{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,22]],"date-time":"2026-02-22T11:14:21Z","timestamp":1771758861243,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"19","license":[{"start":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T00:00:00Z","timestamp":1686700800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T00:00:00Z","timestamp":1686700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902003"],"award-info":[{"award-number":["61902003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2023,10]]},"DOI":"10.1007\/s10489-023-04601-9","type":"journal-article","created":{"date-parts":[[2023,6,14]],"date-time":"2023-06-14T16:01:50Z","timestamp":1686758510000},"page":"21858-21874","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Dual deep Q-learning network guiding a multiagent path planning approach for virtual fire emergency scenarios"],"prefix":"10.1007","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1266-1864","authenticated-orcid":false,"given":"Wen","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Chen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Siyuan","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,14]]},"reference":[{"key":"4601_CR1","doi-asserted-by":"crossref","unstructured":"Van Hasselt H, Guez A, Silver D (2016) Deep reinforcement learning with Double Q-learning[C]. Proceedings of the AAAI Conference on Artificial Intelligence 30(1)","DOI":"10.1609\/aaai.v30i1.10295"},{"issue":"3","key":"4601_CR2","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/s11517-021-02331-z","volume":"59","author":"B Haznedar","year":"2021","unstructured":"Haznedar B, Arslan MT, Kalinli A (2021) Optimizing ANFIS using simulated annealing algorithm for classification of microarray gene expression cancer data[J]. Medical & Biological Engineering & Computing 59(3):497\u2013509","journal-title":"Medical & Biological Engineering & Computing"},{"key":"4601_CR3","doi-asserted-by":"crossref","unstructured":"Wang B, Xie Y, Zhou S et al (2017) Reversible Data Hiding Based on DNA Computing[J]. Computational Intelligenceand Neuroscience 1-9","DOI":"10.1155\/2017\/7276084"},{"issue":"5187","key":"4601_CR4","doi-asserted-by":"publisher","first-page":"1021","DOI":"10.1126\/science.7973651","volume":"266","author":"L Adleman","year":"1994","unstructured":"Adleman L (1994) Molecular computation of solutions to combinatorial problems[J]. Science 266(5187):1021\u20131024","journal-title":"Science"},{"issue":"24","key":"4601_CR5","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.neucom.2019.11.098","volume":"3","author":"G Zhong","year":"2020","unstructured":"Zhong G, Li T, Jiao W et al (2020) DNA computing inspired deep networks design[J]. Neurocomputing 3(24):140\u2013147","journal-title":"Neurocomputing"},{"key":"4601_CR6","doi-asserted-by":"crossref","unstructured":"Hussien HH (2019) DNA computing for RGB image encryption with genetic algorithm[C]. In 2019 14th international conference on computer engineering and systems (ICCES). IEEE, 169-173","DOI":"10.1109\/ICCES48960.2019.9068136"},{"issue":"1","key":"4601_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-018-37186-2","volume":"9","author":"L Sun","year":"2019","unstructured":"Sun L, Kong X, Xu J et al (2019) A hybrid gene selection method based on ReliefF and ant colony optimization algorithm for tumor classification[J]. Sci Rep 9(1):1\u201314","journal-title":"Sci Rep"},{"issue":"2","key":"4601_CR8","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1142\/S1793005720500143","volume":"16","author":"M Mondal","year":"2020","unstructured":"Mondal M, Ray KS (2020) Prediction of visibility under radiation fog by DNA computing[J]. New Mathematics and Natural Computation 16(2):231\u2013254","journal-title":"New Mathematics and Natural Computation"},{"issue":"3","key":"4601_CR9","first-page":"731","volume":"75","author":"N Jafarzadeh","year":"2016","unstructured":"Jafarzadeh N, Iranmanesh A (2016) A new graph theoretical method for analyzing DNA sequences based on genetic codes[J]. MATCH-Commun Math Comput Chem 75(3):731\u2013742","journal-title":"MATCH-Commun Math Comput Chem"},{"key":"4601_CR10","doi-asserted-by":"crossref","unstructured":"Liu R, Wang Y (2019) Research on TSP Solution Based on Genetic Algorithm[C]. In 2019 IEEE\/ACIS 18th International Conference on Computer and Information Science (ICIS). IEEE","DOI":"10.1109\/ICIS46139.2019.8940186"},{"key":"4601_CR11","doi-asserted-by":"crossref","unstructured":"Yang R, Zhang C, Gao R (2017) A new bionic method inspired by DNA computation to solve the hamiltonian path problem[C]. 2017 IEEE International Conference on Information and Automation (ICIA). IEEE 219-225","DOI":"10.1109\/ICInfA.2017.8078909"},{"issue":"547","key":"4601_CR12","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1016\/j.ins.2020.08.102","volume":"1","author":"WM Elsayed","year":"2021","unstructured":"Elsayed WM, Elmogy M, El-Desouky BS (2021) DNA sequence reconstruction based on innovated hybridization technique of probabilistic cellular automata and particle swarm optimization. Inf Sci 1(547):828\u2013840","journal-title":"Inf Sci"},{"issue":"2","key":"4601_CR13","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/TNB.2020.2971644","volume":"19","author":"X Li","year":"2020","unstructured":"Li X, Wang B, Lv H et al (2020) Constraining DNA sequences with a triplet-bases unpaired. IEEE Trans Nanobiosci 19(2):299\u2013303","journal-title":"IEEE Trans Nanobiosci"},{"key":"4601_CR14","doi-asserted-by":"publisher","first-page":"905","DOI":"10.3389\/fbioe.2022.905983","volume":"10","author":"K Shi","year":"2022","unstructured":"Shi K, Huang L, Jiang D, Sun Y, Tong X, Xie Y, Fang Z (2022) Path planning optimization of intelligent vehicle based on improved genetic and ant colony hybrid algorithm[J]. Frontiers in Bioengineering and Biotechnology 10:905\u2013983","journal-title":"Frontiers in Bioengineering and Biotechnology"},{"key":"4601_CR15","doi-asserted-by":"crossref","unstructured":"Liu Y, Jiang D, Xu C et al (2022) Deep learning based 3D target detection for indoor scenes[J]. Applied Intelligence 1-14","DOI":"10.1109\/CVCI56766.2022.9964855"},{"key":"4601_CR16","doi-asserted-by":"crossref","unstructured":"Yun J, Jiang D, Sun Y, Huang L, Tao B, Jiang G, Kong J, Weng Y, Li G, Fang Z (2022) Grasping pose detection for loose stacked object based on convolutional neural network with multiple self-powered sensors information[J]. IEEE Sensors Journal","DOI":"10.1109\/JSEN.2022.3190560"},{"key":"4601_CR17","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1016\/j.asoc.2018.04.015","volume":"68","author":"H Liu","year":"2018","unstructured":"Liu H, Xu B, Lu D et al (2018) A path planning approach for crowd evacuation in buildings based on improved artificial bee colony algorithm[J]. Appl Soft Comput 68:360\u2013376","journal-title":"Appl Soft Comput"},{"key":"4601_CR18","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1613\/jair.1.11396","volume":"64","author":"FL Da Silva","year":"2019","unstructured":"Da Silva FL, Costa AHR (2019) A survey on transfer learning for multiagent reinforcement learning systems[J]. Journal of Artificial Intelligence Research 64:645\u2013703","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"2","key":"4601_CR19","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1007\/s10462-021-09996-w","volume":"55","author":"S Gronauer","year":"2022","unstructured":"Gronauer S, Diepold K (2022) Multi-agent deep reinforcement learning: A survey[J]. Artif Intell Rev 55(2):895\u2013943","journal-title":"Artif Intell Rev"},{"key":"4601_CR20","doi-asserted-by":"crossref","unstructured":"Wang X, Wang S, Liang X et al (2022) Deep reinforcement learning: a survey[J]. IEEE Transactions on Neural Networks and Learning Systems 1-15","DOI":"10.1109\/TNNLS.2022.3207346"},{"key":"4601_CR21","doi-asserted-by":"crossref","unstructured":"Oroojlooy A, Hajinezhad D (2022) A review of cooperative multi-agent deep reinforcement learning[J]. Applied Intelligence 1-46","DOI":"10.1007\/s10489-022-04105-y"},{"issue":"03","key":"4601_CR22","doi-asserted-by":"publisher","first-page":"2159","DOI":"10.1142\/S0218001421590102","volume":"35","author":"Z Yin","year":"2021","unstructured":"Yin Z, Yang J, Zhang Q et al (2021) DNA computing model for satisfiability problem based on hybridization chain reaction[J]. Int J Pattern Recognit Artif Intell 35(03):2159\u20132170","journal-title":"Int J Pattern Recognit Artif Intell"},{"issue":"5","key":"4601_CR23","doi-asserted-by":"publisher","first-page":"8577","DOI":"10.1109\/JIOT.2019.2921159","volume":"6","author":"C Qiu","year":"2019","unstructured":"Qiu C, Hu Y, Chen Y et al (2019) Deep deterministic policy gradient (DDPG)-based energy harvesting wireless communications[J]. IEEE Internet Things J 6(5):8577\u20138588","journal-title":"IEEE Internet Things J"},{"key":"4601_CR24","doi-asserted-by":"crossref","unstructured":"Prasad PC, Jaiswal A, Shakya S et al (2021) Portfolio Optimization: A Study of Nepal Stock Exchange[C]. Proceedings of International Conference on Sustainable Expert Systems. Springer, Singapore 659-672","DOI":"10.1007\/978-981-33-4355-9_49"},{"issue":"1","key":"4601_CR25","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1007\/s11227-021-03878-2","volume":"78","author":"J Li","year":"2022","unstructured":"Li J, Chen Y, Zhao XN et al (2022) An improved DQN path planning algorithm[J]. J Supercomput 78(1):616\u2013639","journal-title":"J Supercomput"},{"key":"4601_CR26","doi-asserted-by":"crossref","unstructured":"Zuo G, Du T, Lu J (2017) Double DQN method for object detection[C]. 2017 Chinese Automation Congress (CAC). IEEE 6727-6732","DOI":"10.1109\/CAC.2017.8243989"},{"key":"4601_CR27","doi-asserted-by":"crossref","unstructured":"Min K, Kim H, Huh K. (2018) Deep Q Learning based high level driving policy determination[C]. IEEE Intelligent Vehicles Symposium (IV). IEEE 226-231","DOI":"10.1109\/IVS.2018.8500645"},{"key":"4601_CR28","doi-asserted-by":"crossref","unstructured":"Mnih V, Kavukcuoglu K, Silver D et al (2015) Human-level control through deep reinforcement learning[J]. Nature 518(7540):529\u2013533","DOI":"10.1038\/nature14236"},{"key":"4601_CR29","unstructured":"Duan Y, Chen X, Houthooft R, Schulman J, Abbeel P (2016) Benchmarking deep reinforcement learning for continuous control[C]. In International conference on machine learning (PMLR) 1329-1338"},{"issue":"1","key":"4601_CR30","doi-asserted-by":"publisher","DOI":"10.1002\/cav.2035","volume":"33","author":"W Zhou","year":"2022","unstructured":"Zhou W, Jiang W, Jie B et al (2022) Multiagent evacuation framework for a virtual fire emergency scenario based on generative adversarial imitation learning[J]. Computer Animation and Virtual Worlds 33(1):e2035","journal-title":"Computer Animation and Virtual Worlds"},{"issue":"1","key":"4601_CR31","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1007\/s11227-021-03878-2","volume":"78","author":"J Li","year":"2022","unstructured":"Li J, Chen Y, Zhao XN et al (2022) An improved DQN path planning algorithm[J]. J Supercomput 78(1):616\u2013639","journal-title":"J Supercomput"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-023-04601-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-023-04601-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-023-04601-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,18]],"date-time":"2023-10-18T13:14:17Z","timestamp":1697634857000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-023-04601-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,14]]},"references-count":31,"journal-issue":{"issue":"19","published-print":{"date-parts":[[2023,10]]}},"alternative-id":["4601"],"URL":"https:\/\/doi.org\/10.1007\/s10489-023-04601-9","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,14]]},"assertion":[{"value":"29 March 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}