“…Chaotic flows are mathematical models originated from the rules of defining chaotic behaviors [1,2]. In the former decades, the chaos theory has been employed in numerous fields such as digital signature [3], secure cryptography [4], pseudorandom number generation [5], secure communication [6], weak signal detection [7], DC-DC boost converter [8], image encryption [9], neurophysiology [10], secure data transmission [11], etc. For the control and synchronization purposes of chaotic systems, several techniques like active control [12], fuzzy control [13], linear matrix inequality (LMI) [14], sampled-data control [15], impulsive adaptive control [16], intermittent control [17] and sliding mode control (SMC) [18] have been introduced.…”