Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remote sensing image enhancement based on wavelet analysis and histogram specification., , , , , and . CCIS, page 55-59. IEEE, (2014)Knowledge reduction algorithms based on rough set and conditional information entropy., , , and . Data Mining and Knowledge Discovery: Theory, Tools, and Technology, volume 4730 of SPIE Proceedings, page 422-431. SPIE, (2002)A new framework for intrusion detection based on rough set theory., , , , and . Data Mining and Knowledge Discovery: Theory, Tools, and Technology, volume 5433 of SPIE Proceedings, page 122-130. SPIE, (2004)New anti-spam filter based on data mining and analysis of email security., , , and . Data Mining and Knowledge Discovery: Theory, Tools, and Technology, volume 5098 of SPIE Proceedings, page 147-154. SPIE, (2003)A novel logical neuron model., and . Int. J. Intell. Syst., 14 (12): 1199-1211 (1999)Monotonic uncertainty measures for attribute reduction in probabilistic rough set model., , and . Int. J. Approx. Reasoning, (2015)Particle Swarm Optimization with Novel Processing Strategy and Its Application., , and . Int. J. Computational Intelligence Systems, 4 (1): 100-111 (2011)A stable gene selection method based on sample weighting., , and . CCECE, page 1-4. IEEE, (2013)Quick Building of Fuzzy Equivalence Matrix in Granular Computing., , , , and . GrC, page 466-469. IEEE, (2008)A self-learning model based on granular computing., , and . GrC, page 530-533. IEEE, (2006)