claim
The 'Bubble-net attacking method' (exploitation phase) of the Whale Optimization Algorithm utilizes two approaches: 'Shrinking encircling' and 'Spiral updating'.

Authors

Sources

Referenced by nodes (1)