default search action
Sodeif Ahadpour
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j9]Nafiseh Hematpour, Sodeif Ahadpour, Iman Golbaz Sourkhani, Reza Hoseini Sani:
A new steganographic algorithm based on coupled chaotic maps and a new chaotic S-box. Multim. Tools Appl. 81(27): 39753-39784 (2022) - 2021
- [j8]Nafiseh Hematpour, Sodeif Ahadpour, Sohrab Behnia:
Presence of dynamics of quantum dots in the digital signature using DNA alphabet and chaotic S-box. Multim. Tools Appl. 80(7): 10509-10531 (2021) - [j7]Nafiseh Hematpour, Sodeif Ahadpour:
Execution examination of chaotic S-box dependent on improved PSO algorithm. Neural Comput. Appl. 33(10): 5111-5133 (2021) - [j6]Sodeif Ahadpour, Forouzan Mirmasoudi:
Coupled two-qubit engine and refrigerator in Heisenberg model. Quantum Inf. Process. 20(2): 63 (2021) - 2020
- [j5]Naser Shirkhanghah, Maghsoud Saadati-Niari, Sodeif Ahadpour:
Fractional population transfer among three-level systems in a cavity by Stark-shift-chirped rapid adiabatic passage. Quantum Inf. Process. 19(4): 128 (2020)
2010 – 2019
- 2018
- [j4]Naser Shirkhanghah, Maghsoud Saadati-Niari, Sodeif Ahadpour:
Creation of qutrit and one-qubit gates in atom-cavity-laser systems by adiabatic passage. Quantum Inf. Process. 17(8): 203 (2018) - 2016
- [i7]Sodeif Ahadpour, Yaser Sadra, Meisam Sadeghi:
Image Encryption Based On Gradient Haar Wavelet and Rational Order Chaotic Maps. CoRR abs/1604.02235 (2016) - 2015
- [i6]Sodeif Ahadpour, Yaser Sadra:
Chaotic trigonometric haar wavelet with focus on image encryption. CoRR abs/1501.00166 (2015) - 2014
- [j3]Sohrab Behnia, Sodeif Ahadpour, Peyman Ayubi:
Design and implementation of coupled chaotic maps in watermarking. Appl. Soft Comput. 21: 481-490 (2014) - [j2]Sodeif Ahadpour, Yaser Sadra, Zahra Arasteh-Fard:
Markov-binary visibility graph: A new method for analyzing complex systems. Inf. Sci. 274: 286-302 (2014) - 2012
- [j1]Sodeif Ahadpour, Yaser Sadra:
Randomness criteria in binary visibility graph and complex network perspective. Inf. Sci. 197: 161-176 (2012) - [i5]Yaser Sadra, Sodeif Ahadpour, Zahra Arasteh-Fard:
A novel chaotic encryption scheme based on pseudorandom bit padding. CoRR abs/1201.1449 (2012) - [i4]Sodeif Ahadpour, Mahdiyeh Majidpour, Yaser Sadra:
Public key Steganography Using Discrete Cross-Coupled Chaotic Maps. CoRR abs/1211.0086 (2012) - [i3]Sodeif Ahadpour, Yaser Sadra:
A Chaos-based Image Encryption Scheme using Chaotic Coupled Map Lattices. CoRR abs/1211.0090 (2012) - 2011
- [i2]Sodeif Ahadpour, Yaser Sadra, Zahra Arasteh-Fard:
A novel chaotic encryption scheme based on generalized threshold function. CoRR abs/1112.3791 (2011) - 2010
- [i1]Sodeif Ahadpour, Yaser Sadra:
Randomness criteria in binary visibility graph perspective. CoRR abs/1004.2189 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint