Author of the publication

Aerospace design optimization using a steady state real-coded genetic algorithm.

, , , and . Appl. Math. Comput., 218 (9): 4710-4730 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unconstrained Biometric Identification: Emerging Technologies., , , and . Computer, 43 (2): 56-62 (2010)Genetic and evolutionary biometrics: Exploring value preference space for hybrid feature weighting and selection., , , , , and . Int. J. Intell. Comput. Cybern., 6 (1): 4-20 (2013)An artificial immunity approach to malware detection in a mobile platform., , and . EURASIP J. Information Security, (2017)An artificial immune system for phishing detection., , , , and . IEEE Congress on Evolutionary Computation, page 1-7. IEEE, (2012)IDS Vulnerability Analysis Using Genertia Red Teams.. Security and Management, page 171-176. CSREA Press, (2003)Solving Distributed Asymmetric CSPs via a Society of Hill-Climbers., and . IC-AI, page 949-953. CSREA Press, (2002)Distributed Steady-State Neuro-Evolutionary Path Planning in Non-Stationary Environments Using Adaptive Replacement.. GECCO, page 58-65. Morgan Kaufmann, (2000)Solving Constraint Satisfaction Problems Using a Genetic/Systematic Search Hybrid That Realizes When to Quit., and . ICGA, page 122-129. Morgan Kaufmann, (1995)Genetic and evolutionary methods for biometric feature reduction., , , , , , , , , and . Int. J. Biom., 4 (3): 220-245 (2012)Hybrid approach for Pareto front expansion in heuristics., , , and . J. Oper. Res. Soc., 62 (2): 348-359 (2011)