Advantage and drawback of support vector machine functionality S Karamizadeh, SM Abdullah, M Halimi, J Shayan, M javad Rajabi 2014 international conference on computer, communications, and control …, 2014 | 260 | 2014 |
Identifying Benefits and risks associated with utilizing cloud computing J Shayan, A Azarnik, S Chuprat, S Karamizadeh, M Alizadeh | 66 | 2012 |
Associated risks of cloud computing for SMEs A Azarnik, J Shayan, M Alizadeh, S Karamizadeh Open International Journal of Informatics 1 (1), 37-45, 2012 | 65 | 2012 |
Security and performance evaluation of lightweight cryptographic algorithms in RFID M Alizadeh, M Salleh, M Zamani, J Shayan, S Karamizadeh Kos Island, Greece, 45-50, 2012 | 56 | 2012 |
A survey on attacks in RFID networks M Alizadeh, M Zamani, AR Shahemabadi, J Shayan, A Azarnik Open International Journal of Informatics 1 (1), 15-24, 2012 | 30 | 2012 |
Code analysis of lightweight encryption algorithms using in RFID systems to improve cipher performance M Alizadeh, J Shayan, M Zamani, T Khodadadi 2012 IEEE Conference on Open Systems, 1-6, 2012 | 21 | 2012 |
javad Rajabi, M.(2014, September). Advantage and drawback of support vector machine functionality S Karamizadeh, SM Abdullah, M Halimi, J Shayan Computer, Communications, and Control Technology (I4CT), 2014 International …, 0 | 18 | |
Face recognition via taxonomy of illumination normalization S Karamizadeh, SM Abdullah, M Zamani, J Shayan, P Nooralishahi Multimedia Forensics and Security: Foundations, Innovations, and …, 2017 | 17 | 2017 |
An overview of objectionable image detection J Shayan, SM Abdullah, S Karamizadeh 2015 International Symposium on Technology Management and Emerging …, 2015 | 17 | 2015 |
Information security awareness behavior: A conceptual model for cloud S Karamizadeh, J Shayan, M Alizadeh, A Kheirkhah International Journal Of Computers & Technology 10 (1), 1186-1191, 2013 | 13 | 2013 |
javad Rajabi, M.(2014). Advantage and drawback of support vector machine functionality S Karamizadeh, SM Abdullah, M Halimi, J Shayan 2014 International Conference on Computer, Communications, and Control …, 2014 | 12 | 2014 |
Threshold based skin color classification S Karamizadeh, SM Abdullah, J Shayan, P Nooralishahi, B Bagherian Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 10 | 2017 |
Taxonomy of filtering based illumination normalization for face recognition S Karamizadeh, SM Abdullah, J Shayan, M Zamani, P Nooralishahi Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 8 | 2017 |
Lightweight authentication for user access to Wireless Sensor networks A Azarnik, J SHAYAN, SK ZADEH, A PASHANG Proceedings of the 12th WSEAS Int. Conf. on Electronics, Hardware, Wireless …, 2013 | 7 | 2013 |
javad Rajabi M S Karamizadeh, SM Abdullah, M Halimi, J Shayan Advantage and Drawback of Support Vector Machine Functionality, 2014 | 5 | 2014 |
ENHANCED AGEHOLONET ALGORITHM USING AGE ESTIMATION AND OBJECTIONABLE IMAGE FOR PORNOGRAPHIC IMAGE DETECTION J SHAYAN | | 2021 |