Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach to Detection of Tampering in Water Meters., , , , and . KES, volume 60 of Procedia Computer Science, page 413-421. Elsevier, (2015)Performance of Raspberry Pi during Blockchain Execution using Proof of Authority Consensus., , , , and . ICEIS (1), page 287-292. SCITEPRESS, (2022)Decision support system in health care building design based on case-based reasoning and reinforcement learning., , and . Expert Syst. Appl., (2022)A Data Mining Method Based on the Variability of the Customer Consumption - A Special Application on Electric Utility Companies., , , , , and . ICEIS (2), page 370-374. (2008)Normalised expert knowledge in OSI management standard., , and . Artificial Intelligence and Applications, page 617-623. IASTED/ACTA Press, (2007)Applying Integrated Expert System in Network Management., , , and . ICEIS (2), page 101-106. (2007)Emotional Factor Forecasting based on Driver Modelling in Electric Vehicle Fleets., , , , , and . ICEIS (1), page 603-612. SCITEPRESS, (2020)Using Regression Analysis to Identify Patterns of Non-Technical Losses on Power Utilities., , , , , and . KES (1), volume 6276 of Lecture Notes in Computer Science, page 410-419. Springer, (2010)A Mining Framework to Detect Non-technical Losses in Power Utilities., , , , , and . ICEIS (2), page 96-101. (2009)