Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An ASCII based effective and multi-operation image encryption method., , , , and . Multim. Tools Appl., 79 (31-32): 22107-22129 (2020)A secure key dependent dynamic substitution method for symmetric cryptosystems., , , , and . PeerJ Comput. Sci., (2021)Suggested Hybrid Approach for Robust Classification of EEG Data for Brain Computer Interface., and . BIOCOMP, page 87-97. CSREA Press, (2010)Optimal sequence for chain matrix multiplication using evolutionary algorithm., , , , , , , and . PeerJ Comput. Sci., (2021)An Improved Convolutional Neural Network for Speech Emotion Recognition., , , , , and . SCDM, volume 457 of Lecture Notes in Networks and Systems, page 194-201. Springer, (2022)Localization for V2X communication with noisy distance measurement., , , , , and . Int. J. Intell. Networks, (2023)Deep Learning Based Multi Pose Human Face Matching System., , , , , , and . IEEE Access, (2024)MIND: A Multi-Source Data Fusion Scheme for Intrusion Detection in Networks., , , , and . Sensors, 21 (14): 4941 (2021)A novel rough value set categorical clustering technique for supplier base management., , , , and . Computing, 103 (9): 2061-2091 (2021)