Advanced Search



7 results found in all.
index Title
1Multi-objective differential evolution with diversity enhancement
Author(s):Bo-yang Qu, Ponnuthurai-Nagaratnam Suganthan  Clicked:11737  Download:7634  Cited:13  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.7 P.538-543  DOI:10.1631/jzus.C0910481
2Convergence analysis of distributed Kalman filtering for relative sensing networks
Author(s):Che Lin, Rong-hao Zheng, Gang-feng Yan, Shi-yuan Lu  Clicked:9413  Download:3900  Cited:0  <Full Text>  <PPT> 2332
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.9 P.1063-1075  DOI:10.1631/FITEE.1700066
3Optimal two-impulse space interception with multiple constraints
Author(s):Li Xie, Yi-qun Zhang, Jun-yan Xu  Clicked:8207  Download:7897  Cited:0  <Full Text>  <PPT> 2155
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.7 P.1085-1107  DOI:10.1631/FITEE.1800763
4Improved binary artificial bee colony algorithm
Author(s):Rafet Durgut  Clicked:8166  Download:10503  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.8 P.1080-1091  DOI:10.1631/FITEE.2000239
5A power optimization approach for mixed polarity Reed–Muller logic circuits based on multi-strategy fusion memetic algorithm
Author(s):Mengyu ZHANG, Zhenxue HE, Yijin WANG, Xiaojun ZHAO, Xiaodan ZHANG, Limin XIAO, Xiang WANG  Clicked:1772  Download:4183  Cited:0  <Full Text>  <PPT> 879
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.3 P.415-426  DOI:10.1631/FITEE.2400513
6An adaptive dung beetle optimizer based on an elastic annealing mechanism and its application to numerical problems and optimization of Reed–Muller logic circuits
Author(s):Lixin MIAO, Zhenxue HE, Xiaojun ZHAO, Yijin WANG, Xiaodan ZHANG, Kui YU, Limin XIAO, Zhisheng HUO  Clicked:1519  Download:3368  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1577-1595  DOI:10.1631/FITEE.2400967
7Dynamic trust-based service function chain deployment method for disrupting attack chains
Author(s):Deqiang ZHOU, Xinsheng JI, Wei YOU, Hang QIU, Jie YANG, Yu ZHAO, Mingyan XU  Clicked:867  Download:748  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.12 P.2550-2568  DOI:10.1631/FITEE.2500218
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE