Author of the publication

A Two-Phase Constraint-Handling Technique for Constrained Optimization.

, , , , and . IEEE Trans. Syst. Man Cybern. Syst., 53 (10): 6194-6203 (October 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical opportunistic routing in high-speed multi-rate wireless mesh networks., , and . MobiHoc, page 127-136. ACM, (2013)Performance analysis and simplification of digital zero phase start (DZPS) employed in data storage timing recovery systems., and . GLOBECOM, page 1118-1122. IEEE, (2004)Texture classification via patch-based sparse texton learning., , , and . ICIP, page 2737-2740. IEEE, (2010)Stereo Refinement Dehazing Network., , , , and . IEEE Trans. Circuits Syst. Video Technol., 32 (6): 3334-3345 (2022)Distributed semi-supervised learning algorithm based on extreme learning machine over networks using event-triggered communication scheme., , and . Neural Networks, (2019)Unsupervised Domain Adaptation for Point Cloud Semantic Segmentation via Graph Matching., , , and . IROS, page 9899-9904. IEEE, (2022)Domain Disentangled Generative Adversarial Network for Zero-Shot Sketch-Based 3D Shape Retrieval., , , , and . AAAI, page 2902-2910. AAAI Press, (2022)Deep Correlated Metric Learning for Sketch-based 3D Shape Retrieval., , , and . AAAI, page 4002-4008. AAAI Press, (2017)A Low-G MEMS Acceleration Switch Based on Direct Contact Method., , , , , and . IEEE SENSORS, page 1-4. IEEE, (2018)Falsified CV Data Attack Detection Based on LSTM., , , , , and . HPCC/DSS/SmartCity/DependSys, page 1029-1034. IEEE, (2021)