{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T16:10:09Z","timestamp":1751731809687,"version":"3.41.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319959290"},{"type":"electronic","value":"9783319959306"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95930-6_81","type":"book-chapter","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T06:12:40Z","timestamp":1530771160000},"page":"806-817","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Artificial Bee Colony Algorithm Based on Ensemble of Constraint Handing Techniques"],"prefix":"10.1007","author":[{"given":"Yue-Hong","family":"Sun","sequence":"first","affiliation":[]},{"given":"Dan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jian-Xiang","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Ke-Lian","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,6]]},"reference":[{"issue":"2","key":"81_CR1","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1109\/TEVC.2008.927706","volume":"13","author":"AK Qin","year":"2009","unstructured":"Qin, A.K., Huang, V.L., Suganthan, P.N.: Differential evolution algorithm with strategy adaptation for global numerical optimization. IEEE Trans. Evol. Comput. 13(2), 398\u2013417 (2009)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"3","key":"81_CR2","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1007\/978-3-540-72950-1_77","volume":"11","author":"D Karaboga","year":"2007","unstructured":"Karaboga, D., Basturk, B.: Artificial Bee Colony (ABC) optimization algorithm for solving constrained optimization problems. Found. Fuzzy Logic Soft Comput. 11(3), 789\u2013798 (2007)","journal-title":"Found. Fuzzy Logic Soft Comput."},{"issue":"2","key":"81_CR3","first-page":"789","volume":"5","author":"I Brajevic","year":"2011","unstructured":"Brajevic, I., Tuba, M., Subotic, M.: Performance of the improved Artificial Bee Colony algorithm on standard engineering constrained problems. Int. J. Math. Comput. Simul. 5(2), 789\u2013798 (2011)","journal-title":"Int. J. Math. Comput. Simul."},{"issue":"3","key":"81_CR4","doi-asserted-by":"publisher","first-page":"3021","DOI":"10.1016\/j.asoc.2010.12.001","volume":"11","author":"D Karaboga","year":"2011","unstructured":"Karaboga, D., Akay, B.: A modified Artificial Bee Colony (ABC) algorithm for constrained optimization problems. Soft. Comput. 11(3), 3021\u20133031 (2011)","journal-title":"Soft. Comput."},{"issue":"22","key":"81_CR5","first-page":"10943","volume":"218","author":"E Mezura-Montes","year":"2012","unstructured":"Mezura-Montes, E., Cetina-Domnguez, O.: Empirical analysis of a modified artificial bee colony for constrained numerical optimization. Appl. Math. Comput. 218(22), 10943\u201310973 (2012)","journal-title":"Appl. Math. Comput."},{"issue":"3\u20134","key":"81_CR6","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1007\/s00521-012-1285-7","volume":"24","author":"X Li","year":"2014","unstructured":"Li, X., Yin, M.: Self-adaptive constrained artificial bee colony for constrained numerical optimization. Neural Comput. Appl. 24(3\u20134), 723\u2013734 (2014)","journal-title":"Neural Comput. Appl."},{"issue":"7","key":"81_CR7","doi-asserted-by":"publisher","first-page":"1587","DOI":"10.1007\/s00521-015-1826-y","volume":"26","author":"I Brajevic","year":"2015","unstructured":"Brajevic, I.: Crossover-based Artificial Bee Colony algorithm for constrained optimization problems. Neural Comput. Appl. 26(7), 1587\u20131601 (2015)","journal-title":"Neural Comput. Appl."},{"issue":"3","key":"81_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13042-015-0357-2","volume":"8","author":"YS Liang","year":"2017","unstructured":"Liang, Y.S., Wan, Z.P., Fang, D.B.: An improved artificial bee colony algorithm for solving constrained optimization problems. Int. J. Mach. Learn. Cybern. 8(3), 1\u201316 (2017)","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"1","key":"81_CR9","doi-asserted-by":"publisher","first-page":"98","DOI":"10.11121\/ijocta.01.2017.00342","volume":"7","author":"B Akay","year":"2017","unstructured":"Akay, B., Karaboga, D.: Artificial bee colony algorithm variants on constrained optimization. Int. J. Optim. Control Theor. Appl. (IJOCTA) 7(1), 98\u2013111 (2017)","journal-title":"Int. J. Optim. Control Theor. Appl. (IJOCTA)"},{"issue":"2","key":"81_CR10","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/S0045-7825(99)00389-8","volume":"186","author":"K Deb","year":"2000","unstructured":"Deb, K.: An efficient constraint handling method for genetic algorithms. Comput. Methods Appl. Mech. Eng. 186(2), 311\u2013338 (2000)","journal-title":"Comput. Methods Appl. Mech. Eng."},{"key":"81_CR11","doi-asserted-by":"crossref","unstructured":"Tessema, B., Yen, G.G.: A self adaptive penalty function based algorithm for constrained optimization. In: IEEE Congress on Evolutionary Computation, CEC 2006, pp. 246\u2013253. IEEE (2006)","DOI":"10.1109\/CEC.2006.1688315"},{"issue":"3","key":"81_CR12","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/4235.873238","volume":"4","author":"TP Runarsson","year":"2000","unstructured":"Runarsson, T.P., Yao, X.: Stochastic ranking for constrained evolutionary optimization. IEEE Trans. Evol. Comput. 4(3), 284\u2013294 (2000)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"4","key":"81_CR13","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.ins.2012.01.017","volume":"222","author":"G Jia","year":"2013","unstructured":"Jia, G., Wang, Y., Cai, Z., et al.: An improved (\u03bb\u2009+\u2009\u00b5)-constrained differential evolution for constrained optimization. Inf. Sci. 222(4), 302\u2013322 (2013)","journal-title":"Inf. Sci."},{"key":"81_CR14","doi-asserted-by":"crossref","unstructured":"Takahama, T., Sakai, S.: Constrained optimization by the constrained differential evolution with gradient-based mutation and feasible elites. In: Conferences, CEC 2006, pp. 1\u20138. IEEE (2006)","DOI":"10.1109\/CEC.2006.1688283"},{"issue":"4","key":"81_CR15","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TEVC.2009.2033582","volume":"14","author":"R Mallipeddi","year":"2010","unstructured":"Mallipeddi, R., Suganthan, P.N.: Ensemble of constraint handling techniques. IEEE Trans. Evol. Comput. 14(4), 561\u2013579 (2010)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"1","key":"81_CR16","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/TEVC.2007.902851","volume":"12","author":"Y Wang","year":"2008","unstructured":"Wang, Y., Cai, Z., Zhou, Y., Zeng, W.: An adaptive tradeoff model for constrained evolutionary optimization. IEEE Trans. Evol. Comput. 12(1), 80\u201392 (2008)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"81_CR17","unstructured":"Karaboga, D.: An idea based on honey bee swarm for numerical optimization. Technical report, Engineering Faculty, Computer Engineering Department, Erciyes University (2005)"},{"key":"81_CR18","doi-asserted-by":"crossref","unstructured":"Trivedi, A., Sanyal, K., Verma, P., et al.: A unified differential evolution algorithm for constrained optimization problems. In: Evolutionary Computation, CEC 2017, pp. 1231\u20131238. IEEE (2017)","DOI":"10.1109\/CEC.2017.7969446"},{"key":"81_CR19","doi-asserted-by":"crossref","unstructured":"Polkov, R.: L-SHADE with competing strategies applied to constrained optimization. In: Evolutionary Computation, CEC 2017, pp. 1683\u20131689. IEEE (2017)","DOI":"10.1109\/CEC.2017.7969504"},{"key":"81_CR20","doi-asserted-by":"crossref","unstructured":"Tvrdik, J., Polakova, R.: A simple framework for constrained problems with ap- plication of L-SHADE44 and IDE. In: Evolutionary Computation, CEC 2017, pp. 1436\u20131443. IEEE (2017)","DOI":"10.1109\/CEC.2017.7969472"},{"key":"81_CR21","doi-asserted-by":"crossref","unstructured":"Ales, Z.: Adaptive constraint handling and Success History Differential Evolution for CEC 2017 Constrained Real-Parameter Optimization. In: Evolutionary Computation, CEC 2017, pp. 2443\u2013 2450. IEEE (2017)","DOI":"10.1109\/CEC.2017.7969601"},{"key":"81_CR22","unstructured":"Wu, G., Mallipedi, R., S, P.N.: Problem definitions and evaluation criteria for the CEC 2017 competition on constrained real-parameter optimization. Technical report, CEC 2017 (2017)"},{"key":"81_CR23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2809445","author":"Y Feng","year":"2018","unstructured":"Feng, Y., Wang, G.-G.: Binary moth search algorithm for discounted 0-1 knapsack problem. IEEE Access (2018). https:\/\/doi.org\/10.1109\/ACCESS.2018.2809445","journal-title":"IEEE Access"},{"key":"81_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2017.12.002","author":"RM Rizk-Allah","year":"2018","unstructured":"Rizk-Allah, R.M., El-Sehiemy, R.A., Wang, G.-G.: A novel parallel hurricane optimization algorithm for secure emission\/economic load dispatch solution. Appl. Soft Comput. (2018). https:\/\/doi.org\/10.1016\/j.asoc.2017.12.002","journal-title":"Appl. Soft Comput."},{"key":"81_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1806-8","author":"RM Rizk-Allah","year":"2017","unstructured":"Rizk-Allah, R.M., El-Sehiemy, R.A., Deb, S., Wang, G.-G.: A novel fruit fly framework for multi-objective shape design of tubular linear synchronous motor. J. Supercomput. (2017). https:\/\/doi.org\/10.1007\/s11227-016-1806-8","journal-title":"J. Supercomput."},{"issue":"1","key":"81_CR26","doi-asserted-by":"publisher","first-page":"88","DOI":"10.4028\/www.scientific.net\/AMM.203.88","volume":"203","author":"J-W Zhang","year":"2012","unstructured":"Zhang, J.-W., Wang, G.-G.: Image matching using a bat algorithm with mutation. Appl. Mech. Mater. 203(1), 88\u201393 (2012)","journal-title":"Appl. Mech. Mater."}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95930-6_81","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T15:39:01Z","timestamp":1751729941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-95930-6_81"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319959290","9783319959306"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95930-6_81","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"6 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ic-ic.tongji.edu.cn\/2018\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"LOD","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"632","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"275","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.46","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}