{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:59:58Z","timestamp":1740099598241,"version":"3.37.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030374938"},{"type":"electronic","value":"9783030374945"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-37494-5_9","type":"book-chapter","created":{"date-parts":[[2019,12,14]],"date-time":"2019-12-14T15:02:38Z","timestamp":1576335758000},"page":"166-182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Application of PSO-Based Constrained Combinatorial Optimization to Segment Assignment in Shield Tunneling"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5473-0864","authenticated-orcid":false,"given":"Koya","family":"Ihara","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4130-2729","authenticated-orcid":false,"given":"Shohei","family":"Kato","sequence":"additional","affiliation":[]},{"given":"Takehiko","family":"Nakaya","sequence":"additional","affiliation":[]},{"given":"Tomoaki","family":"Ogi","sequence":"additional","affiliation":[]},{"given":"Hiroichi","family":"Masuda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,15]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Bonyadi, M., Li, X., Michalewicz, Z.: A hybrid particle swarm with velocity mutation for constraint optimization problems. In: Proceedings of the 15th Annual Conference on Genetic and Evolutionary Computation (GECCO), pp. 1\u20138. ACM (2013)","DOI":"10.1145\/2463372.2463378"},{"key":"9_CR2","unstructured":"Eberhart, R., Kennedy, J.: Particle swarm optimization. In: Proceedings of the IEEE International Conference on Neural Networks, vol. 4, pp. 1942\u20131948. Citeseer (1995)"},{"key":"9_CR3","unstructured":"Eberhart, R.C., Shi, Y.: Comparing inertia weights and constriction factors in particle swarm optimization. In: Proceedings of IEEE Congress on Evolutionary Computation (CEC), vol. 1, pp. 84\u201388. IEEE (2000)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Engelbrecht, A.P.: Fitness function evaluations: a fair stopping condition? In: Proceedings of 2014 IEEE Symposium on Swarm Intelligence (SIS), pp. 1\u20138. IEEE (2014)","DOI":"10.1109\/SIS.2014.7011793"},{"key":"9_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/b101874","volume-title":"Handbook of Metaheuristics","year":"2006","unstructured":"Glover, F.W., Kochenberger, G.A. (eds.): Handbook of Metaheuristics, vol. 57. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/b101874"},{"key":"9_CR6","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley, Reading (1989)"},{"key":"9_CR7","first-page":"69","volume":"1","author":"DE Goldberg","year":"1991","unstructured":"Goldberg, D.E., Deb, K.: A comparative analysis of selection schemes used in genetic algorithms. Found. Genet. Algorithms (FOGA) 1, 69\u201393 (1991)","journal-title":"Found. Genet. Algorithms (FOGA)"},{"key":"9_CR8","unstructured":"Guti\u00e9rrez, A., et al.: Comparison of different PSO initialization techniques for high dimensional search space problems: a test with FSS and antenna arrays. In: Proceedings of the 5th European Conference on Antennas and Propagation (EUCAP), pp. 965\u2013969. IEEE (2011)"},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1007\/s00366-016-0447-0","volume":"32","author":"M Hasanipanah","year":"2016","unstructured":"Hasanipanah, M., Noorian-Bidgoli, M., Armaghani, D.J., Khamesi, H.: Feasibility of PSO-ANN model for predicting surface settlement caused by tunneling. Eng. Comput. 32(4), 705\u2013715 (2016)","journal-title":"Eng. Comput."},{"key":"9_CR10","doi-asserted-by":"crossref","DOI":"10.1201\/9781315222455","volume-title":"Swarm Intelligence: Principles, Advances, and Applications","author":"AE Hassanien","year":"2018","unstructured":"Hassanien, A.E., Emary, E.: Swarm Intelligence: Principles, Advances, and Applications. CRC Press, Boca Raton (2018)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Ihara, K., Kato, S., Nakaya, T., Ogi, T.: Constrained GA based segment assignment in shield tunneling to minimize the amount of excavated soil. In: Proceedings of 2018 IEEE 7th Global Conference on Consumer Electronics, pp. 229\u2013230 (2018)","DOI":"10.1109\/GCCE.2018.8574682"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Ihara, K., Kato, S., Nakaya, T., Ogi, T., Masuda, H.: A PSO based approach to assign segments for reducing excavated soil in shield tunneling. In: Proceedings of the 11th International Conference on Agents and Artificial Intelligence, vol. 2, pp. 328\u2013336 (2019)","DOI":"10.5220\/0007407803280336"},{"key":"9_CR13","unstructured":"Japan Society of Civil Engineers: Standard specifications for tunneling-2006: shield tunnels. Tunnel Engineering Committee, August 2007"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Kennedy, J.: Particle swarm optimization. In: Encyclopedia of Machine Learning, pp. 760\u2013766. Springer, New York (2011)","DOI":"10.1007\/978-0-387-30164-8_630"},{"key":"9_CR15","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of IEEE International Conference on Neural Networks, pp. 1942\u20131948. IEEE (1995)"},{"key":"9_CR16","unstructured":"Kennedy, J., Eberhart, R.C.: A discrete binary version of the particle swarm algorithm. In: Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, vol. 5, pp. 4104\u20134108. IEEE (1997)"},{"issue":"2\u20133","key":"9_CR17","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/S0886-7798(03)00040-3","volume":"18","author":"Y Koyama","year":"2003","unstructured":"Koyama, Y.: Present status and technology of shield tunneling method in Japan. Tunn. Undergr. Space Technol. 18(2\u20133), 145\u2013159 (2003)","journal-title":"Tunn. Undergr. Space Technol."},{"issue":"5","key":"9_CR18","doi-asserted-by":"publisher","first-page":"1261","DOI":"10.1016\/j.chaos.2004.11.095","volume":"25","author":"B Liu","year":"2005","unstructured":"Liu, B., Wang, L., Jin, Y.H., Tang, F., Huang, D.X.: Improved particle swarm optimization combined with chaos. Chaos, Solitons Fractals 25(5), 1261\u20131271 (2005)","journal-title":"Chaos, Solitons Fractals"},{"key":"9_CR19","volume-title":"Mechanised Shield Tunnelling","author":"B Maidl","year":"2013","unstructured":"Maidl, B., Herrenknecht, M., Maidl, U., Wehrmeyer, G.: Mechanised Shield Tunnelling. Wiley, New York (2013)"},{"issue":"3","key":"9_CR20","first-page":"193","volume":"9","author":"BL Miller","year":"1995","unstructured":"Miller, B.L., Goldberg, D.E., et al.: Genetic algorithms, tournament selection, and the effects of noise. Complex Syst. 9(3), 193\u2013212 (1995)","journal-title":"Complex Syst."},{"key":"9_CR21","unstructured":"Ng, J.Y., Chan, A.H.: The ageing construction workforce in Hong Kong: a review. In: Proceedings of International MultiConference of Engineers and Computer Scientists 2015 (IMECS). Newswood Limited (2015)"},{"key":"9_CR22","unstructured":"Olsen, D., Tatum, M., Defnall, C.: How industrial contractors are handling skilled labor shortages in the United States. In: 48th ASC Annual International Conference Proceedings (2012)"},{"key":"9_CR23","unstructured":"Pampara, G., Franken, N., Engelbrecht, A.P.: Combining particle swarm optimisation with angle modulation to solve binary problems. In: Proceedings of IEEE Congress on Evolutionary Computation (CEC), vol. 1, pp. 89\u201396. IEEE (2005)"},{"issue":"1","key":"9_CR24","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/TEVC.2007.894200","volume":"12","author":"S Rahnamayan","year":"2008","unstructured":"Rahnamayan, S., Tizhoosh, H.R., Salama, M.M.A.: Opposition-based differential evolution. IEEE Trans. Evol. Comput. 12(1), 64\u201379 (2008)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"9_CR25","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/j.swevo.2016.02.005","volume":"29","author":"J Soares","year":"2016","unstructured":"Soares, J., Ghazvini, M.A.F., Silva, M., Vale, Z.: Multi-dimensional signaling method for population-based metaheuristics: solving the large-scale scheduling problem in smart grids. Swarm Evol. Comput. 29, 13\u201332 (2016)","journal-title":"Swarm Evol. Comput."},{"issue":"4","key":"9_CR26","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1023\/A:1008202821328","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn, R., Price, K.: Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces. J. Global Optim. 11(4), 341\u2013359 (1997)","journal-title":"J. Global Optim."},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Strasser, S., Goodman, R., Sheppard, J., Butcher, S.: A new discrete particle swarm optimization algorithm. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), pp. 53\u201360. ACM (2016)","DOI":"10.1145\/2908812.2908935"},{"issue":"2","key":"9_CR28","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.tust.2005.06.007","volume":"21","author":"S Suwansawat","year":"2006","unstructured":"Suwansawat, S., Einstein, H.H.: Artificial neural networks for predicting the maximum surface settlement caused by EPB shield tunneling. Tunn. Undergr. Space Technol. 21(2), 133\u2013150 (2006)","journal-title":"Tunn. Undergr. Space Technol."},{"key":"9_CR29","unstructured":"Suzuki, A.: 2016 annual report of NILIM: productivity improvement in infrastrucure development process using i-construction (2016). http:\/\/www.nilim.go.jp\/english\/annual\/annual2016\/ar2016e.html . Accessed 23 Oct 2018"},{"key":"9_CR30","unstructured":"Syswerda, G.: Uniform crossover in genetic algorithms. In: Proceedings of the 3rd International Conference on Genetic Algorithms, pp. 2\u20139. Morgan Kaufmann Publishers (1989)"},{"key":"9_CR31","unstructured":"Takahama, T., Sakai, S.: Constrained optimization by the $$\\varepsilon $$ constrained differential evolution with gradient-based mutation and feasible elites. In: Proceedings of IEEE Congress on Evolutionary Computation (CEC), pp. 1\u20138. IEEE (2006)"},{"key":"9_CR32","doi-asserted-by":"publisher","unstructured":"Takahama, T., Sakai, S.: Constrained optimization by $$\\varepsilon $$ constrained particle swarm optimizer with $$\\varepsilon $$-level control. In: Abraham, A., Dote, Y., Furuhashi, T., K\u00f6ppen, M., Ohuchi, A., Ohsawa, Y. (eds.) Soft Computing as Transdisciplinary Science and Technology. Advances in Soft Computing, vol. 29, pp. 1019\u20131029. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/3-540-32391-0_105","DOI":"10.1007\/3-540-32391-0_105"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Takahama, T., Sakai, S.: Constrained optimization by the $$\\varepsilon $$ constrained differential evolution with an archive and gradient-based mutation. In: Proceedings of IEEE Congress on Evolutionary Computation (CEC), pp. 1\u20139. IEEE (2010)","DOI":"10.1109\/CEC.2010.5586484"},{"issue":"1","key":"9_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00083ED1V01Y200710CEM018","volume":"2","author":"WC Weng","year":"2007","unstructured":"Weng, W.C., Yang, F., Elsherbeni, A.: Electromagnetics and antenna optimization using Taguchi\u2019s method. Synth. Lect. Comput. Electromagnet. 2(1), 1\u201394 (2007)","journal-title":"Synth. Lect. Comput. Electromagnet."},{"key":"9_CR35","doi-asserted-by":"publisher","unstructured":"Yang, Z., Cai, X., Fan, Z.: Epsilon constrained method for constrained multiobjective optimization problems: some preliminary results. In: Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation, pp. 1181\u20131186. ACM (2014). https:\/\/doi.org\/10.1145\/2598394.2610012","DOI":"10.1145\/2598394.2610012"},{"issue":"6","key":"9_CR36","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TEVC.2007.892759","volume":"11","author":"Q Zhang","year":"2007","unstructured":"Zhang, Q., Li, H.: MOEA\/D: a multiobjective evolutionary algorithm based on decomposition. IEEE Trans. Evol. Comput. 11(6), 712\u2013731 (2007)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"1","key":"9_CR37","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1109\/SURV.2013.062613.00014","volume":"16","author":"Z Zhang","year":"2014","unstructured":"Zhang, Z., Long, K., Wang, J., Dressler, F.: On swarm intelligence inspired self-organized networking: its bionic mechanisms, designing principles and optimization approaches. IEEE Commun. Surv. Tutorials 16(1), 513\u2013537 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"}],"container-title":["Lecture Notes in Computer Science","Agents and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-37494-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,28]],"date-time":"2024-07-28T16:35:59Z","timestamp":1722184559000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-37494-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030374938","9783030374945"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-37494-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAART","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Agents and Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Prague","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Czech Republic","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 February 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 February 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaart2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaart.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"202","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"66","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36 poster papers were also accepted. 17 of the 46 accepted full papers are included in LNAI 11978.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}