Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring drivers drowsiness using a wide angle lens., , , , and . ITSC, page 290-295. IEEE, (2013)An efficient three-dimensional face recognition system based random forest and geodesic curves., , , , , and . Comput. Geom., (2021)A new parallel approach for the exploitation of the search space based on PSO algorithm., , , and . CIST, page 104-110. IEEE, (2016)A novel approach IMA of interoperability measurement., , , , and . CIST, page 665-669. IEEE, (2016)Exploiting Open Data to Improve the Business Intelligence & Business Discovery Experience., , , and . BDCA, page 27:1-27:6. ACM, (2017)Deep Belief Network and Auto-Encoder for Face Classification., , , and . Int. J. Interact. Multim. Artif. Intell., 5 (5): 22-29 (2019)Completeness based classification algorithm: a novel approach for educational semantic data completeness assessment., , , , and . Interact. Technol. Smart Educ., 19 (1): 87-111 (2022)A study of an adaptive approach for systems-of-systems integration., , , , and . Int. J. Syst. Syst. Eng., 9 (1): 1-27 (2019)Unveiling confidentiality-related vulnerabilities in an IMS-based environment., , and . ICMCS, page 266-271. IEEE, (2016)Study of the Different Security Threats on the Internet of Things and their Applications., , and . NISS, page 68:1-68:6. ACM, (2019)