{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T04:44:59Z","timestamp":1774673099154,"version":"3.50.1"},"publisher-location":"Cham","reference-count":61,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031821523","type":"print"},{"value":"9783031821530","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82153-0_5","type":"book-chapter","created":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T07:06:09Z","timestamp":1741071969000},"page":"53-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Adaboost Optimized by\u00a0Sinh Cosh Algorithm for\u00a0Prediction of\u00a0Software Defects"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7106-667X","authenticated-orcid":false,"given":"Saramma John","family":"Villoth","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0009-9966-7123","authenticated-orcid":false,"given":"John Philipose","family":"Villoth","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2969-1709","authenticated-orcid":false,"given":"Tamara","family":"Zivkovic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4351-068X","authenticated-orcid":false,"given":"Miodrag","family":"Zivkovic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9402-7391","authenticated-orcid":false,"given":"Luka","family":"Jovanovic","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2062-924X","authenticated-orcid":false,"given":"Nebojsa","family":"Bacanin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3011-1735","authenticated-orcid":false,"given":"Joseph","family":"Mani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,5]]},"reference":[{"key":"5_CR1","unstructured":"Ai, J.X.W.: Defect prediction with semantics and context features of codes based on graph representation learning. IEEE Transactions on Reliability (2021)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Bacanin, N., Bezdan, T., Tuba, E., Strumberger, I., Tuba, M., Zivkovic, M.: Task scheduling in cloud computing environment by grey wolf optimizer. In: 2019 27th Telecommunications Forum (TELFOR), pp.\u00a01\u20134. IEEE (2019)","DOI":"10.1109\/TELFOR48224.2019.8971223"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Bacanin, N., et al.: The explainable potential of coupling hybridized metaheuristics, xgboost, and shap in revealing toluene behavior in the atmosphere. Science of The Total Environment, p. 172195 (2024)","DOI":"10.1016\/j.scitotenv.2024.172195"},{"key":"5_CR4","volume":"35","author":"N Bacanin","year":"2022","unstructured":"Bacanin, N., Sarac, M., Budimirovic, N., Zivkovic, M., AlZubi, A.A., Bashir, A.K.: Smart wireless health care system using graph lstm pollution prediction and dragonfly node localization. Sustain. Comput.: Inform. Syst. 35, 100711 (2022)","journal-title":"Sustain. Comput.: Inform. Syst."},{"issue":"11","key":"5_CR5","doi-asserted-by":"publisher","first-page":"4204","DOI":"10.3390\/s22114204","volume":"22","author":"N Bacanin","year":"2022","unstructured":"Bacanin, N., Stoean, C., Zivkovic, M., Jovanovic, D., Antonijevic, M., Mladenovic, D.: Multi-swarm algorithm for extreme learning machine optimization. Sensors 22(11), 4204 (2022)","journal-title":"Sensors"},{"issue":"1","key":"5_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-022-09744-2","volume":"12","author":"N Bacanin","year":"2022","unstructured":"Bacanin, N., et al.: Hybridized sine cosine algorithm with convolutional neural networks dropout regularization application. Sci. Rep. 12(1), 1\u201320 (2022)","journal-title":"Sci. Rep."},{"issue":"22","key":"5_CR7","doi-asserted-by":"publisher","first-page":"4173","DOI":"10.3390\/math10224173","volume":"10","author":"N Bacanin","year":"2022","unstructured":"Bacanin, N., et al.: Application of natural language processing and machine learning boosted with swarm intelligence for spam email filtering. Mathematics 10(22), 4173 (2022)","journal-title":"Mathematics"},{"key":"5_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2023.111081","volume":"282","author":"J Bai","year":"2023","unstructured":"Bai, J., et al.: A sinh cosh optimizer. Knowl.-Based Syst. 282, 111081 (2023)","journal-title":"Knowl.-Based Syst."},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Bai, X., Zhou, H., Yang, H.: An hvsm-based gru approach to predict cross-version software defects. Int. J. Perform. Eng. 16(6) (2020)","DOI":"10.23940\/ijpe.20.06.p16.979990"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Beni, G.: Swarm intelligence. Complex Social and Behavioral Systems: Game Theory and Agent-Based Models, pp. 791\u2013818 (2020)","DOI":"10.1007\/978-1-0716-0368-0_530"},{"key":"5_CR11","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-981-15-7106-0_16","volume-title":"Machine Learning for Predictive Analysis: Proceedings of ICTIS 2020","author":"T Bezdan","year":"2021","unstructured":"Bezdan, T., Zivkovic, M., Antonijevic, M., Zivkovic, T., Bacanin, N.: Enhanced flower pollination algorithm for task scheduling in cloud computing environment. In: Joshi, A., Khosravy, M., Gupta, N. (eds.) Machine Learning for Predictive Analysis: Proceedings of ICTIS 2020, pp. 163\u2013171. Springer Singapore, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-7106-0_16"},{"issue":"1","key":"5_CR12","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1109\/2.962984","volume":"34","author":"B Boehm","year":"2001","unstructured":"Boehm, B., Basili, V.R.: Top 10 list [software development]. Computer 34(1), 135\u2013137 (2001)","journal-title":"Computer"},{"issue":"1","key":"5_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"J Cohen","year":"1960","unstructured":"Cohen, J.: A coefficient of agreement for nominal scales. Educ. Psychol. Measur. 20(1), 37\u201346 (1960)","journal-title":"Educ. Psychol. Measur."},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Dama\u0161evi\u010dius, R., et al.: Decomposition aided attention-based recurrent neural networks for multistep ahead time-series forecasting of renewable power generation. PeerJ Comput. Sci. 10 (2024)","DOI":"10.7717\/peerj-cs.1795"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1007\/978-981-33-6862-0_54","volume-title":"Computational Vision and Bio-Inspired Computing: ICCVBIC 2020","author":"L Gajic","year":"2021","unstructured":"Gajic, L., Cvetnic, D., Zivkovic, M., Bezdan, T., Bacanin, N., Milosevic, S.: Multi-layer perceptron training using hybridized bat algorithm. In: Smys, S., Tavares, J.M.R.S., Bestak, R., Shi, F. (eds.) Computational Vision and Bio-Inspired Computing: ICCVBIC 2020, pp. 689\u2013705. Springer Singapore, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-33-6862-0_54"},{"issue":"6","key":"5_CR16","doi-asserted-by":"publisher","first-page":"1276","DOI":"10.1109\/TSE.2011.103","volume":"38","author":"T Hall","year":"2011","unstructured":"Hall, T., Beecham, S., Bowes, D., Gray, D., Counsell, S.: A systematic literature review on fault prediction performance in software engineering. IEEE Trans. Software Eng. 38(6), 1276\u20131304 (2011)","journal-title":"IEEE Trans. Software Eng."},{"key":"5_CR17","unstructured":"Halstead, M.H.: Elements of Software Science (Operating and programming systems series). Elsevier Science Inc. (1977)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Halstead, M.H.: Advances in software science. In: Advances in Computers, vol.\u00a018, pp. 119\u2013172. Elsevier (1979)","DOI":"10.1016\/S0065-2458(08)60583-5"},{"issue":"3","key":"5_CR19","first-page":"349","volume":"2","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Rosset, S., Zhu, J., Zou, H.: Multi-class adaboost. Statistics and its. Interface 2(3), 349\u2013360 (2009)","journal-title":"Interface"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.future.2019.02.028","volume":"97","author":"AA Heidari","year":"2019","unstructured":"Heidari, A.A., Mirjalili, S., Faris, H., Aljarah, I., Mafarja, M., Chen, H.: Harris hawks optimization: Algorithm and applications. Futur. Gener. Comput. Syst. 97, 849\u2013872 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5_CR21","unstructured":"Jones, C., Bonsignour, O.: The economics of software quality. Addison-Wesley Professional (2011)"},{"issue":"13","key":"5_CR22","doi-asserted-by":"publisher","first-page":"2272","DOI":"10.3390\/math10132272","volume":"10","author":"D Jovanovic","year":"2022","unstructured":"Jovanovic, D., Antonijevic, M., Stankovic, M., Zivkovic, M., Tanaskovic, M., Bacanin, N.: Tuning machine learning models using a group search firefly algorithm for credit card fraud detection. Mathematics 10(13), 2272 (2022)","journal-title":"Mathematics"},{"issue":"21","key":"5_CR23","doi-asserted-by":"publisher","first-page":"14616","DOI":"10.3390\/su142114616","volume":"14","author":"L Jovanovic","year":"2022","unstructured":"Jovanovic, L., et al.: Multi-step crude oil price prediction based on lstm approach tuned by salp swarm algorithm with disputation operator. Sustainability 14(21), 14616 (2022)","journal-title":"Sustainability"},{"issue":"1","key":"5_CR24","doi-asserted-by":"publisher","first-page":"109","DOI":"10.3390\/atmos14010109","volume":"14","author":"L Jovanovic","year":"2023","unstructured":"Jovanovic, L., et al.: The explainable potential of coupling metaheuristics-optimized-xgboost and shap in revealing vocs\u2019 environmental fate. Atmosphere 14(1), 109 (2023)","journal-title":"Atmosphere"},{"issue":"24","key":"5_CR25","doi-asserted-by":"publisher","first-page":"14727","DOI":"10.1007\/s00521-024-09850-4","volume":"36","author":"L Jovanovic","year":"2024","unstructured":"Jovanovic, L., et al.: Evaluating the performance of metaheuristic-tuned weight agnostic neural networks for crop yield prediction. Neural Comput. Appl. 36(24), 14727\u201314756 (2024). https:\/\/doi.org\/10.1007\/s00521-024-09850-4","journal-title":"Neural Comput. Appl."},{"issue":"1","key":"5_CR26","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1016\/j.asoc.2007.05.007","volume":"8","author":"D Karaboga","year":"2008","unstructured":"Karaboga, D., Basturk, B.: On the performance of artificial bee colony (ABC) algorithm. Appl. Soft Comput. 8(1), 687\u2013697 (2008)","journal-title":"Appl. Soft Comput."},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Kennedy, J., Eberhart, R.: Particle swarm optimization. In: Proceedings of ICNN\u201995-International Conference on Neural Networks. vol.\u00a04, pp. 1942\u20131948. IEEE (1995)","DOI":"10.1109\/ICNN.1995.488968"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Khoshgoftaar, T.M., Gao, K., Seliya, N.: Attribute selection and imbalanced data: Problems in software defect prediction. In: 2010 22nd IEEE International Conference on Tools with Artificial Intelligence. vol.\u00a01, pp. 137\u2013144. IEEE (2010)","DOI":"10.1109\/ICTAI.2010.27"},{"issue":"4","key":"5_CR29","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/TSE.2008.35","volume":"34","author":"S Lessmann","year":"2008","unstructured":"Lessmann, S., Baesens, B., Mues, C., Pietsch, S.: Benchmarking classification models for software defect prediction: A proposed framework and novel findings. IEEE Trans. Softw. Eng. 34(4), 485\u2013496 (2008)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Li, Z., Reformat, M.: A practical method for the software fault-prediction. In: 2007 IEEE International Conference on Information Reuse and Integration, pp. 659\u2013666. IEEE (2007)","DOI":"10.1109\/IRI.2007.4296695"},{"key":"5_CR31","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"4","author":"TJ McCabe","year":"1976","unstructured":"McCabe, T.J.: A complexity measure. IEEE Trans. Software Eng. 4, 308\u2013320 (1976)","journal-title":"IEEE Trans. Software Eng."},{"key":"5_CR32","unstructured":"Menzies, T., DiStefano, J., Orrego, A., Chapman, R.: Assessing predictors of software defects. In: Proceedings of the Workshop Predictive Software Models (2004)"},{"issue":"4","key":"5_CR33","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/s10515-010-0069-5","volume":"17","author":"T Menzies","year":"2010","unstructured":"Menzies, T., Milton, Z., Turhan, B., Cukic, B., Jiang, Y., Bener, A.: Defect prediction from static code features: current results, limitations, new approaches. Autom. Softw. Eng. 17(4), 375\u2013407 (2010)","journal-title":"Autom. Softw. Eng."},{"key":"5_CR34","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-030-68527-0_4","volume-title":"Modelling and Development of Intelligent Systems: 7th International Conference, MDIS 2020, Sibiu, Romania, October 22\u201324, 2020, Revised Selected Papers","author":"S Milosevic","year":"2021","unstructured":"Milosevic, S., Bezdan, T., Zivkovic, M., Bacanin, N., Strumberger, I., Tuba, M.: Feed-forward neural network training by hybrid bat algorithm. In: Simian, D., Stoica, L.F. (eds.) Modelling and Development of Intelligent Systems: 7th International Conference, MDIS 2020, Sibiu, Romania, October 22\u201324, 2020, Revised Selected Papers, pp. 52\u201366. Springer International Publishing, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68527-0_4"},{"key":"5_CR35","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.knosys.2015.12.022","volume":"96","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili, S.: Sca: a sine cosine algorithm for solving optimization problems. Knowl.-Based Syst. 96, 120\u2013133 (2016)","journal-title":"Knowl.-Based Syst."},{"key":"5_CR36","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.advengsoft.2017.07.002","volume":"114","author":"S Mirjalili","year":"2017","unstructured":"Mirjalili, S., Gandomi, A.H., Mirjalili, S.Z., Saremi, S., Faris, H., Mirjalili, S.M.: Salp swarm algorithm: A bio-inspired optimizer for engineering design problems. Adv. Eng. Softw. 114, 163\u2013191 (2017)","journal-title":"Adv. Eng. Softw."},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Mirjalili, S., Mirjalili, S.: Genetic algorithm. Evolutionary Algorithms and Neural Networks: Theory and Applications, pp. 43\u201355 (2019)","DOI":"10.1007\/978-3-319-93025-1_4"},{"issue":"3","key":"5_CR38","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s10462-023-10678-y","volume":"57","author":"M Pavlov-Kagadejev","year":"2024","unstructured":"Pavlov-Kagadejev, M., et al.: Optimizing long-short-term memory models via metaheuristics for decomposition aided wind energy generation forecasting. Artif. Intell. Rev. 57(3), 45 (2024)","journal-title":"Artif. Intell. Rev."},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Petrovic, A., Bacanin, N., Zivkovic, M., Marjanovic, M., Antonijevic, M., Strumberger, I.: The adaboost approach tuned by firefly metaheuristics for fraud detection. In: 2022 IEEE World Conference on Applied Intelligence and Computing (AIC), pp. 834\u2013839. IEEE (2022)","DOI":"10.1109\/AIC55036.2022.9848902"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Pierezan, J., Coelho, L.D.S.: Coyote optimization algorithm: a new metaheuristic for global optimization problems. In: 2018 IEEE Congress on Evolutionary Computation (CEC), pp.\u00a01\u20138. IEEE (2018)","DOI":"10.1109\/CEC.2018.8477769"},{"issue":"2","key":"5_CR41","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.32.2.021406","volume":"32","author":"M Sarac","year":"2022","unstructured":"Sarac, M., Mravik, M., Jovanovic, D., Strumberger, I., Zivkovic, M., Bacanin, N.: Intelligent diagnosis of coronavirus with computed tomography images using a deep learning model. J. Electron. Imaging 32(2), 021406 (2022)","journal-title":"J. Electron. Imaging"},{"key":"5_CR42","unstructured":"Sayyad\u00a0Shirabad, J., Menzies, T.: The PROMISE Repository of Software Engineering Databases. School of Information Technology and Engineering, University of Ottawa, Canada (2005). http:\/\/promise.site.uottawa.ca\/SERepository"},{"issue":"3","key":"5_CR43","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1109\/TSE.2010.90","volume":"37","author":"Q Song","year":"2010","unstructured":"Song, Q., Jia, Z., Shepperd, M., Ying, S., Liu, J.: A general software defect-proneness prediction framework. IEEE Trans. Software Eng. 37(3), 356\u2013370 (2010)","journal-title":"IEEE Trans. Software Eng."},{"key":"5_CR44","doi-asserted-by":"crossref","unstructured":"Stankovic, M., Antonijevic, M., Bacanin, N., Zivkovic, M., Tanaskovic, M., Jovanovic, D.: Feature selection by hybrid artificial bee colony algorithm for intrusion detection. In: 2022 International Conference on Edge Computing and Applications (ICECAA), pp. 500\u2013505. IEEE (2022)","DOI":"10.1109\/ICECAA55415.2022.9936116"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Stegherr, H., Heider, M., H\u00e4hner, J.: Classifying metaheuristics: Towards a unified multi-level classification system. Natural Comput. 1\u201317 (2020)","DOI":"10.1007\/s11047-020-09824-0"},{"issue":"3","key":"5_CR46","doi-asserted-by":"publisher","first-page":"266","DOI":"10.3390\/axioms12030266","volume":"12","author":"C Stoean","year":"2023","unstructured":"Stoean, C., et al.: Metaheuristic-based hyperparameter tuning for recurrent deep learning: Application to the prediction of solar energy generation. Axioms 12(3), 266 (2023)","journal-title":"Axioms"},{"issue":"4","key":"5_CR47","first-page":"331","volume":"17","author":"MK Thota","year":"2020","unstructured":"Thota, M.K., Shajin, F.H., Rajesh, P., et al.: Survey on software defect prediction techniques. Int. J. Appl. Sci. Eng. 17(4), 331\u2013344 (2020)","journal-title":"Int. J. Appl. Sci. Eng."},{"issue":"2","key":"5_CR48","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TR.2013.2259203","volume":"62","author":"S Wang","year":"2013","unstructured":"Wang, S., Yao, X.: Using class imbalance learning for software defect prediction. IEEE Trans. Reliab. 62(2), 434\u2013443 (2013)","journal-title":"IEEE Trans. Reliab."},{"issue":"1","key":"5_CR49","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/4235.585893","volume":"1","author":"DH Wolpert","year":"1997","unstructured":"Wolpert, D.H., Macready, W.G.: No free lunch theorems for optimization. IEEE Trans. Evol. Comput. 1(1), 67\u201382 (1997)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"5_CR50","doi-asserted-by":"crossref","unstructured":"Yang, X.S.: A new metaheuristic bat-inspired algorithm. In: Nature inspired cooperative strategies for optimization (NICSO 2010), pp. 65\u201374. Springer (2010)","DOI":"10.1007\/978-3-642-12538-6_6"},{"key":"5_CR51","doi-asserted-by":"crossref","unstructured":"Yang, X.S., Slowik, A.: Firefly algorithm. In: Swarm Intelligence Algorithms, pp. 163\u2013174. CRC Press (2020)","DOI":"10.1201\/9780429422614-13"},{"issue":"22","key":"5_CR52","doi-asserted-by":"publisher","first-page":"3798","DOI":"10.3390\/electronics11223798","volume":"11","author":"M Zivkovic","year":"2022","unstructured":"Zivkovic, M., et al.: Hybrid cnn and xgboost model tuned by modified arithmetic optimization algorithm for covid-19 early diagnostics from x-ray images. Electronics 11(22), 3798 (2022)","journal-title":"Electronics"},{"key":"5_CR53","doi-asserted-by":"crossref","unstructured":"Zivkovic, M., Bacanin, N., Rakic, A., Arandjelovic, J., Stanojlovic, S., Venkatachalam, K.: Chaotic binary ant lion optimizer approach for feature selection on medical datasets with covid-19 case study. In: 2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), pp. 581\u2013588. IEEE (2022)","DOI":"10.1109\/ICAISS55157.2022.10011032"},{"key":"5_CR54","doi-asserted-by":"crossref","unstructured":"Zivkovic, M., Bacanin, N., Tuba, E., Strumberger, I., Bezdan, T., Tuba, M.: Wireless sensor networks life time optimization based on the improved firefly algorithm. In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 1176\u20131181. IEEE (2020)","DOI":"10.1109\/IWCMC48107.2020.9148087"},{"key":"5_CR55","volume":"66","author":"M Zivkovic","year":"2021","unstructured":"Zivkovic, M., et al.: Covid-19 cases prediction by using hybrid machine learning and beetle antennae search approach. Sustain. Urban Areas 66, 102669 (2021)","journal-title":"Sustain. Urban Areas"},{"key":"5_CR56","doi-asserted-by":"crossref","unstructured":"Zivkovic, M., Bacanin, N., Zivkovic, T., Strumberger, I., Tuba, E., Tuba, M.: Enhanced grey wolf algorithm for energy efficient wireless sensor networks. In: 2020 Zooming Innovation in Consumer Technologies Conference (ZINC), pp. 87\u201392. IEEE (2020)","DOI":"10.1109\/ZINC50678.2020.9161788"},{"key":"5_CR57","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-981-16-0965-7_9","volume-title":"Computer Networks, Big Data and IoT: Proceedings of ICCBI 2020","author":"M Zivkovic","year":"2021","unstructured":"Zivkovic, M., Bezdan, T., Strumberger, I., Bacanin, N., Venkatachalam, K.: Improved Harris Hawks Optimization Algorithm for Workflow Scheduling Challenge in Cloud\u2013Edge Environment. In: Pandian, A.P., Fernando, X., Islam, S.M.S. (eds.) Computer Networks, Big Data and IoT: Proceedings of ICCBI 2020, pp. 87\u2013102. Springer Singapore, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-0965-7_9"},{"key":"5_CR58","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1007\/978-981-33-4355-9_14","volume-title":"Proceedings of International Conference on Sustainable Expert Systems: ICSES 2020","author":"M Zivkovic","year":"2021","unstructured":"Zivkovic, M., et al.: Hybrid genetic algorithm and machine learning method for covid-19 cases prediction. In: Shakya, S., Balas, V.E., Haoxiang, W., Baig, Z. (eds.) Proceedings of International Conference on Sustainable Expert Systems: ICSES 2020, pp. 169\u2013184. Springer Singapore, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-33-4355-9_14"},{"key":"5_CR59","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1007\/978-981-15-8530-2_63","volume-title":"Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2020","author":"M Zivkovic","year":"2021","unstructured":"Zivkovic, M., Zivkovic, T., Venkatachalam, K., Bacanin, N.: Enhanced dragonfly algorithm adapted for wireless sensor network lifetime optimization. In: Jeena Jacob, I., Kolandapalayam Shanmugam, S., Piramuthu, S., Falkowski-Gilski, P. (eds.) Data Intelligence and Cognitive Informatics: Proceedings of ICDICI 2020, pp. 803\u2013817. Springer Singapore, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-8530-2_63"},{"key":"5_CR60","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110659","volume":"146","author":"T Zivkovic","year":"2023","unstructured":"Zivkovic, T., Nikolic, B., Simic, V., Pamucar, D., Bacanin, N.: Software defects prediction by metaheuristics tuned extreme gradient boosting and analysis based on shapley additive explanations. Appl. Soft Comput. 146, 110659 (2023)","journal-title":"Appl. Soft Comput."},{"key":"5_CR61","doi-asserted-by":"crossref","unstructured":"\u017divkovi\u0107, T., \u017divkovi\u0107, M.: Comparative analysis of techniques for testing object oriented programs. In: 2020 Zooming Innovation in Consumer Technologies Conference (ZINC), pp. 270\u2013275. IEEE (2020)","DOI":"10.1109\/ZINC50678.2020.9161799"}],"container-title":["Communications in Computer and Information Science","Intelligent Systems and Pattern Recognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82153-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T07:07:28Z","timestamp":1741072048000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82153-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031821523","9783031821530"],"references-count":61,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82153-0_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"5 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Systems and Pattern Recognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"T\u00fcrkiye","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispr22024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ispr2024.sciencesconf.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}