{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T06:11:42Z","timestamp":1763705502747},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"23","license":[{"start":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T00:00:00Z","timestamp":1536192000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s00500-018-3499-9","type":"journal-article","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T07:58:55Z","timestamp":1536220735000},"page":"7833-7846","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["External archive matching strategy for MOEA\/D"],"prefix":"10.1007","volume":"22","author":[{"given":"Feng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Heng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yixuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yaoyu","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Rao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,6]]},"reference":[{"issue":"3","key":"3499_CR1","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/s11554-016-0631-x","volume":"13","author":"MA Alsmirat","year":"2017","unstructured":"Alsmirat MA, Jararweh Y, Obaidat I, Gupta BB (2017) Automated wireless video surveillance: an evaluation framework. J Real Time Image Process 13(3):527\u2013546","journal-title":"J Real Time Image Process"},{"issue":"3","key":"3499_CR2","first-page":"35","volume":"5","author":"MA Alzain","year":"2015","unstructured":"Alzain MA, Li AS, Soh B, Pardede E (2015) Multi-cloud data management using shamir\u2019s secret sharing and quantum byzantine agreement schemes. Int J Cloud Appl Comput 5(3):35\u201352","journal-title":"Int J Cloud Appl Comput"},{"key":"3499_CR3","unstructured":"Beng KCT, Beng (2004) Multiobjective evolutionary algorithms and applications, vol 45, no 11. Springer, Berlin, pp 2281\u20132293"},{"issue":"3","key":"3499_CR4","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1016\/j.ejor.2006.08.008","volume":"181","author":"N Beume","year":"2007","unstructured":"Beume N, Naujoks B, Emmerich M (2007) Sms-emoa: multiobjective selection based on dominated hypervolume. Eur J Oper Res 181(3):1653\u20131669","journal-title":"Eur J Oper Res"},{"issue":"2","key":"3499_CR5","first-page":"197","volume":"54","author":"Y Cao","year":"2018","unstructured":"Cao Y, Zhou Z, Sun X, Gao C (2018) Coverless information hiding based on the molecular structure images of material. Comput Mater Contin 54(2):197\u2013207","journal-title":"Comput Mater Contin"},{"issue":"2","key":"3499_CR6","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s10710-005-6164-x","volume":"6","author":"CAC Coello","year":"2005","unstructured":"Coello CAC, Corts NC (2005) Solving multiobjective optimization problems using an artificial immune system. Genet Program Evolv Mach 6(2):163\u2013190","journal-title":"Genet Program Evolv Mach"},{"issue":"2","key":"3499_CR7","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1162\/106365601750190406","volume":"9","author":"K Deb","year":"2001","unstructured":"Deb K, Beyer HG (2001) Self-adaptive genetic algorithms with simulated binary crossover. Evol Comput 9(2):197\u2013221","journal-title":"Evol Comput"},{"key":"3499_CR8","volume-title":"Multi-objective optimization using evolutionary algorithms","author":"K Deb","year":"2001","unstructured":"Deb K, Kalyanmoy D (2001) Multi-objective optimization using evolutionary algorithms. Wiley, Hoboken"},{"issue":"2","key":"3499_CR9","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb K, Pratap A, Agarwal S, Meyarivan T (2002) A fast and elitist multiobjective genetic algorithm: Nsga-ii. IEEE Trans Evol Comput 6(2):182\u2013197","journal-title":"IEEE Trans Evol Comput"},{"key":"3499_CR10","doi-asserted-by":"crossref","unstructured":"Deb K, Thiele L, Laumanns M, Zitzler E (2005) Scalable test problems for evolutionary multiobjective optimization. In: Evolutionary multiobjective optimization, pp 105\u2013145","DOI":"10.1007\/1-84628-137-7_6"},{"key":"3499_CR11","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"BB Gupta","year":"2016","unstructured":"Gupta BB, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, Hershey"},{"issue":"9","key":"3499_CR12","doi-asserted-by":"publisher","first-page":"3537","DOI":"10.1007\/s00500-015-1710-9","volume":"20","author":"P He","year":"2016","unstructured":"He P, Deng Z, Wang H, Liu Z (2016) Model approach to grammatical evolution: theory and case study. Soft Comput 20(9):3537\u20133548","journal-title":"Soft Comput"},{"key":"3499_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-0348-8280-4","volume-title":"Nonlinear multiobjective optimization","author":"C Hillermeier","year":"2001","unstructured":"Hillermeier C (2001) Nonlinear multiobjective optimization. Birkh\u00e4ser Verlag, Basel"},{"issue":"2","key":"3499_CR14","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/s00500-016-2364-y","volume":"22","author":"Y Huang","year":"2016","unstructured":"Huang Y, Li W, Liang Z, Xue Y, Wang X (2016) Efficient business process consolidation: combining topic features with structure matching. Soft Comput 22(2):645\u2013657","journal-title":"Soft Comput"},{"key":"3499_CR15","doi-asserted-by":"crossref","unstructured":"Ishibuchi H, Sakane Y, Tsukamoto N, Nojima Y (2009) Effects of using two neighborhood structures on the performance of cellular evolutionary algorithms for many-objective optimization. In: Eleventh conference on congress on evolutionary computation, pp 2508\u20132515","DOI":"10.1109\/CEC.2009.4983256"},{"key":"3499_CR16","first-page":"459","volume-title":"Lecture Notes in Computer Science","author":"Hisao Ishibuchi","year":"2013","unstructured":"Ishibuchi H, Akedo N, Nojima Y (2013) Relation between neighborhood size and moea\/d performance on manyobjective problems. In: International conference on evolutionary multi-criterion optimization, pp 459\u2013474"},{"key":"3499_CR17","doi-asserted-by":"publisher","first-page":"18909","DOI":"10.1109\/ACCESS.2017.2751105","volume":"5","author":"X Lai","year":"2017","unstructured":"Lai X, Zou W, Xie D, Li X, Fan L (2017) DF relaying networks with randomly distributed interferers. IEEE Access 5:18909\u201318917","journal-title":"IEEE Access"},{"issue":"2","key":"3499_CR19","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1109\/TEVC.2008.925798","volume":"13","author":"H Li","year":"2009","unstructured":"Li H, Zhang Q (2009) Multiobjective optimization problems with complicated pareto sets, MOEA\/D and NSGA-II. IEEE Trans Evol Comput 13(2):284\u2013302","journal-title":"IEEE Trans Evol Comput"},{"key":"3499_CR20","doi-asserted-by":"crossref","unstructured":"Li H, Ding M, Deng J, Zhang Q (2015) On the use of random weights in MOEA\/D. In: IEEE Congress on Evolutionary Computation (CEC), pp 978\u2013985","DOI":"10.1109\/CEC.2015.7256996"},{"issue":"12","key":"3499_CR21","first-page":"1525","volume":"32","author":"Y Li","year":"2016","unstructured":"Li Y, Peng Z, Liang D, Chang H, Cai Z (2016) Facial age estimation by using stacked feature composition and selection. Vis Comput Int J Comput Graph\u00a032(12):1525\u20131536","journal-title":"Vis Comput Int J Comput Graph"},{"issue":"1","key":"3499_CR22","first-page":"1","volume":"21","author":"P Li","year":"2016","unstructured":"Li P, Li J, Huang Z, Li T, Gao Cz, Chen WB, Chen K (2017a) Privacy-preserving outsourced classification in cloud computing. Cluster Comput 21(1):1\u201310","journal-title":"Cluster Comput"},{"key":"3499_CR23","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.future.2017.02.006","volume":"74","author":"P Li","year":"2017","unstructured":"Li P, Li J, Huang Z, Li T, Cz Gao, Yiu SM, Chen K (2017b) Multi-key privacy-preserving deep learning in cloud computing. Future Gener Comput Syst 74:76\u201385","journal-title":"Future Gener Comput Syst"},{"issue":"19","key":"3499_CR24","doi-asserted-by":"publisher","first-page":"5717","DOI":"10.1007\/s00500-016-2149-3","volume":"21","author":"W Li","year":"2017","unstructured":"Li W, Li K, Huang Y, Yang S, Yang L (2017c) A eaand aca-based qos multicast routing algorithm with multiple constraints for ad hoc networks. Soft Comput 21(19):5717\u20135727","journal-title":"Soft Comput"},{"key":"3499_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2833-y","author":"W Li","year":"2017","unstructured":"Li W, Li S, Chen Z, Zhong L, Ouyang C (2017d) Self feedback differential evolution adapting to fitness landscape characteristics. Soft Comput. \n                    https:\/\/doi.org\/10.1007\/s00500-017-2833-y","journal-title":"Soft Comput"},{"issue":"3","key":"3499_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-017-5072-4","volume":"77","author":"W Li","year":"2018","unstructured":"Li W, Li K, Guo L, Huang Y, Xue Y (2018a) A new validity index adapted to fuzzy clustering algorithm. Multimed Tools Appl 77(3):1\u201323","journal-title":"Multimed Tools Appl"},{"key":"3499_CR27","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.patcog.2017.10.015","volume":"75","author":"Y Li","year":"2018","unstructured":"Li Y, Wang G, Nie L, Wang Q, Tan W (2018b) Distance metric optimization driven convolutional neural network for age invariant face recognition. Pattern Recognit 75:51\u201362","journal-title":"Pattern Recognit"},{"issue":"C","key":"3499_CR28","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1016\/j.ins.2017.02.054","volume":"397","author":"W Lin","year":"2017","unstructured":"Lin W, Xu S, He L, Li J (2017a) Multi-resource scheduling and power simulation for cloud computing. Inf Sci 397(C):168\u2013186","journal-title":"Inf Sci"},{"issue":"5","key":"3499_CR29","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1007\/s00500-015-1862-7","volume":"21","author":"W Lin","year":"2017","unstructured":"Lin W, Xu SY, Li J, Xu L, Peng Z (2017b) Design and theoretical analysis of virtual machine placement algorithm based on peak workload characteristics. Soft Comput 21(5):1301\u20131314","journal-title":"Soft Comput"},{"issue":"3","key":"3499_CR30","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1109\/TEVC.2013.2281533","volume":"18","author":"HL Liu","year":"2014","unstructured":"Liu HL, Gu F, Zhang Q (2014) Decomposition of a multiobjective optimization problem into a number of simple multiobjective subproblems. IEEE Trans Evol Comput 18(3):450\u2013455","journal-title":"IEEE Trans Evol Comput"},{"issue":"2","key":"3499_CR31","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1162\/EVCO_a_00109","volume":"22","author":"Y Qi","year":"2014","unstructured":"Qi Y, Ma X, Liu F, Jiao L, Sun J, Wu J (2014) MOEA\/D with adaptive weight adjustment. Evol Comput 22(2):231\u2013264","journal-title":"Evol Comput"},{"issue":"6","key":"3499_CR32","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1007\/s10732-015-9301-6","volume":"21","author":"H Sato","year":"2015","unstructured":"Sato H (2015) Analysis of inverted pbi and comparison with other scalarizing functions in decomposition based moeas. J Heuristics 21(6):819\u2013849","journal-title":"J Heuristics"},{"issue":"4","key":"3499_CR33","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1109\/TEVC.2011.2161872","volume":"16","author":"O Schutze","year":"2012","unstructured":"Schutze O, Esquivel X, Lara A, Coello CAC (2012) Using the averaged hausdorff distance as a performance measure in evolutionary multiobjective optimization. IEEE Trans Evol Comput 16(4):504\u2013522","journal-title":"IEEE Trans Evol Comput"},{"issue":"3","key":"3499_CR34","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1162\/evco.1994.2.3.221","volume":"2","author":"N Srinivas","year":"2014","unstructured":"Srinivas N, Deb K (2014) Muiltiobjective optimization using nondominated sorting in genetic algorithms. Evol Comput 2(3):221\u2013248","journal-title":"Evol Comput"},{"issue":"12","key":"3499_CR35","doi-asserted-by":"publisher","first-page":"3193","DOI":"10.1007\/s00500-015-2003-z","volume":"21","author":"F Wang","year":"2017","unstructured":"Wang F, Zhang Y, Rao Q, Li K, Zhang H (2017a) Exploring mutual information-based sentimental analysis with kernel-based extreme learning machine for stock prediction. Soft Comput 21(12):3193\u20133205","journal-title":"Soft Comput"},{"key":"3499_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10766-015-0381-6","volume":"45","author":"Y Wang","year":"2017","unstructured":"Wang Y, Li K, Li K (2017b) Partition scheduling on heterogeneous multicore processors for multi-dimensional loops applications. Int J Parallel Program 45:1\u201326","journal-title":"Int J Parallel Program"},{"issue":"2","key":"3499_CR37","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1109\/TCYB.2015.2403849","volume":"46","author":"Z Wang","year":"2017","unstructured":"Wang Z, Zhang Q, Zhou A, Gong M, Jiao L (2017c) Adaptive replacement strategies for MOEA\/D. IEEE Trans Cybern 46(2):474\u2013486","journal-title":"IEEE Trans Cybern"},{"key":"3499_CR38","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.ins.2018.01.027","volume":"436\u2013437","author":"F Wang","year":"2018","unstructured":"Wang F, Zhang H, Li K, Lin Z, Yang J, Shen XL (2018a) A hybrid particle swarm optimization algorithm using adaptive learning strategy. Inf Sci 436\u2013437:162\u2013177","journal-title":"Inf Sci"},{"key":"3499_CR39","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.ins.2018.01.041","volume":"438","author":"H Wang","year":"2018","unstructured":"Wang H, Wang W, Cui Z, Zhou X, Zhao J, Li Y (2018b) A new dynamic firefly algorithm for demand estimation of water resources. Inf Sci 438:95\u2013106","journal-title":"Inf Sci"},{"key":"3499_CR40","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.asoc.2017.07.034","volume":"61","author":"H Wu","year":"2017","unstructured":"Wu H, Kuang L, Wang F, Rao Q, Gong M, Li Y (2017) A multiobjective box-covering algorithm for fractal modularity on complex networks. Appl Soft Comput 61:294\u2013313","journal-title":"Appl Soft Comput"},{"key":"3499_CR41","doi-asserted-by":"publisher","first-page":"5596","DOI":"10.1109\/ACCESS.2017.2776953","volume":"6","author":"D Xie","year":"2018","unstructured":"Xie D, Lai X, Lei X, Fan L (2018) Cognitive multiuser energy harvesting decode-and-forward relaying system with direct links. IEEE Access 6:5596\u20135606","journal-title":"IEEE Access"},{"issue":"3","key":"3499_CR42","first-page":"357","volume":"53","author":"C Yuan","year":"2017","unstructured":"Yuan C, Li X, Wu QMJ, Li J, Sun X (2017) Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis. Comput Mater Contin 53(3):357\u2013371","journal-title":"Comput Mater Contin"},{"issue":"6","key":"3499_CR43","doi-asserted-by":"publisher","first-page":"712","DOI":"10.1109\/TEVC.2007.892759","volume":"11","author":"Q Zhang","year":"2007","unstructured":"Zhang Q, Li H (2007) MOEA\/D: a multiobjective evolutionary algorithm based on decomposition. IEEE Trans Evol Comput 11(6):712\u2013731","journal-title":"IEEE Trans Evol Comput"},{"key":"3499_CR44","volume-title":"Multiobjective optimization test instances for the CEC 2009 special session and competition","author":"Q Zhang","year":"2008","unstructured":"Zhang Q, Zhou A, Zhao S, Suganthan PN, Liu W, Tiwari S (2008) Multiobjective optimization test instances for the CEC 2009 special session and competition. University of Essex, Colchester"},{"issue":"5","key":"3499_CR45","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1109\/TEVC.2016.2521868","volume":"20","author":"H Zhang","year":"2016","unstructured":"Zhang H, Zhou A, Song S, Zhang Q, Gao XZ, Zhang J (2016) A self-organizing multiobjective evolutionary algorithm. IEEE Trans Evol Comput 20(5):792\u2013806","journal-title":"IEEE Trans Evol Comput"},{"key":"3499_CR46","doi-asserted-by":"publisher","first-page":"16904","DOI":"10.1109\/ACCESS.2017.2741221","volume":"5","author":"S Zhang","year":"2017","unstructured":"Zhang S, Yang Z, Xing X, Gao Y, Xie D, Wong HS (2017) Generalized pair-counting similarity measures for clustering and cluster ensembles. IEEE Access 5:16904\u201316918","journal-title":"IEEE Access"},{"key":"3499_CR47","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0707-5","author":"J Zhang","year":"2018","unstructured":"Zhou J, Wang F, Xu J, Yan Y, Zhu H (2018) A novel character segmentation method for serial number on banknotes with complex background. J Ambient Intell Humaniz Comput. \n                    https:\/\/doi.org\/10.1007\/s12652-018-0707-5","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"3499_CR48","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1162\/106365600568202","volume":"8","author":"E Zitzler","year":"2000","unstructured":"Zitzler E, Deb K, Thiele L (2000) Comparison of multiobjective evolutionary algorithms: empirical results. Evol Comput 8(2):173\u2013195","journal-title":"Evol Comput"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3499-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3499-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3499-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T23:06:58Z","timestamp":1567724818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3499-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,6]]},"references-count":47,"journal-issue":{"issue":"23","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["3499"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3499-9","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,6]]},"assertion":[{"value":"6 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}