{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T07:00:23Z","timestamp":1775545223932,"version":"3.50.1"},"reference-count":25,"publisher":"Informa UK Limited","issue":"12","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Applied Artificial Intelligence"],"published-print":{"date-parts":[[2020,10,14]]},"DOI":"10.1080\/08839514.2020.1790163","type":"journal-article","created":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T06:56:50Z","timestamp":1594796210000},"page":"880-897","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Optimal Sizing of Recycling Folded Cascode Amplifier for Low-Frequency Applications Using New Hybrid Swarm Intelligence-Based Technique"],"prefix":"10.1080","volume":"34","author":[{"given":"Naushad Manzoor","family":"Laskar","sequence":"first","affiliation":[{"name":"Department of Electronics and Communication Engineering, National Institute of Technology, Silchar, India"}]},{"given":"Koushik","family":"Guha","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, National Institute of Technology, Silchar, India"}]},{"given":"Sourav","family":"Nath","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, National Institute of Technology, Silchar, India"}]},{"given":"K.L.","family":"Baishnab","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, National Institute of Technology, Silchar, India"}]},{"given":"P.K.","family":"Paul","sequence":"additional","affiliation":[{"name":"Department of Electronics and Communication Engineering, National Institute of Technology, Silchar, India"}]}],"member":"301","published-online":{"date-parts":[[2020,7,14]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2009.2024819"},{"key":"cit0002","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2011.2173577"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1002\/jnm.2040"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8585-7_25"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126618500299"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2011.02.002"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1109\/JSSC.2013.2266869"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1007\/s10470-009-9361-3"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0792-66"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-018-1247-6"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.1109\/DEVIC.2017.8073949"},{"key":"cit0013","volume":"2014","author":"Liu H.","year":"2014","journal-title":"Hindawi Publishing Corporation, The Scientific World Journal"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1080\/0952813X.2015.1042533"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-015-1920-1"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2017.07.002"},{"key":"cit0017","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2016.01.008"},{"issue":"5","key":"cit0018","first-page":"43620","volume":"10","author":"Paul P. K.","year":"2015","journal-title":"International Journal of Applied Engineering Research"},{"key":"cit0019","unstructured":"Price, K., and R. Storn. 1995. Differential evolution \u2013 A simple and efficient adaptive scheme for global optimization over continuous spaces. Technical report, International Computer Science Institute, Berkley."},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1109\/CJECE.2003.1425097"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.04.033"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1002\/9780470549124"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.1109\/CINTI.2011.6108562"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2007.907868"},{"key":"cit0025","first-page":"3816","volume-title":"Proceedings of the IEEE international conference on system, security and assurance","author":"Zhang W. J.","year":"2003"}],"container-title":["Applied Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08839514.2020.1790163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,24]],"date-time":"2021-05-24T23:15:27Z","timestamp":1621898127000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08839514.2020.1790163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,14]]},"references-count":25,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2020,10,14]]}},"alternative-id":["10.1080\/08839514.2020.1790163"],"URL":"https:\/\/doi.org\/10.1080\/08839514.2020.1790163","relation":{},"ISSN":["0883-9514","1087-6545"],"issn-type":[{"value":"0883-9514","type":"print"},{"value":"1087-6545","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,14]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uaai20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-07-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}