{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T19:28:44Z","timestamp":1773775724723,"version":"3.50.1"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T00:00:00Z","timestamp":1569628800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T00:00:00Z","timestamp":1569628800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["51479017"],"award-info":[{"award-number":["51479017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["017180226"],"award-info":[{"award-number":["017180226"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s00500-019-04388-3","type":"journal-article","created":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T11:03:17Z","timestamp":1569668597000},"page":"7603-7613","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A fault diagnosis model of marine diesel engine cylinder based on modified genetic algorithm and multilayer perceptron"],"prefix":"10.1007","volume":"24","author":[{"given":"Liangsheng","family":"Hou","sequence":"first","affiliation":[]},{"given":"Jiaqi","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Changjiang","family":"Du","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2758-7553","authenticated-orcid":false,"given":"Jundong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,28]]},"reference":[{"key":"4388_CR1","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/AIC-1994-7104","volume":"7","author":"A Aamodt","year":"1994","unstructured":"Aamodt A, Plaza E (1994) Case-based reasoning: foundational issues, methodological variations, and system approaches. AI Commun 7:39\u201359","journal-title":"AI Commun"},{"key":"4388_CR2","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/978-3-642-20998-7_62","volume-title":"Ubiquitous computing and multimedia applications","author":"N Abdul Hamid","year":"2011","unstructured":"Abdul Hamid N, Mohd Nawi N, Ghazali R, Mohd Salleh MN (2011) Accelerating learning performance of back propagation algorithm by using adaptive gain together with adaptive momentum and adaptive learning rate on classification problems. In: Adeli H, Robles RJ, Balitanas M, Kim T-H (eds) Ubiquitous computing and multimedia applications. Springer, Berlin, pp 559\u2013570"},{"key":"4388_CR3","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1108\/JQME-05-2018-0039","volume":"25","author":"S Boral","year":"2019","unstructured":"Boral S, Chaturvedi SK, Naikan VNA (2019) A case-based reasoning system for fault detection and isolation: a case study on complex gearboxes. J Qual Maint Eng 25:213\u2013235. \nhttps:\/\/doi.org\/10.1108\/JQME-05-2018-0039","journal-title":"J Qual Maint Eng"},{"key":"4388_CR4","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.jisa.2019.05.004","volume":"47","author":"A Broumandnia","year":"2019","unstructured":"Broumandnia A (2019) Designing digital image encryption using 2D and 3D reversible modular chaotic maps. J Inf Secur Appl 47:188\u2013198. \nhttps:\/\/doi.org\/10.1016\/j.jisa.2019.05.004","journal-title":"J Inf Secur Appl"},{"key":"4388_CR5","doi-asserted-by":"publisher","first-page":"4153","DOI":"10.1016\/j.ins.2010.07.004","volume":"180","author":"G Calcagno","year":"2010","unstructured":"Calcagno G et al (2010) A multilayer perceptron neural network-based approach for the identification of responsiveness to interferon therapy in multiple sclerosis patients. Inf Sci 180:4153\u20134163. \nhttps:\/\/doi.org\/10.1016\/j.ins.2010.07.004","journal-title":"Inf Sci"},{"key":"4388_CR6","doi-asserted-by":"publisher","unstructured":"Dai Y, Wang X (2012) Medical image encryption based on a composition of logistic maps and Chebyshev maps. In: 2012 IEEE international conference on information and automation, 6\u20138 June 2012, pp 210\u2013214. \nhttps:\/\/doi.org\/10.1109\/icinfa.2012.6246810","DOI":"10.1109\/icinfa.2012.6246810"},{"key":"4388_CR7","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/0888-613X(93)90001-T","volume":"8","author":"S Dutta","year":"1993","unstructured":"Dutta S, Bonissone PP (1993) Integrating case-and rule-based reasoning. Int J Approx Reason 8:163\u2013203. \nhttps:\/\/doi.org\/10.1016\/0888-613X(93)90001-T","journal-title":"Int J Approx Reason"},{"key":"4388_CR8","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-0-387-21830-4_17","volume-title":"The theory of chaotic attractors","author":"JP Eckmann","year":"2004","unstructured":"Eckmann JP, Ruelle D (2004) Ergodic theory of chaos and strange attractors. In: Hunt BR, Li T-Y, Kennedy JA, Nusse HE (eds) The theory of chaotic attractors. Springer, New York, pp 273\u2013312. \nhttps:\/\/doi.org\/10.1007\/978-0-387-21830-4_17"},{"key":"4388_CR9","doi-asserted-by":"publisher","DOI":"10.1515\/jisys-2017-0083","author":"A Fahmi","year":"2017","unstructured":"Fahmi A, Abdullah S, Amin F, Ali A (2017a) Precursor selection for sol\u2013gel synthesis of titanium carbide nanopowders by a new cubic fuzzy multi-attribute group decision-making model. J Intell Syst. \nhttps:\/\/doi.org\/10.1515\/jisys-2017-0083","journal-title":"J Intell Syst"},{"key":"4388_CR10","doi-asserted-by":"publisher","first-page":"3323","DOI":"10.3233\/JIFS-162007","volume":"33","author":"A Fahmi","year":"2017","unstructured":"Fahmi A, Abdullah S, Amin F, Siddiqui N, Ali A, Systems F (2017b) Aggregation operators on triangular cubic fuzzy numbers and its application to multi-criteria decision making problems. J Intell Fuzzy Syst 33:3323\u20133337","journal-title":"J Intell Fuzzy Syst"},{"key":"4388_CR11","doi-asserted-by":"publisher","first-page":"2401","DOI":"10.3233\/JIFS-171567","volume":"34","author":"A Fahmi","year":"2018","unstructured":"Fahmi A, Abdullah S, Amin F, Ahmed R, Ali A, Systems F (2018a) Triangular cubic linguistic hesitant fuzzy aggregation operators and their application in group decision making. J Intell Fuzzy Syst 34:2401\u20132416","journal-title":"J Intell Fuzzy Syst"},{"key":"4388_CR12","first-page":"1","volume":"35","author":"A Fahmi","year":"2018","unstructured":"Fahmi A, Abdullah S, Amin F, Ali A, Ahmad Khan W, Systems F (2018b) Some geometric operators with triangular cubic linguistic hesitant fuzzy number and their application in group decision-making. J Intell Fuzzy Syst 35:1\u201315","journal-title":"J Intell Fuzzy Syst"},{"key":"4388_CR13","first-page":"23","volume":"50","author":"A Fahmi","year":"2018","unstructured":"Fahmi A, Abdullah S, Amin F, Ali AJPUJM (2018c) Weighted average rating (war) method for solving group decision making problem using triangular cubic fuzzy hybrid aggregation (tcfha). Punjab Univ J Math 50:23\u201334","journal-title":"Punjab Univ J Math"},{"key":"4388_CR14","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1080\/00207721.2018.1503356","volume":"49","author":"A Fahmi","year":"2018","unstructured":"Fahmi A, Amin F, Abdullah S, Ali A (2018d) Cubic fuzzy Einstein aggregation operators and its application to decision-making. Int J Syst Sci 49:2385\u20132397","journal-title":"Int J Syst Sci"},{"key":"4388_CR15","doi-asserted-by":"publisher","first-page":"5753","DOI":"10.1007\/s00500-018-3242-6","volume":"23","author":"A Fahmi","year":"2019","unstructured":"Fahmi A, Abdullah S, Amin F, Khan MSA (2019) Trapezoidal cubic fuzzy number Einstein hybrid weighted averaging operators and its application to decision making. Soft Comput 23:5753\u20135783. \nhttps:\/\/doi.org\/10.1007\/s00500-018-3242-6","journal-title":"Soft Comput"},{"key":"4388_CR16","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/0893-6080(89)90003-8","volume":"2","author":"K-I Funahashi","year":"1989","unstructured":"Funahashi K-I (1989) On the approximate realization of continuous mappings by neural networks. Neural Netw 2:183\u2013192. \nhttps:\/\/doi.org\/10.1016\/0893-6080(89)90003-8","journal-title":"Neural Netw"},{"key":"4388_CR17","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1016\/S1352-2310(97)00447-0","volume":"32","author":"MW Gardner","year":"1998","unstructured":"Gardner MW, Dorling SR (1998) Artificial neural networks (the multilayer perceptron)\u2014a review of applications in the atmospheric sciences. Atmos Environ 32:2627\u20132636. \nhttps:\/\/doi.org\/10.1016\/S1352-2310(97)00447-0","journal-title":"Atmos Environ"},{"key":"4388_CR18","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/0375-9601(84)90993-9","volume":"105","author":"T Geisel","year":"1984","unstructured":"Geisel T, Fairen V (1984) Statistical properties of chaos in Chebyshev maps. Phys Lett A 105:263\u2013266. \nhttps:\/\/doi.org\/10.1016\/0375-9601(84)90993-9","journal-title":"Phys Lett A"},{"key":"4388_CR19","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1023\/A:1022602019183","volume":"3","author":"DE Goldberg","year":"1988","unstructured":"Goldberg DE, Holland JH (1988) Genetic algorithms and machine learning. Mach Learn 3:95\u201399. \nhttps:\/\/doi.org\/10.1023\/A:1022602019183","journal-title":"Mach Learn"},{"key":"4388_CR20","doi-asserted-by":"crossref","unstructured":"Habutsu T, Nishio Y, Sasase I, Mori S (1991) A secret key cryptosystem by iterating a chaotic map. In: Workshop on the theory and application of cryptographic techniques, Springer, pp 127\u2013140","DOI":"10.1007\/3-540-46416-6_11"},{"key":"4388_CR21","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/BF01608556","volume":"50","author":"M Henon","year":"1976","unstructured":"Henon M (1976) A two-dimensional mapping with a strange attractor. Commun Math Phys 50:69\u201377","journal-title":"Commun Math Phys"},{"key":"4388_CR22","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/2.485891","volume":"29","author":"AK Jain","year":"1996","unstructured":"Jain AK, Jianchang M, Mohiuddin KM (1996) Artificial neural networks: a tutorial. Computer 29:31\u201344. \nhttps:\/\/doi.org\/10.1109\/2.485891","journal-title":"Computer"},{"issue":"2","key":"4388_CR23","first-page":"117","volume":"19","author":"A Jolfaei","year":"2010","unstructured":"Jolfaei A, Mirghadri A (2010) An image encryption approach using chaos and stream cipher. J Theor Appl Inf Technol 19(2):117\u2013125","journal-title":"J Theor Appl Inf Technol"},{"key":"4388_CR24","doi-asserted-by":"publisher","unstructured":"Kocarev L, Tasev Z (2003) Public-key encryption based on Chebyshev maps. In: Proceedings of the 2003 international symposium on circuits and systems, ISCAS \u201803., 25\u201328 May 2003, pp III\u2013III. \nhttps:\/\/doi.org\/10.1109\/iscas.2003.1204947","DOI":"10.1109\/iscas.2003.1204947"},{"key":"4388_CR25","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00155578","volume":"6","author":"JL Kolodner","year":"1992","unstructured":"Kolodner JL (1992) An introduction to case-based reasoning. Artif Intell Rev 6:3\u201334. \nhttps:\/\/doi.org\/10.1007\/BF00155578","journal-title":"Artif Intell Rev"},{"key":"4388_CR26","first-page":"451","volume":"2","author":"M Kumar","year":"2010","unstructured":"Kumar M, Husian M, Upreti N, Gupta D, Management K (2010) Genetic algorithm: review and application. Int J Inf Technol Knowl Manag 2:451\u2013454","journal-title":"Int J Inf Technol Knowl Manag"},{"key":"4388_CR27","first-page":"889","volume":"19","author":"W-Y Lin","year":"2003","unstructured":"Lin W-Y, Lee W-Y, Hong T-PJJISE (2003) Adapting crossover and mutation rates in genetic algorithms. J Inf Sci Eng 19:889\u2013903","journal-title":"J Inf Sci Eng"},{"key":"4388_CR28","first-page":"1151","volume":"3","author":"MAW Saduf","year":"2013","unstructured":"Saduf MAW, Wani A, Engineering S (2013) Comparative study of back propagation learning algorithms for neural networks. Int J Adv Res Comput Sci Softw Eng 3:1151\u20131156","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"key":"4388_CR29","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/S0893-6080(97)00097-X","volume":"11","author":"F Scarselli","year":"1998","unstructured":"Scarselli F, Chung Tsoi A (1998) Universal approximation using feedforward neural networks: a survey of some existing methods, and some new results. Neural Netw 11:15\u201337. \nhttps:\/\/doi.org\/10.1016\/S0893-6080(97)00097-X","journal-title":"Neural Netw"},{"key":"4388_CR30","first-page":"179","volume":"20","author":"L Shan","year":"2005","unstructured":"Shan L, Qiang H, Li J, Wang ZQ (2005) Chaotic optimization algorithm based on tent map. Control Decis 20:179\u2013182","journal-title":"Control Decis"},{"key":"4388_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJCAT.2012.048203","volume":"44","author":"W Sibanda","year":"2012","unstructured":"Sibanda W, Pretorius P (2012) Artificial neural networks-a review of applications of neural networks in the modeling of HIV epidemic. Int J Comput Appl 44:1\u20139","journal-title":"Int J Comput Appl"},{"key":"4388_CR32","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1016\/j.procs.2015.05.248","volume":"51","author":"P Snaselova","year":"2015","unstructured":"Snaselova P, Zboril F (2015) Genetic algorithm using theory of chaos. Procedia Comput Sci 51:316\u2013325. \nhttps:\/\/doi.org\/10.1016\/j.procs.2015.05.248","journal-title":"Procedia Comput Sci"},{"key":"4388_CR33","first-page":"52","volume":"5","author":"A Suliman","year":"2015","unstructured":"Suliman A, Zhang Y, Engineering (2015) A review on back-propagation neural networks in the application of remote sensing image classification. J Earth Sci Eng 5:52\u201365","journal-title":"J Earth Sci Eng"},{"key":"4388_CR34","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1016\/j.robot.2012.01.001","volume":"60","author":"CK Volos","year":"2012","unstructured":"Volos CK, Kyprianidis IM, Stouboulos IN (2012) A chaotic path planning generator for autonomous mobile robots. Robot Auton Syst 60:651\u2013656. \nhttps:\/\/doi.org\/10.1016\/j.robot.2012.01.001","journal-title":"Robot Auton Syst"},{"key":"4388_CR35","doi-asserted-by":"crossref","unstructured":"Wang Y, Yao M (2009) A new hybrid genetic algorithm based on chaos and PSO. In: IEEE international conference on intelligent computing and intelligent systems, pp 699\u2013703","DOI":"10.1109\/ICICISYS.2009.5357766"},{"key":"4388_CR36","first-page":"1367","volume":"12","author":"T Wang","year":"2014","unstructured":"Wang T, Wang C, Wu J (2014) Accord ignition diagnosis based on improved GA-BP. TELKOMNIKA Indones J Electr Eng 12:1367\u20131373","journal-title":"TELKOMNIKA Indones J Electr Eng"},{"key":"4388_CR37","first-page":"1","volume":"12","author":"B Xu","year":"2015","unstructured":"Xu B, Zhang H, Wang Z, Wang H, Zhang Y (2015) Model and algorithm of BP neural network based on expanded multichain quantum optimization. Math Probl Eng 12:1\u201311","journal-title":"Math Probl Eng"},{"key":"4388_CR38","doi-asserted-by":"publisher","DOI":"10.1002\/9780470640425","volume-title":"Engineering optimization: an introduction with metaheuristic applications","author":"X-S Yang","year":"2010","unstructured":"Yang X-S (2010) Engineering optimization: an introduction with metaheuristic applications. Wiley, Hoboken"},{"key":"4388_CR39","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.ymssp.2017.03.026","volume":"95","author":"Y Yang","year":"2017","unstructured":"Yang Y, Ming A, Zhang Y, Zhu Y (2017) Discriminative non-negative matrix factorization (DNMF) and its application to the fault diagnosis of diesel engine. Mech Syst Signal Process 95:158\u2013171. \nhttps:\/\/doi.org\/10.1016\/j.ymssp.2017.03.026","journal-title":"Mech Syst Signal Process"},{"key":"4388_CR40","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.apenergy.2014.07.104","volume":"134","author":"F Yu","year":"2014","unstructured":"Yu F, Xu X (2014) A short-term load forecasting model of natural gas based on optimized genetic algorithm and improved BP neural network. Appl Energy 134:102\u2013113. \nhttps:\/\/doi.org\/10.1016\/j.apenergy.2014.07.104","journal-title":"Appl Energy"},{"key":"4388_CR41","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy sets. Inf Control 8:338\u2013353. \nhttps:\/\/doi.org\/10.1016\/S0019-9958(65)90241-X","journal-title":"Inf Control"},{"key":"4388_CR42","doi-asserted-by":"publisher","first-page":"012125","DOI":"10.1088\/1755-1315\/163\/1\/012125","volume":"163","author":"M Zhao","year":"2018","unstructured":"Zhao M, Ge XF, Jiang QF, Li J, Ding YS, Du JQ (2018) Application of GA-BP model to fault diagnosis of hydro-turbine generating units IOP. Conf Ser Earth Environ Sci 163:012125. \nhttps:\/\/doi.org\/10.1088\/1755-1315\/163\/1\/012125","journal-title":"Conf Ser Earth Environ Sci"},{"key":"4388_CR43","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.compeleceng.2017.01.002","volume":"60","author":"L Zhixiong","year":"2017","unstructured":"Zhixiong L, Zhiwei G, Chongqing H, Aihua L (2017) On-line indicated torque estimation for internal combustion engines using discrete observer. Comput Electr Eng 60:100\u2013115. \nhttps:\/\/doi.org\/10.1016\/j.compeleceng.2017.01.002","journal-title":"Comput Electr Eng"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04388-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-04388-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04388-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,26]],"date-time":"2020-09-26T23:34:40Z","timestamp":1601163280000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-04388-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,28]]},"references-count":43,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["4388"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-04388-3","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,28]]},"assertion":[{"value":"28 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"We declare that we have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}