From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

How Engineers Deal with Mathematics Solving Differential Equation., , , , , и . ICCS, том 51 из Procedia Computer Science, стр. 1977-1985. Elsevier, (2015)A Protocol to Provide Assurance of Images Integrity Using Memory Cellular Automata.. ACRI, том 4173 из Lecture Notes in Computer Science, стр. 627-635. Springer, (2006)A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata., , и . IbPRIA (1), том 3522 из Lecture Notes in Computer Science, стр. 411-418. Springer, (2005)3D medical data security protection., , и . Expert Syst. Appl., (2016)Security Countermeasures of a SCIRAS Model for Advanced Malware Propagation., , и . IEEE Access, (2019)A computational propagation model for malware based on the SIR classic model., , и . Neurocomputing, (2022)A Graph Cellular Automata Model to Study the Spreading of an Infectious Disease., , , , , и . MICAI (1), том 7629 из Lecture Notes in Computer Science, стр. 458-468. Springer, (2012)A Mathematical Model to Study the Meningococcal Meningitis., , , , , и . ICCS, том 18 из Procedia Computer Science, стр. 2492-2495. Elsevier, (2013)About the Reversibility of Elementary Cellular Automata with Rule Number 180., и . DCAI (2), том 332 из Lecture Notes in Networks and Systems, стр. 131-140. Springer, (2021)Graphic Cryptography with Pseudorandom Bit Generators and Cellular Automata., , , , и . KES, том 2773 из Lecture Notes in Computer Science, стр. 1207-1214. Springer, (2003)