Author of the publication

Heuristic based approach to clustering and its time critical applications.

, , , and . IRI, page 37-42. IEEE Systems, Man, and Cybernetics Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Product Recommendation by Employing Case-Based Reasoning Agents., , and . ICEIS (2), page 515-518. (2004)Genetic algorithms based approach to database vertical partition., , and . J. Intell. Inf. Syst., 26 (2): 167-183 (2006)A Boosting Genetic Fuzzy Classifier for Intrusion Detection Using Data Mining Techniques for Rule Pre-screening., , and . HIS, volume 105 of Frontiers in Artificial Intelligence and Applications, page 983-992. IOS Press, (2003)Integrating Content and Structure into a Comprehensive Framework for XML Document Similarity Represented in 3D Space., , , and . Learning Structure and Schemas from Documents, volume 375 of Studies in Computational Intelligence, Springer, (2011)On personalizing Web search using social network analysis., , and . Inf. Sci., (2015)Web outlier mining: Discovering outliers from web datasets., , and . Intell. Data Anal., 9 (5): 473-486 (2005)Periodicity detection in turkish stock market., , , , and . SIU, page 1-4. IEEE, (2018)Closure Maintenance in An Object-Oriented Query Model., and . CIKM, page 72-79. ACM, (1994)Detecting Cancer Outlier Genes with Potential Rearrangement Using Gene Expression Data and Biological Networks., , and . Adv. Bioinformatics, (2012)Text summarization techniques: SVM versus neural networks., , , , , , , and . iiWAS, page 487-491. ACM, (2009)