Author of the publication

Decomposition-Based Multiobjective Optimization for Constrained Evolutionary Optimization.

, , , and . IEEE Trans. Syst. Man Cybern. Syst., 51 (1): 574-587 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kernel-based data fusion improves the drug-protein interaction prediction., , , and . Comput. Biol. Chem., 35 (6): 353-362 (2011)Investigations on smart card-based secure protocols for autenticated key establishment in Digital pay-TV systems., , , and . IEEE ICCI, page 538-541. IEEE Computer Society, (2009)Random Sampling Algorithms for Landmark Windows over Data Streams., , , , and . ICEIS (1), page 103-107. (2006)Document Clustering using Compound Words., and . IC-AI, page 307-313. CSREA Press, (2005)An Agile Protocol for E-Commerce., and . ICEB, page 393-396. Academic Publishers/World Publishing Corporation, (2004)Kinetic studies of methanol steam reforming over Pd/ZnO catalyst using a microchannel reactor, , , , and . Applied Catalysis A: General, 262 (1): 19-29 (2004/5/10 2004)TY - JOUR.Double-Auction-Based Optimal User Assignment for Multisource-Multirelay Cellular Networks., , , , and . IEEE Trans. Vehicular Technology, 64 (6): 2627-2636 (2015)Prefix-maximized query-tree anti-collision algorithm with robust estimation for RFID system., , and . CCIS, page 170-174. IEEE, (2014)Robust Control Design of Uncertain Mechanical Systems: A Fuzzy Approach., , , , , and . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 24 (2): 307-324 (2016)Detecting malicious short URLs on Twitter., , and . AMCIS, Association for Information Systems, (2015)