Author of the publication

Generation of n-Dimensional Hyperchaotic Maps Using Gershgorin-Type Theorem and its Application.

, , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (10): 6516-6529 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-resource allocation in cloud radio access networks., , , , and . ICC, page 1-6. IEEE, (2017)Handling least privilege problem and role mining in RBAC., , , and . J. Comb. Optim., 30 (1): 63-86 (2015)A technique for generating the reduced reachability graph of petri net models., , , and . SMC, page 3636-3641. IEEE, (2008)Solving Dynamic Vehicle Routing Problem with Soft Time Window by iLNS and hPSO., , , , and . COCOA, volume 10043 of Lecture Notes in Computer Science, page 702-709. Springer, (2016)Channel assignment using block design in wireless mesh networks., , , and . Comput. Commun., 32 (7-10): 1148-1153 (2009)Path Planning for Sensor Data Collection by Using UAVs., , and . MSN, page 199-205. IEEE, (2018)Petri net modeling and deadlock analysis of parallel manufacturing processes with shared-resources., , and . J. Syst. Softw., 83 (4): 675-688 (2010)Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets., and . IEEE Trans. Dependable Secur. Comput., 8 (6): 852-865 (2011)Optimal Satellite Data Downloading to Multiple ESs by ISL Offloading in LEO Satellite Networks., , , and . MSN, page 188-193. IEEE, (2019)Verifiable Encrypted Search with Forward Secure Updates for Blockchain-Based System., , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 206-217. Springer, (2020)