Author of the publication

Systematic t-Unidirectional Error-Detecting Codes over Zm.

, , and . IEEE Trans. Computers, 56 (7): 876-880 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution., , , and . IEEE Access, (2023)Fog Intelligence for Real-Time IoT Sensor Data Analytics., , , , , , and . IEEE Access, (2017)Secure Quantum Steganography Protocol for Fog Cloud Internet of Things., , , , and . IEEE Access, (2018)Secure Medical Blockchain Model., , , , and . Inf., 14 (2): 80 (February 2023)A Dynamic Reconfigurable-Based Approach for Connectivity Mismatches of Web Services., and . ICDIPC (2), volume 189 of Communications in Computer and Information Science, page 67-81. Springer, (2011)Analysis of Plain and Diversity Combining Hybrid ARQ Protocols Over the m(geq 2)-Ary Asymmetric Channel., , and . IEEE Trans. Inf. Theory, 52 (12): 5550-5558 (2006)Efficient Non-Recursive Design of Second-Order Spectral-Null Codes., , , , , and . IEEE Trans. Inf. Theory, 62 (6): 3084-3102 (2016)Big-Data Aggregating, Linking, Integrating and Representing Using Semantic Web Technologies., , and . AMLTA, volume 723 of Advances in Intelligent Systems and Computing, page 331-342. Springer, (2018)On efficient second-order spectral-null codes using sets of m1-balancing functions., , , , , and . ISIT, page 141-145. IEEE, (2013)Toward cognitive support for automated defect detection., , , , , and . Neural Comput. Appl., 32 (9): 4325-4333 (2020)