Author of the publication

An exact approach for the constrained two-dimensional guillotine cutting problem with defects.

, , , , , and . Int. J. Prod. Res., 61 (9): 2986-3003 (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combined knowledge transfer and adaptive coordinate systems approach for evolutionary bilevel optimization., , , , , and . Expert Syst. Appl., (October 2023)An exact approach for the constrained two-dimensional guillotine cutting problem with defects., , , , , and . Int. J. Prod. Res., 61 (9): 2986-3003 (May 2023)Digital Twin-Driven Rapid Customized Design of Board-Type Furniture Production Line., , , , , , and . J. Comput. Inf. Sci. Eng., (February 2021)Location retrieval using visible landmarks based qualitative place signatures., , and . CoRR, (2022)Monitoring and Predictive Maintenance of Centrifugal Pumps Based on Smart Sensors., , , , and . Sensors, 22 (6): 2106 (2022)TChain: A Privacy-Preserving Consortium Blockchain for Parking Charge Management., , , , and . ICBCT, page 210-216. ACM, (2021)Secure Decentralized Machine Identifiers for Internet of Things., , , and . ICBCT, page 57-62. ACM, (2020)An Enhanced Whale Optimization Algorithm for the Two-Dimensional Irregular Strip Packing Problem., , , and . IEA/AIE, volume 12144 of Lecture Notes in Computer Science, page 250-261. Springer, (2020)The Convergence of IoE and Blockchain: Security Challenges., , , and . IT Prof., 21 (5): 26-32 (2019)On Designing Context-Aware Trust Model and Service Delegation for Social Internet of Things., , , and . IEEE Internet Things J., 8 (6): 4775-4787 (2021)