{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:53:51Z","timestamp":1725731631023},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/cybconf.2013.6617450","type":"proceedings-article","created":{"date-parts":[[2013,10,10]],"date-time":"2013-10-10T23:29:20Z","timestamp":1381447760000},"page":"174-179","source":"Crossref","is-referenced-by-count":8,"title":["Distributed human-based genetic algorithm utilizing a mobile ad hoc network"],"prefix":"10.1109","author":[{"given":"Ryosuke","family":"Hasebe","sequence":"first","affiliation":[]},{"given":"Kei","family":"Ohnishi","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Koppen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"494","article-title":"Minimal generation gap model for GAs considering both exploration and exploitation","author":"satoh","year":"1996","journal-title":"Proceedings of the International Conference on Fuzzy Systems Neural Networks and Soft Computing (Iizuka'96)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SASO.2010.15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-094832-4.50018-0"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1409985.1410001"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.41"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22084-5","author":"luque","year":"2011","journal-title":"Parallel Genetic Algorithms Theory and Real World Applications"},{"journal-title":"Haggle","year":"0","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/5.949485"},{"journal-title":"The Design of Innovation Lessons from and for Competent Genetic Algorithms","year":"2002","author":"goldberg","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2001.972056"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24855-2_143"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2011.70"},{"key":"6","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1145\/1523103.1523125","article-title":"Design of an ad-hoc network model for disaster recovery scenario using various routing protocols","author":"kumar","year":"2009","journal-title":"Proceedings of the International Conference on Advances in Computing Communication and Control (ICAC3 '09)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1002\/0471656895"},{"journal-title":"Free Knowledge Exchange (FKE) Project","year":"0","key":"4"},{"key":"9","doi-asserted-by":"crossref","first-page":"983","DOI":"10.1007\/978-3-540-24854-5_98","article-title":"A. Interactive one-max problem allows to compare the performance of interactive and human-based genetic algorithms","author":"cheng","year":"2004","journal-title":"Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2004)"},{"key":"8","first-page":"965","article-title":"Evolutionary computation as a form of organization","author":"kosoruko","year":"2002","journal-title":"Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2002)"}],"event":{"name":"2013 IEEE International Conference on Cybernetics (CYBCO)","start":{"date-parts":[[2013,6,13]]},"location":"Lausanne, Switzerland","end":{"date-parts":[[2013,6,15]]}},"container-title":["2013 IEEE International Conference on Cybernetics (CYBCO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6599033\/6617421\/06617450.pdf?arnumber=6617450","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T23:30:05Z","timestamp":1498087805000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6617450\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/cybconf.2013.6617450","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}