{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T16:35:19Z","timestamp":1758040519011,"version":"3.44.0"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T00:00:00Z","timestamp":1751846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Memetic Comp."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s12293-025-00469-z","type":"journal-article","created":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T07:27:20Z","timestamp":1751873240000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Measures of exploration and exploitation rates in MAs: classification, comparison, and convergence analysis"],"prefix":"10.1007","volume":"17","author":[{"given":"Aridj","family":"Ferhat","sequence":"first","affiliation":[]},{"given":"Farouq","family":"Zitouni","sequence":"additional","affiliation":[]},{"given":"Rihab","family":"Lakbichi","sequence":"additional","affiliation":[]},{"given":"Abdelhadi","family":"Limane","sequence":"additional","affiliation":[]},{"given":"Saad","family":"Harous","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,7]]},"reference":[{"key":"469_CR1","doi-asserted-by":"crossref","unstructured":"Abbass H.\u00a0A., Deb K. (2003). Searching under multi-evolutionary pressures. In International conference on evolutionary multi-criterion optimization, pages 391\u2013404. Springer","DOI":"10.1007\/3-540-36970-8_28"},{"issue":"4","key":"469_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-025-07007-1","volume":"81","author":"N Aguirre","year":"2025","unstructured":"Aguirre N, Cuevas E, Luque-Chang A, Escobar-Cuevas H (2025) An improved swarm optimization algorithm using exploration and evolutionary game theory for efficient exploitation. J Supercomput 81(4):1\u201357","journal-title":"J Supercomput"},{"key":"469_CR3","doi-asserted-by":"crossref","unstructured":"Angus D, Fister I. (2020). Tracking the exploration and exploitation in stochastic population-based nature-inspired algorithms using recurrence plots. In Swarm, Evolutionary, and Memetic Computing and Fuzzy and Neural Computing: 7th International Conference, SEMCCO 2019, and 5th International Conference, FANCCO 2019, Maribor, Slovenia, July 10\u201312, 2019, Revised Selected Papers 7, pages 166\u2013176. Springer","DOI":"10.1007\/978-3-030-37838-7_15"},{"issue":"4","key":"469_CR4","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1109\/TEVC.2010.2064322","volume":"15","author":"L Araujo","year":"2010","unstructured":"Araujo L, Merelo JJ (2010) Diversity through multiculturality: Assessing migrant choice policies in an island model. IEEE Trans Evol Comput 15(4):456\u2013469","journal-title":"IEEE Trans Evol Comput"},{"key":"469_CR5","doi-asserted-by":"crossref","unstructured":"Barker A.\u00a0L, Martin W.N (2000). Dynamics of a distance-based population diversity measure. In Proceedings of the 2000 Congress on Evolutionary Computation. CEC00 (Cat. No. 00TH8512), volume\u00a02, pages 1002\u20131009. IEEE","DOI":"10.1109\/CEC.2000.870755"},{"key":"469_CR6","doi-asserted-by":"crossref","unstructured":"Bayadir Abbas Al-Himyari, Hiba Al-khafaji, N. F.\u00a0H. (2025). Exploration-exploitation tradeoffs in metaheuristics: A review. Asian Journal of Applied Sciences, 12(1)","DOI":"10.24203\/98kbmk88"},{"key":"469_CR7","unstructured":"Brahim B, Kobayashi M, Al\u00a0Ali M, Khatir T, Elmeliani M. E. A.E. (2024). Metaheuristic optimization algorithms: an overview. HCMCOU Journal of Science\u2013Advances in Computational Structures"},{"issue":"1","key":"469_CR8","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/TEVC.2003.819263","volume":"8","author":"EK Burke","year":"2004","unstructured":"Burke EK, Gustafson S, Kendall G (2004) Diversity in genetic programming: An analysis of measures and correlation with fitness. IEEE Trans Evol Comput 8(1):47\u201362","journal-title":"IEEE Trans Evol Comput"},{"issue":"6","key":"469_CR9","doi-asserted-by":"publisher","first-page":"2945","DOI":"10.1111\/itor.13176","volume":"30","author":"CL Camacho-Villal\u00f3n","year":"2023","unstructured":"Camacho-Villal\u00f3n CL, Dorigo M, St\u00fctzle T (2023) Exposing the grey wolf, moth-flame, whale, firefly, bat, and antlion algorithms: six misleading optimization techniques inspired by bestial metaphors. Int Trans Oper Res 30(6):2945\u20132971","journal-title":"Int Trans Oper Res"},{"issue":"1","key":"469_CR10","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TSMCB.2006.883271","volume":"37","author":"A Caponio","year":"2007","unstructured":"Caponio A, Cascella G.L., Neri F, Salvatore N, Sumner M (2007) A fast adaptive memetic algorithm for online and offline control design of pmsm drives. IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics) 37(1):28\u201341","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics)"},{"key":"469_CR11","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s00500-008-0357-1","volume":"13","author":"A Caponio","year":"2009","unstructured":"Caponio A, Neri F, Tirronen V (2009) Super-fit control adaptation in memetic differential evolution frameworks. Soft Comput 13:811\u2013831","journal-title":"Soft Comput"},{"key":"469_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10732-006-9003-1","volume":"13","author":"N Chaiyaratana","year":"2007","unstructured":"Chaiyaratana N, Piroonratana T, Sangkawelert N (2007) Effects of diversity control in single-objective and multi-objective genetic algorithms. Journal of Heuristics 13:1\u201334","journal-title":"Journal of Heuristics"},{"issue":"3","key":"469_CR13","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1109\/TEVC.2008.2011742","volume":"13","author":"G Chen","year":"2009","unstructured":"Chen G, Low CP, Yang Z (2009) Preserving and exploiting genetic diversity in evolutionary programming algorithms. IEEE Trans Evol Comput 13(3):661\u2013673","journal-title":"IEEE Trans Evol Comput"},{"key":"469_CR14","doi-asserted-by":"crossref","unstructured":"Chen S, Boluf\u00e9-R\u00f6hler A, Montgomery J, Hendtlass T (2019). An analysis on the effect of selection on exploration in particle swarm optimization and differential evolution. In 2019 IEEE congress on evolutionary computation (CEC), pages 3037\u20133044. IEEE","DOI":"10.1109\/CEC.2019.8790200"},{"key":"469_CR15","unstructured":"Chen Y, He J (2020). Exploitation and exploration analysis of elitist evolutionary algorithms: A case study. arXiv preprint arXiv:2001.10932"},{"issue":"2","key":"469_CR16","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1515\/jaiscr-2015-0001","volume":"4","author":"S Cheng","year":"2014","unstructured":"Cheng S, Shi Y, Qin Q, Zhang Q, Bai R (2014) Population diversity maintenance in brain storm optimization algorithm. Journal of Artificial Intelligence and Soft Computing Research 4(2):83\u201397","journal-title":"Journal of Artificial Intelligence and Soft Computing Research"},{"issue":"1","key":"469_CR17","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/j.asoc.2012.08.046","volume":"13","author":"G Corriveau","year":"2013","unstructured":"Corriveau G, Guilbault R, Tahan A, Sabourin R (2013) Review of phenotypic diversity formulations for diagnostic tool. Appl Soft Comput 13(1):9\u201326","journal-title":"Appl Soft Comput"},{"issue":"3","key":"469_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2480741.2480752","volume":"45","author":"M \u010crepin\u0161ek","year":"2013","unstructured":"\u010crepin\u0161ek M, Liu S-H, Mernik M (2013) Exploration and exploitation in evolutionary algorithms: A survey. ACM computing surveys (CSUR) 45(3):1\u201333","journal-title":"ACM computing surveys (CSUR)"},{"issue":"1","key":"469_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1504\/IJICA.2011.037947","volume":"3","author":"M \u010crepin\u0161ek","year":"2011","unstructured":"\u010crepin\u0161ek M, Mernik M, Liu S-H (2011) Analysis of exploration and exploitation in evolutionary algorithms by ancestry trees. Int J Innovative Comput Appl 3(1):11\u201319","journal-title":"Int J Innovative Comput Appl"},{"issue":"10","key":"469_CR20","doi-asserted-by":"publisher","first-page":"1580","DOI":"10.3390\/math13101580","volume":"13","author":"M \u010crepin\u0161ek","year":"2025","unstructured":"\u010crepin\u0161ek M, Ravber M, Mernik L, Mernik M (2025) Tackling blind spot challenges in metaheuristics algorithms through exploration and exploitation. Mathematics 13(10):1580","journal-title":"Mathematics"},{"key":"469_CR21","first-page":"249","volume-title":"Experimental analysis between exploration and exploitation","author":"E Cuevas","year":"2021","unstructured":"Cuevas E, Diaz P, Camarena O, Cuevas E, Diaz P, Camarena O (2021) Experimental analysis between exploration and exploitation. A Performance Perspective, Metaheuristic Computation, pp 249\u2013269"},{"key":"469_CR22","doi-asserted-by":"crossref","unstructured":"Cuevas E, Luque A, Morales\u00a0Casta\u00f1eda B, Rivera B (2024). A measure of diversity for metaheuristic algorithms employing population-based approaches. In Metaheuristic Algorithms: New Methods, Evaluation, and Performance Analysis, pages 49\u201372. Springer","DOI":"10.1007\/978-3-031-63053-8_3"},{"key":"469_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF01530777","volume":"5","author":"KA De Jong","year":"1992","unstructured":"De Jong KA, Spears WM (1992) A formal analysis of the role of multi-point crossover in genetic algorithms. Ann Math Artif Intell 5:1\u201326","journal-title":"Ann Math Artif Intell"},{"key":"469_CR24","doi-asserted-by":"crossref","unstructured":"De\u00a0Lorenzo A, Medvet E, Tu\u0161ar T, Bartoli A (2019). An analysis of dimensionality reduction techniques for visualizing evolution. In Proceedings of the Genetic and Evolutionary Computation Conference Companion, pages 1864\u20131872","DOI":"10.1145\/3319619.3326868"},{"issue":"6","key":"469_CR25","doi-asserted-by":"publisher","first-page":"468","DOI":"10.3390\/biomimetics8060468","volume":"8","author":"M Dehghani","year":"2023","unstructured":"Dehghani M, Trojovsk\u00e1 E, Trojovsk\u1ef3 P, Malik OP (2023) Oobo: a new metaheuristic algorithm for solving optimization problems. Biomimetics 8(6):468","journal-title":"Biomimetics"},{"key":"469_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111574","volume":"158","author":"L Deng","year":"2024","unstructured":"Deng L, Liu S (2024) Exposing the chimp optimization algorithm: a misleading metaheuristic technique with structural bias. Appl Soft Comput 158:111574","journal-title":"Appl Soft Comput"},{"key":"469_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2024.111696","volume":"160","author":"L Deng","year":"2024","unstructured":"Deng L, Liu S (2024) Metaheuristics exposed: Unmasking the design pitfalls of arithmetic optimization algorithm in benchmarking. Appl Soft Comput 160:111696","journal-title":"Appl Soft Comput"},{"key":"469_CR28","doi-asserted-by":"crossref","unstructured":"Eberhart R, Kennedy J (1995). A new optimizer using particle swarm theory. In MHS\u201995. Proceedings of the sixth international symposium on micro machine and human science, pages 39\u201343. Ieee","DOI":"10.1109\/MHS.1995.494215"},{"key":"469_CR29","unstructured":"Engelbrecht A.P (2006). Fundamentals of computational swarm intelligence"},{"key":"469_CR30","doi-asserted-by":"crossref","unstructured":"Galv\u00e1n-L\u00f3pez E, McDermott J, O\u2019Neill M, Brabazon A (2010). Towards an understanding of locality in genetic programming. In Proceedings of the 12th annual conference on Genetic and evolutionary computation, pages 901\u2013908","DOI":"10.1145\/1830483.1830646"},{"key":"469_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-6089-0","volume-title":"Tabu search kluwer academic","author":"F Glover","year":"1997","unstructured":"Glover F, Laguna M (1997) Tabu search kluwer academic. Texas, Dordrecht, Boston"},{"key":"469_CR32","unstructured":"Havrda J, Charv\u00e1t F (1967). Quantification method of classification processes. concept of structural $$ a $$-entropy. Kybernetika, 3(1):30\u201335"},{"key":"469_CR33","first-page":"1532","volume":"3","author":"F Herrera","year":"1994","unstructured":"Herrera F, Herrera-Viedma E, Lozano M, Verdegay JL (1994) Fuzzy tools to improve genetic algorithms. In Second European Congress on Intelligent Techniques and Soft Computing 3:1532\u20131539","journal-title":"In Second European Congress on Intelligent Techniques and Soft Computing"},{"issue":"1996","key":"469_CR34","first-page":"95","volume":"8","author":"F Herrera","year":"1996","unstructured":"Herrera F, Lozano M et al (1996) Adaptation of genetic algorithm parameters based on fuzzy logic controllers. Genetic Algorithms and Soft Computing 8(1996):95\u2013125","journal-title":"Genetic Algorithms and Soft Computing"},{"key":"469_CR35","doi-asserted-by":"crossref","unstructured":"Holland J.H (1992). Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence","DOI":"10.7551\/mitpress\/1090.001.0001"},{"issue":"11","key":"469_CR36","doi-asserted-by":"publisher","first-page":"7665","DOI":"10.1007\/s00521-018-3592-0","volume":"31","author":"K Hussain","year":"2019","unstructured":"Hussain K, Salleh MNM, Cheng S, Shi Y (2019) On the exploration and exploitation in popular swarm-based metaheuristic algorithms. Neural Comput Appl 31(11):7665\u20137683","journal-title":"Neural Comput Appl"},{"key":"469_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114353","volume":"167","author":"J Jerebic","year":"2021","unstructured":"Jerebic J, Mernik M, Liu S-H, Ravber M, Baketari\u0107 M, Mernik L, \u010crepin\u0161ek M (2021) A novel direct measure of exploration and exploitation based on attraction basins. Expert Syst Appl 167:114353","journal-title":"Expert Syst Appl"},{"issue":"15","key":"469_CR38","doi-asserted-by":"publisher","first-page":"3175","DOI":"10.1016\/j.ins.2011.03.018","volume":"181","author":"D Jia","year":"2011","unstructured":"Jia D, Zheng G, Khan MK (2011) An effective memetic differential evolution algorithm based on chaotic local search. Inf Sci 181(15):3175\u20133187","journal-title":"Inf Sci"},{"key":"469_CR39","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s10898-007-9149-x","volume":"39","author":"D Karaboga","year":"2007","unstructured":"Karaboga D, Basturk B (2007) A powerful and efficient algorithm for numerical function optimization: artificial bee colony (abc) algorithm. J Global Optim 39:459\u2013471","journal-title":"J Global Optim"},{"issue":"3","key":"469_CR40","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/s11771-004-0066-6","volume":"11","author":"M-Y Li","year":"2004","unstructured":"Li M-Y, Cai Z-X, Sun G-Y (2004) An adaptive genetic algorithm with diversity-guided mutation and its global convergence property. J Cent South Univ Technol 11(3):323\u2013327","journal-title":"J Cent South Univ Technol"},{"key":"469_CR41","doi-asserted-by":"crossref","unstructured":"Lingyun D, Sanyang L (2024). Deficiencies of the whale optimization algorithm and its validation method [j]. Expert Systems With Applications, 237","DOI":"10.1016\/j.eswa.2023.121544"},{"issue":"9","key":"469_CR42","doi-asserted-by":"publisher","first-page":"3792","DOI":"10.1016\/j.asoc.2013.05.010","volume":"13","author":"S-H Liu","year":"2013","unstructured":"Liu S-H, Mernik M, Hrn\u010di\u010d D, \u010crepin\u0161ek M (2013) A parameter control method of evolutionary algorithms using exploration and exploitation measures with a practical application for fitting sovova\u2019s mass transfer model. Appl Soft Comput 13(9):3792\u20133805","journal-title":"Appl Soft Comput"},{"key":"469_CR43","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10898-004-9965-1","volume":"31","author":"M Locatelli","year":"2005","unstructured":"Locatelli M, Wood GR (2005) Objective function features providing barriers to rapid global optimization. J Global Optim 31:549\u2013565","journal-title":"J Global Optim"},{"issue":"23","key":"469_CR44","doi-asserted-by":"publisher","first-page":"4421","DOI":"10.1016\/j.ins.2008.07.031","volume":"178","author":"M Lozano","year":"2008","unstructured":"Lozano M, Herrera F, Cano JR (2008) Replacement strategies to preserve useful diversity in steady-state genetic algorithms. Inf Sci 178(23):4421\u20134433","journal-title":"Inf Sci"},{"key":"469_CR45","doi-asserted-by":"crossref","unstructured":"Miao A.-m, Shi X.-l, Zhang J.-h, Wang E.-y, Peng S.-q (2009). A modified particle swarm optimizer with dynamical inertia weight. In Fuzzy Information and Engineering Volume 2, pages 767\u2013776. Springer","DOI":"10.1007\/978-3-642-03664-4_84"},{"key":"469_CR46","unstructured":"Michael,A, Takagi H (1993). Dynamic control of genetic algorithms using fuzzy logic techniques. In Proceedings of the Fifth International Conference on Genetic Algorithms, pages 76\u201383. Citeseer"},{"key":"469_CR47","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.advengsoft.2017.07.002","volume":"114","author":"S Mirjalili","year":"2017","unstructured":"Mirjalili S, Gandomi AH, Mirjalili SZ, Saremi S, Faris H, Mirjalili SM (2017) Salp swarm algorithm: A bio-inspired optimizer for engineering design problems. Adv Eng Softw 114:163\u2013191","journal-title":"Adv Eng Softw"},{"key":"469_CR48","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361","journal-title":"Adv Eng Softw"},{"key":"469_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2020.100671","volume":"54","author":"B Morales-Casta\u00f1eda","year":"2020","unstructured":"Morales-Casta\u00f1eda B, Zaldivar D, Cuevas E, Fausto F, Rodr\u00edguez A (2020) A better balance in metaheuristic algorithms: Does it exist? Swarm Evol Comput 54:100671","journal-title":"Swarm Evol Comput"},{"key":"469_CR50","doi-asserted-by":"crossref","unstructured":"Morrison R.\u00a0W, De\u00a0Jong K.\u00a0A. (2001). Measurement of population diversity. In International conference on artificial evolution (evolution artificielle), pages 31\u201341. Springer","DOI":"10.1007\/3-540-46033-0_3"},{"issue":"1","key":"469_CR51","doi-asserted-by":"publisher","first-page":"485","DOI":"10.3233\/IDT-idt230275","volume":"18","author":"SK Nayak","year":"2024","unstructured":"Nayak SK, Senapati BR, Mishra D (2024) Balancing exploration and exploitation: Unleashing the adaptive power of automatic cuckoo search for meta-heuristic optimization. Intelligent Decision Technologies 18(1):485\u2013508","journal-title":"Intelligent Decision Technologies"},{"issue":"2","key":"469_CR52","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1109\/TCBB.2007.070202","volume":"4","author":"F Neri","year":"2007","unstructured":"Neri F, Toivanen J, Cascella GL, Ong Y-S (2007) An adaptive multimeme algorithm for designing hiv multidrug therapies. IEEE\/ACM Trans Comput Biol Bioinf 4(2):264\u2013278","journal-title":"IEEE\/ACM Trans Comput Biol Bioinf"},{"key":"469_CR53","doi-asserted-by":"crossref","unstructured":"Olorunda O, Engelbrecht A.\u00a0P. (2008). Measuring exploration\/exploitation in particle swarms using swarm diversity. In 2008 IEEE congress on evolutionary computation (IEEE world congress on computational intelligence), pages 1128\u20131134. IEEE","DOI":"10.1109\/CEC.2008.4630938"},{"key":"469_CR54","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.ins.2021.11.073","volume":"586","author":"V Osuna-Enciso","year":"2022","unstructured":"Osuna-Enciso V, Cuevas E, Casta\u00f1eda BM (2022) A diversity metric for population-based metaheuristic algorithms. Inf Sci 586:192\u2013208","journal-title":"Inf Sci"},{"issue":"2","key":"469_CR55","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1177\/1059712309103566","volume":"17","author":"I Paenke","year":"2009","unstructured":"Paenke I, Jin Y, Branke J (2009) Balancing population-and individual-level adaptation in changing environments. Adapt Behav 17(2):153\u2013174","journal-title":"Adapt Behav"},{"issue":"11","key":"469_CR56","doi-asserted-by":"publisher","first-page":"13187","DOI":"10.1007\/s10462-023-10470-y","volume":"56","author":"K Rajwar","year":"2023","unstructured":"Rajwar K, Deep K, Das S (2023) An exhaustive review of the metaheuristic algorithms for search and optimization: taxonomy, applications, and open challenges. Artif Intell Rev 56(11):13187\u201313257","journal-title":"Artif Intell Rev"},{"issue":"3","key":"469_CR57","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1016\/j.cad.2010.12.015","volume":"43","author":"RV Rao","year":"2011","unstructured":"Rao RV, Savsani VJ, Vakharia DP (2011) Teaching-learning-based optimization: a novel method for constrained mechanical design optimization problems. Comput Aided Des 43(3):303\u2013315","journal-title":"Comput Aided Des"},{"key":"469_CR58","unstructured":"R\u00e9nyi A. (1961). On measures of entropy and information. In Proceedings of the fourth Berkeley symposium on mathematical statistics and probability, volume 1: contributions to the theory of statistics, volume\u00a04, pages 547\u2013562. University of California Press"},{"key":"469_CR59","doi-asserted-by":"crossref","unstructured":"Saib B, Abdessemed M.-R, Hocin R, Khoualdi K (2022). Study of exploration and exploitation mechanisms in nature inspired metaheuristics for global optimization. In International Conference on Computing and Information Technology, pages 442\u2013453. Springer","DOI":"10.1007\/978-3-031-25344-7_41"},{"key":"469_CR60","doi-asserted-by":"crossref","unstructured":"Salleh M. N.\u00a0M, Hussain K, Cheng S, Shi Y, Muhammad A, Ullah G, Naseem R. (2018). Exploration and exploitation measurement in swarm-based metaheuristic algorithms: An empirical analysis. In Recent Advances on Soft Computing and Data Mining: Proceedings of the Third International Conference on Soft Computing and Data Mining (SCDM 2018), Johor, Malaysia, February 06-07, 2018, pages 24\u201332. Springer","DOI":"10.1007\/978-3-319-72550-5_3"},{"issue":"3","key":"469_CR61","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon CE (1948) A mathematical theory of communication. The Bell system technical journal 27(3):379\u2013423","journal-title":"The Bell system technical journal"},{"issue":"1","key":"469_CR62","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1111\/itor.12001","volume":"22","author":"K S\u00f6rensen","year":"2015","unstructured":"S\u00f6rensen K (2015) Metaheuristics-the metaphor exposed. Int Trans Oper Res 22(1):3\u201318","journal-title":"Int Trans Oper Res"},{"issue":"1","key":"469_CR63","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/j.asoc.2009.11.024","volume":"11","author":"C Soza","year":"2011","unstructured":"Soza C, Becerra RL, Riff MC, Coello CAC (2011) Solving timetabling problems using a cultural algorithm. Appl Soft Comput 11(1):337\u2013344","journal-title":"Appl Soft Comput"},{"key":"469_CR64","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1016\/j.ins.2015.09.056","volume":"329","author":"G Squillero","year":"2016","unstructured":"Squillero G, Tonda A (2016) Divergence of character and premature convergence: A survey of methodologies for promoting diversity in evolutionary optimization. Inf Sci 329:782\u2013799","journal-title":"Inf Sci"},{"key":"469_CR65","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1023\/A:1008202821328","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn R, Price K (1997) Differential evolution-a simple and efficient heuristic for global optimization over continuous spaces. J Global Optim 11:341\u2013359","journal-title":"J Global Optim"},{"key":"469_CR66","first-page":"268","volume":"2","author":"E Talbi","year":"2009","unstructured":"Talbi E (2009) Metaheuristics: From design to implementation. John Wiley & Sons google schola 2:268\u2013308","journal-title":"John Wiley & Sons google schola"},{"key":"469_CR67","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.asoc.2017.04.044","volume":"59","author":"SL Tilahun","year":"2017","unstructured":"Tilahun SL (2017) Prey predator hyperheuristic. Appl Soft Comput 59:104\u2013114","journal-title":"Appl Soft Comput"},{"key":"469_CR68","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1007\/s10732-018-9397-6","volume":"25","author":"SL Tilahun","year":"2019","unstructured":"Tilahun SL, Tawhid MA (2019) Swarm hyperheuristic framework. Journal of Heuristics 25:809\u2013836","journal-title":"Journal of Heuristics"},{"key":"469_CR69","doi-asserted-by":"crossref","unstructured":"Tirronen V, Neri F (2009). Differential evolution with fitness diversity self-adaptation. In Nature-inspired algorithms for optimisation, pages 199\u2013234. Springer","DOI":"10.1007\/978-3-642-00267-0_7"},{"key":"469_CR70","doi-asserted-by":"crossref","unstructured":"Tirronen V, Neri F, Karkkainen T, Majava K, Rossi T (2007). A memetic differential evolution in filter design for defect detection in paper production. In Applications of Evolutionary Computing: EvoWorkshops 2007: EvoCoMnet, EvoFIN, EvoIASP, EvoINTERACTION, EvoMUSART, EvoSTOC and EvoTransLog. Proceedings, pages 320\u2013329. Springer","DOI":"10.1007\/978-3-540-71805-5_35"},{"key":"469_CR71","unstructured":"Tsutsui S, Ghosh A, Corne D, Fujimoto Y (1997). A real coded genetic algorithm with an explorer and an exploiter populations. In ICGA, pages 238\u2013245"},{"key":"469_CR72","doi-asserted-by":"crossref","unstructured":"Ursem R.\u00a0K (2002). Diversity-guided evolutionary algorithms. In International Conference on Parallel Problem Solving from Nature, pages 462\u2013471. Springer","DOI":"10.1007\/3-540-45712-7_45"},{"key":"469_CR73","doi-asserted-by":"crossref","unstructured":"Wineberg M, Oppacher F (2003). The underlying similarity of diversity measures used in evolutionary computation. In Genetic and Evolutionary Computation-GECCO 2003: Genetic and Evolutionary Computation Conference Chicago, IL, USA, July 12\u201316, 2003 Proceedings, Part II, pages 1493\u20131504. Springer","DOI":"10.1007\/3-540-45110-2_21"}],"container-title":["Memetic Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12293-025-00469-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12293-025-00469-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12293-025-00469-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T08:02:09Z","timestamp":1757577729000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12293-025-00469-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,7]]},"references-count":73,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["469"],"URL":"https:\/\/doi.org\/10.1007\/s12293-025-00469-z","relation":{},"ISSN":["1865-9284","1865-9292"],"issn-type":[{"type":"print","value":"1865-9284"},{"type":"electronic","value":"1865-9292"}],"subject":[],"published":{"date-parts":[[2025,7,7]]},"assertion":[{"value":"27 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"37"}}