Author of the publication

An Investigation of Factors and Measurements for Successful e-Commerce Websites.

, , and . WEBIST (1), page 354-360. SciTePress, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Facial image reconstruction using polygon approximation., , , , and . SIP, page 565-569. IASTED/ACTA Press, (2005)A federated network online network traffics analysis engine for cybersecurity., , , , and . IJCNN, page 1-8. IEEE, (2015)Swarm Intelligent Compressive Routing in Wireless Sensor Networks., , and . Comput. Intell., 31 (3): 513-531 (2015)Identify Website Personality by Using Unsupervised Learning Based on Quantitative Website Elements., , and . ICONIP (1), volume 9489 of Lecture Notes in Computer Science, page 522-530. Springer, (2015)GRAFIX: Automated Rule-Based Post Editing System to Improve English-Persian SMT Output., , and . COLING (Posters), page 873-882. Indian Institute of Technology Bombay, (2012)Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition., , , and . PST, page 1-2. IEEE Computer Society, (2018)COR-Honeypot: Copy-On-Risk, Virtual Machine as Honeypot in the Cloud., , , , and . CLOUD, page 908-912. IEEE Computer Society, (2016)An adaptive real-time skin detector for video sequences., , and . VISION, page 65-70. CSREA Press, (2005)A survey on internet usage and cybersecurity awareness in students., , and . PST, page 223-228. IEEE, (2016)"How do you know that I don't understand?" A look at the future of intelligent tutoring systems., , , , and . Comput. Hum. Behav., 24 (4): 1342-1363 (2008)