Advanced Search



7 results found in all.
index Title
1Multi-objective differential evolution with diversity enhancement
Author(s):Bo-yang Qu, Ponnuthurai-Nagaratnam Suganthan  Clicked:11597  Download:7080  Cited:13  <Full Text>
Journal of Zhejiang University Science C  2010 Vol.11 No.7 P.538-543  DOI:10.1631/jzus.C0910481
2Convergence analysis of distributed Kalman filtering for relative sensing networks
Author(s):Che Lin, Rong-hao Zheng, Gang-feng Yan, Shi-yuan Lu  Clicked:9202  Download:3502  Cited:0  <Full Text>  <PPT> 2276
Frontiers of Information Technology & Electronic Engineering  2018 Vol.19 No.9 P.1063-1075  DOI:10.1631/FITEE.1700066
3Optimal two-impulse space interception with multiple constraints
Author(s):Li Xie, Yi-qun Zhang, Jun-yan Xu  Clicked:8006  Download:7383  Cited:0  <Full Text>  <PPT> 2108
Frontiers of Information Technology & Electronic Engineering  2020 Vol.21 No.7 P.1085-1107  DOI:10.1631/FITEE.1800763
4Improved binary artificial bee colony algorithm
Author(s):Rafet Durgut  Clicked:7979  Download:9927  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2021 Vol.22 No.8 P.1080-1091  DOI:10.1631/FITEE.2000239
5A power optimization approach for mixed polarity Reed–Muller logic circuits based on multi-strategy fusion memetic algorithm
Author(s):Mengyu ZHANG, Zhenxue HE, Yijin WANG, Xiaojun ZHAO, Xiaodan ZHANG, Limin XIAO, Xiang WANG  Clicked:1523  Download:3250  Cited:0  <Full Text>  <PPT> 789
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.3 P.415-426  DOI:10.1631/FITEE.2400513
6An adaptive dung beetle optimizer based on an elastic annealing mechanism and its application to numerical problems and optimization of Reed–Muller logic circuits
Author(s):Lixin MIAO, Zhenxue HE, Xiaojun ZHAO, Yijin WANG, Xiaodan ZHANG, Kui YU, Limin XIAO, Zhisheng HUO  Clicked:1269  Download:2643  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.9 P.1577-1595  DOI:10.1631/FITEE.2400967
7Dynamic trust-based service function chain deployment method for disrupting attack chains
Author(s):Deqiang ZHOU, Xinsheng JI, Wei YOU, Hang QIU, Jie YANG, Yu ZHAO, Mingyan XU  Clicked:670  Download:588  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.12 P.2550-2568  DOI:10.1631/FITEE.2500218
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE