Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Evolution with Proximity-Based Replacement Strategy and Elite Archive Mechanism for Global Optimization., , , and . ICA3PP (2), volume 11335 of Lecture Notes in Computer Science, page 76-89. Springer, (2018)Differential Evolution With Neighborhood and Direction Information for Numerical Optimization., and . IEEE Trans. Cybern., 43 (6): 2202-2215 (2013)Following Targets for Mobile Tracking in Wireless Sensor Networks., , , , , , and . ACM Trans. Sens. Networks, 12 (4): 31:1-31:24 (2016)Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks., , , , , , , and . IJDSN, 12 (2): 5831471:1-5831471:11 (2016)Multi-start Stochastic Competitive Hopfield Neural Network for p-Median Problem., , , , and . ISNN (1), volume 5551 of Lecture Notes in Computer Science, page 75-83. Springer, (2009)Operational-Behavior Auditing in Cloud Storage., , , , , and . CloudComp, volume 197 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 162-172. Springer, (2016)Improving the Localization Probability and Decreasing Communication Cost for Mobile Users., , , , , and . SpaCCS Workshops, volume 10067 of Lecture Notes in Computer Science, page 197-207. (2016)Cellular direction information based differential evolution for numerical optimization: an empirical study., , , , and . Soft Comput., 20 (7): 2801-2827 (2016)A Novel Botnet Detection Method Based on Preprocessing Data Packet by Graph Structure Clustering., , , , , and . CyberC, page 42-45. IEEE, (2016)Detecting Targets Based on a Realistic Detection and Decision Model in Wireless Sensor Networks., , , , , , and . WASA, volume 9204 of Lecture Notes in Computer Science, page 836-844. Springer, (2015)