{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T02:39:48Z","timestamp":1772851188491,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"6-7","license":[{"start":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T00:00:00Z","timestamp":1715299200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T00:00:00Z","timestamp":1715299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SIViP"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11760-024-03236-8","type":"journal-article","created":{"date-parts":[[2024,5,10]],"date-time":"2024-05-10T11:01:56Z","timestamp":1715338916000},"page":"5333-5346","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Effective test-data generation using the modified black widow optimization algorithm"],"prefix":"10.1007","volume":"18","author":[{"given":"Bahman","family":"Arasteh","sequence":"first","affiliation":[]},{"given":"Ali","family":"Ghaffari","sequence":"additional","affiliation":[]},{"given":"Milad","family":"Khadir","sequence":"additional","affiliation":[]},{"given":"Mahsa","family":"Torkamanian-Afshar","sequence":"additional","affiliation":[]},{"given":"Sajad","family":"Pirahesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,10]]},"reference":[{"key":"3236_CR1","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s10836-014-5438-8","volume":"30","author":"B Arasteh","year":"2014","unstructured":"Arasteh, B., Miremadi, S.G., Rahmani, A.M.: Developing inherently resilient software against soft-errors based on algorithm level inherent features. J. Electron. Test. 30, 193\u2013212 (2014)","journal-title":"J. Electron. Test."},{"key":"3236_CR2","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1016\/j.sbspro.2014.07.519","volume":"143","author":"B Arasteh","year":"2014","unstructured":"Arasteh, B., Pirahesh, S., Zakeri, A., Arasteh, B.: Highly available and dependable e-learning services using grid system. Procedia Soc. Behav. Sci. 143, 471\u2013476 (2014). https:\/\/doi.org\/10.1016\/j.sbspro.2014.07.519","journal-title":"Procedia Soc. Behav. Sci."},{"issue":"5","key":"3236_CR3","first-page":"21","volume":"9","author":"SA Keshtgar","year":"2017","unstructured":"Keshtgar, S.A., Arasteh, B.B.: Enhancing software reliability against soft-error using minimum redundancy on critical data. Int. J. Comput. Netw. Inf. Secur. 9(5), 21 (2017)","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"3236_CR4","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s10664-021-10066-6","volume":"27","author":"R Pan","year":"2022","unstructured":"Pan, R., Bagherzadeh, M., Ghaleb, T.A., et al.: Test case selection and prioritization using machine learning: a systematic literature review. Empir. Softw. Eng. 27, 29 (2022). https:\/\/doi.org\/10.1007\/s10664-021-10066-6","journal-title":"Empir. Softw. Eng."},{"key":"3236_CR5","doi-asserted-by":"publisher","first-page":"9599","DOI":"10.1007\/s13369-019-03817-7","volume":"44","author":"M Khanna","year":"2019","unstructured":"Khanna, M., Chaudhary, A., Toofani, A., et al.: Performance comparison of multi-objective algorithms for test case prioritization during web application testing. Arab. J. Sci. Eng. 44, 9599\u20139625 (2019). https:\/\/doi.org\/10.1007\/s13369-019-03817-7","journal-title":"Arab. J. Sci. Eng."},{"issue":"3","key":"3236_CR6","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1504\/IJCAT.2017.088200","volume":"56","author":"M Khanna","year":"2017","unstructured":"Khanna, M., Chauhan, N., Sharma, D.K., Toofani, A.: Test case prioritisation during web application testing. Int. J. Comput. Appl. Technol. 56(3), 230\u2013243 (2017). https:\/\/doi.org\/10.1504\/IJCAT.2017.088200","journal-title":"Int. J. Comput. Appl. Technol."},{"issue":"3","key":"3236_CR7","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1016\/j.jksuci.2019.05.005","volume":"34","author":"S Pradhan","year":"2022","unstructured":"Pradhan, S., Ray, M., Swain, S.K.: Transition coverage based test case generation from state chart diagram. J. King Saud Univ. Comput. Inf. Sci. 34(3), 993\u20131002 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2019.05.005","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"3236_CR8","doi-asserted-by":"crossref","unstructured":"Khatun, S., Rabbi, K., Yaakub, C., Klaib, M. J.: A Random search based effective algorithm for pairwise test data generation. In: International Conference on Electrical, Control and Computer Engineering 2011 (InECCE) (2011)","DOI":"10.1109\/INECCE.2011.5953894"},{"key":"3236_CR9","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1016\/j.jss.2016.03.020","volume":"121","author":"MM Eler","year":"2016","unstructured":"Eler, M.M., Endo, A.T., Durelli, V.H.: An empirical study to quantify the characteristics of Java programs that may influence symbolic execution from a unit testing perspective. J. Syst. Softw. 121, 281\u2013297 (2016)","journal-title":"J. Syst. Softw."},{"key":"3236_CR10","unstructured":"Cohen, M. B., Colbourn, C. J., Ling, A. C.: Augmenting simulated annealing to build interaction test suites. In: 14th International Symposium on Software Reliability Engineering, 2003. ISSRE (2003)"},{"issue":"1\u20134","key":"3236_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/S0020-0255(00)00093-1","volume":"131","author":"J-C Lin","year":"2001","unstructured":"Lin, J.-C., Yeh, P.-L.: Automatic test data generation for path testing using GAs. Inf. Sci. 131(1\u20134), 47\u201364 (2001)","journal-title":"Inf. Sci."},{"key":"3236_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115446","volume":"183","author":"M Esnaashari","year":"2021","unstructured":"Esnaashari, M., Damia, A.H.: Automation of software test data generation using genetic algorithm and reinforcement learning. Expert Syst. Appl. 183, 115446 (2021)","journal-title":"Expert Syst. Appl."},{"key":"3236_CR13","doi-asserted-by":"publisher","first-page":"4593","DOI":"10.1007\/s13369-014-1074-y","volume":"39","author":"C Mao","year":"2014","unstructured":"Mao, C.: Generating test data for software structural testing based on particle swarm optimization. Arab. J. Sci. Eng. 39, 4593\u20134607 (2014)","journal-title":"Arab. J. Sci. Eng."},{"key":"3236_CR14","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.swevo.2014.10.003","volume":"20","author":"C Mao","year":"2015","unstructured":"Mao, C., Xiao, L., Yu, X., Chen, J.: Adapting ant colony optimization to generate test data for software structural testing. Swarm Evol. Comput. 20, 23\u201336 (2015)","journal-title":"Swarm Evol. Comput."},{"issue":"06","key":"3236_CR15","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1142\/S0218194017500358","volume":"27","author":"ZK Aghdam","year":"2017","unstructured":"Aghdam, Z.K., Arasteh, B.: An efficient method to generate test data for software structural testing using artificial bee colony optimization algorithm. Int. J. Softw. Eng. Knowl. Eng. 27(06), 951\u2013966 (2017)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"issue":"1","key":"3236_CR16","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2228","volume":"32","author":"A Ghaemi","year":"2020","unstructured":"Ghaemi, A., Arasteh, B.: SFLA-based heuristic method to generate software structural test data. J. Softw. Evol. Process 32(1), e2228 (2020)","journal-title":"J. Softw. Evol. Process"},{"key":"3236_CR17","doi-asserted-by":"crossref","unstructured":"Hayyolalam V., Kazem A.: Black Widow Optimization Algorithm: a novel meta-heuristic approach for solving engineering optimization problems. Eng. Appl. Artif. Intell. 87 (2020)","DOI":"10.1016\/j.engappai.2019.103249"},{"key":"3236_CR18","doi-asserted-by":"publisher","DOI":"10.4018\/IJAMC.2019040101","author":"M Khanna","year":"2019","unstructured":"Khanna, M., Chauhan, N., Sharma, D.K.: Search for prioritized test cases during web application testing. Int. J. Appl. Metaheuristic Comput. (2019). https:\/\/doi.org\/10.4018\/IJAMC.2019040101","journal-title":"Int. J. Appl. Metaheuristic Comput."},{"issue":"1","key":"3236_CR19","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2408","volume":"34","author":"B Arasteh","year":"2022","unstructured":"Arasteh, B., Fatolahzadeh, A., Kiani, F.: Savalan: multi objective and homogeneous method for software modules clustering. J. Softw. Evol. Process 34(1), e2408 (2022)","journal-title":"J. Softw. Evol. Process"},{"issue":"4","key":"3236_CR20","first-page":"449","volume":"14","author":"B Arasteh","year":"2020","unstructured":"Arasteh, B., Sadegi, R., Arasteh, K.: Araz: a software modules clustering method using the combination of particle swarm optimization and genetic algorithms. Intell. Decis. Technol. 14(4), 449\u2013462 (2020)","journal-title":"Intell. Decis. Technol."},{"issue":"3","key":"3236_CR21","doi-asserted-by":"publisher","first-page":"94","DOI":"10.6025\/jnt\/2018\/9\/3\/94-101","volume":"9","author":"B Arasteh","year":"2018","unstructured":"Arasteh, B.: Software fault-prediction using combination of neural network and naive bayes algorithm. J. Netw. Technol. 9(3), 94\u2013101 (2018)","journal-title":"J. Netw. Technol."},{"issue":"2","key":"3236_CR22","first-page":"251","volume":"55","author":"B Arasteh","year":"2021","unstructured":"Arasteh, B., Sadegi, R., Arasteh, K.: B\u00f6len: software module clustering method using the combination of shuffled frog leaping and genetic algorithm. Data Technol. Appl. 55(2), 251\u2013279 (2021)","journal-title":"Data Technol. Appl."},{"key":"3236_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118869","volume":"213","author":"A Bouyer","year":"2023","unstructured":"Bouyer, A., Beni, H.A., Arasteh, B., Aghaee, Z., Ghanbarzadeh, R.: FIP: a fast overlapping community-based influence maximization algorithm using probability coefficient of global diffusion in social networks. Expert Syst. Appl. 213, 118869 (2023). https:\/\/doi.org\/10.1016\/j.eswa.2022.118869","journal-title":"Expert Syst. Appl."},{"key":"3236_CR24","doi-asserted-by":"publisher","first-page":"3283","DOI":"10.1007\/s00521-022-07781-6","volume":"35","author":"B Arasteh","year":"2023","unstructured":"Arasteh, B.: Clustered design-model generation from a program source code using chaos-based metaheuristic algorithms. Neural Comput. Appl. 35, 3283\u20133305 (2023)","journal-title":"Neural Comput. Appl."}],"container-title":["Signal, Image and Video Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03236-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11760-024-03236-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11760-024-03236-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T08:24:37Z","timestamp":1721031877000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11760-024-03236-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,10]]},"references-count":24,"journal-issue":{"issue":"6-7","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["3236"],"URL":"https:\/\/doi.org\/10.1007\/s11760-024-03236-8","relation":{},"ISSN":["1863-1703","1863-1711"],"issn-type":[{"value":"1863-1703","type":"print"},{"value":"1863-1711","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,10]]},"assertion":[{"value":"26 July 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 August 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that no funds, grants, or other support were received during the preparation of this manuscript. The authors have no relevant financial or non-financial conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The data used in this research does not belong to any other person or third party and was prepared and generated by the researchers themselves during the research. The data of this research will be accessible to other researchers.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical and informed consent for data used"}}]}}