Author of the publication

Complex Dynamics Behaviors in Cellular Automata Rule 35.

, , , and . J. Cellular Automata, 6 (6): 487-504 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complex Dynamics Behaviors in Cellular Automata Rule 35., , , and . J. Cellular Automata, 6 (6): 487-504 (2011)Hopf bifurcation analysis of a delayed viral infection model in computer networks., , , and . Mathematical and Computer Modelling, 56 (7-8): 167-179 (2012)Securely and efficiently perform large matrix rank decomposition computation via cloud computing., , , and . Cluster Computing, 18 (2): 989-997 (2015)An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids., , , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 469-482. Springer, (2017)Sample size calculation for microarray experiments with blocked one-way design., , , , and . BMC Bioinformatics, (2009)S-DIGing: A Stochastic Gradient Tracking Algorithm for Distributed Optimization., , , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 6 (1): 53-65 (2022)Wireless sensor network accurate TOA location algorithm based on the energy detection., , , and . IJWMC, 10 (2): 159-165 (2016)CropIrri: A Decision Support System for Crop Irrigation Management., and . CCTA, volume 317 of IFIP Advances in Information and Communication Technology, page 90-97. Springer, (2009)Analysis on equilibrium points of cellular neural networks with thresholding activation function., , , , , and . Neural Computing and Applications, 23 (1): 23-29 (2013)Lag Secure Consensus for Second-Order Nonlinear Multiagent Systems with Event-Triggered Control Strategy under DoS Attacks., , , , , , and . Secur. Commun. Networks, (2022)