{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:33:13Z","timestamp":1777390393084,"version":"3.51.4"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T00:00:00Z","timestamp":1707868800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T00:00:00Z","timestamp":1707868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1007\/s13198-023-02236-0","type":"journal-article","created":{"date-parts":[[2024,2,14]],"date-time":"2024-02-14T10:02:01Z","timestamp":1707904921000},"page":"2202-2217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Metaheuristic algorithms and their applications in performance optimization of cyber-physical systems having applications in logistics"],"prefix":"10.1007","volume":"15","author":[{"given":"Monika","family":"Saini","sequence":"first","affiliation":[]},{"given":"Vijay Singh","family":"Maan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9749-9140","authenticated-orcid":false,"given":"Ashish","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Dinesh Kumar","family":"Saini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,14]]},"reference":[{"issue":"6","key":"2236_CR1","doi-asserted-by":"publisher","first-page":"1795","DOI":"10.1007\/s10845-021-01757-4","volume":"33","author":"MustufaHaider Abidi","year":"2022","unstructured":"Abidi MustufaHaider, Alkhalefah Hisham, Umer Usama (2022) Fuzzy harmony search based optimal control strategy for wireless cyber physical system with industry 4.0. J Intell Manuf 33(6):1795\u20131812","journal-title":"J Intell Manuf"},{"key":"2236_CR2","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1016\/j.compind.2018.04.017","volume":"100","author":"R Alguliyev","year":"2018","unstructured":"Alguliyev R, Imamverdiyev Y, Sukhostat L (2018) Cyber-physical systems and their security issues. Comput Ind 100:212\u2013223","journal-title":"Comput Ind"},{"key":"2236_CR3","unstructured":"Alur R (2015) Principles of cyber-physical systems. MIT press"},{"key":"2236_CR4","unstructured":"Aslani B, Mohebbi S, Oughton EJ (2022) The state-of-the-art survey on optimization methods for cyber-physical networks. arXiv preprint arXiv:2210.03642"},{"issue":"1","key":"2236_CR5","first-page":"161","volume":"12","author":"R Baheti","year":"2011","unstructured":"Baheti R, Gill H (2011) Cyber-physical systems. Impact Control Technol 12(1):161\u2013166","journal-title":"Impact Control Technol"},{"key":"2236_CR6","doi-asserted-by":"crossref","unstructured":"Bhatia V, Vivek J, Sunita K, Kaswan KS (2022) Real-life applications of soft computing in cyber-physical system: a compressive review. Soft computing: theories and applications: proceedings of SoCTA 2020, 1: 501\u2013514","DOI":"10.1007\/978-981-16-1740-9_41"},{"issue":"1","key":"2236_CR7","doi-asserted-by":"publisher","first-page":"46","DOI":"10.3103\/S0146411615010022","volume":"49","author":"Vladimir A Bogatyrev","year":"2015","unstructured":"Bogatyrev Vladimir A, Bogatyrev AV (2015) Functional reliability of a real-time redundant computational process in cluster architecture systems. Autom Control Comput Sci 49(1):46\u201356","journal-title":"Autom Control Comput Sci"},{"issue":"11","key":"2236_CR8","doi-asserted-by":"publisher","first-page":"2225","DOI":"10.1002\/spe.2942","volume":"51","author":"Kun Cao","year":"2021","unstructured":"Cao Kun, Wei Tongquan, Chen Mingsong, Li Keqin, Weng Jian, Tan Wuzheng (2021) Exploring reliable edge-cloud computing for service latency optimization in sustainable cyber-physical systems. Softw Pract Exp 51(11):2225\u20132237","journal-title":"Softw Pract Exp"},{"issue":"19","key":"2236_CR9","doi-asserted-by":"publisher","first-page":"2252","DOI":"10.3390\/rs11192252","volume":"11","author":"F Casta\u00f1o","year":"2019","unstructured":"Casta\u00f1o F, Strzelczak S, Villalonga A, Haber RE, Kossakowska J (2019) Sensor reliability in cyber-physical systems using internet-of-things data: a review and case study. Remote Sens 11(19):2252","journal-title":"Remote Sens"},{"issue":"1","key":"2236_CR10","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/s10489-012-0358-8","volume":"38","author":"S-T Cheng","year":"2013","unstructured":"Cheng S-T, Shih J-S, Chang T-Y (2013) GA-based actuator control method for minimizing power consumption in cyber physical systems. Appl Intell 38(1):78\u201387","journal-title":"Appl Intell"},{"issue":"1","key":"2236_CR11","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MIE.2017.2648857","volume":"11","author":"AW Colombo","year":"2017","unstructured":"Colombo AW, Karnouskos S, Kaynak O, Shi Y, Yin S (2017) Industrial cyberphysical systems: a backbone of the fourth industrial revolution. IEEE Ind Electron Mag 11(1):6\u201316","journal-title":"IEEE Ind Electron Mag"},{"issue":"9","key":"2236_CR12","first-page":"528","volume":"82","author":"GB Erickson","year":"2011","unstructured":"Erickson GB, Citek K, Cove M, Wilczek J, Linster C, Bjarnason B, Langemo N (2011) Reliability of a computer-based system for measuring visual performance skills. Optom J Am Optom Assoc 82(9):528\u2013542","journal-title":"Optom J Am Optom Assoc"},{"key":"2236_CR13","doi-asserted-by":"crossref","unstructured":"Jazdi N (2014) Cyber physical systems in the context of industry 4.0. In: 2014 IEEE international conference on automation, quality and testing, robotics, pp 1\u20134. IEEE","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"2236_CR14","doi-asserted-by":"publisher","first-page":"100988","DOI":"10.1016\/j.aei.2019.100988","volume":"42","author":"E Kajati","year":"2019","unstructured":"Kajati E, Papcun P, Liu C, Zhong RY, Koziorek J, Zolotova I (2019) Cloud based cyber-physical systems: network evaluation study. Adv Eng Inform 42:100988","journal-title":"Adv Eng Inform"},{"key":"2236_CR15","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.compind.2018.02.009","volume":"97","author":"Azfar Khalid","year":"2018","unstructured":"Khalid Azfar, Kirisci Pierre, Khan Zeashan Hameed, Ghrairi Zied, Thoben Klaus-Dieter, Pannek J\u00fcrgen (2018) Security framework for industrial collaborative robotic cyber-physical systems. Comput Ind 97:132\u2013145","journal-title":"Comput Ind"},{"issue":"6","key":"2236_CR16","doi-asserted-by":"publisher","first-page":"1334","DOI":"10.1007\/s13198-021-01305-6","volume":"12","author":"Ashish Kumar","year":"2021","unstructured":"Kumar Ashish, Saini Monika, Saini Dinesh Kumar, Badiwal Nikhilesh (2021) Cyber physical systems-reliability modelling: critical perspective and its impact. Int J Syst Assur Eng Manag 12(6):1334\u20131347","journal-title":"Int J Syst Assur Eng Manag"},{"key":"2236_CR17","doi-asserted-by":"publisher","first-page":"118643","DOI":"10.1016\/j.eswa.2022.118643","volume":"211","author":"CKM Lee","year":"2023","unstructured":"Lee CKM, Ng CK, Chung SY, Keung KL (2023) Cloud-based cyber-physical logistics system with nested MAX-MIN ant algorithm for e-commerce logistics. Expert Syst Appl 211:118643","journal-title":"Expert Syst Appl"},{"issue":"5","key":"2236_CR18","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1109\/JPROC.2015.2497161","volume":"104","author":"C Lu","year":"2015","unstructured":"Lu C, Saifullah A, Li Bo, Sha Mo, Gonzalez H, Gunatilaka D, Chengjie Wu, Nie L, Chen Y (2015) Real-time wireless sensor-actuator networks for industrial cyber-physical systems. Proc IEEE 104(5):1013\u20131024","journal-title":"Proc IEEE"},{"issue":"6","key":"2236_CR19","doi-asserted-by":"publisher","first-page":"837","DOI":"10.3390\/s16060837","volume":"16","author":"Y Lu","year":"2016","unstructured":"Lu Y, Li L, Peng H, Yang Y (2016) An energy efficient mutual authentication and key agreement scheme preserving anonymity for wireless sensor networks. Sensors 16(6):837","journal-title":"Sensors"},{"key":"2236_CR26","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361","journal-title":"Adv Eng Softw"},{"key":"2236_CR27","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1007\/s00521-015-1920-1","volume":"27","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S (2016) Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems. Neural Comput Appl 27:1053\u20131073","journal-title":"Neural Comput Appl"},{"key":"2236_CR20","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-42559-7_2","volume-title":"Industrial internet of things","author":"Sascha Julian Oks","year":"2017","unstructured":"Oks Sascha Julian, Fritzsche Albrecht, M\u00f6slein Kathrin M (2017) An application map for industrial cyber-physical systems. Industrial internet of things. Springer, Cham, pp 21\u201346"},{"key":"2236_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-022-10252-x","author":"SJ Oks","year":"2022","unstructured":"Oks SJ, Jalowski M, Lechner M et al (2022) Cyber-physical systems in the context of industry 4.0: a review, categorization and outlook. Inf Syst Front. https:\/\/doi.org\/10.1007\/s10796-022-10252-x","journal-title":"Inf Syst Front"},{"issue":"10","key":"2236_CR22","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1007\/s00607-012-0227-7","volume":"95","author":"Sazia Parvin","year":"2013","unstructured":"Parvin Sazia, Hussain FarookhKhadeer, Hussain Omar Khadeer, Thein Thandar, Park Jong Sou (2013) Multi-cyber framework for availability enhancement of cyber physical systems. Computing 95(10):927\u2013948","journal-title":"Computing"},{"key":"2236_CR28","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.advengsoft.2017.01.004","volume":"105","author":"S Saremi","year":"2017","unstructured":"Saremi S, Mirjalili S, Lewis A (2017) Grasshopper optimisation algorithm: theory and application. Adv Eng Softw 105:30\u201347","journal-title":"Adv Eng Softw"},{"key":"2236_CR23","doi-asserted-by":"publisher","first-page":"100762","DOI":"10.1016\/j.swevo.2020.100762","volume":"60","author":"Melanie Schranz","year":"2021","unstructured":"Schranz Melanie, Di Caro Gianni A, Schmickl Thomas, Elmenreich Wilfried, Arvin Farshad, \u015eekercio\u011flu Ahmet, Sende Micha (2021) Swarm intelligence and cyber-physical systems: concepts, challenges and future trends. Swarm Evol Comput 60:100762","journal-title":"Swarm Evol Comput"},{"key":"2236_CR29","doi-asserted-by":"crossref","unstructured":"Yang XS, Deb S (2009) Cuckoo search via L\u00e9vy flights. In: 2009 World congress on nature & biologically inspired computing (NaBIC), pp 210\u2013214. IEEE.","DOI":"10.1109\/NABIC.2009.5393690"},{"key":"2236_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-04137-3_14","volume-title":"Simulation for industry 4.0. Springer series in advanced manufacturing","author":"H Zhang","year":"2019","unstructured":"Zhang H, Buchmeister B, Liu S, Ojstersek R (2019) Use of a simulation environment and metaheuristic algorithm for human resource management in a cyber-physical system. In: Gunal M (ed) Simulation for industry 4.0. Springer series in advanced manufacturing. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-04137-3_14"},{"key":"2236_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-021-10153-5","author":"C Zhang","year":"2021","unstructured":"Zhang C, Chen Y, Chen H, Chong D (2021) Industry 4.0 and its implementation: a review. Inf Syst Front. https:\/\/doi.org\/10.1007\/s10796-021-10153-5","journal-title":"Inf Syst Front"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-023-02236-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13198-023-02236-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-023-02236-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T16:19:06Z","timestamp":1718381946000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13198-023-02236-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,14]]},"references-count":29,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["2236"],"URL":"https:\/\/doi.org\/10.1007\/s13198-023-02236-0","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,14]]},"assertion":[{"value":"5 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"In this study no human participant and\/or animals involved.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}