Author of the publication

Evolvable hardware design based on a novel simulated annealing in an embedded system.

, , , , , , and . Concurr. Comput. Pract. Exp., 24 (4): 354-370 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Handwritten Signature Image., , , and . FGIT-SecTech, volume 58 of Communications in Computer and Information Science, page 43-50. Springer, (2009)A New Authentication Scheme for Cloud-based Storage Applications., , and . SIN, page 57-60. ACM, (2016)Smart City and IoT., , and . Future Gener. Comput. Syst., (2017)U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home., , , and . J. Supercomput., 45 (1): 88-104 (2008)A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect., , , , , , and . IEEE Access, (2020)Adaptive routing protocol for mobile ad hoc networks., , , and . Computing, 96 (9): 817-827 (2014)Editorial to special issue: computer and network applications for ubiquitous computing., , and . Computing, 96 (9): 775-776 (2014)RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys., , , and . Secur. Commun. Networks, (2018)Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation., , , , and . Int. J. Commun. Netw. Syst. Sci., 2 (5): 363-370 (2009)Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks., , , , and . Sensors, 16 (11): 1832 (2016)