From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A batch image encryption scheme based on chaining random grids., , и . Sci. Iran., 20 (3): 670-681 (2013)A fast graph cut algorithm for disparity estimation., , , и . PCS, стр. 326-329. IEEE, (2010)MicroApp: Architecting Web Application for Non-uniform Trustworthiness in Cloud Computing Environment., , , , , и . SERE (Companion), стр. 97-106. IEEE, (2014)Fast algorithm on selecting bi-directional prediction type in H.264/AVC scalable video coding., и . ISCAS, стр. 113-116. IEEE, (2010)The Cyberbullying Assessment of Capable Guardianship in Routine Activity Theory., , и . PAISI, том 10241 из Lecture Notes in Computer Science, стр. 3-14. (2017)On Improving Interconnect Defect Diagnosis Resolution and Yield for Interposer-Based 3-D ICs., , , , , и . IEEE Des. Test, 31 (4): 16-26 (2014)Robust Watermarking for Multiple Images and Users Based on Visual Cryptography., , , и . ICGEC, том 238 из Advances in Intelligent Systems and Computing, стр. 175-182. Springer, (2013)An Association Rule Analysis of Acupressure Effect on Sleep Quality., , , и . BIBM, стр. 3827-3831. IEEE, (2021)Palette Partition Based Data Hiding for Color Images., , , , и . IIH-MSP, стр. 620-623. IEEE Computer Society, (2009)Holography: A Hardware Virtualization Tool for Malware Analysis., , , , , и . PRDC, стр. 263-268. IEEE Computer Society, (2009)