{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T22:40:04Z","timestamp":1746052804226,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,9]]},"DOI":"10.1109\/bicta.2010.5645306","type":"proceedings-article","created":{"date-parts":[[2010,12,9]],"date-time":"2010-12-09T10:33:18Z","timestamp":1291890798000},"page":"328-332","source":"Crossref","is-referenced-by-count":1,"title":["A hybrid strategy based on niche genetic algorithm and Tabu search and its convergence property"],"prefix":"10.1109","author":[{"family":"Zhiyong Li","sequence":"first","affiliation":[]},{"family":"Houfu Li","sequence":"additional","affiliation":[]},{"family":"Youwen Chen","sequence":"additional","affiliation":[]},{"given":"A.","family":"Sallam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2008.10.046"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.2006.1678"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74282-1_28"},{"key":"13","first-page":"1","article-title":"Optimizing complex functions by chaos genetic algorithm","volume":"21","author":"tang","year":"2000","journal-title":"Journal of Harbin Engineering University"},{"key":"14","first-page":"63","article-title":"Elitist preserved genetic algorithm and its convergence analysis","volume":"16","author":"lin","year":"2000","journal-title":"Control and Decision"},{"key":"11","first-page":"225","article-title":"Genetic local search for multi-objective combinatorial optimization","volume":"10","author":"laszkiewicz","year":"2002","journal-title":"European Journal of Operational Research"},{"key":"12","first-page":"1863","article-title":"A genetic algorithm based on evolutionarily stable strategy","volume":"14","author":"su","year":"2003","journal-title":"Journal of Software"},{"key":"3","first-page":"387","article-title":"Genetic algorithms, tabu search and simulated annealing: A comparison between three approaches for the cryptanalysis of transposition cipher","volume":"3","author":"garg","year":"2005","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"2","first-page":"100","article-title":"Studies on some modem optimization algorithms","volume":"24","author":"xu","year":"2002","journal-title":"Journal of Systems Engineering and Electronics"},{"journal-title":"Adaptation in Natural and Artificial Systems","year":"1975","author":"holland","key":"1"},{"key":"10","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1080\/03155986.1995.11732279","article-title":"An evolutionary tabu search algorithm and NHL scheduling problem","volume":"33","author":"costa","year":"1995","journal-title":"Information Systems and Operation Research"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/11596448_33"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2008.00688"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.06.043"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.4314\/ijest.v2i1.59085"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0548(93)E0023-M"},{"journal-title":"Intelligent Optimization Algorithms with Application","year":"2001","author":"wang","key":"8"}],"event":{"name":"2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)","start":{"date-parts":[[2010,9,23]]},"location":"Changsha, China","end":{"date-parts":[[2010,9,26]]}},"container-title":["2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5629467\/5645057\/05645306.pdf?arnumber=5645306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T19:12:39Z","timestamp":1559848359000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5645306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,9]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/bicta.2010.5645306","relation":{},"subject":[],"published":{"date-parts":[[2010,9]]}}}