{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T19:05:22Z","timestamp":1775502322443,"version":"3.50.1"},"reference-count":52,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,9,1]],"date-time":"2026-09-01T00:00:00Z","timestamp":1788220800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Advanced Engineering Informatics"],"published-print":{"date-parts":[[2026,9]]},"DOI":"10.1016\/j.aei.2026.104519","type":"journal-article","created":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T04:05:04Z","timestamp":1774238704000},"page":"104519","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"PA","title":["IFSDR: Re-clustering routing of data transmission using objective function synchronization based on intelligent threshold detector"],"prefix":"10.1016","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9761-8848","authenticated-orcid":false,"given":"Arash","family":"GhorbanniaDelavar","sequence":"first","affiliation":[]},{"given":"Zahra","family":"Jormand","sequence":"additional","affiliation":[]},{"given":"Fatemeh Zahra","family":"Gharib","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.aei.2026.104519_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2025.104132","article-title":"TPMCD: A method to optimizing cost and throughput for clustering tasks and hybrid containers in the cloud data center","volume":"237","author":"GhorbanniaDelavar","year":"2025","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.aei.2026.104519_b2","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1016\/j.asoc.2018.02.013","article-title":"Review on meta-heuristics approaches for airside operation research","volume":"66","author":"Ng","year":"2018","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b3","doi-asserted-by":"crossref","DOI":"10.1016\/j.compstruc.2020.106271","article-title":"Efficient meta-heuristic mesh adaptation strategies for NURBS upper\u2013bound limit analysis of curved three-dimensional masonry structures","volume":"236","author":"Grillanda","year":"2020","journal-title":"Comput. Struct."},{"key":"10.1016\/j.aei.2026.104519_b4","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2024.102362","article-title":"Multi-satellite cooperative scheduling method for large-scale tasks based on hybrid graph neural network and metaheuristic algorithm","volume":"60","author":"Feng","year":"2024","journal-title":"Adv. Eng. Informat."},{"key":"10.1016\/j.aei.2026.104519_b5","doi-asserted-by":"crossref","DOI":"10.1016\/j.future.2024.107624","article-title":"MHSC: A meta-heuristic method to optimize throughput and energy using sensitivity rate computing","volume":"166","author":"Delavar","year":"2025","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.aei.2026.104519_b6","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.123362","article-title":"Particle guided metaheuristic algorithm for global optimization and feature selection problems","volume":"248","author":"Kwakye","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.aei.2026.104519_b7","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1016\/j.asoc.2018.05.032","article-title":"Hybrid meta-heuristic algorithms for independent job scheduling in grid computing","volume":"72","author":"Younis","year":"2018","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b8","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.asoc.2018.11.011","article-title":"A constrained portfolio selection model at considering risk-adjusted measure by using hybrid meta-heuristic algorithms","volume":"75","author":"Salehpoor","year":"2019","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b9","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.comcom.2020.08.010","article-title":"Quantum and classical genetic algorithms for multilevel segmentation of medical images: A comparative study","volume":"162","author":"Hilali-Jaghdam","year":"2020","journal-title":"Comput. Commun."},{"key":"10.1016\/j.aei.2026.104519_b10","series-title":"2010 2nd International Conference on Computer Technology and Development","first-page":"365","article-title":"DSQGG: An optimized genetic-based algorithm for scheduling in distributed grid","author":"Delavar","year":"2010"},{"key":"10.1016\/j.aei.2026.104519_b11","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2022.101563","article-title":"Genetic algorithm-assisted an improved AdaBoost double-layer for oil temperature prediction of TBM","volume":"52","author":"Ren","year":"2022","journal-title":"Adv. Eng. Informat."},{"key":"10.1016\/j.aei.2026.104519_b12","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2020.106330","article-title":"Application of a genetic algorithm based model selection algorithm for identification of carbide-based hot metal desulfurization","volume":"92","author":"Vuolio","year":"2020","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b13","series-title":"2010 2nd International Conference on Software Technology and Engineering","first-page":"2","article-title":"GQSD: The new algorithm for optimizing the quality of service heterogeneous possessing sources at distributed systems","author":"Delavar","year":"2010"},{"key":"10.1016\/j.aei.2026.104519_b14","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2022.109231","article-title":"Dynamically induced clustering ant colony algorithm based on a coevolutionary chain","volume":"251","author":"Yu","year":"2022","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.aei.2026.104519_b15","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1016\/j.compeleceng.2016.09.035","article-title":"Cooperative ant colony-genetic algorithm based on spark","volume":"60","author":"Gaifang","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.aei.2026.104519_b16","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2022.101816","article-title":"A quantum-inspired ant colony optimization for solving a sustainable four-dimensional traveling salesman problem under type-2 fuzzy variable","volume":"55","author":"Das","year":"2023","journal-title":"Adv. Eng. Informat."},{"key":"10.1016\/j.aei.2026.104519_b17","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1016\/j.asoc.2017.02.021","article-title":"Ant colony optimization based hierarchical multi-label classification algorithm","volume":"55","author":"Khan","year":"2017","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b18","article-title":"Minus HELLO: HELLO devoid protocols for energy preservation in mobile ad-hoc networks","volume":"38","author":"Banerjee","year":"2023","journal-title":"Sustain. Comput.: Informat. Syst."},{"key":"10.1016\/j.aei.2026.104519_b19","article-title":"A novel routing protocol for reducing packet delay with multi-beam antennas","volume":"220","author":"Biomo","year":"2023","journal-title":"Comput. Netw."},{"key":"10.1016\/j.aei.2026.104519_b20","article-title":"Flow-based intrusion detection system in vehicular ad hoc network using context-aware feature extraction","volume":"41","author":"Shams","year":"2023","journal-title":"Veh. Commun."},{"key":"10.1016\/j.aei.2026.104519_b21","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.comcom.2024.01.030","article-title":"Throughput maximization in multi-slice cooperative NOMA-based system with underlay D2D communications","volume":"217","author":"Amer","year":"2024","journal-title":"Comput. Commun."},{"key":"10.1016\/j.aei.2026.104519_b22","article-title":"Zone-based stable and secure clustering technique for VANETs","volume":"130","author":"Sharma","year":"2024","journal-title":"Simul. Model. Pr. Theory"},{"key":"10.1016\/j.aei.2026.104519_b23","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.111593","article-title":"A discrete artificial bee colony algorithm and its application in flexible flow shop scheduling with assembly and machine deterioration effect","volume":"159","author":"Li","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b24","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.112472","article-title":"A fuzzy grouping-based memetic algorithm for multi-depot multi-UAV power pole inspection","volume":"168","author":"Chen","year":"2025","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b25","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2025.104131","article-title":"A holistic survey of UAV-assisted wireless communications in the transition from 5G to 6G: State-of-the-art intertwined innovations, challenges, and opportunities","author":"Mahbub","year":"2025","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.aei.2026.104519_b26","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119015","article-title":"Learning to rank and predict: multi-task learning for ad hoc retrieval and query performance prediction","volume":"639","author":"Khodabakhsh","year":"2023","journal-title":"Inform. Sci."},{"key":"10.1016\/j.aei.2026.104519_b27","first-page":"145","article-title":"Hybrid optimization using lion and dragonfly for enhanced resource allocation in fifth-generation networks","author":"Louis","year":"2023","journal-title":"Data Knowl. Eng."},{"key":"10.1016\/j.aei.2026.104519_b28","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2023.109080","article-title":"A binary reptile search algorithm based on transfer functions with a new stochastic repair method for 0\u20131 knapsack problems","volume":"178","author":"Ervural","year":"2023","journal-title":"Comput. Ind. Eng."},{"key":"10.1016\/j.aei.2026.104519_b29","article-title":"Discharging driven energy sharing protocol for V2V communication in vehicular energy networks","volume":"49","author":"Tang","year":"2024","journal-title":"Veh. Commun."},{"key":"10.1016\/j.aei.2026.104519_b30","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.111263","article-title":"Subswarm-guided ant colony optimization with enhanced pheromone update mechanism and beam search for VNF placement and routing","volume":"153","author":"Tam","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.111261","article-title":"An oscillatory particle swarm optimization feature selection algorithm for hybrid data based on mutual information entropy","volume":"152","author":"He","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b32","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1016\/j.ejor.2024.05.009","article-title":"A hybrid genetic algorithm with type-aware chromosomes for traveling salesman problems with drone","volume":"318","author":"Mahmoudinazlou","year":"2024","journal-title":"European J. Oper. Res."},{"key":"10.1016\/j.aei.2026.104519_b33","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2024.124375","article-title":"Genetic programming hyper-heuristic-based solution for dynamic energy-efficient scheduling of hybrid flow shop scheduling with machine breakdowns and random job arrivals","author":"Duan","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.aei.2026.104519_b34","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2023.103377","article-title":"Adaptive protocol of raft in wireless network","volume":"154","author":"Yu","year":"2024","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.aei.2026.104519_b35","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.112039","article-title":"Optimizing energy-efficient cluster head selection in wireless sensor networks using a binarized spiking neural network and honey badger algorithm","volume":"299","author":"Wilson","year":"2024","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.aei.2026.104519_b36","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.111947","article-title":"A survey of mat-heuristics for combinatorial optimisation problems: variants, trends and opportunities","author":"Ngoo","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b37","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2024.102799","article-title":"A comprehensive review of clustering techniques in artificial intelligence for knowledge discovery: Taxonomy, challenges, applications and future prospects","volume":"62","author":"Singh","year":"2024","journal-title":"Adv. Eng. Informat."},{"key":"10.1016\/j.aei.2026.104519_b38","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.112102","article-title":"Two-stage heuristic algorithm with pseudo node-based model for electric vehicle routing problem","volume":"165","author":"Xia","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b39","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.112424","article-title":"An altitude-aware fuzzy approach for energy efficiency in UAV-assisted 3D wireless sensor networks","volume":"167","author":"Sert","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b40","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2024.103675","article-title":"Age of information optimal UAV swarm-assisted sweep coverage in wireless sensor networks","volume":"166","author":"Li","year":"2025","journal-title":"Ad Hoc Networks"},{"key":"10.1016\/j.aei.2026.104519_b41","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2025.111037","article-title":"Malicious vehicle detection scheme based on UAV and vehicle cooperative authentication in vehicular networks","volume":"258","author":"Wang","year":"2025","journal-title":"Comput. Netw."},{"key":"10.1016\/j.aei.2026.104519_b42","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2025.103757","article-title":"Energy-efficient clustering and path planning for UAV-assisted D2D cellular networks","volume":"170","author":"Gouda","year":"2025","journal-title":"Ad Hoc Networks"},{"key":"10.1016\/j.aei.2026.104519_b43","article-title":"EdlIoT: A method for decreasing energy consumption and latency using scheduling algorithm in internet of things","volume":"42","author":"Delavar","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"key":"10.1016\/j.aei.2026.104519_b44","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110869","article-title":"FMORT: The meta-heuristic routing method by integrating index parameters to optimize energy consumption and real execution time using FANET","volume":"255","author":"GhorbanniaDelavar","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.aei.2026.104519_b45","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2024.108941","article-title":"A dyeing clustering algorithm based on ant colony path-finding mechanism","volume":"136","author":"Zeng","year":"2024","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.aei.2026.104519_b46","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.111773","article-title":"Cluster-based multicast optimized routing in VANETs using elite knowledge-based genetic algorithm","volume":"294","author":"Badole","year":"2024","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.aei.2026.104519_b47","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.112192","article-title":"Binary ant colony optimization algorithm in learning random satisfiability logic for discrete hopfield neural network","volume":"166","author":"Gao","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b48","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2024.110600","article-title":"An improved artificial bee colony algorithm to minimum propagation latency and balanced load for controller placement in software defined network","volume":"250","author":"Ma","year":"2024","journal-title":"Comput. Netw."},{"key":"10.1016\/j.aei.2026.104519_b49","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2024.112047","article-title":"A genetic algorithm method for improving suboptimal sensor arrangements in coverage and connectivity problems","volume":"166","author":"Assis","year":"2024","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b50","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2024.102923","article-title":"CMPSO: A novel co-evolutionary multigroup particle swarm optimization for multi-mission UAVs path planning","volume":"63","author":"Hu","year":"2025","journal-title":"Adv. Eng. Informat."},{"key":"10.1016\/j.aei.2026.104519_b51","article-title":"Combinatorial optimization for UAV swarm path planning and task assignment in multi-obstacle battlefield environment","author":"Guo","year":"2025","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.aei.2026.104519_b52","article-title":"A task-driven scheme for forming clustering-structure-based heterogeneous FANETs","volume":"52","author":"Chen","year":"2025","journal-title":"Veh. Commun."}],"container-title":["Advanced Engineering Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1474034626002119?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1474034626002119?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T18:04:23Z","timestamp":1775498663000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1474034626002119"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,9]]},"references-count":52,"alternative-id":["S1474034626002119"],"URL":"https:\/\/doi.org\/10.1016\/j.aei.2026.104519","relation":{},"ISSN":["1474-0346"],"issn-type":[{"value":"1474-0346","type":"print"}],"subject":[],"published":{"date-parts":[[2026,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"IFSDR: Re-clustering routing of data transmission using objective function synchronization based on intelligent threshold detector","name":"articletitle","label":"Article Title"},{"value":"Advanced Engineering Informatics","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.aei.2026.104519","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier Ltd.","name":"copyright","label":"Copyright"}],"article-number":"104519"}}