Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Representation by levels: An alternative to fuzzy sets for fuzzy data mining., , and . Fuzzy Sets Syst., (2020)Fuzzy frameworks for mining data associations: fuzzy association rules and beyond., , and . WIREs Data Mining Knowl. Discov., 6 (2): 50-69 (2016)Studying Interest Measures for Association Rules through a Logical Model., , and . Int. J. Uncertain. Fuzziness Knowl. Based Syst., 18 (1): 87-106 (2010)Hardware Architecture Proposal for TEDA Algorithm to Data Streaming Anomaly Detection., , , , , , and . IEEE Access, (2021)Fuzzy Association Rules Mining Using Spark., , and . IPMU (2), volume 854 of Communications in Computer and Information Science, page 15-25. Springer, (2018)Open data analysis for environmental scanning in security-oriented strategic analysis., , and . FUSION, page 91-97. IEEE, (2016)Federated Learning in Healthcare with Unsupervised and Semi-Supervised Methods., , and . FQAS, volume 14113 of Lecture Notes in Computer Science, page 182-193. Springer, (2023)A Fuzzy Mining Approach for Energy Efficiency in a Big Data Framework., , and . IEEE Trans. Fuzzy Syst., 28 (11): 2747-2758 (2020)Anomaly detection using fuzzy association rules., , , , and . Int. J. Electron. Secur. Digit. Forensics, 6 (1): 25-37 (2014)A Comparative Study of Word Embeddings for the Construction of a Social Media Expert Filter., , and . FQAS, volume 12871 of Lecture Notes in Computer Science, page 196-208. Springer, (2021)