Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of Nonlinear Component of Block Cipher Using Gravesian Octonion Integers., , , , , and . IEEE Access, (2023)An Affective Agent Playing Tic-Tac-Toe as Part of a Healing Environment., and . PRIMA, volume 5925 of Lecture Notes in Computer Science, page 33-47. Springer, (2009)Improved Twofish Algorithm: A Digital Image Enciphering Application., , , , , and . IEEE Access, (2021)Reliability Analysis for Electronic Devices Using Generalized Exponential Distribution., , , , , and . IEEE Access, (2020)Metamorphic Testing of an Artificially Intelligent Chess Game., , and . IEEE Access, (2020)A game theoretic power control and spectrum sharing approach using cost dominance in cognitive radio networks., , , , , and . PeerJ Comput. Sci., (2021)Affective Agents Perceiving Each Other's Actions., and . ECMS, page 194-202. European Council for Modeling and Simulation, (2009)Prostate Cancer Detection Using Deep Learning and Traditional Techniques., , , , , , and . IEEE Access, (2021)Multi-Images Encryption Scheme Based on 3D Chaotic Map and Substitution Box., , , , , , and . IEEE Access, (2021)A Dynamic Three-Bit Image Steganography Algorithm for Medical and e-Healthcare Systems., , , , , , and . IEEE Access, (2020)