Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust ensemble learning for mining noisy data streams., , , , and . Decis. Support Syst., 50 (2): 469-479 (2011)A Multi-criteria Convex Quadratic Programming model for credit data analysis., , , and . Decis. Support Syst., 44 (4): 1016-1030 (2008)Classification of HIV-I-Mediated neuronal dendritic and synaptic damage using multiple criteria linear programming., , , , , , , , , and 1 other author(s). Neuroinformatics, 2 (3): 303-326 (2004)A binary integer linear program with multi-criteria and multi-constraint levels., and . Comput. Oper. Res., 24 (3): 259-273 (1997)Minimization of Cogging Torque for V-Type IPMSM by the Asymmetric Auxiliary Slots on the Rotor., , , , and . IEEE Access, (2022)Aircraft Anti-skid Braking Control Based on Reinforcement Learning., , , , , , , and . IEEE Trans. Aerosp. Electron. Syst., 59 (6): 9219-9232 (December 2023)My Early Researches on Fuzzy Set and Fuzzy Logic.. Int. J. Comput. Commun. Control, (2020)The Analysis of Peasant Household's Credit Behavior., , , , and . ICCS, volume 9 of Procedia Computer Science, page 1228-1233. Elsevier, (2012)A trusted computing environment model in cloud architecture., , , and . ICMLC, page 2843-2848. IEEE, (2010)Towards Analyzing Data to Find Nearest Neighbors.. Int. J. Comput. Their Appl., 20 (3): 158-164 (2013)