{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:28:34Z","timestamp":1776108514485,"version":"3.50.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T00:00:00Z","timestamp":1738022400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T00:00:00Z","timestamp":1738022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62203132"],"award-info":[{"award-number":["62203132"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62341303"],"award-info":[{"award-number":["62341303"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01901-w","type":"journal-article","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T08:57:40Z","timestamp":1738054660000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["NHBBWO: A novel hybrid butterfly-beluga whale optimization algorithm with the dynamic strategy for WSN coverage optimization"],"prefix":"10.1007","volume":"18","author":[{"given":"Xinyi","family":"Chen","sequence":"first","affiliation":[]},{"given":"Mengjian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Deguang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,28]]},"reference":[{"key":"1901_CR1","doi-asserted-by":"crossref","first-page":"102618","DOI":"10.1016\/j.simpat.2022.102618","volume":"120","author":"M Al Samara","year":"2022","unstructured":"Al Samara M, Bennis I, Abouaissa A, Lorenz P (2022) Enhanced efficient outlier detection and classification approach for WSNs. Simul Model Pract Theory 120:102618","journal-title":"Simul Model Pract Theory"},{"key":"1901_CR2","doi-asserted-by":"crossref","first-page":"26971","DOI":"10.1109\/ACCESS.2018.2833632","volume":"6","author":"A Tripathi","year":"2018","unstructured":"Tripathi A, Gupta HP, Dutta T, Mishra R, Shukla K, Jit S (2018) Coverage and connectivity in WSNs: a survey, research issues and challenges. IEEE Access 6:26971\u201326992","journal-title":"IEEE Access"},{"key":"1901_CR3","doi-asserted-by":"crossref","unstructured":"Sharma V, Beniwal R, Kumar V (2024) Multi-level trust-based secure and optimal IoT-WSN routing for environmental monitoring applications. J Supercomput 1\u201344","DOI":"10.1007\/s11227-023-05875-z"},{"issue":"5","key":"1901_CR4","doi-asserted-by":"crossref","first-page":"2670","DOI":"10.3390\/s23052670","volume":"23","author":"F Alharbi","year":"2023","unstructured":"Alharbi F, Zakariah M, Alshahrani R, Albakri A, Viriyasitavat W, Alghamdi AA (2023) Intelligent transportation using wireless sensor networks blockchain and license plate recognition. Sensors 23(5):2670","journal-title":"Sensors"},{"key":"1901_CR5","doi-asserted-by":"crossref","unstructured":"Jha S, Trivedi A, Pattanaik K, Gauttam H, Bellavista P (2023) Efficient data harvesting from boundary nodes for smart irrigation. Peer-to-Peer Netw Appl 1\u201324","DOI":"10.1007\/s12083-023-01577-8"},{"key":"1901_CR6","doi-asserted-by":"crossref","unstructured":"Mahor V, Padmavathy R, Chatterjee S (2023) Secure and lightweight authentication protocol for anonymous data access in cloud assisted IoT system. Peer-to-Peer Netw Appl 1\u201316","DOI":"10.1007\/s12083-023-01590-x"},{"key":"1901_CR7","doi-asserted-by":"crossref","first-page":"1581","DOI":"10.1016\/j.procs.2023.01.136","volume":"218","author":"S Mohapatra","year":"2023","unstructured":"Mohapatra S, Sahoo A, Mohanty S, Singh D (2023) IoT enabled ubiquitous healthcare system using predictive analytics. Proc Comput Sci 218:1581\u20131590","journal-title":"Proc Comput Sci"},{"key":"1901_CR8","doi-asserted-by":"crossref","unstructured":"Bian Q, Zhang Y, Song C, Wu A (2024) Flexible symmetric predicate encryption for data privacy in IoT environments. Peer-to-Peer Netw Appl 1\u20139","DOI":"10.1007\/s12083-023-01619-1"},{"key":"1901_CR9","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1007\/s11277-017-5063-9","volume":"100","author":"N Kulkarni","year":"2018","unstructured":"Kulkarni N, Prasad NR, Prasad R (2018) A novel sensor node deployment using low discrepancy sequences for WSN. Wirel Person Commun 100:241\u2013254","journal-title":"Wirel Person Commun"},{"key":"1901_CR10","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.inffus.2017.08.001","volume":"41","author":"W Fang","year":"2018","unstructured":"Fang W, Song X, Wu X, Sun J, Hu M (2018) Novel efficient deployment schemes for sensor coverage in mobile wireless sensor networks. Inf Fusion 41:25\u201336","journal-title":"Inf Fusion"},{"issue":"5","key":"1901_CR11","doi-asserted-by":"crossref","first-page":"4307","DOI":"10.1016\/j.aej.2021.03.007","volume":"60","author":"X Lu","year":"2021","unstructured":"Lu X, Su Y, Wu Q, Wei Y, Wang J (2021) An improved coverage gap fixing method for heterogenous wireless sensor network based on Voronoi polygons. Alex Eng J 60(5):4307\u20134313","journal-title":"Alex Eng J"},{"key":"1901_CR12","doi-asserted-by":"crossref","first-page":"102082","DOI":"10.1016\/j.adhoc.2020.102082","volume":"101","author":"F Hajjej","year":"2020","unstructured":"Hajjej F, Hamdi M, Ejbali R, Zaied M (2020) A distributed coverage hole recovery approach based on reinforcement learning for wireless sensor networks. Ad Hoc Netw 101:102082","journal-title":"Ad Hoc Netw"},{"key":"1901_CR13","doi-asserted-by":"crossref","first-page":"3123","DOI":"10.1007\/s00366-020-00996-y","volume":"37","author":"S Gupta","year":"2021","unstructured":"Gupta S, Deep K, Moayedi H, Foong LK, Assad A (2021) Sine cosine grey wolf optimizer to solve engineering design problems. Eng Comput 37:3123\u20133149","journal-title":"Eng Comput"},{"key":"1901_CR14","doi-asserted-by":"crossref","first-page":"122349","DOI":"10.1016\/j.eswa.2023.122349","volume":"239","author":"Z Yang","year":"2024","unstructured":"Yang Z (2024) Competing leaders grey wolf optimizer and its application for training multi-layer perceptron classifier. Expert Syst Appl 239:122349","journal-title":"Expert Syst Appl"},{"key":"1901_CR15","doi-asserted-by":"crossref","first-page":"102814","DOI":"10.1016\/j.simpat.2023.102814","volume":"128","author":"J Xie","year":"2023","unstructured":"Xie J, Zhang M, Jin B, Zhai J, Wang Z, Xiao J, Zhou J (2023) BACSSOC: a novel clustering method for mobile forest protection using wireless sensor network with lower energy consumption and lower latency. Simul Model Pract Theory 128:102814","journal-title":"Simul Model Pract Theory"},{"key":"1901_CR16","doi-asserted-by":"crossref","first-page":"110319","DOI":"10.1016\/j.asoc.2023.110319","volume":"142","author":"Z Li","year":"2023","unstructured":"Li Z (2023) A local opposition-learning golden-sine grey wolf optimization algorithm for feature selection in data classification. Appl Soft Comput 142:110319","journal-title":"Appl Soft Comput"},{"key":"1901_CR17","doi-asserted-by":"crossref","first-page":"117054","DOI":"10.1016\/j.energy.2020.117054","volume":"196","author":"X Lin","year":"2020","unstructured":"Lin X, Wu Y (2020) Parameters identification of photovoltaic models using niche-based particle swarm optimization in parallel computing architecture. Energy 196:117054","journal-title":"Energy"},{"issue":"3","key":"1901_CR18","doi-asserted-by":"crossref","first-page":"882","DOI":"10.1109\/JSEN.2016.2633409","volume":"17","author":"O Moh\u2019d Alia","year":"2016","unstructured":"Moh\u2019d Alia O, Al-Ajouri A (2016) Maximizing wireless sensor network coverage with minimum cost using harmony search algorithm. IEEE Sens J 17(3):882\u2013896","journal-title":"IEEE Sens J"},{"key":"1901_CR19","doi-asserted-by":"crossref","unstructured":"Senouci MR, Abdellaoui A (2017) Efficient sensor placement heuristics. In: 2017 IEEE international conference on communications (ICC) pp 1\u20136","DOI":"10.1109\/ICC.2017.7997101"},{"key":"1901_CR20","doi-asserted-by":"crossref","first-page":"109215","DOI":"10.1016\/j.knosys.2022.109215","volume":"251","author":"C Zhong","year":"2022","unstructured":"Zhong C, Li G, Meng Z (2022) Beluga whale optimization: a novel nature-inspired metaheuristic algorithm. Knowl Based Syst 251:109215","journal-title":"Knowl Based Syst"},{"key":"1901_CR21","doi-asserted-by":"crossref","first-page":"4075","DOI":"10.1016\/j.jmrt.2023.01.212","volume":"23","author":"GS Alsoruji","year":"2023","unstructured":"Alsoruji GS, Sadoun A, Abd Elaziz M, Al-Betar MA, Abdallah A, Fathy A (2023) On the prediction of the mechanical properties of ultrafine grain Al-TiO2 nanocomposites using a modified long-short term memory model with beluga whale optimizer. J Mater Res Technol 23:4075\u20134088","journal-title":"J Mater Res Technol"},{"key":"1901_CR22","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.beproc.2017.09.007","volume":"145","author":"PA Anderson","year":"2017","unstructured":"Anderson PA, Poe RB, Thompson LA, Weber N, Romano TA (2017) Behavioral responses of beluga whales (Delphinapterus leucas) to environmental variation in an Arctic estuary. Behav Process 145:48\u201359","journal-title":"Behav Process"},{"key":"1901_CR23","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1016\/j.aej.2023.04.002","volume":"72","author":"MH Hassan","year":"2023","unstructured":"Hassan MH, Kamel S, Jurado F, Ebeed M, Elnaggar MF (2023) Economic load dispatch solution of large-scale power systems using an enhanced beluga whale optimizer. Alex Eng J 72:573\u2013591","journal-title":"Alex Eng J"},{"key":"1901_CR24","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1007\/s00500-018-3102-4","volume":"23","author":"S Arora","year":"2019","unstructured":"Arora S, Singh S (2019) Butterfly optimization algorithm: a novel approach for global optimization. Soft Comput 23:715\u2013734","journal-title":"Soft Comput"},{"issue":"8","key":"1901_CR25","doi-asserted-by":"crossref","first-page":"1854","DOI":"10.3390\/math11081854","volume":"11","author":"S-C Horng","year":"2023","unstructured":"Horng S-C, Lin S-S (2023) Improved beluga whale optimization for solving the simulation optimization problems with stochastic constraints. Mathematics 11(8):1854","journal-title":"Mathematics"},{"issue":"3","key":"1901_CR26","doi-asserted-by":"crossref","first-page":"707","DOI":"10.3390\/math11030707","volume":"11","author":"EH Houssein","year":"2023","unstructured":"Houssein EH, Sayed A (2023) Dynamic candidate solution boosted beluga whale optimization algorithm for biomedical classification. Mathematics 11(3):707","journal-title":"Mathematics"},{"key":"1901_CR27","doi-asserted-by":"crossref","unstructured":"Chen H, Wang Z, Wu D, Jia H, Wen C, Rao H, Abualigah L (2023) An improved multi-strategy beluga whale optimization for global optimization problems. Math Biosci Eng 20(7):13267\u201313317","DOI":"10.3934\/mbe.2023592"},{"issue":"21","key":"1901_CR28","doi-asserted-by":"crossref","first-page":"3531","DOI":"10.3390\/electronics11213531","volume":"11","author":"H Xu","year":"2022","unstructured":"Xu H, Lu Y, Guo Q (2022) Application of improved butterfly optimization algorithm combined with black widow optimization in feature selection of network intrusion detection. Electronics 11(21):3531","journal-title":"Electronics"},{"issue":"10","key":"1901_CR29","doi-asserted-by":"crossref","first-page":"8207","DOI":"10.1016\/j.jksuci.2022.08.004","volume":"34","author":"R Sihwail","year":"2022","unstructured":"Sihwail R, Solaiman OS, Ariffin KAZ (2022) New robust hybrid Jarratt-Butterfly optimization algorithm for nonlinear models. J King Saud Univ -Comput Inf Sci 34(10):8207\u20138220","journal-title":"J King Saud Univ -Comput Inf Sci"},{"key":"1901_CR30","doi-asserted-by":"crossref","first-page":"107291","DOI":"10.1016\/j.knosys.2021.107291","volume":"228","author":"A Mortazavi","year":"2021","unstructured":"Mortazavi A, Moloodpoor M (2021) Enhanced butterfly optimization algorithm with a new fuzzy regulator strategy and virtual butterfly concept. Knowl Based Syst 228:107291","journal-title":"Knowl Based Syst"},{"issue":"19","key":"1901_CR31","doi-asserted-by":"crossref","first-page":"4320","DOI":"10.3390\/s19194320","volume":"19","author":"D Wang","year":"2019","unstructured":"Wang D, Wang H, Ban X, Qian X, Ni J (2019) An adaptive, discrete space oriented wolf pack optimization algorithm for a movable wireless sensor network. Sensors 19(19):4320","journal-title":"Sensors"},{"key":"1901_CR32","doi-asserted-by":"crossref","unstructured":"Wang X, Gu H, Liu Y, Zhang H (2019) A two-stage RPSO-ACS based protocol: a new method for sensor network clustering and routing in mobile computing. IEEE Access 7:113141\u2013113150","DOI":"10.1109\/ACCESS.2019.2933150"},{"issue":"7","key":"1901_CR33","doi-asserted-by":"crossref","first-page":"3877","DOI":"10.1109\/JSEN.2015.2395958","volume":"15","author":"A Adulyasas","year":"2015","unstructured":"Adulyasas A, Sun Z, Wang N (2015) Connected coverage optimization for sensor scheduling in wireless sensor networks. IEEE Sens J 15(7):3877\u20133892","journal-title":"IEEE Sens J"},{"issue":"1","key":"1901_CR34","doi-asserted-by":"crossref","first-page":"117","DOI":"10.3390\/s17010117","volume":"17","author":"Q Zhang","year":"2017","unstructured":"Zhang Q, Fok MP (2017) A two-phase coverage-enhancing algorithm for hybrid wireless sensor networks. Sensors 17(1):117","journal-title":"Sensors"},{"key":"1901_CR35","doi-asserted-by":"crossref","first-page":"103308","DOI":"10.1016\/j.adhoc.2023.103308","volume":"152","author":"Z Wang","year":"2024","unstructured":"Wang Z, Huang L, Yang S, Luo X, He D, Chan S (2024) Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization. Ad Hoc Netw 152:103308","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"1901_CR36","doi-asserted-by":"crossref","first-page":"675","DOI":"10.3390\/electronics9040675","volume":"9","author":"K Tarnaris","year":"2020","unstructured":"Tarnaris K, Preka I, Kandris D, Alexandridis A (2020) Coverage and k-coverage optimization in wireless sensor networks using computational intelligence methods: a comparative study. Electronics 9(4):675","journal-title":"Electronics"},{"key":"1901_CR37","doi-asserted-by":"crossref","unstructured":"Wang J, Zhu Z, Zhang F, Liu Y (2024) An improved salp swarm algorithm for solving node coverage optimization problem in WSN. Peer-to-Peer Netw Appl 1\u201312","DOI":"10.20944\/preprints202304.1025.v1"},{"key":"1901_CR38","doi-asserted-by":"crossref","first-page":"106602","DOI":"10.1016\/j.asoc.2020.106602","volume":"96","author":"Z Miao","year":"2020","unstructured":"Miao Z, Yuan X, Zhou F, Qiu X, Song Y, Chen K (2020) Grey wolf optimizer with an enhanced hierarchy and its application to the wireless sensor network coverage optimization problem. Appl Soft Comput 96:106602","journal-title":"Appl Soft Comput"},{"issue":"17","key":"1901_CR39","doi-asserted-by":"crossref","first-page":"5869","DOI":"10.3390\/s21175869","volume":"21","author":"F Zhu","year":"2021","unstructured":"Zhu F, Wang W (2021) A coverage optimization method for WSNs based on the improved weed algorithm. Sensors 21(17):5869","journal-title":"Sensors"},{"issue":"12","key":"1901_CR40","doi-asserted-by":"crossref","first-page":"675","DOI":"10.3390\/axioms11120675","volume":"11","author":"M Zhang","year":"2022","unstructured":"Zhang M, Wang D, Yang M, Tan W, Yang J (2022) HPSBA: a modified hybrid framework with convergence analysis for solving wireless sensor network coverage optimization problem. Axioms 11(12):675","journal-title":"Axioms"},{"key":"1901_CR41","doi-asserted-by":"crossref","unstructured":"Zhu F, Wang W, Li S (2022) Application of improved manta ray foraging optimization algorithm in coverage optimization of wireless sensor networks. Comput Intell Neurosci 2022","DOI":"10.1155\/2022\/3082933"},{"key":"1901_CR42","doi-asserted-by":"crossref","first-page":"100546","DOI":"10.1016\/j.iot.2022.100546","volume":"19","author":"J Yin","year":"2022","unstructured":"Yin J, Deng N, Zhang J (2022) Wireless sensor network coverage optimization based on Yin-Yang pigeon-inspired optimization algorithm for internet of things. Int Things 19:100546","journal-title":"Int Things"},{"issue":"1","key":"1901_CR43","doi-asserted-by":"crossref","first-page":"70","DOI":"10.3390\/biomimetics8010070","volume":"8","author":"C Zeng","year":"2023","unstructured":"Zeng C, Qin T, Tan W, Lin C, Zhu Z, Yang J, Yuan S (2023) Coverage optimization of heterogeneous wireless sensor network based on improved wild horse optimizer. Biomimetics 8(1):70","journal-title":"Biomimetics"},{"issue":"4","key":"1901_CR44","doi-asserted-by":"crossref","first-page":"354","DOI":"10.3390\/biomimetics8040354","volume":"8","author":"Y Xu","year":"2023","unstructured":"Xu Y, Zhang B, Zhang Y (2023) Application of an enhanced whale optimization algorithm on coverage optimization of sensor. Biomimetics 8(4):354","journal-title":"Biomimetics"},{"issue":"11","key":"1901_CR45","doi-asserted-by":"crossref","first-page":"220","DOI":"10.3390\/math6110220","volume":"6","author":"T Jiang","year":"2018","unstructured":"Jiang T, Zhang C, Zhu H, Gu J, Deng G (2018) Energy-efficient scheduling for a job shop using an improved whale optimization algorithm. Mathematics 6(11):220","journal-title":"Mathematics"},{"issue":"14","key":"1901_CR46","doi-asserted-by":"crossref","first-page":"5164","DOI":"10.3390\/s22145164","volume":"22","author":"L Bo","year":"2022","unstructured":"Bo L, Li Z, Liu Y, Yue Y, Zhang Z, Wang Y (2022) Research on multi-level scheduling of mine water reuse based on improved whale optimization algorithm. Sensors 22(14):5164","journal-title":"Sensors"},{"issue":"5","key":"1901_CR47","doi-asserted-by":"crossref","first-page":"2075","DOI":"10.1007\/s00500-021-06623-2","volume":"26","author":"C Tang","year":"2022","unstructured":"Tang C, Sun W, Xue M, Zhang X, Tang H, Wu W (2022) A hybrid whale optimization algorithm with artificial bee colony. Soft Comput 26(5):2075\u20132097","journal-title":"Soft Comput"},{"issue":"24","key":"1901_CR48","doi-asserted-by":"crossref","first-page":"5949","DOI":"10.1002\/cpe.5949","volume":"32","author":"H Ding","year":"2020","unstructured":"Ding H, Wu Z, Zhao L (2020) Whale optimization algorithm based on nonlinear convergence factor and chaotic inertial weight. Concurr Comput Pract Exper 32(24):5949","journal-title":"Concurr Comput Pract Exper"},{"key":"1901_CR49","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367","journal-title":"Adv Eng Softw"},{"key":"1901_CR50","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361","journal-title":"Adv Eng Softw"},{"key":"1901_CR51","doi-asserted-by":"crossref","first-page":"9383","DOI":"10.1007\/s00521-019-04452-x","volume":"32","author":"W Zhao","year":"2020","unstructured":"Zhao W, Wang L, Zhang Z (2020) Artificial ecosystem-based optimization: a novel nature-inspired meta-heuristic algorithm. Neural Comput Appl 32:9383\u20139425","journal-title":"Neural Comput Appl"},{"key":"1901_CR52","doi-asserted-by":"crossref","unstructured":"Shehadeh HA, Ahmedy I, Idris MYI (2018) Sperm swarm optimization algorithm for optimizing wireless sensor network challenges. In: Proceedings of the 6th international conference on communications and broadband networking pp 53\u201359","DOI":"10.1145\/3193092.3193100"},{"issue":"15","key":"1901_CR53","doi-asserted-by":"crossref","first-page":"10733","DOI":"10.1007\/s00521-023-08261-1","volume":"35","author":"HA Shehadeh","year":"2023","unstructured":"Shehadeh HA (2023) Chernobyl disaster optimizer (CDO): a novel meta-heuristic method for global optimization. Neural Comput Appl 35(15):10733\u201310749","journal-title":"Neural Comput Appl"},{"issue":"18","key":"1901_CR54","doi-asserted-by":"crossref","first-page":"11739","DOI":"10.1007\/s00521-021-05880-4","volume":"33","author":"HA Shehadeh","year":"2021","unstructured":"Shehadeh HA (2021) A hybrid sperm swarm optimization and gravitational search algorithm (HSSOGSA) for global optimization. Neural Comput Appl 33(18):11739\u201311752","journal-title":"Neural Comput Appl"},{"issue":"4","key":"1901_CR55","doi-asserted-by":"crossref","first-page":"525","DOI":"10.3390\/e24040525","volume":"24","author":"M Zhang","year":"2022","unstructured":"Zhang M, Wang D, Yang J (2022) Hybrid-flash butterfly optimization algorithm with logistic mapping for solving the engineering constrained optimization problems. Entropy 24(4):525","journal-title":"Entropy"},{"key":"1901_CR56","doi-asserted-by":"crossref","unstructured":"Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of ICNN\u201995-international conference on neural networks vol 4, pp 1942\u20131948. IEEE","DOI":"10.1109\/ICNN.1995.488968"},{"key":"1901_CR57","doi-asserted-by":"crossref","unstructured":"Wilcoxon F (1992) Individual comparisons by ranking methods. In: Breakthroughs in statistics: methodology and distribution pp 196\u2013202","DOI":"10.1007\/978-1-4612-4380-9_16"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01901-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01901-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01901-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T10:03:06Z","timestamp":1747476186000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01901-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,28]]},"references-count":57,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1901"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01901-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,28]]},"assertion":[{"value":"23 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"80"}}