Author of the publication

Dispersed foraging slime mould algorithm: Continuous and binary variants for global optimization and wrapper-based feature selection.

, , , , , , and . Knowl. Based Syst., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nonlinear integral sliding mode variable structure control for two-tank system with input - Limitation., and . IECON, page 5150-5155. IEEE, (2017)Image Feature Extraction Based on Support Vector Machine and Multi-DSP Combined Structure., and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 1123-1130. Springer, (2013)Orthogonal learning covariance matrix for defects of grey wolf optimizer: Insights, balance, diversity, and feature selection., , , , , , and . Knowl. Based Syst., (2021)Dispersed foraging slime mould algorithm: Continuous and binary variants for global optimization and wrapper-based feature selection., , , , , , and . Knowl. Based Syst., (2022)Chaotic diffusion-limited aggregation enhanced grey wolf optimizer: Insights, analysis, binarization, and feature selection., , , , , , and . Int. J. Intell. Syst., 37 (8): 4864-4927 (2022)Detection of COVID-19 severity using blood gas analysis parameters and Harris hawks optimized extreme learning machine., , , , , , , , , and . Comput. Biol. Medicine, (2022)Research on the Cultivation of Software Engineering Graduates' Scientific Research Ability Based on Whole Process Control and Management., , and . ICETM, page 259-265. ACM, (2021)Competitive pricing and advertising strategies for online retailers with "showrooming" and "webrooming"., , , , and . Eur. J. Oper. Res., 316 (2): 617-638 (2024)Quantitatively analyzing the driving factors of vegetation change in China: Climate change and human activities., , , , , , , and . Ecol. Informatics, (2024)A real-time inversion attack on the GMR-2 cipher used in the satellite phones., , and . Sci. China Inf. Sci., 61 (3): 032113:1-032113:18 (2018)