{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T18:15:23Z","timestamp":1772820923151,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/cec.2010.5586142","type":"proceedings-article","created":{"date-parts":[[2010,9,29]],"date-time":"2010-09-29T19:54:29Z","timestamp":1285790069000},"page":"1-8","source":"Crossref","is-referenced-by-count":11,"title":["An explorative and exploitative mutation scheme"],"prefix":"10.1109","author":[{"given":"Fatemeh","family":"Vafaee","sequence":"first","affiliation":[]},{"given":"Peter C.","family":"Nelson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","author":"srinivas","year":"1995","journal-title":"Niching methods for genetic algorithms"},{"key":"ref10","first-page":"61","article-title":"On crossover as an evolutionary viable strategy","author":"schaffer","year":"1991","journal-title":"Proc of the 4th Int Con on GAs"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/BF00203032"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BF01530777"},{"key":"ref13","first-page":"238","article-title":"A real coded genetic algorithm with an explorer and an exploiter populations","author":"tsutsui","year":"1997","journal-title":"Proc of the 73th Int Con on GAs"},{"key":"ref14","first-page":"10","article-title":"Biases in the crossover landscape","author":"eshelman","year":"1989","journal-title":"Proc of the 3th Int Con on GAs"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/4235.771166"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1007\/3-540-61286-6_141","article-title":"Intelligent mutation rate control in canonical genetic algorithms","author":"back","year":"1996","journal-title":"Foundations of Intelligent Systems"},{"key":"ref17","first-page":"263","article-title":"Self-adaptation in genetic algorithms","author":"back","year":"1991","journal-title":"Proceeding of the 1st European Conference on Artificial Life"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1996.542382"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2008.45"},{"key":"ref28","article-title":"Evolutionary algorithms, the role of mutation and recombination","author":"spears","year":"2000","journal-title":"Natural Computing"},{"key":"ref4","author":"holland","year":"1975","journal-title":"Adaptation in Natural and Artificial Systems"},{"key":"ref27","author":"jones","year":"1995","journal-title":"Evolutionary algorithms fitness landscapes and search"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0040785"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-356-1.50006-6"},{"key":"ref29","first-page":"25","article-title":"Effects of population size and relative elitism on optimization speed and reliability of genetic algorithms","author":"koljonen","year":"2006","journal-title":"Proc of the 9th Scand Conf on Artif Intel"},{"key":"ref5","author":"goldberg","year":"1989","journal-title":"Genetic Algorithms in Search Optimization and Machine Learning"},{"key":"ref8","first-page":"93","author":"vose","year":"1993","journal-title":"A Critical Examination of the Schema Theorem"},{"key":"ref7","first-page":"20","article-title":"How genetic algorithms work: a critical look at implicit parallelism","author":"grefenstette","year":"1989","journal-title":"Proceedings of the 3rd Int Conf on Genetic Algorithms"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/FI-1998-35123403","article-title":"On evolutionary exploration and exploitation","volume":"35","author":"eiben","year":"1998","journal-title":"Fundamenta Informaticae"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-59496-5_352"},{"key":"ref1","article-title":"The hitchhiker's guide to evolutionary computation","volume":"3","author":"heitkotter","year":"1997","journal-title":"FAQ for comp ai genetic"},{"key":"ref20","first-page":"61","article-title":"Adapting operator probabilities in genetic algorithms","author":"davis","year":"2002","journal-title":"Proceedings of the 3rd Int Conf on Genetic Algorithms"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/21.286385"},{"key":"ref21","first-page":"104","article-title":"Varying the probability of mutation in the genetic algorithms","author":"fogarty","year":"1989","journal-title":"Proc Intl Conf on Genetic Algorithms"},{"key":"ref24","first-page":"1396","article-title":"Maximum likelihood estimation of phylogeny from dna sequences when substitution rates differ over sites","volume":"10","author":"yang","year":"1993","journal-title":"J Mol Biol Evol"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2009.101"},{"key":"ref26","author":"swofford","year":"0","journal-title":"Phylogenetic Inference"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/BF00160154"}],"event":{"name":"2010 IEEE Congress on Evolutionary Computation (CEC)","location":"Barcelona, Spain","start":{"date-parts":[[2010,7,18]]},"end":{"date-parts":[[2010,7,23]]}},"container-title":["IEEE Congress on Evolutionary Computation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5573635\/5585910\/05586142.pdf?arnumber=5586142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,12]],"date-time":"2020-06-12T07:32:51Z","timestamp":1591947171000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5586142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/cec.2010.5586142","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}