Author of the publication

Clustering Techniques Performance Analysis for a Solar Thermal Collector Hybrid Model Implementation.

, , , , , , , and . HAIS, volume 12344 of Lecture Notes in Computer Science, page 329-340. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of a Conceptual Model for a Knowledge-Based System for the Design of Closed-Loop PID Controllers., , , , and . IDEAL, volume 5788 of Lecture Notes in Computer Science, page 58-65. Springer, (2009)Prediction of Student Performance Through an Intelligent Hybrid Model., , , , , and . HAIS, volume 11734 of Lecture Notes in Computer Science, page 710-721. Springer, (2019)Electromyogram prediction during anesthesia by using a hybrid intelligent model., , , , , , and . J. Ambient Intell. Humaniz. Comput., 11 (11): 4467-4476 (2020)Enriched multi-agent middleware for building rule-based distributed security solutions for IoT environments., , , , , and . CoRR, (2024)Social network analysis for personalized characterization and risk assessment of alcohol use disorders in adolescents using semantic technologies., , , , and . Future Gener. Comput. Syst., (2020)An ontology-based approach to knowledge representation for Computer-Aided Control System Design., , , and . Data Knowl. Eng., (2018)Diabetes detection using deep learning techniques with oversampling and feature augmentation., , , , and . Comput. Methods Programs Biomed., (2021)Middleware-based multi-agent development environment for building and testing distributed intelligent systems., , , , , , and . Clust. Comput., 24 (3): 2313-2325 (2021)Detection of Denial of Service Attacks in an MQTT Environment Using a One-Class Approach., , , , , , , , , and . CISIS-ICEUTE, volume 1400 of Advances in Intelligent Systems and Computing, page 84-93. Springer, (2021)Categorization of CoAP DoS Attack Based on One-Class Boundary Methods., , , , , , , , and . SOCO (1), volume 749 of Lecture Notes in Networks and Systems, page 112-121. Springer, (2023)