Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Fuzzy Logic in Computer Security and Forensics., , and . Computational Intelligence for Privacy and Security, volume 394 of Studies in Computational Intelligence, Springer, (2012)State detection from electromyographic signals towards the control of prosthetic limbs., , and . UKCI, page 120-127. IEEE, (2013)Authentication of Individuals using Hand Geometry Biometrics: A Neural Network Approach., , , and . Neural Processing Letters, 26 (3): 201-216 (2007)The recursive deterministic perceptron neural network., and . Neural Networks, 11 (9): 1571-1588 (1998)A permutation entropy-based EMD-ANN forecasting ensemble approach for wind speed prediction., , , , and . Neural Comput. Appl., 33 (7): 2369-2391 (2021)Choice effect of linear separability testing methods on constructive neural network algorithms: An empirical study., , and . Expert Syst. Appl., 38 (3): 2330-2346 (2011)A fuzzy genetic programming-based algorithm for subgroup discovery and the application to one problem of pathogenesis of acute sore throat conditions in humans., , , , , , and . Inf. Sci., (2015)E2PAMEA: A fast evolutionary algorithm for extracting fuzzy emerging patterns in big data environments., , , , and . Neurocomputing, (2020)A real use case of semi-supervised learning for mammogram classification in a local clinic of Costa Rica., , , , , , and . Medical Biol. Eng. Comput., 60 (4): 1159-1175 (2022)Analysis and test of efficient methods for building recursive deterministic perceptron neural networks., , , , and . Neural Networks, 20 (10): 1095-1108 (2007)