{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T08:29:45Z","timestamp":1775809785713,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T00:00:00Z","timestamp":1638230400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T00:00:00Z","timestamp":1638230400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Swarm Intell"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s11721-021-00202-9","type":"journal-article","created":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T19:23:45Z","timestamp":1638300225000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":165,"title":["Metaphor-based metaheuristics, a call for action: the elephant in the room"],"prefix":"10.1007","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1390-7536","authenticated-orcid":false,"given":"Claus","family":"Aranha","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0182-3469","authenticated-orcid":false,"given":"Christian L.","family":"Camacho Villal\u00f3n","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8432-4325","authenticated-orcid":false,"given":"Felipe","family":"Campelo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3971-0507","authenticated-orcid":false,"given":"Marco","family":"Dorigo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3295-3888","authenticated-orcid":false,"given":"Rub\u00e9n","family":"Ruiz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3855-9072","authenticated-orcid":false,"given":"Marc","family":"Sevaux","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1429-2836","authenticated-orcid":false,"given":"Kenneth","family":"S\u00f6rensen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5820-0473","authenticated-orcid":false,"given":"Thomas","family":"St\u00fctzle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,30]]},"reference":[{"key":"202_CR1","unstructured":"ACM Transactions on Evolutionary Learning and Optimization. Guidelines for Authors. https:\/\/dl.acm.org\/journal\/telo\/author-guidelines (2021). Version visited last on March 26, 2021"},{"key":"202_CR2","doi-asserted-by":"crossref","unstructured":"Camacho Villal\u00f3n, C.L., Dorigo, M., & St\u00fctzle, T. (2018). Why the intelligent water drops cannot be considered as a novel algorithm. In: M.\u00a0Dorigo, M.\u00a0Birattari, C.\u00a0Blum, A.L. Christensen, A.\u00a0Reina, V.\u00a0Trianni (eds.) Swarm Intelligence, 11th International Conference, ANTS 2018, Lecture Notes in Computer Science, vol. 11172, (pp. 302\u2013314). Springer.","DOI":"10.1007\/978-3-030-00533-7_24"},{"issue":"3\u20134","key":"202_CR3","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s11721-019-00165-y","volume":"13","author":"CL Camacho Villal\u00f3n","year":"2019","unstructured":"Camacho Villal\u00f3n, C. L., Dorigo, M., & St\u00fctzle, T. (2019). The intelligent water drops algorithm: why it cannot be considered a novel algorithm. Swarm Intelligence, 13(3\u20134), 173\u2013192.","journal-title":"Swarm Intelligence"},{"key":"202_CR4","doi-asserted-by":"crossref","unstructured":"Camacho Villal\u00f3n, C. L., St\u00fctzle, T., & Dorigo, M. (2020). Grey wolf, firefly and bat algorithms: Three widespread algorithms that do not contain any novelty. In: International Conference on Swarm Intelligence, (pp. 121\u2013133). Springer (2020)","DOI":"10.1007\/978-3-030-60376-2_10"},{"key":"202_CR5","unstructured":"Camacho Villal\u00f3n, C. L., St\u00fctzle, T., & Dorigo, M (2021). Cuckoo search $$\\equiv $$ ($$\\mu +\\lambda $$)\u2013evolution strategy \u2014 A rigorous analysis of an algorithm that has been misleading the research community for more than 10 years and nobody seems to have noticed. Technical Report TR\/IRIDIA\/2021-006, IRIDIA, Universit\u00e9 Libre de Bruxelles, Belgium."},{"key":"202_CR6","unstructured":"Campelo, F., & Aranha, C. (2021). Evolutionary computation bestiary. https:\/\/github.com\/fcampelo\/EC-Bestiary (2021). Version visited last on 26 March."},{"key":"202_CR7","unstructured":"Dorigo, M. (2016). Swarm intelligence: A few things you need to know if you want to publish in this journal. https:\/\/www.springer.com\/cda\/content\/document\/cda_downloaddocument\/Additional_submission_instructions.pdf (2016). Uploaded in November 2016"},{"issue":"10","key":"202_CR8","doi-asserted-by":"publisher","first-page":"3764","DOI":"10.1007\/s11227-015-1592-8","volume":"72","author":"S Fong","year":"2016","unstructured":"Fong, S., Wang, X., Xu, Q., Wong, R., Fiaidhi, J., & Mohammed, S. (2016). Recent advances in metaheuristic algorithms: Does the makara dragon exist? The Journal of Supercomputing, 72(10), 3764\u20133786.","journal-title":"The Journal of Supercomputing"},{"issue":"19","key":"202_CR9","doi-asserted-by":"publisher","first-page":"5573","DOI":"10.1007\/s00500-016-2471-9","volume":"21","author":"C Garc\u00eda-Mart\u00ednez","year":"2017","unstructured":"Garc\u00eda-Mart\u00ednez, C., Guti\u00e9rrez, P. D., Molina, D., Lozano, M., & Herrera, F. (2017). Since CEC 2005 competition on real-parameter optimisation: a decade of research, progress and comparative analysis weakness. Soft Computing, 21(19), 5573\u20135583.","journal-title":"Soft Computing"},{"key":"202_CR11","unstructured":"Journal of Heuristics. Policies on Heuristic Search Research. https:\/\/www.springer.com\/journal\/10732\/updates\/17199246 (2015). Version visited last on March 26, 2021."},{"issue":"4","key":"202_CR10","doi-asserted-by":"publisher","first-page":"719","DOI":"10.1007\/s11047-012-9322-0","volume":"11","author":"G Melvin","year":"2012","unstructured":"Melvin, G., Dodd, T. J., & Gro\u00df, R. (2012). Why GSA: a gravitational search algorithm is not genuinely based on the law of gravity. Natural Computing, 11(4), 719\u2013720.","journal-title":"Natural Computing"},{"issue":"1","key":"202_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-019-0050-8","volume":"1","author":"MA Lones","year":"2020","unstructured":"Lones, M. A. (2020). Mitigating metaphors: A comprehensible guide to recent nature-inspired algorithms. SN Computer Science, 1(1), 1\u201312.","journal-title":"SN Computer Science"},{"key":"202_CR13","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.ins.2014.01.026","volume":"267","author":"AP Piotrowski","year":"2014","unstructured":"Piotrowski, A. P., Napiorkowski, J. J., & Rowinski, P. M. (2014). How novel is the novel black hole optimization approach? Information Sciences, 267, 191\u2013200.","journal-title":"Information Sciences"},{"issue":"7","key":"202_CR14","doi-asserted-by":"publisher","first-page":"1224","DOI":"10.1016\/j.ins.2010.12.006","volume":"181","author":"D Simon","year":"2011","unstructured":"Simon, D., Rarick, R., Ergezer, M., & Du, D. (2011). Analytical and numerical comparisons of biogeography-based optimization and genetic algorithms. Information Sciences, 181(7), 1224\u20131248.","journal-title":"Information Sciences"},{"issue":"1","key":"202_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1111\/itor.12001","volume":"22","author":"K S\u00f6rensen","year":"2015","unstructured":"S\u00f6rensen, K. (2015). Metaheuristics\u2013the metaphor exposed. International Transactions in Operational Research, 22(1), 3\u201318.","journal-title":"International Transactions in Operational Research"},{"key":"202_CR16","doi-asserted-by":"crossref","unstructured":"S\u00f6rensen, K. Sevaux, M., & Glover, F. (2017). A history of metaheuristics. arXiv preprint arXiv:1704.00853.","DOI":"10.1007\/978-3-319-07124-4_4"},{"issue":"1","key":"202_CR17","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1111\/itor.12443","volume":"26","author":"K S\u00f6rensen","year":"2019","unstructured":"S\u00f6rensen, K., Arnold, F., & Palhazi Cuervo, D. (2019). A critical analysis of the improved Clarke and Wright savings algorithm. International Transactions in Operational Research, 26(1), 54\u201363.","journal-title":"International Transactions in Operational Research"},{"key":"202_CR18","unstructured":"Swan, J., Adriaensen, S., Bishr, M., & Burke, et al. (2015). A research agenda for metaheuristic standardization. In: Proceedings of the XI Metaheuristics International Conference, pp. 1-3."},{"key":"202_CR19","doi-asserted-by":"crossref","unstructured":"Tzanetos, A., & Dounias, G. (2020). Nature inspired optimization algorithms or simply variations of metaheuristics? Artificial Intelligence Review,1\u201322,","DOI":"10.1007\/s10462-020-09893-8"},{"issue":"2","key":"202_CR20","doi-asserted-by":"publisher","first-page":"50","DOI":"10.4018\/jamc.2010040104","volume":"12","author":"D Weyland","year":"2010","unstructured":"Weyland, D. (2010). A rigorous analysis of the harmony search algorithm: How the research community can be misled by a novel methodology. International Journal of Applied Metaheuristic Computing, 12(2), 50\u201360.","journal-title":"International Journal of Applied Metaheuristic Computing"},{"key":"202_CR21","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.orp.2015.04.001","volume":"2","author":"D Weyland","year":"2015","unstructured":"Weyland, D. (2015). A critical analysis of the harmony search algorithm: How not to solve Sudoku. Operations Research Perspectives, 2, 97\u2013105.","journal-title":"Operations Research Perspectives"}],"container-title":["Swarm Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11721-021-00202-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11721-021-00202-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11721-021-00202-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,5]],"date-time":"2022-02-05T08:44:44Z","timestamp":1644050684000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11721-021-00202-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,30]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["202"],"URL":"https:\/\/doi.org\/10.1007\/s11721-021-00202-9","relation":{},"ISSN":["1935-3812","1935-3820"],"issn-type":[{"value":"1935-3812","type":"print"},{"value":"1935-3820","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,30]]},"assertion":[{"value":"29 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}