Author of the publication

Normal forms of fuzzy middle and fuzzy contradictions.

, , and . IEEE Trans. Syst. Man Cybern. Part B, 29 (2): 237-253 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering of Web Documents using a Graph Model., , , and . Web Document Analysis, volume 55 of Series in Machine Perception and Artificial Intelligence, World Scientific, (2003)Re-granulating a Fuzzy Rulebase., , , , and . FUZZ-IEEE, page 372-375. IEEE, (2001)New mathematical morphology operators and their applications., and . SAC, page 426-432. ACM, (1992)Conceptualizing the design of Knowledge-Based Systems., and . Inf. Sci., 68 (1-2): 65-90 (1993)A model for an expert system for medium access control in a local area network., and . Inf. Sci., 37 (1-3): 39-83 (1985)Implementing Imprecision in Information Systems., and . Inf. Sci., 37 (1-3): 107-141 (1985)Anomaly detection in web documents using crisp and fuzzy-based cosine clustering methodology., , , and . Inf. Sci., 177 (2): 467-475 (2007)Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities., , and . Fighting Terror in Cyberspace, volume 65 of Series in Machine Perception and Artificial Intelligence, WorldScientific, (2005)New Results and Techniques in Resolution Theory., and . IEEE Trans. Computers, 25 (7): 673-677 (1976)Multi-lingual Detection of Web Terrorist Content., , and . Intelligence and Security Informatics, volume 135 of Studies in Computational Intelligence, Springer, (2008)