关注
Esmaeil KheirKhah
Esmaeil KheirKhah
Islamic Azad University
在 iau.ac.ir 的电子邮件经过验证
标题
引用次数
引用次数
年份
Security challenges in mobile ad hoc networks: A survey
A Dorri, SR Kamel, E Kheirkhah
arXiv preprint arXiv:1503.03233, 2015
992015
A hybrid face detection system using combination of appearance-based and feature-based methods
ZS Tabatabaie, RW Rahmat, NIB Udzir, E Kheirkhah
International Journal of Computer Science and Network Security 9 (5), 181-185, 2009
612009
An approach for transforming of relational databases to OWL ontology
M Dadjoo, E Kheirkhah
arXiv preprint arXiv:1502.05844, 2015
532015
An experimental study of ssh attacks by using honeypot decoys
E Kheirkhah, SMP Amin, HAJ Sistani, H Acharya
Indian Journal of Science and Technology 6 (12), 5567-5578, 2013
442013
An optimized semantic web service composition method based on clustering and ant colony algorithm
NH Rostami, E Kheirkhah, M Jalali
arXiv preprint arXiv:1402.2271, 2014
402014
Web services composition methods and techniques: A review
NH Rostami, E Kheirkhah, M Jalali
International Journal of Computer Science, Engineering & Information …, 2013
342013
Important factors in selecting requirements engineering techniques
E Kheirkhah, A Deraman
2008 International Symposium on Information Technology 4, 1-5, 2008
332008
A hybrid face detection approach in color images with complex background
E Kheirkhah, ZS Tabatabaie
Indian Journal of Science and Technology 8 (1), 49-60, 2015
302015
A review of recent advances in quantum-inspired metaheuristics
S Hakemi, M Houshmand, E KheirKhah, SA Hosseini
Evolutionary Intelligence 17 (2), 627-642, 2024
292024
Web service discovery methods and techniques: A review
S Pakari, E Kheirkhah, M Jalali
Int. J. Comput. Sci. Eng. Inf. Technol 4 (1), 1-14, 2014
242014
Semantic web-based software engineering by automated requirements ontology generation in soa
V Rastgoo, MS Hosseini, E Kheirkhah
International Journal of Web & Semantic Technology 5 (2), 1, 2014
102014
A novel approach: A hybrid semantic matchmaker for service discovery in service oriented architecture
S Pakari, E Kheirkhah, M Jalali
International Journal of Network Security & Its Applications 6 (1), 37, 2014
102014
Classification of Routing Protocols in Wireless Sensor Networks
F Azimiyan, E Kheirkhah, M Jalali
International Review on Computers and Software 7 (4), 2012
72012
A framework for requirements engineering in end-user computing
E Kheirkhah, A Deraman, ZS Tabatabaie
2009 WRI World Congress on Computer Science and Information Engineering 7 …, 2009
62009
Adaptive skin color classification technique for color-based face detection systems using integral image
ZS Tabatabaie, RW Rahmat, NI Udzir, E Kheirihah
International Review on Computers and Software 6 (1), 32-39, 2011
52011
AN ANALYSIS OF SECURITY CHALLENGES IN MOBILE AD HOC NETWORKS
A Dorri, SR Kamel, E kheyrkhah
The Sixth International Conference on Wireless & Mobile Networks, 2014
42014
Diagnosing Parkinson's Disease Using Movement Signal Mapping by Neural Network and Classifier Modulation
H Nikandish, E Kheirkhah
ETRI Journal 39 (6), 851-858, 2017
32017
Analysis of current requirements engineering techniques in end-user computing
E Kheirthah, A Deraman
International Review on Computers and Software 5 (6), 724-730, 2010
32010
Screen-Based prototyping: A conceptual framework
E Kheirkhah, A Deraman, ZS Tabatabaie
Information Technology Journal 8 (4), 558-564, 2009
32009
Requirements Engineering in End-User Computing: A review
E Kheirkhah, A Deraman
2008 International Symposium on Information Technology 4, 1-8, 2008
22008
系统目前无法执行此操作,请稍后再试。
文章 1–20