Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A scheme for protecting multiple quantum erasures, and . CoRR, (2011)A new algorithm for compression of partially commutative alphabets., and . Inf. Sci., (2022)An Architecture for Computing Zech's Logarithms in GF(2m)., and . IEEE Trans. Computers, 49 (5): 519-525 (2000)Zero-Error Capacity of a Quantum Channel., and . ICT, volume 3124 of Lecture Notes in Computer Science, page 100-105. Springer, (2004)Markov Chain Simulation of Biological Effects on Nerve Cells Ionic Channels Due to Electromagnetic Fields Used in Communication Systems., , and . ICT, volume 3124 of Lecture Notes in Computer Science, page 1023-1028. Springer, (2004)Weight Structure of Binary Codes and the Performance of Blind Search Algorithms.. SBRN, page 144-149. IEEE Computer Society, (2000)A Comparative Study of Use of Shannon, Rényi and Tsallis Entropy for Attribute Selecting in Network Intrusion Detection., , and . IDEAL, volume 7435 of Lecture Notes in Computer Science, page 492-501. Springer, (2012)Fuzzy-based dialectical non-supervised image classification and clustering., , , , , and . Int. J. Hybrid Intell. Syst., 7 (2): 115-124 (2010)The impact of constellation cardinality on discrete unidimensional CVQKD protocols., and . Quantum Inf. Process., 20 (8): 284 (2021)Optimized recovery of collided chipless RFID signals using Fractional Fourier Transform., , and . RFID-TA, page 91-96. IEEE, (2014)