Author of the publication

The separation of binary relative three-weight codes and its applications.

, , and . Cryptogr. Commun., 11 (5): 979-992 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Twin positive solutions for higher order m-point boundary value problems with sign changing nonlinearities., , and . Appl. Math. Comput., 146 (2-3): 299-311 (2003)Multistage Pooling for Blind Quality Prediction of Asymmetric Multiply-Distorted Stereoscopic Images., , , , and . IEEE Trans. Multim., 20 (10): 2605-2619 (2018)Improved Particle Swarm Optimization Based on Dynamic Zaslavskii Chaos and Dynamic Nonlinear Functions., , , and . BMEI, page 1-5. IEEE, (2009)Parameters Turning of the Active-Disturbance Rejection Controller Based on RBF Neural Network., and . CCTA (4), volume 347 of IFIP Advances in Information and Communication Technology, page 260-267. Springer, (2010)Two-Photon Luminescence and Second Harmonic Generation from Gold Micro-Plates., , , , , , and . Sensors, 14 (10): 18328-18336 (2014)Post-nonlinear Blind Source Separation Using Wavelet Neural Networks and Particle Swarm Optimization., and . ICNC (2), volume 3611 of Lecture Notes in Computer Science, page 386-390. Springer, (2005)Optical Sensing of Vegetation Water Content: A Synthesis Study., , , , , and . IEEE J Sel. Topics in Appl. Earth Observ. and Remote Sensing, 8 (4): 1456-1464 (2015)Opposition-Based Learning Estimation of Distribution Algorithm with Gaussian Copulas and Its Application to Placement of RFID Readers., , , , and . AICI (1), volume 7002 of Lecture Notes in Computer Science, page 219-227. Springer, (2011)A Multimodel Based Range Query Processing Algorithm for Information Collection in CPS., , , , , and . IJDSN, (2015)A Novel Semi-Supervised Learning Approach for Network Intrusion Detection on Cloud-Based Robotic System., , , , and . IEEE Access, (2018)