by this, present work considers that utilizes common modulo-based hashing technique, studies its performance...

10.1109/pacet60398.2024.10497085 article EN 2024-03-28

Chaotic behavior is a term that attributed to dynamical systems whose solutions are highly sensitive initial conditions. This means small perturbations in the conditions can lead completely different trajectories solution space. These types of chaotic arise various natural or artificial biology, meteorology, economics, electrical circuits, engineering, computer science and more. Of these innumerable systems, perhaps most interesting those exhibit attracting behavior. By that, authors refer...

10.4018/ijsda.2017010105 article EN International Journal of System Dynamics Applications 2016-10-19

In this work, a novel hyperjerk system, with hyperbolic sine function as the only nonlinear term, is proposed, modification of system proposed by Leutcho et al. First, dynamical analysis on performed and interesting phenomena concerning chaos theory, such route to chaos, antimonotonicity, crisis, coexisting attractors, are studied. For reason, system’s bifurcation diagrams respect different parameter values plotted its Lyapunov exponents computed. Afterwards, synchronization considered,...

10.1155/2020/2826850 article EN cc-by Complexity 2020-04-30

Summary This work considers the problem of observer design for rectangular descriptor systems with nonlinearities satisfying incremental quadratic constraints. The is feasible under satisfaction a linear matrix inequality and some algebraic relations in system matrices. special case output also considered. Finally, developed approach applied to secure communications illustrated through numerical examples.

10.1002/rnc.5233 article EN International Journal of Robust and Nonlinear Control 2020-09-19
Coming Soon ...