Author of the publication

Modified Leader-Advocate-Believer Algorithm with Clustering-Based Search Space Reduction Method for Solving Engineering Design Problems.

, , , , and . SN Comput. Sci., 5 (4): 376 (April 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JPEG based steganography methods using Cohort Intelligence with Cognitive Computing and modified Multi Random Start Local Search optimization algorithms., and . Inf. Sci., (2018)Boundary Searching Genetic Algorithm: A Multi-objective Approach for Constrained Problems., and . FICTA, volume 247 of Advances in Intelligent Systems and Computing, page 269-276. Springer, (2013)Multi-cohort intelligence algorithm for solving advanced manufacturing process problems., , , and . Neural Comput. Appl., 32 (18): 15055-15075 (2020)Design of a fractional PIλDμ controller using the cohort intelligence method., , and . Frontiers Inf. Technol. Electron. Eng., 19 (3): 437-445 (2018)Probability collectives for solving discrete and mixed variable problems., , and . Int. J. Comput. Aided Eng. Technol., 8 (4): 325-361 (2016)Socio evolution & learning optimization algorithm: A socio-inspired optimization methodology., , and . Future Gener. Comput. Syst., (2018)Adaptive Range Genetic Algorithm: A hybrid optimization approach and its application in the design and economic optimization of Shell-and-Tube Heat Exchanger., , , , and . Eng. Appl. Artif. Intell., (2019)Modified Leader-Advocate-Believer Algorithm with Clustering-Based Search Space Reduction Method for Solving Engineering Design Problems., , , , and . SN Comput. Sci., 5 (4): 376 (April 2024)Constraint handling in Firefly Algorithm., , and . CYBCONF, page 186-190. IEEE, (2013)Improved Cohort Intelligence - A high capacity, swift and secure approach on JPEG image steganography., and . J. Inf. Secur. Appl., (2019)