Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a robust palmprint representation for person identification., , and . Int. J. Inf. Commun. Technol., 14 (1): 89-109 (2019)Privacy Preservation of Biometrics Used for IoT Systems Security: Brief Review., , and . KGSWC Workshops, volume 3335 of CEUR Workshop Proceedings, page 150-160. CEUR-WS.org, (2022)Identifying and Modeling Non-Functional Concerns Relationships., , and . JSEA, 3 (8): 820-826 (2010)Optimizing Both the User Requirements and the Load Balancing in the Volunteer Computing System by using Markov Chain Model., , and . Int. J. Enterp. Inf. Syst., 14 (1): 35-62 (2018)Learning-Free Deep Features for Multispectral Palm-Print Classification., , and . Comput. Sci., (2023)Implementing a Cloud-Based Decision Support System in a Private Cloud: The Infrastructure and the Deployment Process., , , and . IJDSST, 8 (1): 25-42 (2016)Eliciting requirements for an inter-company cooperative information system., , and . J. Systems and IT, 12 (4): 305-333 (2010)Enhancing Elicitation Technique Selection Process in a Cooperative Distributed Environment., , and . REFSQ, volume 5025 of Lecture Notes in Computer Science, page 23-36. Springer, (2008)Patrons temporels pour spécifier les systèmes auto-adaptatifs., , and . INFORSID, page 213-228. (2017)An Automated Finger-Knuckle-Print Identification System Using Jointly RBF & RFT Classifiers., , , and . IUCC-CSS, page 17-22. IEEE Computer Society, (2016)