Author of the publication

Learning Frequent Behaviors Patterns in Intelligent Environments for Attentiveness Level.

, , , and . PAAMS (Special Sessions), volume 619 of Advances in Intelligent Systems and Computing, page 139-147. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Production in Small and Medium Enterprises., , and . PAAMS (Workshops), volume 157 of Advances in Intelligent and Soft Computing, page 49-56. Springer, (2012)Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks., , , , , and . Knowl. Inf. Syst., 34 (1): 193-217 (2013)Model of experts for decision support in the diagnosis of leukemia patients., , , and . Artif. Intell. Medicine, 46 (3): 179-200 (2009)Comparative Genomics with Multi-agent Systems., , , , , and . ISI, volume 182 of Advances in Intelligent Systems and Computing, page 175-181. Springer, (2012)Modelling an Intelligent Interaction System for Increasing the Level of Attention., , , and . ISAmI, volume 615 of Advances in Intelligent Systems and Computing, page 210-217. Springer, (2017)An Intelligent System to Generate Chord Progressions from Colors with an Artificial Immune System., , and . New Gener. Comput., 38 (3): 531-549 (2020)Dealing with Demand in Electric Grids with an Adaptive Consumption Management Platform., , , and . Complex., (2018)Personalization of the Workplace through a Proximity Detection System Using User Profiles., , , , , and . Int. J. Distributed Sens. Networks, (2013)A Case-Based Reasoning Model Powered by Deep Learning for Radiology Report Recommendation., , , and . Int. J. Interact. Multim. Artif. Intell., 7 (2): 15 (2021)Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks., , , , , and . Appl. Soft Comput., 11 (7): 4384-4398 (2011)