Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenges in Matching Heterogeneous Relational Databases' Schemas., , , and . IKE, page 163-169. CSREA Press, (2010)Down Syndrome Face Recognition: A Review., , , , and . Symmetry, 12 (7): 1182 (2020)Application of Rasch Model in Validating the Content of Measurement Instrument for Blog Quality., , , , and . ICSECS (2), volume 180 of Communications in Computer and Information Science, page 125-136. Springer, (2011)Blog quality model., , , , and . Int. J. Web Based Communities, 9 (1): 25-50 (2013)CoAP-Based Lightweight Interoperability Semantic Sensor and Actuator Ontology for IoT Ecosystem., , , , , and . Int. J. Ambient Comput. Intell., 12 (2): 92-110 (2021)Enhancing indoor positioning service for location based Internet of Things (IoT): A source selecting approach with error compensation., , , and . ISCE, page 52-55. IEEE, (2017)Multi-View Human Action Recognition Using Wavelet Data Reduction and Multi-Class Classification., , , , , and . SCSE, volume 62 of Procedia Computer Science, page 585-592. Elsevier, (2015)A novel investigation of the effect of iterations in sliding semi-landmarks for 3D human facial images., , , , and . BMC Bioinform., 21 (1): 208 (2020)Algorithm of local features fusion and modified covariance-matrix technique for hand motion position estimation and hand gesture trajectory tracking approach., , , and . Multim. Tools Appl., 80 (4): 5287-5318 (2021)An effective security alert mechanism for real-time phishing tweet detection on Twitter., , , , and . Comput. Secur., (2019)