Author of the publication

Generalized Tagaki-Sugeno fuzzy rules based prediction model with application to power plant pulverizing system.

, , , , and . CDC, page 7409-7414. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fuzzy Sequential Pattern Mining Algorithm Based on Independent Pruning Strategy for Parameters Optimization of Ball Mill Pulverizing System., , , and . Inf. Technol. Control., 43 (3): 303-314 (2014)Generalized modeling of the fractional-order memcapacitor and its character analysis., , , , and . Commun. Nonlinear Sci. Numer. Simul., (2018)Generalized Tagaki-Sugeno fuzzy rules based prediction model with application to power plant pulverizing system., , , , and . CDC, page 7409-7414. IEEE, (2013)Detection and volume estimation of bubbles in blood circuit of hemodialysis by morphological image processing., , and . RAM/CIS, page RAM:228-231. IEEE, (2015)A Density-based Quantitative Attribute Partition Algorithm for Association Rule Mining on Industrial Database., , , and . ACC, page 75-80. IEEE, (2008)Software Maintainability Prediction Model Based on Fuzzy Neural Network., , , , and . J. Multiple Valued Log. Soft Comput., 20 (1-2): 39-53 (2012)Enhancing effectiveness of density-based outlier mining scheme with density-similarity-neighbor-based outlier factor., , , and . Expert Syst. Appl., 37 (12): 8090-8101 (2010)A suspect point recheck method of fuzzy clustering for robot self-position estimation., , , , and . ICARCV, page 38-41. IEEE, (2014)A Survey of the State-of-the-Art and Some Extensions of Recommender System Based on Big Data., , and . ICBDS, volume 1796 of Communications in Computer and Information Science, page 155-171. Springer, (2022)Intelligent Authentication Method for Trusted Access of Mobile Nodes in Internet of Things Driven by Cloud Trust., and . ADHIP (2), volume 348 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 232-241. Springer, (2020)