{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:43:19Z","timestamp":1743093799232,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662490136"},{"type":"electronic","value":"9783662490143"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-49014-3_36","type":"book-chapter","created":{"date-parts":[[2015,12,23]],"date-time":"2015-12-23T09:41:36Z","timestamp":1450863696000},"page":"400-410","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Self-adaptive Multiple Evolution Algorithms for Image Segmentation Using Multilevel Thresholding"],"prefix":"10.1007","author":[{"given":"Liling","family":"Sun","sequence":"first","affiliation":[]},{"given":"Jingtao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Na","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Qiaocui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hanning","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,24]]},"reference":[{"issue":"1","key":"36_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TPAMI.1980.4766964","volume":"PAMI\u20132","author":"JC Bexdek","year":"1980","unstructured":"Bexdek, J.C.: A convergence theorem for the fuzzy isodara clustering algorithms. IEEE Trans. Pattern Anal. Mach. Intell. PAMI\u20132(1), 1\u20138 (1980)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Comaniciu, D., Meer, P.: Mean shift analysis and applications. In: Proceedings of 7th International Conference on Computer Vision, pp. 1197\u20131203, Kerkyra (1999)","DOI":"10.1109\/ICCV.1999.790416"},{"issue":"7","key":"36_CR3","doi-asserted-by":"publisher","first-page":"629","DOI":"10.1109\/34.56205","volume":"12","author":"P Perona","year":"1990","unstructured":"Perona, P., Malik, J.: Scale-space and edge detection using anisotropic diffusion. IEEE Trans. Pattern Anal. Mach. Intell. 12(7), 629\u2013639 (1990)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"36_CR4","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.swevo.2013.02.001","volume":"11","author":"S Agrawal","year":"2013","unstructured":"Agrawal, S., Panda, R., Bhuyan, S., Panigrahi, B.K.: Tsallis: entropy based optimal multi-level thresholding using cuckoo search algorithm. Swarm Evol. Comput. 11, 16\u201330 (2013)","journal-title":"Swarm Evol. Comput."},{"issue":"1","key":"36_CR5","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1117\/1.1631315","volume":"13","author":"M Sezgin","year":"2004","unstructured":"Sezgin, M., Sankur, B.: Survey over image thresholding techniques and quantitative performance evaluation. J. Electron. Imaging 13(1), 146\u2013165 (2004)","journal-title":"J. Electron. Imaging"},{"issue":"2","key":"36_CR6","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0734-189X(88)90022-9","volume":"41","author":"PK Sahoo","year":"1988","unstructured":"Sahoo, P.K., Soltani, S., Wong, A.K.C.: A survey of thresholding techniques. Comput. Vis. Graph Image Process. 41(2), 233\u2013260 (1988)","journal-title":"Comput. Vis. Graph Image Process."},{"issue":"4","key":"36_CR7","first-page":"290","volume":"59","author":"H Gao","year":"2010","unstructured":"Gao, H., Xu, W., Sun, J., Tang, Y.: Multilevel thresholding for image segmentation through an improved quantum-behaved particle swarm algorithm. IEEE T. Instrum. Measur. 59(4), 290\u2013301 (2010)","journal-title":"IEEE T. Instrum. Measur."},{"issue":"2","key":"36_CR8","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1109\/TEVC.2008.924428","volume":"13","author":"JA Vrugt","year":"2009","unstructured":"Vrugt, J.A., Robinson, B.A., Hyman, J.M.: Self-adaptive multimethod search for global optimization in real-parameter spaces. IEEE Trans. Evol. Comput. 13(2), 243\u2013259 (2009)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"1","key":"36_CR9","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/4235.585893","volume":"1","author":"DH Wolpert","year":"1997","unstructured":"Wolpert, D.H., Macready, W.G.: No free lunch theorems for optimization. IEEE Trans. Evol. Comput. 1(1), 67\u201382 (1997)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"36_CR10","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1142\/S0219525907001070","volume":"10","author":"J Kennedy","year":"2007","unstructured":"Kennedy, J.: The particle swarm as collaborative sampling of the search space. Adv. Complex Syst. 10, 191\u2013213 (2007)","journal-title":"Adv. Complex Syst."},{"key":"36_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-30976-2_9","volume-title":"Advances in Swarm Intelligence","author":"W Li","year":"2012","unstructured":"Li, W., Zhou, Q., Zhu, Y., Pan, F.: An improved MOPSO with a crowding distance based external archive maintenance strategy. In: Tan, Y., Shi, Y., Ji, Z. (eds.) ICSI 2012, Part I. LNCS, vol. 7331, pp. 74\u201382. Springer, Heidelberg (2012)"},{"issue":"3","key":"36_CR12","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2010.04.004","volume":"34","author":"HN Chen","year":"2011","unstructured":"Chen, H.N., Zhu, Y.L., Hu, K.Y., Ku, T.: RFID network planning using a multi-swarm optimizer. J. Netw. Comput. Appl. 34(3), 88\u2013901 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"36_CR13","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.ins.2011.09.005","volume":"182","author":"M El-Abd","year":"2012","unstructured":"El-Abd, M.: Performance assessment of foraging algorithms vs. evolutionary algorithms. Inf. Sci. 182(1), 243\u2013263 (2012)","journal-title":"Inf. Sci."},{"issue":"2","key":"36_CR14","doi-asserted-by":"publisher","first-page":"738","DOI":"10.1016\/j.asoc.2008.09.009","volume":"9","author":"JH Kmpf","year":"2009","unstructured":"Kmpf, J.H., Robinson, D.: A hybrid CMA-ES and HDE optimization algorithm with application to solar energy potential. Appl. Soft Comput. 9(2), 738\u2013745 (2009)","journal-title":"Appl. Soft Comput."},{"issue":"4","key":"36_CR15","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/s10462-011-9276-0","volume":"39","author":"P Civicioglu","year":"2013","unstructured":"Civicioglu, P., Besdok, E.: A conceptual comparison of the cuckoo-search, particle swarm optimization, differential evolution and artificial bee colony algorithms. Artif. Intell. Rev. 39(4), 315\u2013346 (2013)","journal-title":"Artif. Intell. Rev."},{"issue":"6","key":"36_CR16","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1109\/TEVC.2008.919004","volume":"12","author":"D Simon","year":"2008","unstructured":"Simon, D.: Biogeography-based optimization. IEEE Trans. Evol. Comput. 12(6), 702\u2013713 (2008)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"36_CR17","unstructured":"Suganthan, P.N., Hansen, N., Liang, J.J., Deb, K., Chen, Y.P., Auger, A., Tiwari, S.: Problem definitions and evaluation criteria for the CEC 2005 special session on real-parameter optimization. Technical report, Nanyang Technological University, Singapore and Kan-GAL Report Number 2005005 (Kanpur Genetic Algorithms Laboratory, IIT Kanpur), pp. 1\u201350 (2005)"}],"container-title":["Communications in Computer and Information Science","Bio-Inspired Computing -- Theories and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-49014-3_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:16:51Z","timestamp":1559348211000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-49014-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662490136","9783662490143"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-49014-3_36","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"24 December 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}