Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Facial image reconstruction using polygon approximation., , , , and . SIP, page 565-569. IASTED/ACTA Press, (2005)Identify Website Personality by Using Unsupervised Learning Based on Quantitative Website Elements., , and . ICONIP (1), volume 9489 of Lecture Notes in Computer Science, page 522-530. Springer, (2015)GRAFIX: Automated Rule-Based Post Editing System to Improve English-Persian SMT Output., , and . COLING (Posters), page 873-882. Indian Institute of Technology Bombay, (2012)COR-Honeypot: Copy-On-Risk, Virtual Machine as Honeypot in the Cloud., , , , and . CLOUD, page 908-912. IEEE Computer Society, (2016)A federated network online network traffics analysis engine for cybersecurity., , , , and . IJCNN, page 1-8. IEEE, (2015)Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition., , , and . PST, page 1-2. IEEE Computer Society, (2018)Frown gives game away: affect sensitive systems for elementary mathematics., , , , and . SMC (1), page 13-18. IEEE, (2004)An Investigation of Factors and Measurements for Successful e-Commerce Websites., , and . WEBIST (1), page 354-360. SciTePress, (2014)Large-Scale Image Retrieval Using Local Binary Patterns and Iterative Quantization., , and . DICTA, page 1-5. IEEE, (2015)An alternative approach for developing socially assistive robots., and . BioRob, page 573-578. IEEE, (2014)