Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kernel Hidden Unit Analysis-Network Size Reduction by Entropy Minimization-., and . IEICE Trans. Inf. Syst., 78-D (4): 484-489 (1995)Structure Identification of Acquired Knowledge in Fuzzy Inference by Genetic Algorithms., , , , and . IEEE/Nagoya-University World Wisepersons Workshop, volume 1152 of Lecture Notes in Computer Science, page 21-34. Springer, (1995)Uniqueness of Partially Specified Multiple-Valued Kleenean Function., , , and . ISMVL, page 242-247. IEEE Computer Society, (1995)Feature detectors by autoencoders: Decomposition of input patterns into atomic features by neural networks., and . Neural Processing Letters, 2 (6): 17-22 (1995)Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree., , and . ISW, volume 1729 of Lecture Notes in Computer Science, page 103-117. Springer, (1999)Web Content Transducing System for Cellular Phones., , and . AICT/ICIW, page 188. IEEE Computer Society, (2006)Fuzzy system identification for composite operation and fuzzy relation by genetic algorithms., , , and . KES (1), page 289-295. IEEE, (1997)Constrained information maximization., and . ICNN, page 740-744. IEEE, (1996)Improving Generalization Performance by Information Minimization., , and . IEICE Trans. Inf. Syst., 78-D (2): 163-173 (1995)Secure Instant Messaging Protocol Preserving Confidentiality against Administrator., , and . AINA (2), page 27-30. IEEE Computer Society, (2004)