Author of the publication

Handling swarm of UAVs based on evolutionary multi-objective optimization.

, , and . Prog. Artif. Intell., 6 (3): 263-274 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Gamification approach for education on values: results from a pilot study., , , and . AfCAI, volume 2609 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)RiskTrack: A New Approach for Risk Assessment on Radicalisation Based on Social Media Data., , , , and . AfCAI, volume 1794 of CEUR Workshop Proceedings, CEUR-WS.org, (2016)Wind Power Production Forecasting Using Ant Colony Optimization and Extreme Learning Machines., , , , and . IDC, volume 737 of Studies in Computational Intelligence, page 175-184. Springer, (2017)Representational Learning for the Detection of COVID Related Conspiracy Spreaders in Online Platforms., , , and . MediaEval, volume 3583 of CEUR Workshop Proceedings, CEUR-WS.org, (2022)Efficient Fake News Detection using Bagging Ensembles of Bidirectional Echo State Networks., , , , and . IJCNN, page 1-7. IEEE, (2022)Extracting Collective Trends from Twitter Using Social-Based Data Mining., , , and . ICCCI, volume 8083 of Lecture Notes in Computer Science, page 622-630. Springer, (2013)An Ensemble Algorithm Based on Deep Learning for Tuberculosis Classification., , and . IDEAL (1), volume 11871 of Lecture Notes in Computer Science, page 145-154. Springer, (2019)Using Hierarchical Knowledge Structures to Implement Dynamic FAQ Systems., , , and . PAKM, volume 3336 of Lecture Notes in Computer Science, page 496-507. Springer, (2004)VPOET: Using a Distributed Collaborative Platform for Semantic Web Applications., , and . IDC, volume 162 of Studies in Computational Intelligence, page 167-176. Springer, (2008)Ontology Uses for Radicalisation Detection on Social Networks., , , and . IDEAL (2), volume 11315 of Lecture Notes in Computer Science, page 3-8. Springer, (2018)