Author of the publication

Data Mining: Next Generation Challenges and Future Directions

, , , and (Eds.) AAAI/MIT Press, Menlo Park, CA, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing the Critical Success Factors of Lean System Implementation in India Post Using DEMATEL Method., , , , and . ISDA (1), volume 646 of Lecture Notes in Networks and Systems, page 118-127. Springer, (2022)Robotic Interventions for Learning (ROB-I-LEARN): Examining Social Robotics for Learning Disabilities through Business Model Canvas., , , and . HRI (Companion), page 277-281. ACM, (2023)Development of Deer Hunting linked Earthworm Optimization Algorithm for solving large scale Traveling Salesman Problem., , and . Knowl. Based Syst., (2021)Design of a new switched-stator BLDC drive to improve the energy efficiency of an electric vehicle., and . ICIT, page 532-537. IEEE, (2017)A multi-level inverter configuration for 4n pole induction motor drive by using conventional two-level inverters., , and . ICIT, page 592-597. IEEE, (2015)K-Ring of Privacy: A Functionally Complete Framework for Optimal Privacy with no Loss of Accuracy in Data Mining, , , , and . ()in communication.Managing social-educational robotics for students with autism spectrum disorder through business model canvas and customer discovery., , , and . Frontiers Robotics AI, (2024)Generation of multilevel voltage profile for torque ripple reduction of a 15 phase pole-phase modulated induction motor drive using two-level inverter structure., and . ICIT, page 1002-1007. IEEE, (2016)Automatic Tamil Lyric Generation based on neuro-linguistics., , , and . ICIA, page 129:1-129:9. ACM, (2016)Constructing a "Common Cross Site Scripting Vulnerabilities Enumeration (CXE)" Using CWE and CVE., and . ICISS, volume 4812 of Lecture Notes in Computer Science, page 277-291. Springer, (2007)