{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T20:36:48Z","timestamp":1772570208438,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2018,9,7]],"date-time":"2018-09-07T00:00:00Z","timestamp":1536278400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Evol. Intel."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s12065-018-0168-y","type":"journal-article","created":{"date-parts":[[2018,9,7]],"date-time":"2018-09-07T13:55:39Z","timestamp":1536328539000},"page":"31-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":133,"title":["Optimization using lion algorithm: a biological inspiration from lion\u2019s social behavior"],"prefix":"10.1007","volume":"11","author":[{"given":"Rajakumar","family":"Boothalingam","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"168_CR1","volume-title":"Handbook of natural computing","author":"G Rozenberg","year":"2011","unstructured":"Rozenberg G, Bck T, Kok JN (2011) Handbook of natural computing, 1st edn. Springer Publishing Company, New York","edition":"1"},{"issue":"9","key":"168_CR2","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MC.2016.292","volume":"49","author":"XS Yang","year":"2016","unstructured":"Yang XS, Deb S, Fong S, He X, Zhao YX (2016) From swarm intelligence to metaheuristics: nature-inspired optimization algorithms. Computer 49(9):52\u201359","journal-title":"Computer"},{"issue":"1","key":"168_CR3","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/MIS.2004.1265875","volume":"19","author":"N Shadbolt","year":"2004","unstructured":"Shadbolt N (2004) Nature-inspired computing. IEEE J Intell Syst 19(1):2\u20133","journal-title":"IEEE J Intell Syst"},{"key":"168_CR4","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/978-3-642-16544-3_2","volume-title":"Bioinspired Computation in Combinatorial Optimization","author":"Frank Neumann","year":"2010","unstructured":"Neumann F, Witt C (2010) Bioinspired computation in combinatorial optimization algorithms and their computational complexity. Natural computing series, XII, p 216"},{"key":"168_CR5","volume-title":"Handbook of natural computing","author":"D Corne","year":"2010","unstructured":"Corne D, Deb K, Knowles J, Yao X (2010) Selected applications of natural computing. In: Rozenberg G, Back T, Kok JN (eds) Handbook of natural computing. Springer, Berlin"},{"key":"168_CR6","volume-title":"Adaptation in natural and artificial systems","author":"JH Holland","year":"1975","unstructured":"Holland JH (1975) Adaptation in natural and artificial systems. University of Michigan Press, Ann Arbor"},{"issue":"4","key":"168_CR7","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MC.2009.104","volume":"42","author":"J Bongard","year":"2009","unstructured":"Bongard J (2009) Biologically inspired computing. IEEE Comput J 42(4):95\u201398","journal-title":"IEEE Comput J"},{"issue":"6","key":"168_CR8","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/5992.881711","volume":"2","author":"N Forbes","year":"2000","unstructured":"Forbes N (2000) Biologically inspired computing. Comput Sci Eng 2(6):83\u201387","journal-title":"Comput Sci Eng"},{"issue":"4","key":"168_CR9","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1109\/TCSI.2009.2027626","volume":"57","author":"HR Mahdiani","year":"2010","unstructured":"Mahdiani HR, Ahmadi A, Fakhraie SM, Lucas C (2010) Bio-inspired imprecise computational blocks for efficient VLSI implementation of soft-computing applications. IEEE Trans Circuits Syst I Regul Pap 57(4):1549\u20138328","journal-title":"IEEE Trans Circuits Syst I Regul Pap"},{"key":"168_CR10","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.protcy.2012.10.016","volume":"6","author":"B.R. Rajakumar","year":"2012","unstructured":"Rajakumar BR (2012) The lion\u2019s algorithm: a new nature-inspired search algorithm. In: Second international conference on communication, computing and security, vol 6, pp\u00a0126\u2013135. https:\/\/doi.org\/10.1016\/j.protcy.2012.10.016","journal-title":"Procedia Technology"},{"key":"168_CR11","doi-asserted-by":"crossref","unstructured":"Rajakumar BR (2014) Lion algorithm for standard and large scale bilinear system identification: a global optimization based on lion\u2019s social behavior. In: 2014 IEEE congress on evolutionary computation (CEC), pp\u00a02116\u20132123","DOI":"10.1109\/CEC.2014.6900561"},{"key":"168_CR12","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1515\/jisys-2016-0175","volume":"27","author":"S Chander","year":"2016","unstructured":"Chander S, Vijaya P, Dhyani P (2016) ADOFL: multi-kernel-based adaptive directive operative fractional lion optimisation algorithm for data clustering. J Intell Syst 27:317","journal-title":"J Intell Syst"},{"key":"168_CR13","doi-asserted-by":"crossref","unstructured":"Babers R, Hassanien AE, Ghali NI (2015) A nature-inspired metaheuristic lion optimization algorithm for community detection. In: 2015 11th IEEE international computer engineering conference (ICENCO)","DOI":"10.1109\/ICENCO.2015.7416351"},{"key":"168_CR14","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.aej.2016.12.013","volume":"57","author":"S Chander","year":"2017","unstructured":"Chander S, Vijaya P, Dhyani P (2017) Multi kernel and dynamic fractional lion optimization algorithm for data clustering. Alex Eng J 57:267","journal-title":"Alex Eng J"},{"issue":"1","key":"168_CR15","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1078\/1616-5047-00090","volume":"68","author":"H Bauer","year":"2003","unstructured":"Bauer H, Iongh de HH, Silvestre I (2003) Lion social behaviour in the West and Central African Savanna belt. Mamm Biol 68(1):239\u2013243","journal-title":"Mamm Biol"},{"key":"168_CR16","volume-title":"Artificial intelligence through simulated evolution","author":"LJ Fogel","year":"1966","unstructured":"Fogel LJ, Owens AJ, Walsh MJ (1966) Artificial intelligence through simulated evolution. Wiley Publishing, New York"},{"key":"168_CR17","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.tcs.2010.10.035","volume":"425","author":"B Doerr","year":"2012","unstructured":"Doerr B, Happ E, Klein C (2012) Crossover can probably be useful in evolutionary computation. Theor Comput Sci 425:17\u201333","journal-title":"Theor Comput Sci"},{"issue":"1","key":"168_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1162\/evco.1993.1.1.1","volume":"1","author":"T Back","year":"1993","unstructured":"Back T, Hoffmeister F, Schwefel HP (1993) An overview of evolutionary algorithms for parameter optimization. J Evol Comput 1(1):1\u201324 (De Jong K (ed), Cambridge: MIT Press)","journal-title":"J Evol Comput"},{"key":"168_CR19","unstructured":"Jong De KA (1975) An analysis of the behavior of a class of genetic adaptive systems. Doctoral thesis, Dept. Computer and Communication Sciences, University of Michigan, Ann Arbor"},{"key":"168_CR20","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1038\/scientificamerican0597-52","volume":"276","author":"C Packer","year":"2016","unstructured":"Packer C, Pusey AE (2016) Divided we fall: cooperation among lions. Sci Am 276:52\u201359","journal-title":"Sci Am"},{"issue":"5859","key":"168_CR21","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1038\/296740a0","volume":"296","author":"C Packer","year":"1982","unstructured":"Packer C, Pusey AE (1982) Cooperation and competition within coalitions of male lions: Kin selection or game theory? Nature 296(5859):740\u2013742","journal-title":"Nature"},{"issue":"1","key":"168_CR22","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/0003-3472(95)80157-X","volume":"49","author":"J Grinnell","year":"1995","unstructured":"Grinnell J, Packer C, Pusey AE (1995) Cooperation in male lions: Kinship, reciprocity or mutualism? Anim Behav 49(1):95\u2013105","journal-title":"Anim Behav"},{"issue":"5859","key":"168_CR23","first-page":"740","volume":"296","author":"C Packer","year":"1982","unstructured":"Packer C, Pusey AE (1982) Cooperation and competition within coalition of male lions: Kin selection or game theory. Macmillan J 296(5859):740\u2013742","journal-title":"Macmillan J"},{"key":"168_CR24","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1016\/j.ins.2016.01.055","volume":"346","author":"E Lotfi","year":"2016","unstructured":"Lotfi E, Akbarzadeh-T MR (2016) A winner-take-all approach to emotional neural networks with universal approximation property. Inform Sci 346:369\u2013388","journal-title":"Inform Sci"},{"issue":"5","key":"168_CR25","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1109\/TEVC.2009.2011992","volume":"13","author":"S He","year":"2009","unstructured":"He S, Wu QH, Saunders JR (2009) Group search optimizer: an optimization algorithm inspired by animal searching behavior. IEEE Trans Evol Comput 13(5):973\u2013990","journal-title":"IEEE Trans Evol Comput"},{"issue":"1","key":"168_CR26","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.amc.2009.03.090","volume":"214","author":"D Karaboga","year":"2009","unstructured":"Karaboga D, Akay B (2009) A comparative study of artificial bee colony algorithm. Appl Math Comput 214(1):108\u2013132","journal-title":"Appl Math Comput"},{"issue":"2","key":"168_CR27","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/4235.771163","volume":"3","author":"X Yao","year":"1999","unstructured":"Yao X, Liu Y, Lin G (1999) Evolutionary programming made faster. IEEE Trans Evol Comput 3(2):82\u2013102","journal-title":"IEEE Trans Evol Comput"},{"key":"168_CR28","volume-title":"Evolutionary computation: toward a new philosophy of machine intelligence","author":"DB Fogel","year":"1995","unstructured":"Fogel DB (1995) Evolutionary computation: toward a new philosophy of machine intelligence. IEEE Press, New York"},{"key":"168_CR29","unstructured":"Fogel LJ, Owens AJ, Walsh MJ (1965) Artificial intelligence through a simulation of evolution. In: Proc. 2nd cybern. sci. symp. biophysics cybern. syst., Washington: Spartan Books, pp\u00a0131\u2013155"},{"key":"168_CR30","volume-title":"Evolution and optimum seeking","author":"HP Schwefel","year":"1995","unstructured":"Schwefel HP (1995) Evolution and optimum seeking. Wiley, New York"},{"issue":"3","key":"168_CR31","first-page":"467","volume":"26","author":"X Yao","year":"1997","unstructured":"Yao X, Liu Y (1997) Fast evolution strategies. Control Cybern 26(3):467\u2013496","journal-title":"Control Cybern"},{"key":"168_CR32","doi-asserted-by":"crossref","unstructured":"Hansen N, Ostermeier A (1996) Adapting arbitrary normal mutation distributions in evolution strategies: the covariance matrix adaptation. In: IEEE int. conf. evolution. comput. (ICEC) proc, pp\u00a0312\u2013317","DOI":"10.1109\/ICEC.1996.542381"},{"key":"168_CR33","volume-title":"Towards a new evolutionary computation","author":"N Hansen","year":"2006","unstructured":"Hansen N (2006) The CMA evolution strategy: a comparing review. In: Lozano JA, Larraaga P, Inza I, Bengoetxea E (eds) Towards a new evolutionary computation. Springer, Berlin"},{"key":"168_CR34","unstructured":"Hedar A, Fukushima M (2006) Evolution strategies learned with automatic termination criteria. In: Proceedings of SCIS-ISIS 2006, Tokyo, Japan"},{"key":"168_CR35","first-page":"41","volume-title":"Genetic algorithms in search optimization and machine learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg DE (1989) Genetic algorithms in search optimization and machine learning. Addison Wesley, Reading, p 41"},{"key":"168_CR36","doi-asserted-by":"publisher","unstructured":"Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of IEEE international conference on neural networks, IV, pp\u00a01942\u20131948. https:\/\/doi.org\/10.1109\/ICNN.1995.488968","DOI":"10.1109\/ICNN.1995.488968"},{"key":"168_CR37","unstructured":"Karaboga D (2005) An idea based on honey bee swarm for numerical optimization. Technical Report-TR06, Erciyes University, Engineering Faculty, Computer Engineering Department"},{"issue":"1","key":"168_CR38","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/4235.585893","volume":"1","author":"DH Wolpert","year":"1997","unstructured":"Wolpert DH, Macready WG (1997) No free lunch theorems for optimization. IEEE Trans Evol Comput 1(1):67\u201382","journal-title":"IEEE Trans Evol Comput"},{"key":"168_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2017.04.019","volume":"83","author":"YP Cheng","year":"2017","unstructured":"Cheng YP, Li Y, Wang G, Zheng Y-F, Cui XT (2017) A novel bacterial foraging optimization algorithm for feature selection. Expert Syst Appl 83:1\u201317","journal-title":"Expert Syst Appl"},{"key":"168_CR40","unstructured":"Yang X-S, Deb S (2009) Cuckoo search via L\u00e9vy flights. In: World congress on nature and biologically inspired computing (NaBIC 2009), IEEE Publications, pp\u00a0210\u2013214"},{"key":"168_CR41","volume-title":"Nature inspired metaheuristic algorithms","author":"X-S Yang","year":"2010","unstructured":"Yang X-S (2010) Nature inspired metaheuristic algorithms, 2nd edn. Luniver Press, London","edition":"2"},{"key":"168_CR42","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.knosys.2015.07.006","volume":"89","author":"S Mirjalili","year":"2015","unstructured":"Mirjalili S (2015) Moth-flame optimization algorithm: a novel nature-inspired heuristic paradigm. Knowl Based Syst 89:228\u2013249","journal-title":"Knowl Based Syst"},{"issue":"4","key":"168_CR43","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1007\/s00521-015-1920-1","volume":"27","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S (2016) Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. J Neural Comput Appl 27(4):1053\u20131073","journal-title":"J Neural Comput Appl"},{"key":"168_CR44","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"SM Mirjalili","year":"2014","unstructured":"Mirjalili SM, Mirjalili A, Lewis (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361","journal-title":"Adv Eng Softw"},{"key":"168_CR45","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367","journal-title":"Adv Eng Softw"},{"key":"168_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compstruc.2016.03.001","volume":"169","author":"A Askarzadeh","year":"2016","unstructured":"Askarzadeh A (2016) A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput Struct 169:1\u201312","journal-title":"Comput Struct"},{"key":"168_CR47","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1016\/j.eswa.2017.12.039","volume":"97","author":"LL Li","year":"2018","unstructured":"Li LL, Yang YF, Wang C-H, Lin K-P (2018) Biogeography-based optimization based on population competition strategy for solving the substation location problem. Expert Syst Appl 97:290\u2013302","journal-title":"Expert Syst Appl"},{"key":"168_CR48","first-page":"18","volume":"22","author":"VK Price","year":"1997","unstructured":"Price VK, Storn MR (1997) Differential evolution: a simple evolution strategy for fast optimization. Dr Dobb\u2019s J 22:18\u201324","journal-title":"Dr Dobb\u2019s J"},{"issue":"13","key":"168_CR49","doi-asserted-by":"publisher","first-page":"2232","DOI":"10.1016\/j.ins.2009.03.004","volume":"179","author":"E Rashedi","year":"2009","unstructured":"Rashedi E, Nezamabadi-Pour H, Saryazdi S (2009) GSA: a gravitational search algorithm. Inf Sci 179(13):2232\u20132248","journal-title":"Inf Sci"},{"key":"168_CR50","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1177\/003754970107600201","volume":"76","author":"ZW Geem","year":"2001","unstructured":"Geem ZW, Kim JH, Loganathan GV (2001) A new heuristic optimization algorithm: harmony search. Simulation 76:60\u201368","journal-title":"Simulation"},{"issue":"11","key":"168_CR51","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/0895-7177(93)90204-C","volume":"18","author":"L Ingber","year":"1993","unstructured":"Ingber L (1993) Simulated annealing: practice versus theory. Math Comput Model 18(11):29\u201357","journal-title":"Math Comput Model"}],"container-title":["Evolutionary Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12065-018-0168-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-018-0168-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12065-018-0168-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,31]],"date-time":"2022-08-31T22:21:41Z","timestamp":1661984501000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12065-018-0168-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,7]]},"references-count":51,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["168"],"URL":"https:\/\/doi.org\/10.1007\/s12065-018-0168-y","relation":{},"ISSN":["1864-5909","1864-5917"],"issn-type":[{"value":"1864-5909","type":"print"},{"value":"1864-5917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,7]]},"assertion":[{"value":"30 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 September 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}