2024
Fractal Dimensions in Circular and Spiral Phenomena.
Circuits Syst. Signal Process., January, 2024
2023
The Dimensionality of Genetic Information.
Parallel Process. Lett., December, 2023
Linear Fractals with Weights.
Parallel Process. Lett., December, 2023
Self-similarity and the maximum entropy principle in the genetic code.
Theory Biosci., September, 2023
No-Go Theorems on Machine Consciousness.
J. Artif. Intell. Conscious., September, 2023
An Information Principle Based on Partitions for Cognitive Data.
J. Artif. Intell. Conscious., March, 2023
2022
Number of Autonomous Cognitive Agents in a Neural Network.
J. Artif. Intell. Conscious., 2022
The Limits to Machine Consciousness.
J. Artif. Intell. Conscious., 2022
New Classes of Regular Symmetric Fractals.
Circuits Syst. Signal Process., 2022
2021
Fractals with Optimal Information Dimension.
Circuits Syst. Signal Process., 2021
The Intrinsic Dimensionality of Data.
Circuits Syst. Signal Process., 2021
The Base-e Representation of Numbers and the Power Law.
Circuits Syst. Signal Process., 2021
2018
On Ternary Coding and Three-Valued Logic.
CoRR, 2018
Order Effects for Queries in Intelligent Systems.
CoRR, 2018
On the Algebra in Boole's Laws of Thought.
CoRR, 2018
Reasoning in a Hierarchical System with Missing Group Size Information.
CoRR, 2018
2017
Power series models of self-similarity in social networks.
Inf. Sci., 2017
Learning Based on CC1 and CC4 Neural Networks.
CoRR, 2017
Reasoning in Systems with Elements that Randomly Switch Characteristics.
CoRR, 2017
Probability Reversal and the Disjunction Effect in Reasoning Systems.
CoRR, 2017
On Quantum Decision Trees.
CoRR, 2017
The Absent-Minded Driver Problem Redux.
CoRR, 2017
Binary Prime Tableau Sequences.
CoRR, 2017
An Investigation of Power Law Probability Distributions for Network Anomaly Detection.
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Incomplete information and quantum decision trees.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017
Binary primes sequence for cryptography and secure communication.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Pseudorandom tableau sequences.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017
Authentication of parties in piggy bank cryptography.
Proceedings of the 51st Asilomar Conference on Signals, Systems, and Computers, 2017
2016
Generalized Unary Coding.
Circuits Syst. Signal Process., 2016
Simulating entanglement in classical computing for cryptographic applications.
Cryptologia, 2016
The binary primes sequence for computational hardening of pseudorandom sequences.
CoRR, 2016
The Narayana Universal Code.
CoRR, 2016
2015
Orthogonal Residue Sequences.
Circuits Syst. Signal Process., 2015
Connectivity in Social Networks.
CoRR, 2015
A Class of Random Sequences for Key Generation.
CoRR, 2015
Two Power Series Models of Self-Similarity in Social Networks.
CoRR, 2015
Multiparty Probability Computation and Verification.
CoRR, 2015
Oblivious Transfer Protocol with Verification.
CoRR, 2015
Multi-Photon Quantum Key Distribution Based on Double-Lock Encryption.
CoRR, 2015
2014
Social Network Dynamics: An Attention Economics Perspective.
Proceedings of the Social Networks: A Framework of Computational Intelligence, 2014
The Number Theoretic Hilbert Transform.
Circuits Syst. Signal Process., 2014
Cryptographic Applications of Primitive Pythagorean Triples.
Cryptologia, 2014
Friendship Paradox and Attention Economics.
CoRR, 2014
Authentication Using Piggy Bank Approach to Secure Double-Lock Cryptography.
CoRR, 2014
Efficiency of Matrix Multiplication on the Cross-Wired Mesh Array.
CoRR, 2014
DAWN: Defending against wormhole attacks in wireless network coding systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
2013
Residue Classes of the PPT Sequence
CoRR, 2013
Generalized Public Key Transformations with Side Information
CoRR, 2013
The Quartic Public Key Transformation
CoRR, 2013
The Piggy Bank Cryptographic Trope
CoRR, 2013
Neural Network Capacity for Multilevel Inputs.
CoRR, 2013
A Key Set Cipher for Wireless Sensor Networks.
CoRR, 2013
A Class of Orthogonal Sequences.
CoRR, 2013
Threshold Quantum Cryptography.
CoRR, 2013
Probability and the Classical/Quantum Divide.
CoRR, 2013
Multi-photon implementation of three-stage quantum cryptography protocol.
Proceedings of the International Conference on Information Networking 2013, 2013
Multi-photon tolerant secure quantum communication - From theory to practice.
Proceedings of IEEE International Conference on Communications, 2013
2012
Random Sequences from Primitive Pythagorean Triples
CoRR, 2012
An Alignment Algorithm for Sequences
CoRR, 2012
Random Sequences Based on the Divisor Pairs Function
CoRR, 2012
Goldbach Circles and Balloons and Their Cross Correlation
CoRR, 2012
Goldbach Triples and Key Distribution
CoRR, 2012
Implementation of Secure Quantum Protocol using Multiple Photons for Communication
CoRR, 2012
Goldbach Ellipse Sequences for Cryptographic Applications
CoRR, 2012
On Randomness of Goldbach Sequences
CoRR, 2012
iAQC: The Intensity-Aware Quantum Cryptography Protocol
CoRR, 2012
A Survey of Prediction Using Social Media
CoRR, 2012
Increasing Randomness Using Permutations on Blocks
CoRR, 2012
A Comprehensive Security Model for Networking Applications.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012
An empirical study of how users adopt famous entities.
Proceedings of the First International Conference on Future Generation Communication Technologies (FGST 2012), 2012
2011
Space efficient secret sharing for implicit data security.
Inf. Sci., 2011
The Algebra of Two Dimensional Patterns
CoRR, 2011
Information Centric Frameworks for Micro Assembly.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2011 Workshops, 2011
A New Small World Lattice.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
Matrix based key agreement algorithms for sensor networks.
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011
2010
Hybrid Neural Network Architecture for On-Line Learning.
Intell. Inf. Manag., 2010
Internet Voting Protocol Based on Improved Implicit Security.
Cryptologia, 2010
The Use of Rapid Digital Game Creation to Learn Computational Thinking
CoRR, 2010
On the Mesh Array for Matrix Multiplication
CoRR, 2010
Unary Coding for Neural Network Learning
CoRR, 2010
Pythagorean Triples and Cryptographic Coding
CoRR, 2010
Recursive Secret Sharing for Distributed Storage and Information Hiding
CoRR, 2010
A Key Distribution Scheme for Sensor Networks Using Structured Graphs
CoRR, 2010
A Tree Based Recursive Information Hiding Scheme.
Proceedings of IEEE International Conference on Communications, 2010
Data Mining Using Surface and Deep Agents Based on Neural Networks.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010
2009
Multilevel Indexed Quasigroup Encryption for Data and Speech.
IEEE Trans. Broadcast., 2009
Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks.
Secur. Commun. Networks, 2009
Online data storage using implicit security.
Inf. Sci., 2009
Rapid digital game creation for broadening participation in computing and fostering crucial thinking skills.
Int. J. Soc. Humanist. Comput., 2009
A Tree Based Recursive Scheme for Space Efficient Secret Sharing.
IACR Cryptol. ePrint Arch., 2009
Space Efficient Secret Sharing: A Recursive Approach.
IACR Cryptol. ePrint Arch., 2009
Another Look at Quantum Neural Computing
CoRR, 2009
Recursive Random Number Generator Using Prime Reciprocals
CoRR, 2009
Single Neuron Memories and the Network's Proximity Matrix
CoRR, 2009
Memory Retrieved from Single Neurons
CoRR, 2009
Cryptography for Multi-Located Parties
CoRR, 2009
Space Efficient Secret Sharing.
CoRR, 2009
The Transactional Nature of Quantum Information.
CoRR, 2009
A Distributed Data Storage Scheme for Sensor Networks.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Learning Computer Programming with Game Design.
Proceedings of the CSEDU 2009 - Proceedings of the First International Conference on Computer Supported Education, Lisboa, Portugal, March 23-26, 2009, 2009
2008
A Recursive Threshold Visual Cryptography Scheme.
IACR Cryptol. ePrint Arch., 2008
Internet Voting Protocol Based on Implicit Data Security.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008
2007
How to improve security in electronic voting?
Ubiquity, 2007
An Improved Method of Content Based Image Watermarking.
IEEE Trans. Broadcast., 2007
2006
On the realizability of quantum computers.
Ubiquity, 2006
The Cubic Public-Key Transformation
CoRR, 2006
Artificial and Biological Intelligence
CoRR, 2006
Quantum Information and Entropy.
CoRR, 2006
2005
Artificial and Biological Intelligence.
Ubiquity, 2005
Watermarking Using Decimal Sequences.
Cryptologia, 2005
A Three-Stage Quantum Cryptography Protocol.
CoRR, 2005
2003
General qubit errors cannot be corrected.
Inf. Sci., 2003
2002
A class of instantaneously trained neural networks.
Inf. Sci., 2002
Recursive Hiding of Secrets in Visual Cryptography.
Cryptologia, 2002
2000
Quantum computing and neural information processing.
Inf. Sci., 2000
Active agents, intelligence and quantum computing.
Inf. Sci., 2000
1999
Inverse Kinematics in Robotics using Neural Networks.
Inf. Sci., 1999
A Neural Network-based Intelligent Metasearch Engine.
Inf. Sci., 1999
1998
On Generalization by Neural Networks.
Inf. Sci., 1998
1996
An Indus-Sarasvatī Signboard.
Cryptologia, 1996
1995
On Quantum Neural Computing.
Inf. Sci., 1995
1994
New algorithms for training feedforward neural networks.
Pattern Recognit. Lett., 1994
1993
Neural networks and artificial intelligence.
Inf. Sci., 1993
1990
Indus and Brahmi Further Connections.
Cryptologia, 1990
Neural computing with structured information.
Proceedings of the 2nd International IEEE Conference on Tools for Artificial Intelligence, 1990
1989
A New Method for Coin Flipping by Telephone.
Cryptologia, 1989
1988
A two-layered mesh array for matrix multiplication.
Parallel Comput., 1988
Multilayered array computing.
Inf. Sci., 1988
A frequency Analysis of the Indus Script.
Cryptologia, 1988
1987
The Paninian approach to natural language processing.
Int. J. Approx. Reason., 1987
The Study of the Indus Script General Considerations.
Cryptologia, 1987
1985
Encryption and Error-Correction Coding Using <i>D</i> Sequences.
IEEE Trans. Computers, 1985
How to Detect Tampering of Data.
Inf. Process. Lett., 1985
1984
On the method of puzzles for key distribution.
Int. J. Parallel Program., 1984
1983
A Structural Redundancy in <i>d</i>-Sequences.
IEEE Trans. Computers, 1983
Exponentiation modulo a polynomial for data security.
Int. J. Parallel Program., 1983
Data Security in Computer Networks: Guest Editor's Introduction.
Computer, 1983
Joint Encryption and Error-Correction Coding.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983
1981
IEEE Trans. Inf. Theory, 1981
Scrambling and Randomization.
Proceedings of the Advances in Cryptology: A Report on CRYPTO 81, 1981
1974
Binary Sequences and Redundancy.
IEEE Trans. Syst. Man Cybern., 1974