Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Active leading through obstacles using ant-colony algorithm., , , , and . Neurocomputing, (2012)Adaptive critic-based neuro-fuzzy controller in multi-agents: Distributed behavioral control and path tracking., , , and . Neurocomputing, (2012)Mehrab Maps: One-Dimensional Piecewise nonlinear Chaotic Maps., , and . Int. J. Bifurc. Chaos, (2012)Speech encryption based on fast Fourier transform permutation.. ICECS, page 290-293. IEEE, (2000)A fault-tolerant and scalable column-wise reversible quantum multiplier with a reduced size., and . Quantum Inf. Process., 22 (4): 166 (April 2023)Secure scan-based design using Blum Blum Shub algorithm., and . EWDTS, page 1-5. IEEE Computer Society, (2016)Automatic Test Pattern Generation Through Boolean Satisfiability for Testing Bridging Faults., , and . Journal of Circuits, Systems, and Computers, 28 (14): 1950240:1-1950240:26 (2019)A Side-Channel Analysis for Hardware Trojan Detection Based on Path Delay Measurement., and . Journal of Circuits, Systems, and Computers, 27 (9): 1850138:1-1850138:13 (2018)Probabilistic failure analysis of hot gas path in a heavy-duty gas turbine using Bayesian networks., , , , and . Int. J. Syst. Assur. Eng. Manag., 10 (5): 1173-1185 (2019)Blockchain-based end-to-end privacy-preserving scheme for IoT-based healthcare systems., , and . J. Supercomput., 80 (2): 2067-2127 (January 2024)