{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:49:03Z","timestamp":1729644543126,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/icinfa.2017.8078909","type":"proceedings-article","created":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T21:59:29Z","timestamp":1509055169000},"page":"219-225","source":"Crossref","is-referenced-by-count":2,"title":["A new bionic method inspired by DNA computation to solve the hamiltonian path problem"],"prefix":"10.1109","author":[{"given":"Runtao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Chengjin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Gao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gki235"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1080\/10002007088537464","article-title":"A New Approach Based on PSO Algorithm to Find Good Computational Encoding Sequences","volume":"17","author":"cui","year":"2007","journal-title":"Progress in Nature Science"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystems.2007.06.002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystems.2010.05.006"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2012.6256526"},{"key":"ref13","first-page":"9","article-title":"Selection of an Optimal Suitable Project Management Approach through DNA Computing-based Clustering","volume":"4","author":"chang","year":"2013","journal-title":"International Journal of Innovative Management Information and Production"},{"key":"ref14","first-page":"86","article-title":"Data Encryption and Decryption Based on DNA Computing Model","volume":"35","author":"chen","year":"2007","journal-title":"Computer and Digital Engineering"},{"key":"ref15","first-page":"104","article-title":"Encryption Scheme Research Based on DNA Technology","volume":"45","author":"cui","year":"2009","journal-title":"Computer Engineering and Applications"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2012.02.007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/ange.201107156"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-012-9334-9"},{"key":"ref19","first-page":"748","article-title":"A DNA Algorithm for Comparative Modeling of Protein Structure","volume":"45","author":"zhao","year":"2009","journal-title":"Acta Scientiarum Naturalium Universitatis Pekinensis"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2008.10.021"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1126\/science.1069528"},{"key":"ref27","first-page":"118","article-title":"Research on the Encoding Method of DNA Computing","volume":"27","author":"liu","year":"2003","journal-title":"Computer Engineering and Applications"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1126\/science.288.5469.1223"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2006.09.020"},{"key":"ref29","first-page":"73","article-title":"DNA Sequence Design for Reliable DNA Computing by Using a Multiobjective Approach","author":"chaves-gonzlez","year":"2011","journal-title":"13th IEEE International Symposium on Computational Intelligence and Informatics"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystems.2005.09.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2012.08.073"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.biosystems.2011.03.004"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1126\/science.278.5337.446"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1166\/jctn.2014.3388"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.7973651"},{"key":"ref20","first-page":"108","article-title":"System Identification and Control Using DNA Computing Algorithms","volume":"3","author":"huang","year":"2012","journal-title":"Int J Biol Biomed Eng"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1038\/nature02551"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37015-1_76"},{"key":"ref24","first-page":"2283","article-title":"DNA Computing Principle, Advances and Difficulties: Immobilization Technology of DNA Molecule","volume":"32","author":"xu","year":"2009","journal-title":"Journal of Computers"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1063\/1.3259628"},{"journal-title":"Graphs Theory and Applications with Exercises and Problems","year":"2013","author":"fournier","key":"ref26"},{"key":"ref25","first-page":"763","article-title":"The Mathematical Description of the Primary Structure of DNA Molecule","volume":"8","author":"chen","year":"1985","journal-title":"Chinese Journal of Nature"}],"event":{"name":"2017 IEEE International Conference on Information and Automation (ICIA)","start":{"date-parts":[[2017,7,18]]},"location":"Macau SAR, China","end":{"date-parts":[[2017,7,20]]}},"container-title":["2017 IEEE International Conference on Information and Automation (ICIA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8055743\/8078872\/08078909.pdf?arnumber=8078909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T06:25:36Z","timestamp":1570256736000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8078909\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/icinfa.2017.8078909","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}