claim
The 'Bubble-net attacking method' (exploitation phase) of the Whale Optimization Algorithm utilizes two approaches: 'Shrinking encircling' and 'Spiral updating'.
Authors
Sources
- Comprehensive framework for smart residential demand side ... www.nature.com via serper