{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T14:24:51Z","timestamp":1768746291625,"version":"3.49.0"},"reference-count":81,"publisher":"Oxford University Press (OUP)","issue":"8","license":[{"start":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:00:00Z","timestamp":1753401600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"name":"Graduate Research Fund of Guizhou Province","award":["2024YJSKYJJ164"],"award-info":[{"award-number":["2024YJSKYJJ164"]}]},{"name":"Guizhou Provincial Basic Research Program","award":["Qiankehejichu-ZK[2024] General 424"],"award-info":[{"award-number":["Qiankehejichu-ZK[2024] General 424"]}]},{"name":"Guizhou Provincial Basic Research Program","award":["Qiankehejichu-ZK [2023] General 014"],"award-info":[{"award-number":["Qiankehejichu-ZK [2023] General 014"]}]},{"name":"Science and Technology Platform Project of Guizhou Province, China","award":["ZSYS[2025]011"],"award-info":[{"award-number":["ZSYS[2025]011"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,8,4]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Metaheuristic algorithms are important methods for solving practical optimization problems. Accurate, efficient, and stable metaheuristic algorithms have become the main goal of optimization research. Hippopotamus optimization algorithm (HO) is a new algorithm with good optimization effect proposed by three biological behaviors of hippopotamus: position change, defense, and avoidance of predators. However, due to the many restrictions of hippopotamus itself and the incomplete exploitation of hippopotamus\u2019 physiological functions, in the exploration and exploitation stages, the parameter settings are single and limited in range, and the position change strategies under different conditions are less different, resulting in the algorithm\u2019s limited search ability, tendency to converge prematurely and fall into the local optimal trap, poor exploration accuracy, and other shortcomings, making it impossible to obtain good results when facing optimization problems. In response to these shortcomings, this paper proposes a multi-strategy Hippopotamus optimization algorithm (MSHO), which achieves better performance by introducing three strategy improvement methods: adaptive perturbation optimization, autonomous optimal screening and new avoidance and defense. The effectiveness of MSHO is verified by comparing it with 10 excellent algorithms on the two test sets of CEC2017 and CEC2020. MSHO ranked first in the Friedman test results of the two experimental test sets, and in the two test sets, the optimization effect of MSHO was improved by 47.21% and 45.66%, respectively, compared with HO. Parameter perturbation analysis experiments were conducted, and the optimization effect of the improved strategy on the algorithm was obtained through ablation experiments. In addition, feature selection (FS) helps to improve the accuracy and efficiency of data analysis in fields such as engineering design and image analysis. In order to verify that MSHO has good effects in FS applications, it was compared with 10 excellent algorithms on 23 FS data sets. The Friedman test results of MSHO on 23 experimental FS data sets show that the optimization effect of MSHO is also better than other comparison algorithms, and the optimization effect is improved by 32.11% compared with HO, proving that MSHO performs better than the original HO and other comparison algorithms in the application of FS. MSHO and HO are tested for exploration and exploitation balance and population diversity, and it is finally concluded that MSHO has good stability and population diversity.<\/jats:p>","DOI":"10.1093\/jcde\/qwaf073","type":"journal-article","created":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T13:01:27Z","timestamp":1753448487000},"page":"193-251","source":"Crossref","is-referenced-by-count":0,"title":["An effective method for solving feature selection problems based on multi-strategy Hippo optimization algorithm"],"prefix":"10.1093","volume":"12","author":[{"given":"Xiaoyang","family":"Yuan","sequence":"first","affiliation":[{"name":"Guizhou Normal University School of Mechanical and Electrical Engineering, , Guiyang, Guizhou 550025 ,","place":["China"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0349-3106","authenticated-orcid":false,"given":"Liguo","family":"Yao","sequence":"additional","affiliation":[{"name":"Guizhou Normal University School of Mechanical and Electrical Engineering, , Guiyang, Guizhou 550025 ,","place":["China"]},{"name":"Guizhou Normal University Guizhou Key Laboratory of NewGen Cyberspace Security, , Guiyang, Guizhou 550025 ,","place":["China"]},{"name":"Guizhou Normal University Technical Engineering Center of Manufacturing Service and Knowledge Engineering, , Guiyang, Guizhou 550025 ,","place":["China"]}]},{"given":"Taihua","family":"Zhang","sequence":"additional","affiliation":[{"name":"Guizhou Normal University School of Mechanical and Electrical Engineering, , Guiyang, Guizhou 550025 ,","place":["China"]},{"name":"Guizhou Normal University Guizhou Key Laboratory of NewGen Cyberspace Security, , Guiyang, Guizhou 550025 ,","place":["China"]},{"name":"Guizhou Normal University Technical Engineering Center of Manufacturing Service and Knowledge Engineering, , Guiyang, Guizhou 550025 ,","place":["China"]}]},{"given":"Qipeng","family":"Chen","sequence":"additional","affiliation":[{"name":"Guiyang University School of Mechanical Engineering, , Guiyang 550005 ,","place":["China"]},{"name":"Guizhou University Key Laboratory of Advanced Manufacturing Technology, Ministry of Education, , Guiyang 550025 ,","place":["China"]}]},{"given":"Guanghui","family":"Li","sequence":"additional","affiliation":[{"name":"Guizhou Normal University School of Mechanical and Electrical Engineering, , Guiyang, Guizhou 550025 ,","place":["China"]}]}],"member":"286","published-online":{"date-parts":[[2025,7,25]]},"reference":[{"key":"2025082213265232700_bib1","doi-asserted-by":"publisher","first-page":"110248","DOI":"10.1016\/j.knosys.2022.110248","article-title":"Nutcracker optimizer: A novel naturE\u2212inspired metaheuristic algorithm for global optimization and engineering design problems","volume":"262","author":"Abdel-Basset","year":"2023","journal-title":"Knowledge-Based Systems"},{"key":"2025082213265232700_bib2","doi-asserted-by":"publisher","first-page":"113062","DOI":"10.1016\/j.knosys.2025.113062","article-title":"A Halton enhanced solution-based Human Evolutionary Algorithm for complex optimization and advanced FS problems","volume":"311","author":"Abdel-Salam","year":"2025","journal-title":"Knowledge-Based Systems"},{"key":"2025082213265232700_bib3","doi-asserted-by":"publisher","first-page":"102201","DOI":"10.1016\/j.jocs.2023.102201","article-title":"IBJA: An improved binary DJaya algorithm for feature selection","volume":"75","author":"Abed-alguni","year":"2024","journal-title":"Journal of Computational Science"},{"key":"2025082213265232700_bib4","doi-asserted-by":"publisher","first-page":"14417","DOI":"10.1007\/s10586-024-04674-2","article-title":"BOC-PDO: An intrusion detection model using binary opposition cellular prairie dog optimization algorithm","volume":"27","author":"Abed-alguni","year":"2024","journal-title":"Cluster Computing"},{"key":"2025082213265232700_bib5","doi-asserted-by":"publisher","first-page":"e0275346","DOI":"10.1371\/journal.pone.0275346","article-title":"Advanced dwarf mongoose optimization for solving CEC 2011 and CEC 2017 benchmark problems","volume":"17","author":"Agushaka","year":"2022","journal-title":"PLoS ONE"},{"key":"2025082213265232700_bib6","doi-asserted-by":"publisher","first-page":"19427","DOI":"10.1007\/s00521-023-08772-x","article-title":"Binary improved white shark algorithm for intrusion detection systems","volume":"35","author":"Alawad","year":"2023","journal-title":"Neural Computing and Applications"},{"key":"2025082213265232700_bib7","doi-asserted-by":"publisher","first-page":"113156","DOI":"10.1016\/j.knosys.2025.113156","article-title":"EBAO: An intrusion detection framework for wireless sensor networks using an enhanced binary Aquila optimizer","volume":"312","author":"Alawad","year":"2025","journal-title":"Knowledge-Based Systems"},{"key":"2025082213265232700_bib8","doi-asserted-by":"publisher","first-page":"6107","DOI":"10.1007\/s13042-024-02308-y","article-title":"Bi-objective feature selection in high-dimensional datasets using improved binary chimp optimization algorithm","volume":"15","author":"Al-qudah","year":"2024","journal-title":"International Journal of Machine Learning and Cybernetics"},{"key":"2025082213265232700_bib9","doi-asserted-by":"publisher","first-page":"619","DOI":"10.3390\/biomimetics8080619","article-title":"Giant Armadillo optimization: A new bio-inspired metaheuristic algorithm for solving optimization problems","volume":"8","author":"Alsayyed","year":"2023","journal-title":"Biomimetics"},{"key":"2025082213265232700_bib10","doi-asserted-by":"publisher","first-page":"145","DOI":"10.3390\/technologies13040145","article-title":"AOAFS: A malware detection system using an improved arithmetic optimization algorithm","volume":"13","author":"Alshorman","year":"2025","journal-title":"Technologies"},{"key":"2025082213265232700_bib11","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1142\/S0218001408006351","article-title":"Genetic algorithm based feature selection level fusion using fingerprint and iris biometrics","volume":"22","author":"Altun","year":"2008","journal-title":"International Journal of Pattern Recognition and Artificial Intelligence"},{"key":"2025082213265232700_bib12","doi-asserted-by":"publisher","first-page":"5032","DOI":"10.1038\/s41598-024-54910-3","article-title":"Hippopotamus optimization algorithm: A novel naturE\u2212inspired optimization algorithm","volume":"14","author":"Amiri","year":"2024","journal-title":"Scientific Reports"},{"key":"2025082213265232700_bib13","first-page":"1079","article-title":"An improved butterfly optimization algorithm with chaos","volume":"32","author":"Arora","year":"2017","journal-title":"Journal of Intelligent & Fuzzy Systems"},{"key":"2025082213265232700_bib14","doi-asserted-by":"publisher","first-page":"107025","DOI":"10.1016\/j.compbiomed.2023.107025","article-title":"NSICA: Multi-objective imperialist competitive algorithm for feature selection in arrhythmia diagnosis","volume":"161","author":"Ayar","year":"2023","journal-title":"Computers in Biology and Medicine"},{"key":"2025082213265232700_bib15","doi-asserted-by":"publisher","first-page":"76529","DOI":"10.1109\/ACCESS.2019.2921545","article-title":"A novel hybrid harris hawks optimization for color image multilevel thresholding segmentation","volume":"7","author":"Bao","year":"2019","journal-title":"IEEE Access"},{"key":"2025082213265232700_bib16","first-page":"1","article-title":"mlr: Machine learning in R","volume":"17","author":"Bischl","year":"2016","journal-title":"Journal of Machine Learning Research"},{"key":"2025082213265232700_bib17","doi-asserted-by":"publisher","first-page":"2689","DOI":"10.1103\/PhysRevLett.66.2689","article-title":"Young's double-slit experiment with atoms: A simple atom interferometer","volume":"66","author":"Carnal","year":"1991","journal-title":"Physical Review Letters"},{"key":"2025082213265232700_bib18","doi-asserted-by":"publisher","DOI":"10.1109\/IADCC.2009.4809211","article-title":"A review on Speech and speaker authentication System using voice signal feature selection and extraction","volume-title":"2009 IEEE International Advance Computing Conference","author":"Chandra","year":"2009"},{"key":"2025082213265232700_bib19","doi-asserted-by":"publisher","first-page":"1542","DOI":"10.1093\/bioinformatics\/btz763","article-title":"Feature selection may improve deep neural networks for the bioinformatics problems","volume":"36","author":"Chen","year":"2020","journal-title":"Bioinformatics"},{"key":"2025082213265232700_bib20","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/s00607-024-01397-5","article-title":"A novel cheetah optimizer hybrid approach based on opposition-based learning (OBL) and diversity metrics","volume":"107","author":"Cuevas","year":"2025","journal-title":"Computing"},{"key":"2025082213265232700_bib21","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.matcom.2024.08.004","article-title":"Balancing individual and collective strategies: A new approach in metaheuristic optimization","volume":"227","author":"Cuevas","year":"2025","journal-title":"Mathematics and Computers in Simulation"},{"key":"2025082213265232700_bib22","doi-asserted-by":"publisher","first-page":"110011","DOI":"10.1016\/j.knosys.2022.110011","article-title":"Coati Optimization Algorithm: A new bio-inspired metaheuristic algorithm for solving optimization problems","volume":"259","author":"Dehghani","year":"2023","journal-title":"Knowledge-based Systems"},{"key":"2025082213265232700_bib23","doi-asserted-by":"publisher","first-page":"031041","DOI":"10.1103\/PhysRevX.11.031041","article-title":"Wave-particle duality of many-body quantum states","volume":"11","author":"Dittel","year":"2021","journal-title":"Physical Review X"},{"key":"2025082213265232700_bib24","doi-asserted-by":"publisher","first-page":"186638","DOI":"10.1109\/ACCESS.2020.3029728","article-title":"An improved harris hawks optimization algorithm with simulated annealing for feature selection in the medical field","volume":"8","author":"Elgamal","year":"2020","journal-title":"IEEE Access"},{"key":"2025082213265232700_bib25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12065-024-00988-7","article-title":"Integration of metaheuristic operators through unstructured evolutive game theory approach: A novel hybrid methodology","volume":"18","author":"Escobar-Cuevas","year":"2025","journal-title":"Evolutionary Intelligence"},{"key":"2025082213265232700_bib26","doi-asserted-by":"publisher","first-page":"e01910","DOI":"10.1016\/j.gecco.2021.e01910","article-title":"Hippopotamus population trends in ndumo game Reserve, South Africa, from 1951 to 2021","volume":"32","author":"Fritsch","year":"2021","journal-title":"Global Ecology and Conservation"},{"key":"2025082213265232700_bib27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10479-022-04854-6","article-title":"A logistics distribution route optimization model based on hybrid intelligent algorithm and its application","author":"Gan","year":"2022","journal-title":"Annals of Operations Research"},{"key":"2025082213265232700_bib28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s40745-025-00602-2","article-title":"Feature selection with an improved flow direction algorithm to improve the performance of intrusion detection systems","author":"Ghahramani","year":"2025","journal-title":"Annals of Data Science"},{"key":"2025082213265232700_bib29","first-page":"1157","article-title":"An introduction to variable and feature selection","volume":"3","author":"Guyon","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"2025082213265232700_bib30","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1057\/ivs.2010.4","article-title":"Variable binned scatter plots","volume":"9","author":"Hao","year":"2010","journal-title":"Information Visualization"},{"key":"2025082213265232700_bib31","doi-asserted-by":"publisher","first-page":"849","DOI":"10.1016\/j.future.2019.02.028","article-title":"Harris hawks optimization: Algorithm and applications","volume":"97","author":"Heidari","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"2025082213265232700_bib32","doi-asserted-by":"publisher","first-page":"13369","DOI":"10.1007\/s11042-022-13836-6","article-title":"MOAEOSCA: An enhanced multi-objective hybrid artificial ecosystem-based optimization with sine cosine algorithm for feature selection in botnet detection in IoT","volume":"82","author":"Hosseini","year":"2023","journal-title":"Multimedia Tools and Applications"},{"key":"2025082213265232700_bib33","doi-asserted-by":"publisher","first-page":"111402","DOI":"10.1016\/j.knosys.2024.111402","article-title":"Guided learning strategy: A novel update mechanism for metaheuristic algorithms design and improvement","volume":"286","author":"Jia","year":"2024","journal-title":"Knowledge-Based Systems"},{"key":"2025082213265232700_bib34","doi-asserted-by":"publisher","first-page":"101456","DOI":"10.1016\/j.swevo.2023.101456","article-title":"Memory backtracking strategy: An evolutionary updating mechanism for meta-heuristic algorithms","volume":"84","author":"Jia","year":"2024","journal-title":"Swarm and Evolutionary Computation"},{"key":"2025082213265232700_bib35","doi-asserted-by":"publisher","first-page":"115665","DOI":"10.1016\/j.eswa.2021.115665","article-title":"Remora optimization algorithm","volume":"185","author":"Jia","year":"2021","journal-title":"Expert Systems with Applications"},{"key":"2025082213265232700_bib36","doi-asserted-by":"publisher","first-page":"1919","DOI":"10.1007\/s10462-023-10567-4","article-title":"Crayfish optimization algorithm","volume":"56","author":"Jia","year":"2023","journal-title":"Artificial Intelligence Review"},{"key":"2025082213265232700_bib37","doi-asserted-by":"publisher","first-page":"13295","DOI":"10.1007\/s10586-024-04618-w","article-title":"Catch fish optimization algorithm: A new human behavior algorithm for solving clustering problems","volume":"27","author":"Jia","year":"2024","journal-title":"Cluster Computing"},{"key":"2025082213265232700_bib38","doi-asserted-by":"publisher","first-page":"2065","DOI":"10.1093\/jcde\/qwad089","article-title":"Modified beluga whale optimization with multi-strategies for solving engineering problems","volume":"10","author":"Jia","year":"2023","journal-title":"Journal of Computational Design and Engineering"},{"key":"2025082213265232700_bib39","doi-asserted-by":"publisher","first-page":"2177","DOI":"10.1093\/jcde\/qwad096","article-title":"Improved snow ablation optimizer with heat transfer and condensation strategy for global optimization problem","volume":"10","author":"Jia","year":"2023","journal-title":"Journal of Computational Design and Engineering"},{"key":"2025082213265232700_bib40","doi-asserted-by":"publisher","first-page":"113071","DOI":"10.1016\/j.asoc.2025.113071","article-title":"Thinking Innovation Strategy (TIS): A novel mechanism for metaheuristic algorithm design and evolutionary update","volume":"175","author":"Jia","year":"2025","journal-title":"Applied Soft Computing"},{"key":"2025082213265232700_bib41","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s10462-024-10738-x","article-title":"Modified crayfish optimization algorithm for solving multiple engineering application problems","volume":"57","author":"Jia","year":"2024","journal-title":"Artificial Intelligence Review"},{"key":"2025082213265232700_bib42","doi-asserted-by":"publisher","first-page":"235","DOI":"10.3233\/FI-2017-1539","article-title":"Enhanced grey wolf optimization algorithm for global optimization","volume":"153","author":"Joshi","year":"2017","journal-title":"Fundamenta Informaticae"},{"key":"2025082213265232700_bib43","doi-asserted-by":"publisher","first-page":"2058","DOI":"10.1103\/PhysRevLett.71.2058","article-title":"Nonlinear sinusoidal waves and their superposition in anharmonic lattices","volume":"71","author":"Kosevich","year":"1993","journal-title":"Physical Review Letters"},{"key":"2025082213265232700_bib44","doi-asserted-by":"publisher","first-page":"105887","DOI":"10.1016\/j.knosys.2020.105887","article-title":"CNN-based image recognition for topology optimization","volume":"198","author":"Lee","year":"2020","journal-title":"Knowledge-Based Systems"},{"key":"2025082213265232700_bib45","volume-title":"Spatially Explicit Behavioral Models, Foraging Behavior, and Population Dynamics of the Common Hippopotamus (Hippopotamus amphibius)","author":"Lewison","year":"2002"},{"key":"2025082213265232700_bib46","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1093\/jcde\/qwae069","article-title":"Modified crayfish optimization algorithm with adaptive spiral elite greedy opposition-based learning and search-hide strategy for global optimization","volume":"11","author":"Li","year":"2024","journal-title":"Journal of Computational Design and Engineering"},{"key":"2025082213265232700_bib47","doi-asserted-by":"publisher","first-page":"124857","DOI":"10.1016\/j.eswa.2024.124857","article-title":"Review of the metaheuristic algorithms in applications: Visual analysis based on bibliometrics (1994\u20132023)","author":"Li","year":"2024","journal-title":"Expert Systems with Applications"},{"key":"2025082213265232700_bib48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3136625","article-title":"Feature selection: A data perspective","volume":"50","author":"Li","year":"2017","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"2025082213265232700_bib49","doi-asserted-by":"publisher","first-page":"160607","DOI":"10.1109\/ACCESS.2020.3020879","article-title":"Target recognition method of rehabilitation robot based on image local features","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"key":"2025082213265232700_bib50","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/MIS.2005.105","article-title":"Evolving feature selection","volume":"20","author":"Liu","year":"2005","journal-title":"IEEE Intelligent Systems"},{"key":"2025082213265232700_bib51","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/MIS.2005.105","article-title":"Toward integrating feature selection algorithms for classification and clustering","volume":"17","author":"Liu","year":"2005","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"2025082213265232700_bib52","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/j.yhbeh.2015.06.011","article-title":"Common and divergent psychobiological mechanisms underlying maternal behaviors in non-human and human mammals","volume":"73","author":"Lonstein","year":"2015","journal-title":"Hormones and Behavior"},{"key":"2025082213265232700_bib53","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1007\/s12650-019-00569-2","article-title":"Enhancing statistical charts: Toward better data visualization and analysis","volume":"22","author":"Luo","year":"2019","journal-title":"Journal of Visualization"},{"key":"2025082213265232700_bib54","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1016\/j.swevo.2018.04.011","article-title":"Multi-population techniques in nature inspired optimization algorithms: A comprehensive survey","volume":"44","author":"Ma","year":"2019","journal-title":"Swarm and Evolutionary Computation"},{"key":"2025082213265232700_bib55","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","article-title":"The whale optimization algorithm","volume":"95","author":"Mirjalili","year":"2016","journal-title":"Advances in Engineering Software"},{"key":"2025082213265232700_bib56","doi-asserted-by":"publisher","first-page":"35543","DOI":"10.1007\/s11042-020-10467-7","article-title":"A leader Harris hawks optimization for 2-D Masi entropy-based multilevel image thresholding","volume":"80","author":"Naik","year":"2021","journal-title":"Multimedia Tools and Applications"},{"key":"2025082213265232700_bib57","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/TCYB.2019.2944141","article-title":"A new binary particle swarm optimization approach: Momentum and dynamic balance between exploration and exploitation","volume":"51","author":"Nguyen","year":"2019","journal-title":"IEEE Transactions on Cybernetics"},{"key":"2025082213265232700_bib58","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TEVC.2002.806169","article-title":"An analysis of the behavior of simplified evolutionary algorithms on trap functions","volume":"7","author":"Nijssen","year":"2003","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"2025082213265232700_bib59","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1016\/j.eswa.2013.09.004","article-title":"Genetic algorithm-based heuristic for feature selection in credit risk assessment","volume":"41","author":"Oreski","year":"2014","journal-title":"Expert Systems with Applications"},{"key":"2025082213265232700_bib60","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.knosys.2014.02.021","article-title":"An improved fruit fly optimization algorithm for continuous function optimization problems","volume":"62","author":"Pan","year":"2014","journal-title":"Knowledge-Based Systems"},{"key":"2025082213265232700_bib61","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1109\/TSE.2020.2989666","article-title":"A theory of value for value-based feature selection in software engineering","volume":"48","author":"Rodriguez","year":"2020","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2025082213265232700_bib62","volume-title":"Sexual Dimorphism in the Common Hippopotamus (Hippopotamus Amphibius)","author":"Sadler","year":"2020"},{"key":"2025082213265232700_bib63","doi-asserted-by":"publisher","first-page":"2507","DOI":"10.1093\/bioinformatics\/btm344","article-title":"A review of feature selection techniques in bioinformatics","volume":"23","author":"Saeys","year":"2007","journal-title":"Bioinformatics"},{"key":"2025082213265232700_bib64","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1080\/02724634.1989.10011761","article-title":"Taxonomy, habits, and relationships of the subfossil Madagascan hippopotami Hippopotamus lemerlei and H. madagascariensis","volume":"9","author":"Stuenes","year":"1989","journal-title":"Journal of Vertebrate Paleontology"},{"key":"2025082213265232700_bib65","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/S0169-2607(01)00116-X","article-title":"Recent development on computer aided tissue engineering\u2014a review","volume":"67","author":"Sun","year":"2002","journal-title":"Computer Methods and Programs in Biomedicine"},{"key":"2025082213265232700_bib66","doi-asserted-by":"publisher","first-page":"149","DOI":"10.3390\/biomimetics8020149","article-title":"Subtraction-average-based optimizer: A new swarm-inspired metaheuristic algorithm for solving optimization problems","volume":"8","author":"Trojovsk\u00fd","year":"2023","journal-title":"Biomimetics"},{"key":"2025082213265232700_bib67","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TIFS.2006.890517","article-title":"Optimized feature extraction for learning-based image steganalysis","volume":"2","author":"Wang","year":"2007","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"2025082213265232700_bib68","volume-title":"Problem Definitions and Evaluation Criteria for the CEC 2017 Competition on Constrained Real-parameter Optimization","author":"Wu","year":"2017"},{"key":"2025082213265232700_bib69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42235-024-00515-5","article-title":"An improved Northern Goshawk optimization algorithm for feature selection","author":"Xie","year":"2024","journal-title":"Journal of Bionic Engineering"},{"key":"2025082213265232700_bib70","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1080\/21642583.2019.1708830","article-title":"A novel swarm intelligence optimization approach: Sparrow search algorithm","volume":"8","author":"Xue","year":"2020","journal-title":"Systems Science & Control Engineering"},{"key":"2025082213265232700_bib71","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.snb.2015.02.025","article-title":"Feature selection and analysis on correlated gas sensor data with recursive feature elimination","volume":"212","author":"Yan","year":"2015","journal-title":"Sensors and Actuators B: Chemical"},{"key":"2025082213265232700_bib72","doi-asserted-by":"crossref","first-page":"e30053","DOI":"10.1016\/j.heliyon.2024.e30053","article-title":"Evolution and emerging trends of named entity recognition: Bibliometric analysis from 2000 to 2023","volume":"10","author":"Yang","year":"2024","journal-title":"Heliyon"},{"key":"2025082213265232700_bib73","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1201\/9780429422614","article-title":"Firefly algorithm","volume-title":"Swarm Intelligence Algorithms","author":"Yang","year":"2020"},{"key":"2025082213265232700_bib74","doi-asserted-by":"publisher","first-page":"305","DOI":"10.3390\/biomimetics8030305","article-title":"Reptile search algorithm considering different flight heights to solve engineering optimization design problems","volume":"8","author":"Yao","year":"2023","journal-title":"Biomimetics"},{"key":"2025082213265232700_bib75","doi-asserted-by":"publisher","first-page":"492","DOI":"10.3390\/biomimetics8060492","article-title":"Multi-strategy improved sand cat swarm optimization: Global optimization and feature selection","volume":"8","author":"Yao","year":"2023","journal-title":"Biomimetics"},{"key":"2025082213265232700_bib76","doi-asserted-by":"publisher","first-page":"120594","DOI":"10.1016\/j.eswa.2023.120594","article-title":"ESO: An enhanced snake optimizer for real-world engineering problems","volume":"230","author":"Yao","year":"2023","journal-title":"Expert Systems with Applications"},{"key":"2025082213265232700_bib77","doi-asserted-by":"publisher","first-page":"eabi9268","DOI":"10.1126\/sciadv.abi9268","article-title":"Quantitative complementarity of wave-particle duality","volume":"7","author":"Yoon","year":"2021","journal-title":"Science Advances"},{"key":"2025082213265232700_bib78","doi-asserted-by":"publisher","first-page":"128427","DOI":"10.1016\/j.neucom.2024.128427","article-title":"Polar lights optimizer: Algorithm and applications in image segmentation and feature selection","volume":"607","author":"Yuan","year":"2024","journal-title":"Neurocomputing"},{"key":"2025082213265232700_bib79","volume-title":"Problem Definitions and Evaluation Criteria for the CEC 2020 Special Session and Competition on Single Objective Bound Constrained Numerical Optimization","author":"Yue","year":"2019"},{"key":"2025082213265232700_bib80","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1093\/jcde\/qwac135","article-title":"A multi-strategy enhanced African vultures optimization algorithm for global optimization problems","volume":"10","author":"Zheng","year":"2023","journal-title":"Journal of Computational Design and Engineering"},{"key":"2025082213265232700_bib81","doi-asserted-by":"publisher","DOI":"10.1109\/APCIP.2009.217","article-title":"A modified particle swarm optimization with an adaptive acceleration coefficients","volume-title":"2009 Asia-Pacific Conference on Information Processing","author":"Ziyu","year":"2009"}],"container-title":["Journal of Computational Design and Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/jcde\/advance-article-pdf\/doi\/10.1093\/jcde\/qwaf073\/63847266\/qwaf073.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/jcde\/article-pdf\/12\/8\/193\/63847266\/qwaf073.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/jcde\/article-pdf\/12\/8\/193\/63847266\/qwaf073.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:27:01Z","timestamp":1755883621000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jcde\/article\/12\/8\/193\/8212846"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,25]]},"references-count":81,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8,4]]}},"URL":"https:\/\/doi.org\/10.1093\/jcde\/qwaf073","relation":{},"ISSN":["2288-5048"],"issn-type":[{"value":"2288-5048","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025,8]]},"published":{"date-parts":[[2025,7,25]]}}}