Author of the publication

Non-dominated Rank based Sorting Genetic Algorithms.

, and . Fundam. Informaticae, 83 (3): 231-252 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance evaluation of a new shuffling cipher model with most used chaotic dynamical systems., , , , and . TENCON, page 167-171. IEEE, (2018)A cryptographic model for better information security., , , , and . J. Inf. Secur. Appl., (2018)Securing images with a diffusion mechanism based on Fractional Brownian Motion., , , , and . J. Inf. Secur. Appl., (2018)Non-dominated Rank based Sorting Genetic Algorithms., and . Fundam. Informaticae, 83 (3): 231-252 (2008)Relating Romanized Comments to News Articles by Inferring Multi-Glyphic Topical Correspondence., , , and . AAAI, page 311-317. AAAI Press, (2015)Weight-Agnostic Hierarchical Stick-Breaking Process., and . ICBK, page 342-349. IEEE Computer Society, (2018)A cryptographic model based on logistic map and a 3-D matrix., , , , and . J. Inf. Secur. Appl., (2017)Content Driven User Profiling for Comment-Worthy Recommendations of News and Blog Articles., , and . RecSys, page 195-202. ACM, (2015)Going beyond Corr-LDA for detecting specific comments on news & blogs., , and . WSDM, page 483-492. ACM, (2014)Investigation of coupled map lattice as a diffusion model for enhanced image security., , , , and . TENCON, page 172-175. IEEE, (2018)