{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:28:38Z","timestamp":1771468118601,"version":"3.50.1"},"reference-count":40,"publisher":"Informa UK Limited","issue":"3","license":[{"start":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T00:00:00Z","timestamp":1733788800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information and Telecommunication"],"published-print":{"date-parts":[[2025,7,3]]},"DOI":"10.1080\/24751839.2024.2436228","type":"journal-article","created":{"date-parts":[[2024,12,10]],"date-time":"2024-12-10T12:33:51Z","timestamp":1733834031000},"page":"317-334","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Energy-efficient joint performance optimization of cloud data centre users\/operator using memetic algorithm"],"prefix":"10.1080","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6173-1577","authenticated-orcid":false,"given":"Pejman","family":"Goudarzi","sequence":"first","affiliation":[{"name":"ICT Research Institute (ITRC)","place":["Tehran, Iran"]}]},{"given":"Farima","family":"Ayatollahi","sequence":"additional","affiliation":[{"name":"ICT Research Institute (ITRC)","place":["Tehran, Iran"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0862-0533","authenticated-orcid":false,"given":"Jaime","family":"Lloret","sequence":"additional","affiliation":[{"name":"Universitat Polit\u00e8cnica de Val\u00e8ncia","place":["Gandia, Spain"]}]}],"member":"301","published-online":{"date-parts":[[2024,12,10]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-023-08151-7"},{"key":"e_1_3_2_3_1","unstructured":"Alreshoodi M. & Woods J. (2013). Survey on QoE\\QoS correlation models for multimedia services arXiv preprint. https:\/\/arxiv.org\/abs\/1306.0221"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JEEIT.2019.8717430"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/17445760.2017.1278601"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1108\/HFF-01-2020-0036"},{"key":"e_1_3_2_7_1","volume-title":"Constrained optimization and Lagrange multiplier methods","author":"Bertsekas D. P.","year":"1982","unstructured":"Bertsekas, D. P. (1982). Constrained optimization and Lagrange multiplier methods. Athena Scientific."},{"key":"e_1_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470940105"},{"key":"e_1_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/en14082071"},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/network2040037"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2481183"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-022-03068-9"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2023.110681"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2774"},{"key":"e_1_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics8020218"},{"key":"e_1_3_2_16_1","article-title":"A memetic algorithm for dynamic design of wireless sensor networks","author":"Ferentinos K. P.","year":"2007","unstructured":"Ferentinos, K. P., & Tsiligiridis, T. A. (2007). A memetic algorithm for dynamic design of wireless sensor networks. IEEE Congress on Evolutionary Computation.","journal-title":"IEEE Congress on Evolutionary Computation"},{"key":"e_1_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2012.6245984"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi15030088"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-008-9592-0"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40998-020-00381-x"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi14120368"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/s22218384"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.3390\/biomimetics8030278"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2017.08.015"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-023-00210-y"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2489646"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2019.2927410"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.04.016"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2016.2623803"},{"key":"e_1_3_2_30_1","unstructured":"Lugo L. Segura C. & Miranda G. (2024). Future trends in the design of memetic algorithms: The case of the linear ordering problem. arXiv pre-print. https:\/\/arxiv.org\/abs\/2405.08285"},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/su152115249"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23247-3"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2314861"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.3390\/network3010005"},{"key":"e_1_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31204-0_18"},{"key":"e_1_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11213639"},{"key":"e_1_3_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2558203"},{"key":"e_1_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3434"},{"key":"e_1_3_2_39_1","first-page":"1","article-title":"A game theory approach to fair and efficient resource allocation in cloud computing","volume":"2014","author":"Xu X.","year":"2014","unstructured":"Xu, X., & Yu, H. (2014). A game theory approach to fair and efficient resource allocation in cloud computing. Mathematical Problems in Engineering, 2014, 1\u201314.","journal-title":"Mathematical Problems in Engineering"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.3390\/en12081474"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2019.07.008"}],"container-title":["Journal of Information and Telecommunication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/24751839.2024.2436228","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T17:57:14Z","timestamp":1755626234000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/24751839.2024.2436228"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,10]]},"references-count":40,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,7,3]]}},"alternative-id":["10.1080\/24751839.2024.2436228"],"URL":"https:\/\/doi.org\/10.1080\/24751839.2024.2436228","relation":{},"ISSN":["2475-1839","2475-1847"],"issn-type":[{"value":"2475-1839","type":"print"},{"value":"2475-1847","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,10]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tjit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-08-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}