Author of the publication

A new Pareto frontier covering strategy in FS-MOGA for multi-objective function optimization.

, , , and . SCIS&ISIS, page 1888-1893. IEEE, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Genetic Algorithm for Automatically Designing Modular Reinforcement Learning Agents., , and . GECCO, page 203-210. Morgan Kaufmann, (2000)A Real Coded Genetic Algorithm for Function Optimization Using Unimodal Normal Distributed Crossover., and . ICGA, page 246-253. Morgan Kaufmann, (1997)Adaptation of expansion rate for real-coded crossovers., , , and . GECCO, page 739-746. ACM, (2009)Detection of Cyber Attacks Against Voltage Control in Distribution Power Grids With PVs., , , , , , and . IEEE Trans. Smart Grid, 7 (4): 1824-1835 (2016)Adaptive Weighted Aggregation 2: More scalable AWA for multiobjective function optimization., , , and . IEEE Congress on Evolutionary Computation, page 2375-2382. IEEE, (2011)CMA-ES with Learning Rate Adaptation., , and . CoRR, (2024)A Robust Real-Coded Genetic Algorithm using Unimodal Normal Distribution Crossover Augmented by Uniform Crossover: Effects of Self-Adaptation of Crossover Probabilities, , and . Proceedings of the Genetic and Evolutionary Computation Conference, 1, page 496--503. Orlando, Florida, USA, Morgan Kaufmann, (13-17 July 1999)U-Mart Project: Learning Economic Principles from the Bottom by Both Human and Software Agents., , , , , , and . JSAI Workshops, volume 2253 of Lecture Notes in Computer Science, page 121-131. Springer, (2001)Functional-Specialization Multi-Objective Real-Coded Genetic Algorithm: FS-MOGA., , , and . PPSN, volume 5199 of Lecture Notes in Computer Science, page 691-701. Springer, (2008)A Handy Laser Show System for Open Space Entertainment., , , , and . ICEC, volume 5709 of Lecture Notes in Computer Science, page 311-312. Springer, (2009)