{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:16:16Z","timestamp":1761894976319},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2009,10,22]],"date-time":"2009-10-22T00:00:00Z","timestamp":1256169600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1007\/s10115-009-0261-8","type":"journal-article","created":{"date-parts":[[2009,10,21]],"date-time":"2009-10-21T16:07:18Z","timestamp":1256141238000},"page":"523-549","source":"Crossref","is-referenced-by-count":25,"title":["Immune algorithm with orthogonal design based initialization, cloning, and selection for global optimization"],"prefix":"10.1007","volume":"25","author":[{"given":"Maoguo","family":"Gong","sequence":"first","affiliation":[]},{"given":"Licheng","family":"Jiao","sequence":"additional","affiliation":[]},{"given":"Fang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenping","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,10,22]]},"reference":[{"key":"261_CR1","doi-asserted-by":"crossref","unstructured":"Aickelin U, Cayzer S (2002) The danger theory and its application to artificial immune systems. In: Proceeding of the first international conference on artificial immune systems. University of Kent at Canterbury, England, pp 141\u2013148","DOI":"10.2139\/ssrn.2832054"},{"key":"261_CR2","unstructured":"Bentley, P, Doheon L, Sungwon J (eds) (2008) Proceedings of the seventh international conference on artificial immune systems, ICARIS 2008, Phuket, Thailand, August 10\u201313. Springer, Lecture Notes in Computer Science, vol 5132"},{"key":"261_CR3","unstructured":"Bersini H, Carneiro J (eds) (2006) Proceedings of the third international conference on artificial immune systems, ICARIS 2006, Oeiras, Portugal, September 4\u20136. Springer, Lecture Notes in Computer Science, vol 4163"},{"key":"261_CR4","doi-asserted-by":"crossref","DOI":"10.5962\/bhl.title.8281","volume-title":"The clonal selection theory of acquired immunity","author":"FM Burnet","year":"1959","unstructured":"Burnet FM (1959) The clonal selection theory of acquired immunity. Cambridge University Press, Cambridge"},{"key":"261_CR5","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s10710-005-6164-x","volume":"6","author":"CA Coello","year":"2005","unstructured":"Coello CA, Cortes NC (2005) Solving multiobjective optimization problems using an artificial immune system. Genet Program Evolvable Mach 6: 163\u2013190","journal-title":"Genet Program Evolvable Mach"},{"key":"261_CR6","doi-asserted-by":"crossref","unstructured":"Cutello V, Narzisi G, Nicosia G, Pavone M (2005) Clonal selection algorithms: a comparative case study using effective mutation potentials. In: Proceedings of 4th international conference on artificial immune systems, ICARIS 2005, Banff, Canada. August 14\u201317, 2005. Lecture Notes in Computer Science, vol 3627, pp 13\u201328","DOI":"10.1007\/11536444_2"},{"key":"261_CR7","doi-asserted-by":"crossref","unstructured":"Cutello V, Nicosia G, Pavone M (2004) Exploring the capability of immune algorithms: a characterization of hypemutation operators. In: Proceedings of third international conference on artificial immune systems, ICARIS2004, Catania, Italy, September 13\u201316, 2004, Lecture Notes in Computer Science, vol 3239, pp 263\u2013276","DOI":"10.1007\/978-3-540-30220-9_22"},{"key":"261_CR8","first-page":"115","volume":"9","author":"K Deb","year":"1995","unstructured":"Deb K, Agrawal RB (1995) Simulated binary crossover for continuous search space. Complex Syst 9: 115\u2013148","journal-title":"Complex Syst"},{"key":"261_CR9","doi-asserted-by":"crossref","unstructured":"Deb K, Anand A, Joshi D (2002) A computationally efficient evolutionary algorithm for real-parameter optimization. KanGAL Report No. 2002003","DOI":"10.1162\/106365602760972767"},{"issue":"2","key":"261_CR10","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1162\/106365601750190406","volume":"9","author":"K Deb","year":"2001","unstructured":"Deb K, Beyer HG (2001) Self-adaptive genetic algorithms with simulated binary crossover. Evol Comput 9(2): 197\u2013221","journal-title":"Evol Comput"},{"key":"261_CR11","doi-asserted-by":"crossref","unstructured":"de Castro LN, Timmis J (2002) An artificial immune network for multimodal function optimization. In: Proceedings of the 2002 congress on evolutionary computation, CEC\u2019 02, vol 1, pp 699\u2013704","DOI":"10.1109\/CEC.2002.1007011"},{"issue":"3","key":"261_CR12","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1109\/TEVC.2002.1011539","volume":"6","author":"LN Castro de","year":"2002","unstructured":"de Castro LN, Von Zuben FJ (2002) Learning and optimization using the clonal selection principle. IEEE Trans Evol Comput 6(3): 239\u2013251","journal-title":"IEEE Trans Evol Comput"},{"key":"261_CR13","unstructured":"de Castro LN, Von Zuben FJ, Knidel H (eds) (2007) Proceedings of the third international conference on artificial immune systems, ICARIS 2007, Santos, Brazil, August 26\u201329. Springer, Lecture Notes in Computer Science, vol 4628"},{"key":"261_CR14","doi-asserted-by":"crossref","unstructured":"Forrest S, Perelson AS (1991) Genetic algorithms and the immune system. In: Schwefel H-P, Manner R (eds) Parallel problem solving from nature Lecture Notes in Computer Science, Springer, Berlin, pp 320\u2013325","DOI":"10.1007\/BFb0029771"},{"issue":"8","key":"261_CR15","doi-asserted-by":"crossref","first-page":"975","DOI":"10.1080\/03052150600880706","volume":"38","author":"F Freschi","year":"2006","unstructured":"Freschi F, Repetto M (2006) VIS: an artificial immune network for multi-objective optimization. Eng Optim 38(8): 975\u2013996","journal-title":"Eng Optim"},{"key":"261_CR16","doi-asserted-by":"crossref","unstructured":"Fukuda T, Mori K, Tsukiyama M (1993) Immune networks using genetic algorithm for adaptive production scheduling. In: 15th IFAC world congress, vol 3, pp 57\u201360","DOI":"10.1016\/S1474-6670(17)48487-4"},{"key":"261_CR17","doi-asserted-by":"crossref","unstructured":"Garrett SM (2004) Parameter-free, Adaptive clonal selection. In: The Proceedings of IEEE Congress on Evolutionary Computing, CEC 2004, Portland, Oregon, pp 1052\u20131058","DOI":"10.1109\/CEC.2004.1330978"},{"issue":"2","key":"261_CR18","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1162\/1063656054088512","volume":"13","author":"SM Garrett","year":"2005","unstructured":"Garrett SM (2005) How do we evaluate artificial immune systems. Evol Comput 13(2): 145\u2013178","journal-title":"Evol Comput"},{"issue":"2","key":"261_CR19","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1162\/evco.2008.16.2.225","volume":"16","author":"MG Gong","year":"2008","unstructured":"Gong MG, Jiao LC, Du HF, Bo LF (2008) Multi-objective immune algorithm with nondominated neighbor-based selection. Evol Comput 16(2): 225\u2013255","journal-title":"Evol Comput"},{"issue":"8","key":"261_CR20","doi-asserted-by":"crossref","first-page":"1064","DOI":"10.1007\/s11432-008-0040-2","volume":"51","author":"MG Gong","year":"2008","unstructured":"Gong MG, Jiao LC, Ma WP, Du HF (2008) Multiobjective optimization using an immunodominance and clonal selection inspired algorithm. Sci China Ser F Inform Sci 51(8): 1064\u20131082","journal-title":"Sci China Ser F Inform Sci"},{"issue":"1\u20133","key":"261_CR21","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.neucom.2007.12.041","volume":"72","author":"MG Gong","year":"2008","unstructured":"Gong MG, Jiao LC, Zhang XR (2008) A population-based artificial immune system for numerical optimization. Neurocomputing 72(1\u20133): 149\u2013161","journal-title":"Neurocomputing"},{"key":"261_CR22","doi-asserted-by":"crossref","unstructured":"Hart E, Timmis J (2005) Application areas of AIS: the past, the present and the future. In: Proceedings of the 4th international conference on artificial immune systems, ICARIS 2005. Springer. Lecture Notes in Computer Science, vol 3627, pp 483\u2013497","DOI":"10.1007\/11536444_37"},{"key":"261_CR23","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1478-6","volume-title":"Orthogonal arrays: theory and applications","author":"AS Hedayat","year":"1999","unstructured":"Hedayat AS, Sloane NJA, Stufken J (1999) Orthogonal arrays: theory and applications. Springer, New York"},{"issue":"6","key":"261_CR24","doi-asserted-by":"crossref","first-page":"522","DOI":"10.1109\/TEVC.2004.835176","volume":"8","author":"SY Ho","year":"2004","unstructured":"Ho SY, Shu LS, Chen JH (2004) Intelligent evolutionary algorithms for large parameter optimization problems. IEEE Trans Evol Comput 8(6): 522\u2013540","journal-title":"IEEE Trans Evol Comput"},{"key":"261_CR25","doi-asserted-by":"crossref","unstructured":"Jacob C, Pilat ML, Bentley PJ, Timmis J (eds) (2005) Proceedings of the fourth international conference on artificial immune systems, ICARIS 2005, Banff, August 14\u201317, Springer, Lecture Notes in Computer Science, vol 3627","DOI":"10.1007\/11536444"},{"issue":"2","key":"261_CR26","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1162\/evco.2007.15.2.223","volume":"15","author":"Z Ji","year":"2007","unstructured":"Ji Z, Dasgupta D (2007) Revisiting negative selection algorithms. Evol Comput 15(2): 223\u2013251","journal-title":"Evol Comput"},{"issue":"5","key":"261_CR27","doi-asserted-by":"crossref","first-page":"1234","DOI":"10.1109\/TSMCB.2008.927271","volume":"38","author":"LC Jiao","year":"2008","unstructured":"Jiao LC, Li YY, Gong MG, Zhang XR (2008) Quantum-inspired immune clonal algorithm for global optimization. IEEE Trans Syst Man Cybern, Part B 38(5): 1234\u20131253","journal-title":"IEEE Trans Syst Man Cybern, Part B"},{"issue":"5","key":"261_CR28","doi-asserted-by":"crossref","first-page":"552","DOI":"10.1109\/3468.867862","volume":"30","author":"LC Jiao","year":"2000","unstructured":"Jiao LC, Wang L (2000) A novel genetic algorithm based on immunity. IEEE Trans Syst Man Cybern Part A 30(5): 552\u2013561","journal-title":"IEEE Trans Syst Man Cybern Part A"},{"key":"261_CR29","doi-asserted-by":"crossref","unstructured":"Kouchakpour P, Zaknich A, Br\u00e4unl T (2009) A survey and taxonomy of performance improvement of canonical genetic programming. Knowl Inform Syst. doi: 10.1007\/s10115-008-0184-9","DOI":"10.1007\/s10115-008-0184-9"},{"key":"261_CR30","doi-asserted-by":"crossref","unstructured":"Khare V, Yao X, Deb K (2003) Performance scaling of multi-objective evolutionary algorithms. In: Proceedings of the second international conference on evolutionary multi-criterion optimization, EMO 2003, Springer. Lecture Notes in Computer Science, vol 2632, pp 376\u2013390","DOI":"10.1007\/3-540-36970-8_27"},{"issue":"1","key":"261_CR31","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/4235.910464","volume":"5","author":"YW Leung","year":"2001","unstructured":"Leung YW, Wang YP (2001) An orthogonal genetic algorithm with quantization for global numerical optimization. IEEE Trans Evol Comput 5(1): 41\u201353","journal-title":"IEEE Trans Evol Comput"},{"key":"261_CR32","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s11047-005-1625-y","volume":"5","author":"JJ Liang","year":"2006","unstructured":"Liang JJ, Baskar S, Suganthan PN, Qin AK (2006) Performance evaluation of multiagent genetic algorithm. Nat Comput 5: 83\u201396","journal-title":"Nat Comput"},{"issue":"3","key":"261_CR33","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1109\/TEVC.2005.857610","volume":"10","author":"JJ Liang","year":"2006","unstructured":"Liang JJ, Qin AK, Suganthan PN, Baskar S (2006) Comprehensive learning particle swarm optimizer for global optimization of multimodal functions. IEEE Trans Evol Comput 10(3): 281\u2013295","journal-title":"IEEE Trans Evol Comput"},{"key":"261_CR34","doi-asserted-by":"crossref","unstructured":"Liang JJ, Suganthan PN, Deb K (2005) Novel composition test functions for numerical global optimization. In: Proceedings of the 2005 IEEE swarm intelligence symposium, pp 68\u201375","DOI":"10.1109\/SIS.2005.1501604"},{"key":"261_CR35","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1080\/00031305.1978.10479236","volume":"32","author":"R McGill","year":"1978","unstructured":"McGill R, Tukey J, Larsen W (1978) Variations of boxplots. Am Stat 32: 12\u201316","journal-title":"Am Stat"},{"key":"261_CR36","unstructured":"Nicosia G, Cutello V, Bentley PJ, Timmis J (eds) (2004) Proceedings of the third international conference on artificial immune systems, ICARIS 2004, Catania, September 13\u201316. Springer, Lecture Notes in Computer Science, vol 3239"},{"issue":"3","key":"261_CR37","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1007\/s10115-008-0171-1","volume":"19","author":"GL Pappa","year":"2009","unstructured":"Pappa GL, Freitas AA (2009) Evolving rule induction algorithms with multi-objective grammar-based genetic programming. Knowl Inform Syst 19(3): 283\u2013309","journal-title":"Knowl Inform Syst"},{"issue":"3","key":"261_CR38","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1007\/s10115-007-0072-8","volume":"14","author":"GL Peterson","year":"2008","unstructured":"Peterson GL, McBride BT (2008) The importance of generalizability for anomaly detection. Knowl Inform Syst 14(3): 377\u2013392","journal-title":"Knowl Inform Syst"},{"key":"261_CR39","unstructured":"Smith RE, Forrest S, Perelson AS (1992) Population diversity in an immune system model: implications for genetic search. In: Whitley LD (ed) Foundations of genetic algorithms, vol 2, Morgan Kaufmann Publishers, San Mateo, pp 153\u2013165"},{"issue":"2","key":"261_CR40","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1162\/evco.1993.1.2.127","volume":"1","author":"RE Smith","year":"1993","unstructured":"Smith RE, Forrest S, Perelson AS (1993) Searching for diverse, cooperative populations with genetic algorithms. Evol Comput 1(2): 127\u2013149","journal-title":"Evol Comput"},{"key":"261_CR41","unstructured":"Suganthan PN, Hansen N, Liang JJ, Deb K, Chen Y-P, Auger A, Tiwari S (2005) Problem definitions and evaluation criteria for the CEC 2005 special session on real-parameter optimization. Technical Report, Nanyang Technological University, Singapore, May 2005 AND KanGAL Report #2005005, IIT Kanpur, India"},{"issue":"6","key":"261_CR42","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1080\/03052150701280541","volume":"39","author":"Y Wang","year":"2007","unstructured":"Wang Y, Liu H, Cai ZX, Zhou YR (2007) An orthogonal design based constrained evolutionary optimization algorithm. Eng Optim 39(6): 715\u2013736","journal-title":"Eng Optim"},{"issue":"1","key":"261_CR43","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1162\/evco.2004.12.1.77","volume":"12","author":"SY Zeng","year":"2004","unstructured":"Zeng SY, Kang LS, Ding LX (2004) An orthogonal multi-objective evolutionary algorithm for multi-objective optimization problems with constraints. Evol Comput 12(1): 77\u201398","journal-title":"Evol Comput"},{"issue":"1","key":"261_CR44","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1109\/4235.752920","volume":"3","author":"QF Zhang","year":"1999","unstructured":"Zhang QF, Leung YW (1999) An orthogonal genetic algorithm for multimedia multicast routine. IEEE Trans Evol Comput 3(1): 53\u201362","journal-title":"IEEE Trans Evol Comput"},{"issue":"2","key":"261_CR45","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/TSMCB.2003.821456","volume":"34","author":"WC Zhong","year":"2004","unstructured":"Zhong WC, Liu J, Xue MZ, Jiao LC (2004) A multiagent genetic algorithm for global numerical optimization. IEEE Trans Syst Man Cybern Part B 34(2): 1128\u20131141","journal-title":"IEEE Trans Syst Man Cybern Part B"},{"issue":"2","key":"261_CR46","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1007\/s10115-007-0070-x","volume":"15","author":"A Zhou","year":"2008","unstructured":"Zhou A, Cao F, Qian W, Jin C (2008) Tracking clusters in evolving data streams over sliding windows. Knowl Inform Syst 15(2): 181\u2013214","journal-title":"Knowl Inform Syst"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-009-0261-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-009-0261-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-009-0261-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,17]],"date-time":"2024-03-17T07:05:10Z","timestamp":1710659110000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-009-0261-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,22]]},"references-count":46,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,12]]}},"alternative-id":["261"],"URL":"https:\/\/doi.org\/10.1007\/s10115-009-0261-8","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,10,22]]}}}