{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T16:21:21Z","timestamp":1772554881731,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T00:00:00Z","timestamp":1682380800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T00:00:00Z","timestamp":1682380800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2024,1]]},"DOI":"10.1007\/s00500-023-08199-5","type":"journal-article","created":{"date-parts":[[2023,4,25]],"date-time":"2023-04-25T15:28:05Z","timestamp":1682436485000},"page":"415-435","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A three-phase approach to improve the functionality of t-way strategy"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9010-6113","authenticated-orcid":false,"given":"Einollah","family":"Pira","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Vahid","family":"Rafe","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sajad","family":"Esfandyari","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,4,25]]},"reference":[{"issue":"1","key":"8199_CR1","first-page":"161","volume":"48","author":"Z Abbasi","year":"2018","unstructured":"Abbasi Z, Esfandyari S, Rafe V (2018) Covering array generation using teaching learning base optimization algorithm. TABRIZ J Electr Eng 48(1):161\u2013171","journal-title":"TABRIZ J Electr Eng"},{"key":"8199_CR2","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.infsof.2015.05.005","volume":"66","author":"BS Ahmed","year":"2015","unstructured":"Ahmed BS, Abdulsamad TS, Potrus MY (2015) Achievement of minimized combinatorial test suite for configuration-aware software functional testing using the cuckoo search algorithm. Inf Softw Technol 66:13\u201329","journal-title":"Inf Softw Technol"},{"key":"8199_CR3","doi-asserted-by":"crossref","first-page":"71683","DOI":"10.1109\/ACCESS.2022.3188856","volume":"10","author":"M Ahmed","year":"2022","unstructured":"Ahmed M, Nasser AB, Zamli KZ (2022) Construction of prioritized T-way test suite using bi-objective dragonfly algorithm. IEEE Access 10:71683\u201371698","journal-title":"IEEE Access"},{"issue":"1","key":"8199_CR4","first-page":"431","volume":"8","author":"BS Ahmed","year":"2012","unstructured":"Ahmed BS, Zamli KZ, Lim CP (2012a) Constructing a t-way interaction test suite using the particle swarm optimization approach. Int J Innov Comput Inf Control 8(1):431\u2013452","journal-title":"Int J Innov Comput Inf Control"},{"issue":"4","key":"8199_CR5","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1016\/j.asoc.2011.11.029","volume":"12","author":"BS Ahmed","year":"2012","unstructured":"Ahmed BS, Zamli KZ, Lim CP (2012b) Application of particle swarm optimization to uniform and variable strength covering array construction. Appl Soft Comput 12(4):1330\u20131347","journal-title":"Appl Soft Comput"},{"key":"8199_CR6","doi-asserted-by":"crossref","first-page":"33406","DOI":"10.1109\/ACCESS.2020.2973696","volume":"8","author":"HNN Al-Sammarraie","year":"2020","unstructured":"Al-Sammarraie HNN, Jawawi DN (2020) Multiple black hole inspired meta-heuristic searching optimization for combinatorial testing. Ieee Access 8:33406\u201333418","journal-title":"Ieee Access"},{"key":"8199_CR7","doi-asserted-by":"crossref","unstructured":"Alazzawi AK, Rais HM, Basri S (2018) \u201cArtificial bee colony algorithm for t-way test suite generation,\u201d In: 2018 4th International conference on computer and information sciences (ICCOINS), pp 1\u20136","DOI":"10.1109\/ICCOINS.2018.8510601"},{"key":"8199_CR8","doi-asserted-by":"crossref","unstructured":"Alazzawi AK, Rais HM, Basri S (2019a)\u201cABCVS: an artificial bee colony for generating variable t-way test sets,\u201d Int J Adv Comput Sci. Appl, 10(4)","DOI":"10.14569\/IJACSA.2019.0100431"},{"key":"8199_CR9","doi-asserted-by":"crossref","unstructured":"Alazzawi AK, Rais HM, Basri S (2019b) \u201cHybrid artificial bee colony algorithm for t-way interaction test suite generation,\u201d In: Software engineering methods in intelligent algorithms: proceedings of 8th computer science on-line conference 2019b, Vol. 1 8, pp 192\u2013199","DOI":"10.1007\/978-3-030-19807-7_19"},{"issue":"10","key":"8199_CR10","first-page":"343","volume":"21","author":"YA Alsariera","year":"2021","unstructured":"Alsariera YA, Al Omari AH, Albawaleez MA, Sanjalawe YK, Zamli KZ (2021) Hybridized BA & PSO t-way algorithm for test case generation. IJCSNS 21(10):343","journal-title":"IJCSNS"},{"issue":"6","key":"8199_CR11","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1016\/j.infsof.2012.01.002","volume":"54","author":"ARA Alsewari","year":"2012","unstructured":"Alsewari ARA, Zamli KZ (2012) Design and implementation of a harmony-search-based variable-strength t-way testing strategy with constraints support. Inf Softw Technol 54(6):553\u2013568","journal-title":"Inf Softw Technol"},{"issue":"1","key":"8199_CR12","doi-asserted-by":"crossref","first-page":"012011","DOI":"10.1088\/1757-899X\/917\/1\/012011","volume":"917","author":"JM Altmemi","year":"2020","unstructured":"Altmemi JM, Othman RR, Ahmad R (2020) SCAVS: Implement sine cosine algorithm for generating variable t-way test suite. IOP Conf Series: Mater Sci Eng 917(1):012011","journal-title":"IOP Conf Series: Mater Sci Eng"},{"key":"8199_CR13","volume-title":"Principles of model checking","author":"C Baier","year":"2008","unstructured":"Baier C, Katoen J-P (2008) Principles of model checking. MIT press, Cambridge"},{"key":"8199_CR14","doi-asserted-by":"crossref","unstructured":"Bansal P, Sabharwal S, Malik S, Arora V, and Kumar V (2013)\u201cAn approach to test set generation for pair-wise testing using genetic algorithms,\u201d In: International symposium on search based software engineering, 2013, pp 294\u2013299","DOI":"10.1007\/978-3-642-39742-4_27"},{"issue":"9","key":"8199_CR15","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/35.312843","volume":"32","author":"SM Bellovin","year":"1994","unstructured":"Bellovin SM, Cheswick WR (1994) Network firewalls. IEEE Commun Mag 32(9):50\u201357","journal-title":"IEEE Commun Mag"},{"issue":"7","key":"8199_CR16","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1109\/32.605761","volume":"23","author":"DM Cohen","year":"1997","unstructured":"Cohen DM, Dalal SR, Fredman ML, Patton GC (1997) The AETG system: an approach to testing based on combinatorial design. IEEE Trans Softw Eng 23(7):437\u2013444","journal-title":"IEEE Trans Softw Eng"},{"key":"8199_CR17","doi-asserted-by":"crossref","unstructured":"Cohen MB, Gibbons PB, Mugridge WB, Colbourn CJ, and Collofello JS (2003) \u201cA variable strength interaction testing of components,\u201d In: Proceedings 27th annual international computer software and applications conference. COMPAC 2003, pp 413\u2013418","DOI":"10.1109\/CMPSAC.2003.1245373"},{"key":"8199_CR18","unstructured":"Czerwonka J (2008) \u201cPairwise testing in the real world: practical extensions to test-case scenarios,\u201d Microsoft Corp Softw Test Tech Artic"},{"key":"8199_CR19","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.infsof.2017.10.007","volume":"94","author":"S Esfandyari","year":"2018","unstructured":"Esfandyari S, Rafe V (2018) A tuned version of genetic algorithm for efficient test suite generation in interactive t-way testing strategy. Inf Softw Technol 94:165\u2013185","journal-title":"Inf Softw Technol"},{"key":"8199_CR20","doi-asserted-by":"crossref","first-page":"106219","DOI":"10.1016\/j.asoc.2020.106219","volume":"91","author":"S Esfandyari","year":"2020","unstructured":"Esfandyari S, Rafe V (2020) Extracting combinatorial test parameters and their values using model checking and evolutionary algorithms. Appl Soft Comput 91:106219","journal-title":"Appl Soft Comput"},{"issue":"11","key":"8199_CR21","doi-asserted-by":"crossref","first-page":"7673","DOI":"10.1007\/s00500-021-05788-0","volume":"25","author":"S Esfandyari","year":"2021","unstructured":"Esfandyari S, Rafe V (2021) GALP: A hybrid artificial intelligence algorithm for generating covering array. Soft Comput 25(11):7673\u20137689","journal-title":"Soft Comput"},{"key":"8199_CR23","unstructured":"Flores P, Cheon Y (2011) \u201cPWiseGen: generating test cases for pairwise testing using genetic algorithms,\u201d In 2011 IEEE International conference on computer science and automation engineering, vol. 2, pp. 747\u2013752"},{"issue":"5","key":"8199_CR24","doi-asserted-by":"crossref","first-page":"287","DOI":"10.6028\/jres.113.022","volume":"113","author":"M Forbes","year":"2008","unstructured":"Forbes M, Lawrence J, Lei Y, Kacker RN, Kuhn DR (2008) Refining the in-parameter-order strategy for constructing covering arrays. J Res Natl Inst Stand Technol 113(5):287","journal-title":"J Res Natl Inst Stand Technol"},{"issue":"1","key":"8199_CR25","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1214\/aoms\/1177731944","volume":"11","author":"M Friedman","year":"1940","unstructured":"Friedman M (1940) A comparison of alternative tests of significance for the problem of m rankings. Ann Math Stat 11(1):86\u201392","journal-title":"Ann Math Stat"},{"key":"8199_CR26","doi-asserted-by":"crossref","unstructured":"Grindal M, Offutt J (2007) \u201cInput parameter modeling for combination strategies,\u201d In: Proceedings of the 25th conference on IASTED international multi-conference: software engineering, pp 255\u2013260","DOI":"10.1109\/ASWEC.2007.27"},{"issue":"1\u20133","key":"8199_CR27","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.disc.2003.11.029","volume":"284","author":"A Hartman","year":"2004","unstructured":"Hartman A, Raskin L (2004) Problems and algorithms for covering arrays. Discrete Math 284(1\u20133):149\u2013156","journal-title":"Discrete Math"},{"key":"8199_CR28","doi-asserted-by":"crossref","unstructured":"Hartman A (2005) \u201cSoftware and hardware testing using combinatorial covering suites,\u201d In: Graph theory, combinatorics and algorithms, Springer, pp 237\u2013266","DOI":"10.1007\/0-387-25036-0_10"},{"key":"8199_CR29","first-page":"4860","volume":"34","author":"KM Htay","year":"2022","unstructured":"Htay KM, Othman RR, Amir A, Alkanaani JMH (2022) \u201cGravitational search algorithm based strategy for combinatorial t-way test suite generation.\u201d J. King Saud Univ.-Comput Inf. Sci. 34:4860\u20134873","journal-title":"J. King Saud Univ.-Comput Inf. Sci."},{"key":"8199_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infsof.2018.12.001","volume":"108","author":"A Kalaee","year":"2019","unstructured":"Kalaee A, Rafe V (2019) Model-based test suite generation for graph transformation system using model simulation and search-based techniques. Inf Softw Technol 108:1\u201329","journal-title":"Inf Softw Technol"},{"key":"8199_CR31","doi-asserted-by":"crossref","first-page":"6915","DOI":"10.4249\/scholarpedia.6915","volume":"5","author":"D Karaboga","year":"2010","unstructured":"Karaboga D (2010) Artificial bee colony algorithm. Scholarpedia 5:6915","journal-title":"Scholarpedia"},{"key":"8199_CR32","doi-asserted-by":"crossref","unstructured":"Kastenberg H, Rensink A (2006) \u201cModel checking dynamic states in GROOVE,\u201d In: International SPIN workshop on model checking of software, 2006, pp 299\u2013305","DOI":"10.1007\/11691617_19"},{"key":"8199_CR34","unstructured":"Lei Y, Tai K-C (1998) \u201cIn-parameter-order: a test generation strategy for pairwise testing,\u201d In: Proceedings third IEEE international high-assurance systems engineering symposium (Cat. No. 98EX231), pp 254\u2013261"},{"key":"8199_CR35","doi-asserted-by":"crossref","unstructured":"Lei Y, Kacker R, Kuhn DR, Okun V, and Lawrence J (2007) \u201cIPOG: A general strategy for t-way software testing,\u201d In: 14th Annual IEEE international conference and workshops on the engineering of computer-based systems (ECBS\u201907), pp 549\u2013556","DOI":"10.1109\/ECBS.2007.47"},{"key":"8199_CR36","doi-asserted-by":"crossref","unstructured":"Luo C et al (2021) \u201cAutoCCAG: an automated approach to constrained covering array generation,\u201d In: 2021 IEEE\/ACM 43rd international conference on software engineering (ICSE), pp 201\u2013212","DOI":"10.1109\/ICSE43902.2021.00030"},{"issue":"22","key":"8199_CR37","doi-asserted-by":"crossref","first-page":"8753","DOI":"10.1016\/j.eswa.2015.07.029","volume":"42","author":"T Mahmoud","year":"2015","unstructured":"Mahmoud T, Ahmed BS (2015) An efficient strategy for covering array construction with fuzzy logic-based adaptive swarm optimization for software testing use. Expert Syst Appl 42(22):8753\u20138765","journal-title":"Expert Syst Appl"},{"key":"8199_CR38","doi-asserted-by":"crossref","unstructured":"McCaffrey JD (2010) \u201cAn empirical study of pairwise test set generation using a genetic algorithm,\u201d In: 2010 Seventh international conference on information technology: new generations, pp 992\u2013997","DOI":"10.1109\/ITNG.2010.93"},{"key":"8199_CR39","volume-title":"The art of software testing","author":"GJ Myers","year":"2004","unstructured":"Myers GJ, Badgett T, Thomas TM, Sandler C (2004) The art of software testing, vol 2. Wiley Online Library, New Jersey"},{"issue":"2","key":"8199_CR40","first-page":"29","volume":"2","author":"S Nidhra","year":"2012","unstructured":"Nidhra S, Dondeti J (2012) Black box and white box testing techniques-a literature review. Int J Embed Syst Appl IJESA 2(2):29\u201350","journal-title":"Int J Embed Syst Appl IJESA"},{"issue":"2","key":"8199_CR41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1883612.1883618","volume":"43","author":"C Nie","year":"2011","unstructured":"Nie C, Leung H (2011) A survey of combinatorial testing. ACM Comput Surv CSUR 43(2):1\u201329","journal-title":"ACM Comput Surv CSUR"},{"key":"8199_CR42","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.infsof.2015.02.008","volume":"62","author":"C Nie","year":"2015","unstructured":"Nie C, Wu H, Niu X, Kuo F-C, Leung H, Colbourn CJ (2015) Combinatorial testing, random testing, and adaptive random testing for detecting interaction triggered failures. Inf Softw Technol 62:198\u2013213","journal-title":"Inf Softw Technol"},{"key":"8199_CR43","doi-asserted-by":"crossref","unstructured":"Odili JB, Nasser AB, Noraziah A, Wahab MHA, Ahmed M (2022) \u201cAfrican buffalo optimization algorithm based t-way test suite generation strategy for electronic-payment transactions,\u201d In: proceedings of international conference on emerging technologies and intelligent systems: ICETIS 2021 (Volume 1), pp 160\u2013174","DOI":"10.1007\/978-3-030-82616-1_15"},{"key":"8199_CR44","volume-title":"Probabilistic reasoning in intelligent systems: networks of plausible inference","author":"J Pearl","year":"2014","unstructured":"Pearl J (2014) Probabilistic reasoning in intelligent systems: networks of plausible inference. Elsevier, London"},{"key":"8199_CR45","unstructured":"Pelikan M, Goldberg DE, Tsutsui S (2003) \u201cHierarchical Bayesian optimization algorithm: toward a new generation of evolutionary algorithms,\u201d In: SICE 2003 Annual conference (IEEE Cat. No. 03TH8734, vol. 3, pp 2738\u20132743"},{"key":"8199_CR46","doi-asserted-by":"crossref","first-page":"103684","DOI":"10.1016\/j.engappai.2020.103684","volume":"92","author":"E Pira","year":"2020","unstructured":"Pira E (2020) A novel approach to solve AI planning problems in graph transformations. Eng Appl Artif Intell 92:103684","journal-title":"Eng Appl Artif Intell"},{"key":"8199_CR47","doi-asserted-by":"crossref","first-page":"839","DOI":"10.1007\/s11390-020-1003-3","volume":"36","author":"E Pira","year":"2021","unstructured":"Pira E (2021) Using Markov chain based estimation of distribution algorithm for model-based safety analysis of graph transformation. J Comput Sci Technol 36:839\u2013855","journal-title":"J Comput Sci Technol"},{"key":"8199_CR48","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.jss.2017.05.128","volume":"131","author":"E Pira","year":"2017","unstructured":"Pira E, Rafe V, Nikanjam A (2017) Deadlock detection in complex software systems specified through graph transformation using Bayesian optimization algorithm. J Syst Softw 131:181\u2013200","journal-title":"J Syst Softw"},{"key":"8199_CR49","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.infsof.2018.01.004","volume":"97","author":"E Pira","year":"2018","unstructured":"Pira E, Rafe V, Nikanjam A (2018) Searching for violation of safety and liveness properties using knowledge discovery in complex systems specified through graph transformations. Inf Softw Technol 97:110\u2013134","journal-title":"Inf Softw Technol"},{"key":"8199_CR50","doi-asserted-by":"crossref","first-page":"106577","DOI":"10.1016\/j.ress.2019.106577","volume":"191","author":"E Pira","year":"2019","unstructured":"Pira E, Rafe V, Nikanjam A (2019) Using evolutionary algorithms for reachability analysis of complex software systems specified through graph transformation. Reliab Eng Syst Saf 191:106577","journal-title":"Reliab Eng Syst Saf"},{"issue":"2","key":"8199_CR51","first-page":"21","volume":"5","author":"E Pira","year":"2014","unstructured":"Pira E, Reza MZ, Soltani F (2014) Verification of confliction and unreachability in rule-based expert systems with model checking. Int J Artif Intell Appl 5(2):21","journal-title":"Int J Artif Intell Appl"},{"key":"8199_CR52","first-page":"77","volume":"52","author":"E Pira","year":"2022","unstructured":"Pira E, Rafe V, Esfandyari S (2022) \u201cMinimum covering array generation using success-history and linear population size reduction based adaptive differential evolution algorithm\u201d. TJEE 52:77\u201389","journal-title":"TJEE"},{"key":"8199_CR53","unstructured":"Rozenberg, G Handbook of Graph Grammars and Comp., vol. 1. World scientific, 1997"},{"issue":"2","key":"8199_CR54","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1016\/j.ejor.2004.08.006","volume":"169","author":"R Sagarna","year":"2006","unstructured":"Sagarna R, Lozano JA (2006) Scatter search in software testing, comparison and collaboration with estimation of distribution algorithms. Eur J Oper Res 169(2):392\u2013412","journal-title":"Eur J Oper Res"},{"issue":"4","key":"8199_CR55","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/TEVC.2007.906095","volume":"12","author":"R Santana","year":"2008","unstructured":"Santana R, Larra\u00f1aga P, Lozano JA (2008) Protein folding in simplified models with estimation of distribution algorithms. IEEE Trans Evol Comput 12(4):418\u2013438","journal-title":"IEEE Trans Evol Comput"},{"key":"8199_CR56","volume-title":"Model checking of visual modeling languages","author":"\u00c1 Schmidt","year":"2004","unstructured":"Schmidt \u00c1 (2004) Model checking of visual modeling languages. Bp. Univ. Technol. Hung, China"},{"key":"8199_CR57","unstructured":"Shiba T, Tsuchiya T, Kikuno T (2004)\u201cUsing artificial life techniques to generate test cases for combinatorial testing,\u201d In: Proceedings of the 28th annual international computer software and applications conference,. COMPSAC. pp. 72\u201377"},{"key":"8199_CR58","volume-title":"Metaheuristics and the search for covering and packing arrays","author":"J Stardom","year":"2001","unstructured":"Stardom J (2001) Metaheuristics and the search for covering and packing arrays. Simon Fraser University Burnaby, Burnaby"},{"key":"8199_CR59","doi-asserted-by":"crossref","unstructured":"Taentzer G (2003) \u201cAGG: a graph transformation environment for modeling and validation of software,\u201d In: International workshop on applications of graph transformations with industrial relevance, pp 446\u2013453","DOI":"10.1007\/978-3-540-25959-6_35"},{"key":"8199_CR22","doi-asserted-by":"crossref","unstructured":"Wilcoxon F, \u201cIndividual comparisons by ranking methods,\u201d in Breakthroughs in statistics, Springer, 1992, pp. 196\u2013202.","DOI":"10.1007\/978-1-4612-4380-9_16"},{"key":"8199_CR60","doi-asserted-by":"crossref","unstructured":"Williams AW, Probert RL (1996) \u201cA practical strategy for testing pair-wise coverage of network interfaces,\u201d In: Proceedings of ISSRE\u201996: 7th international symposium on software reliability engineering, pp 246\u2013254","DOI":"10.1109\/ISSRE.1996.558835"},{"issue":"4","key":"8199_CR61","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1109\/TEVC.2014.2362532","volume":"19","author":"H Wu","year":"2014","unstructured":"Wu H, Nie C, Kuo F-C, Leung H, Colbourn CJ (2014) A discrete particle swarm optimization for covering array generation. IEEE Trans Evol Comput 19(4):575\u2013591","journal-title":"IEEE Trans Evol Comput"},{"issue":"1","key":"8199_CR62","doi-asserted-by":"crossref","first-page":"137","DOI":"10.3233\/IFS-162127","volume":"31","author":"R Yousefian","year":"2016","unstructured":"Yousefian R, Aboutorabi S, Rafe V (2016) A greedy algorithm versus metaheuristic solutions to deadlock detection in graph transformation systems. J Intell Fuzzy Syst 31(1):137\u2013149","journal-title":"J Intell Fuzzy Syst"},{"key":"8199_CR63","doi-asserted-by":"crossref","unstructured":"Yuan B, Orlowska M, Sadiq S (2007)\u201cFinding the optimal path in 3D spaces using EDAs\u2013the wireless sensor networks scenario,\u201d In: International conference on adaptive and natural computing algorithms, pp 536\u2013545","DOI":"10.1007\/978-3-540-71618-1_59"},{"issue":"1","key":"8199_CR64","doi-asserted-by":"crossref","first-page":"012013","DOI":"10.1088\/1742-6596\/1830\/1\/012013","volume":"1830","author":"HL Zakaria","year":"2021","unstructured":"Zakaria HL, Zamli KZ, Din F (2021) Hybrid migrating birds optimization strategy for t-way test suite generation. J Phys Conf Ser 1830(1):012013","journal-title":"J Phys Conf Ser"},{"key":"8199_CR65","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.engappai.2016.12.014","volume":"59","author":"KZ Zamli","year":"2017","unstructured":"Zamli KZ, Din F, Baharom S, Ahmed BS (2017) Fuzzy adaptive teaching learning-based optimization strategy for the problem of generating mixed strength t-way test suites. Eng Appl Artif Intell 59:35\u201350","journal-title":"Eng Appl Artif Intell"},{"issue":"9","key":"8199_CR66","doi-asserted-by":"crossref","first-page":"1741","DOI":"10.1016\/j.ins.2011.01.002","volume":"181","author":"KZ Zamli","year":"2011","unstructured":"Zamli KZ, Klaib MF, Younis MI, Isa NAM, Abdullah R (2011) Design and implementation of a t-way test data generation strategy with automated execution tool support. Inf Sci 181(9):1741\u20131758","journal-title":"Inf Sci"},{"key":"8199_CR67","doi-asserted-by":"crossref","unstructured":"Zamli KZ, Ahmed BS, Mahmoud T, Afzal W (2018)\u201cFuzzy adaptive tuning of a particle swarm optimization algorithm for variable-strength combinatorial test suite generation,\u201d ArXiv Prepr. ArXiv181005824","DOI":"10.1049\/PBCE119H_ch22"},{"key":"8199_CR68","unstructured":"\u201cGenerating dynamically nested loops.\u201d https:\/\/www.codeproject.com\/Tips\/759707\/Generating-dynamically-nested-loops (Accessed 13 Oct 2020)"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-08199-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-08199-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-08199-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,19]],"date-time":"2024-10-19T05:12:45Z","timestamp":1729314765000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-08199-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,25]]},"references-count":67,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["8199"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-08199-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,25]]},"assertion":[{"value":"3 April 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest for any of them in this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}