iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/ACCESS.2022.3166901
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T16:19:52Z","timestamp":1726762792329},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100006261","name":"Taif University Researchers Supporting, Taif University, Taif, Saudi Arabia","doi-asserted-by":"publisher","award":["TURSP-2020\/150"],"id":[{"id":"10.13039\/501100006261","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3166901","type":"journal-article","created":{"date-parts":[[2022,4,12]],"date-time":"2022-04-12T19:33:04Z","timestamp":1649791984000},"page":"40536-40555","source":"Crossref","is-referenced-by-count":66,"title":["Novel Meta-Heuristic Algorithm for Feature Selection, Unconstrained Functions and Engineering Problems"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9221-7658","authenticated-orcid":false,"given":"El-Sayed M.","family":"El-Kenawy","sequence":"first","affiliation":[{"name":"Faculty of Artificial Intelligence, Delta University for Science and Technology, Mansoura, Egypt"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1443-9458","authenticated-orcid":false,"given":"Seyedali","family":"Mirjalili","sequence":"additional","affiliation":[{"name":"Centre for Artificial Intelligence Research and Optimization, Torrens University Australia, Fortitude Valley, QLD, Australia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8187-2286","authenticated-orcid":false,"given":"Fawaz","family":"Alassery","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, College of Computers and Information Technology, Taif University, Taif, Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4870-1493","authenticated-orcid":false,"given":"Yu-Dong","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computing and Mathematical Sciences, University of Leicester, Leicester LE1 7RH, U.K"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8557-3566","authenticated-orcid":false,"given":"Marwa Metwally","family":"Eid","sequence":"additional","affiliation":[{"name":"Faculty of Artificial Intelligence, Delta University for Science and Technology, Mansoura, Egypt"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6032-7468","authenticated-orcid":false,"given":"Shady Y.","family":"El-Mashad","sequence":"additional","affiliation":[{"name":"Department of Computer Systems Engineering, Faculty of Engineering at Shoubra, Benha University, Banha, Egypt"}]},{"given":"Bandar Abdullah","family":"Aloyaydi","sequence":"additional","affiliation":[{"name":"Mechanical Engineering Department, Qassim University, Buraidah, Saudi Arabia"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-8352-6731","authenticated-orcid":false,"given":"Abdelhameed","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"Computer Engineering and Control Systems Department, Faculty of Engineering, Mansoura University, Mansoura, Egypt"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7080-1979","authenticated-orcid":false,"given":"Abdelaziz A.","family":"Abdelhamid","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computing and Information Technology, Shaqra University, Shaqra, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0548(86)90048-1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4613-0303-9_33"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45612-0_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/937503.937505"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICENCO49778.2020.9357403"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-017-1212-6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3061058"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3083593"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3111408"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2022.023257"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00704-021-03843-2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3106233"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00366-021-01356-0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2990828"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-03901-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3028012"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12127-3_13"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2906757"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ISDA.2007.101"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.07.025"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2016.01.008"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1870-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2017.01.006"},{"key":"ref24","article-title":"Memetic firefly algorithm for combinatorial optimization","author":"Fister","year":"2012","journal-title":"arXiv:1204.5165"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2011.03.034"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3001151"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s00366-018-0668-5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015892"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CCA.1999.806674"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.03.004"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2897325"},{"key":"ref32","first-page":"1","article-title":"Solving the tension\/compression spring design problem by an improved firefly algorithm","volume-title":"Proc. IDDM","author":"Celik"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.01.029"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2889854"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.12.022"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/NCCC49330.2021.9428794"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09755988.pdf?arnumber=9755988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T21:04:10Z","timestamp":1705957450000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9755988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3166901","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}