Author of the publication

Quantum-inspired ant colony optimisation algorithm for a two-stage permutation flow shop with batch processing machines.

, , , , and . Int. J. Prod. Res., 58 (19): 5945-5963 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Conflict driven scan chain configuration for high transition fault coverage and low test power., , and . ASP-DAC, page 666-671. IEEE, (2009)LARX: Large-Scale Anti-Phishing by Retrospective Data-Exploring Based on a Cloud Computing Platform., , , and . ICCCN, page 1-5. IEEE, (2011)Extrinsic calibration of a laser range finder and a camera based on the automatic detection of line feature., , , and . CISP-BMEI, page 448-453. IEEE, (2016)Fuzzy Optimization for Security Sensors Deployment in Collaborative Intrusion Detection System., , , and . FSKD, volume 4223 of Lecture Notes in Computer Science, page 743-752. Springer, (2006)Inferring Full Diffusion History from Partial Timestamps., , and . IEEE Trans. Knowl. Data Eng., 32 (7): 1378-1392 (2020)TruCom: Exploiting Domain-Specific Trust Networks for Multicategory Item Recommendation., , , , , and . IEEE Syst. J., 11 (1): 295-304 (2017)Deep Neural Network Modeling of Unknown Partial Differential Equations in Nodal Space., , , and . CoRR, (2021)Self-attention based convolutional-LSTM for android malware detection using network traffics grayscale image., , , , , , and . Appl. Intell., 53 (1): 683-705 (2023)The Capacity of Private Information Retrieval with Private Side Information., , and . CoRR, (2017)The Segmentation Method of Target Point Cloud for Polarization-Modulated 3D Imaging., , , , and . Sensors, 20 (1): 179 (2020)