{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T14:50:31Z","timestamp":1774277431757,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2014,11,18]],"date-time":"2014-11-18T00:00:00Z","timestamp":1416268800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s00500-014-1517-0","type":"journal-article","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T16:42:29Z","timestamp":1416588149000},"page":"465-494","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Adaptive direction information in differential evolution for numerical optimization"],"prefix":"10.1007","volume":"20","author":[{"given":"Yiqiao","family":"Cai","sequence":"first","affiliation":[]},{"given":"Jiahai","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yonghong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,18]]},"reference":[{"key":"1517_CR1","unstructured":"Alcal\u00e1-Fdez J, S\u00e1nchez L, Garc\u00eda S (2014) KEEL: a software tool to assess evolutionary algorithms to data mining problems. Available Online: http:\/\/www.keel.es\/"},{"key":"1517_CR2","doi-asserted-by":"crossref","unstructured":"Auer P, Cesa-Bianchi N, Fischer P (2002) Finite-time analysis of the multiarmed bandit problem. Mach Learn 47(2\u20133):235\u2013256","DOI":"10.1023\/A:1013689704352"},{"key":"1517_CR3","doi-asserted-by":"crossref","unstructured":"Brest J, Greiner S, Boskovic B, Mernik M, Zumer V (2006) Selfadapting control parameters in differential evolution: a comparative study on numerical benchmark problems. IEEE Trans Evol Comput 10(6):646\u2013657","DOI":"10.1109\/TEVC.2006.872133"},{"issue":"2","key":"1517_CR4","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/s00500-011-0744-x","volume":"16","author":"Y Cai","year":"2012","unstructured":"Cai Y, Wang J, Yin J (2012) Learning-enhanced differential evolution for numerical optimization. Soft Comput 16(2):303\u2013330","journal-title":"Soft Comput"},{"issue":"6","key":"1517_CR5","doi-asserted-by":"crossref","first-page":"2202","DOI":"10.1109\/TCYB.2013.2245501","volume":"43","author":"Y Cai","year":"2013","unstructured":"Cai Y, Wang J (2013) Differential evolution with neighborhood and direction information for numerical optimization. IEEE Trans Cybern 43(6):2202\u20132215","journal-title":"IEEE Trans Cybern"},{"key":"1517_CR6","doi-asserted-by":"crossref","unstructured":"Cai Y, Du J (2014) Enhanced differential evolution with adaptive direction information. In: Proceedings of the 2014 IEEE congress on evolutionary computation (CEC 2014), Beijing, pp 305\u2013312","DOI":"10.1109\/CEC.2014.6900228"},{"key":"1517_CR7","doi-asserted-by":"crossref","unstructured":"Da Costa L, Fialho A, Schoenauer M, Sebag M (2008) Adaptive operator selection with dynamic multi-armed bandits. In: Keijzer M et al (eds) GECCO\u201908: Proceedings of 2008 annual conference on genetic and evolutionary computation. ACM Press, New York, pp 913\u2013920","DOI":"10.1145\/1389095.1389272"},{"issue":"1","key":"1517_CR8","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TEVC.2010.2059031","volume":"15","author":"S Das","year":"2011","unstructured":"Das S, Suganthan PN (2011) Differential evolution: a survey of the state-of-the-art. IEEE Trans Evol Comput 15(1):4\u201331","journal-title":"IEEE Trans Evol Comput"},{"key":"1517_CR9","unstructured":"Davis L (1989) Adapting operator probabilities in genetic algorithms. In: Proceedings of ICGA, pp 61\u201369"},{"key":"1517_CR10","doi-asserted-by":"crossref","unstructured":"Dorronsoro B, Bouvry P (2011) Improving classical and decentralized differential dvolution with new mutation operator and population topologies. IEEE Trans Evol Comput 15(1):67\u201398","DOI":"10.1109\/TEVC.2010.2081369"},{"key":"1517_CR11","doi-asserted-by":"crossref","unstructured":"Eiben A, Michalewicz Z, Schoenauer M, Smith J (2007) Parameter control in evolutionary algorithms. In: Lobo F, Lima C, Michalewicz Z (eds) Parameter setting in evolutionary algorithms. Studies in computational intelligence, vol 54. Springer, Berlin, pp 19\u201346","DOI":"10.1007\/978-3-540-69432-8_2"},{"key":"1517_CR12","doi-asserted-by":"crossref","unstructured":"Feoktistov V, Janaqi S (2004) Generalization of the strategies in differential evolution. In: Proceedings of parallel distribution process symposium, pp 165\u2013170","DOI":"10.1109\/IPDPS.2004.1303160"},{"key":"1517_CR13","unstructured":"Fialho A (2010) Adaptive operator selection for optimization. Ph.D. dissertation, Universit\u00e9 Paris-Sud XI, Orsay"},{"key":"1517_CR14","doi-asserted-by":"crossref","unstructured":"Fialho A, Ros R, Schoenauer M, Sebag M (2010) Comparison-based adaptive strategy selection in differential evolution. In: Schaefer R et al (eds) PPSN XI: Proceedings of 11th international conference on parallel problem solving from nature. Springer, Berlin, pp 194\u2013203","DOI":"10.1007\/978-3-642-15844-5_20"},{"key":"1517_CR15","doi-asserted-by":"crossref","unstructured":"Fialho A, Schoenauer M, Sebag M (2010) Toward comparison-based adaptive operator selection. In: Branke et al (ed) GECCO\u201910: Proceedings of 2010 annual conference on genetic and evolutionary computation. ACM Press, New York, pp 767\u2013774","DOI":"10.1145\/1830483.1830619"},{"issue":"10","key":"1517_CR16","doi-asserted-by":"crossref","first-page":"959","DOI":"10.1007\/s00500-008-0392-y","volume":"13","author":"S Garc\u00eda","year":"2009","unstructured":"Garc\u00eda S, Fern\u00e1ndez A, Luengo J, Herrera F (2009) A study of statistical techniques and performance measures for genetics-based machine learning: accuracy and interpretability. Soft Comput 13(10):959\u2013977","journal-title":"Soft Comput"},{"key":"1517_CR17","doi-asserted-by":"crossref","unstructured":"Goldberg DE (1990) Probability matching, the magnitude of reinforcement, and classifier system bidding. Mach Learn 5:407\u2013425","DOI":"10.1007\/BF00116878"},{"key":"1517_CR18","doi-asserted-by":"crossref","unstructured":"Gong W, Fialho A, Cai Z (2010) Adaptive strategy selection in differential evolution. In: Branke J et al (eds) GECCO10: Proceedings of 2010 annual conference on genetic and evolutionary computation. ACM Press, New York, pp 409\u2013416","DOI":"10.1145\/1830483.1830559"},{"key":"1517_CR19","doi-asserted-by":"crossref","unstructured":"Islam SM, Das S, Ghosh S, Roy S, Suganthan PN (2012) An adaptive differential evolution algorithm with novel mutation and crossover strategies for global numerical optimization. IEEE Trans Syst Man Cybern B Cybern 42(2):482\u2013500","DOI":"10.1109\/TSMCB.2011.2167966"},{"key":"1517_CR20","unstructured":"Julstrom BA (1995) What have you done for me lately? Adapting operator probabilities in a steady-state genetic algorithms. In: Proceedings of ICGA. Morgan Kaufmann, pp 81\u201387"},{"issue":"9","key":"1517_CR21","doi-asserted-by":"crossref","first-page":"1681","DOI":"10.1016\/j.ins.2010.01.008","volume":"180","author":"J Li","year":"2010","unstructured":"Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180(9):1681\u20131689","journal-title":"Inf Sci"},{"key":"1517_CR22","doi-asserted-by":"crossref","unstructured":"Li J, Chen X, Li M, Li P, Lee P, Lou W (2014a) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615\u20131625","DOI":"10.1109\/TPDS.2013.284"},{"key":"1517_CR23","doi-asserted-by":"crossref","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2014b) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201\u20132210","DOI":"10.1109\/TPDS.2013.271"},{"key":"1517_CR24","doi-asserted-by":"crossref","unstructured":"Li K, Fialho A, Kwong S, Zhang Q (2014c) Adaptive operator selection with bandits for multiobjective evolutionary algorithm based decomposition. IEEE Trans Evol Comput 18(1):114\u2013130","DOI":"10.1109\/TEVC.2013.2239648"},{"key":"1517_CR25","doi-asserted-by":"crossref","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proceeding of the 29th IEEE international conference on computer communications (INFOCOM 2010). IEEE Press, New York, pp 441\u2013445","DOI":"10.1109\/INFCOM.2010.5462196"},{"issue":"1","key":"1517_CR26","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/s10462-009-9137-2","volume":"33","author":"F Neri","year":"2010","unstructured":"Neri F, Tirronen V (2010) Recent advances in differential evolution: a survey and experimental analysis. Artif Intell Rev 33(1):61\u2013106","journal-title":"Artif Intell Rev"},{"key":"1517_CR27","doi-asserted-by":"crossref","unstructured":"Noman N, Iba H (2008) Accelerating differential evolution using an adaptive local search. IEEE Trans Evol Comput 12(1):107\u2013125","DOI":"10.1109\/TEVC.2007.895272"},{"key":"1517_CR28","doi-asserted-by":"crossref","unstructured":"Plagianakos V, Tasoulis D, Vrahatis M (2008) A review of major application areas of differential evolution. In: Chakraborty U (ed) Advances in Differential Evolution. Springer, Berlin, pp 197\u2013238","DOI":"10.1007\/978-3-540-68830-3_8"},{"key":"1517_CR29","volume-title":"Differential evolution: a practical approach to gobal optimization","author":"KV Price","year":"2005","unstructured":"Price KV, Storn RM, Lampinen JA (2005) Differential evolution: a practical approach to gobal optimization. Springer, Secaucus"},{"issue":"2","key":"1517_CR30","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1109\/TEVC.2008.927706","volume":"13","author":"A Qin","year":"2009","unstructured":"Qin A, Huang V, Suganthan PN (2009) Differential evolution algorithm with strategy adaptation for global numerical optimization. IEEE Trans Evol Comput 13(2):398\u2013417","journal-title":"IEEE Trans Evol Comput"},{"key":"1517_CR31","doi-asserted-by":"crossref","unstructured":"Rahnamayan S, Tizhoosh HR, Salama MMA (2008) Oppositionbased differential evolution. IEEE Trans Evol Comput 12(1):64\u201379","DOI":"10.1109\/TEVC.2007.894200"},{"key":"1517_CR32","doi-asserted-by":"crossref","unstructured":"Sarker R, Elsayed S,Ray T (2014) Differential evolution with dynamic parameters selection for optimization problems. IEEE Trans on Evol Comput 18(5):689\u2013707","DOI":"10.1109\/TEVC.2013.2281528"},{"issue":"4","key":"1517_CR33","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1023\/A:1008202821328","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn R, Price K (1997) Differential evolution: a simple and efficient heuristic for global optimization over continuous spaces. J Global Optim 11(4):341\u2013359","journal-title":"J Global Optim"},{"key":"1517_CR34","unstructured":"Storn R, Price K (2014) Differential evolution homepage. Available Online: http:\/\/www.icsi.berkeley.edu\/storn\/code.html"},{"key":"1517_CR35","unstructured":"Suganthan PN, Hansen N, Liang JJ, Deb K, Chen YP, Auger A, Tiwari S (2005) Problem definitions and evaluation criteria for the CEC 2005 special session on real-parameter optimization. Nanyang Technological University, Singapore, KanGAL Report no. 2005005, IIT Kanpur, India"},{"key":"1517_CR36","doi-asserted-by":"crossref","unstructured":"Thierens D (2005) An adaptive pursuit strategy for allocating operator probabilities. In: Beyer HG (ed) GECCO\u201905: Proceedings of 2005 annual conference on genetic and evolutionary computation. ACM Press, New York, pp 1539\u20131546","DOI":"10.1145\/1068009.1068251"},{"issue":"2","key":"1517_CR37","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.cor.2011.05.008","volume":"39","author":"L Wang","year":"2010","unstructured":"Wang L, Fang C (2010) An effective estimation of distribution algorithm for the multi-mode resource-constrained project scheduling problem. Comput Oper Res 39(2):449\u2013460","journal-title":"Comput Oper Res"},{"key":"1517_CR38","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1007\/s00500-011-0780-6","volume":"16","author":"J Wang","year":"2012","unstructured":"Wang J, Zhou Y, Cai Y, Yin J (2012) Learnable tabu search guided by estimation of distribution for maximum diversity problems. Soft Comput 16:711\u2013728","journal-title":"Soft Comput"},{"key":"1517_CR39","doi-asserted-by":"crossref","unstructured":"Whitacre J, Pham T, Sarker R (2006) Use of statistical outlier detection method in adaptive evolutionary algorithms. In: GECCO\u201906: Proceedings of 2006 annual conference on genetic and evolutionary computation. ACM Press, New York, pp 1345\u20131352","DOI":"10.1145\/1143997.1144205"},{"issue":"5","key":"1517_CR40","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1109\/TSMCC.2011.2160941","volume":"42","author":"B Xin","year":"2012","unstructured":"Xin B, Chen J, Zhang J et al (2012) Hybridizing differential evolution and particle swarm optimization to design powerful optimizers: a review and taxonomy. IEEE Trans Syst Man Cybern Part C Appl Rev 42(5):744\u2013767","journal-title":"IEEE Trans Syst Man Cybern Part C Appl Rev"},{"key":"1517_CR41","doi-asserted-by":"crossref","unstructured":"Xu L, Shing T (2010) Self-organizing potential field network: a new optimization algorithm. IEEE Trans Neural Netw 21(9):1482\u20131495","DOI":"10.1109\/TNN.2010.2047264"},{"key":"1517_CR42","doi-asserted-by":"crossref","unstructured":"Yu W, Shen M, Chen W et al (2014) Differential evolution with two-level parameter adaptation. IEEE Trans Cybern 44(7):1080\u20131099","DOI":"10.1109\/TCYB.2013.2279211"},{"key":"1517_CR43","doi-asserted-by":"crossref","unstructured":"Zhan ZH, Zhang J, Li Y, Chung HSH (2009) Adaptive particle swarm optimization. IEEE Trans Syst Man Cybern B Cybern 39(6):1362\u20131381","DOI":"10.1109\/TSMCB.2009.2015956"},{"issue":"5","key":"1517_CR44","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1109\/TEVC.2009.2014613","volume":"13","author":"J Zhang","year":"2009","unstructured":"Zhang J, Sanderson A (2009) JADE: adaptive differential evolution with optional external archive. IEEE Trans Evol Comput 13(5):945\u2013958","journal-title":"IEEE Trans Evol Comput"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-014-1517-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-014-1517-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-014-1517-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,17]],"date-time":"2019-08-17T18:09:21Z","timestamp":1566065361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-014-1517-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,18]]},"references-count":44,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["1517"],"URL":"https:\/\/doi.org\/10.1007\/s00500-014-1517-0","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,11,18]]}}}