Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the mathematics of beauty: beautiful images.. CoRR, (2017)Employing secure coding practices into industrial applications: a case study., , , , , , and . Empir. Softw. Eng., 21 (1): 4-16 (2016)Toward Building Science Discovery Machines., and . CoRR, (2021)Combining convolutional neural networks with SVM classifier for recognizing Persian and Arabic handwritten words., , and . Multim. Tools Appl., 81 (23): 33785-33799 (2022)Cyber-Physical Attack Conduction and Detection in Decentralized Power Systems., , , , , and . IEEE Access, (2022)SIDS: State-based intrusion detection for stage-based cyber physical systems., , , and . Int. J. Crit. Infrastructure Prot., (2018)An Information Theory Approach to Aesthetic Assessment of Visual Patterns., and . Entropy, 23 (2): 153 (2021)Selecting effective features on prediction of delay in servicing ships arriving to ports using a combination of Clonal Selection and Grey Wolf Optimization algorithms - Case study: Shahid Rajaee port in Bandar Abbas., , and . Comput. Intell., 36 (3): 1140-1160 (2020)A security test-bed for industrial control systems., , and . MoSEMInA, page 26-31. ACM, (2014)Evolving Neural Networks with Optimal Balance between Information Flow and Connections Cost., and . CoRR, (2022)