Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Encryption Based On Protein Synthesis., , , and . GEM, page 278-283. CSREA Press, (2008)Using Voronoi diagrams to solve a hybrid facility location problem with attentive facilities., , , and . Inf. Sci., (2013)EXTRA: EXpertise-Boosted Model for Trust-Based Recommendation System Based on Supervised Random Walk., and . Comput. Informatics, 37 (5): 1209-1230 (2018)Over-sampling via under-sampling in strongly imbalanced data., and . Int. J. Adv. Intell. Paradigms, 9 (1): 58-66 (2017)Fingerprint Matching using the Onion Peeling Approach and Turning Function., , and . CoRR, (2021)Predicting Points of Interest with Social Relations and Geographical-Temporal Information., , and . ISDA (2), volume 715 of Lecture Notes in Networks and Systems, page 545-554. Springer, (2022)Extracting an English-Persian Parallel Corpus from Comparable Corpora., , and . LREC, European Language Resources Association (ELRA), (2018)A Greedy Agent-Based Resource Allocation in the Smart Electricity Markets., , , and . AIAI, volume 436 of IFIP Advances in Information and Communication Technology, page 150-161. Springer, (2014)An Ant Colony Algorithm for the Minimum Weight Triangulation., , and . ICCSA Workshops, page 81-85. IEEE Computer Society, (2010)A polynomial time algorithm for big data in a special case of minimum constraint removal problem., , and . Evol. Intell., 13 (2): 247-254 (2020)