{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:07:42Z","timestamp":1746158862371,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icsmc.2003.1243839","type":"proceedings-article","created":{"date-parts":[[2004,6,22]],"date-time":"2004-06-22T16:27:43Z","timestamp":1087921663000},"page":"343-348","source":"Crossref","is-referenced-by-count":1,"title":["Phases-based dynamic genetic strategies for genetic algorithms"],"prefix":"10.1109","volume":"1","author":[{"family":"Li Minqiang","sequence":"first","affiliation":[]},{"family":"Kou Jisong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1986.289288"},{"key":"ref11","first-page":"23","article-title":"Towards an optimal mutation probability for GA","volume":"ppsn 1","author":"hesser","year":"1990","journal-title":"Proc First Workshop"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1090.001.0001","article-title":"Adaptation in natural and artificial systems: An introductory analysis with applications to biology, control, and artificial intelligence","author":"holland","year":"1992"},{"key":"ref13","first-page":"192","article-title":"Adaptive mutation in the genetic algorithm","author":"qi","year":"1993","journal-title":"Proceedings of the 3 Annual Conference on Evolutionary Programming"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BF00993252"},{"key":"ref15","first-page":"50","article-title":"The ARGOT strategy: adaptive representation genetic optimizer technique","author":"shaefer","year":"1987","journal-title":"Genetic Algorithms and Their Applications Proc Second Int?l Conf Genetic Algorithms"},{"key":"ref16","first-page":"240","article-title":"A. Dining with GAs: operator lunch theorem","author":"spears","year":"1997","journal-title":"In Proceedings of Foundations of Genetic Algorithms (FOGA 4)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/21.286385"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585893"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1995.3.3.311"},{"key":"ref3","first-page":"100","article-title":"Adaptive selection methods for genetic algorithms","author":"baker","year":"1985","journal-title":"Proc First Int Conf Genetic Algorithms"},{"key":"ref6","first-page":"35","article-title":"On evolutionary exploration and exploitation","author":"eiben","year":"1999","journal-title":"Evolutionary Computation"},{"key":"ref5","first-page":"60","article-title":"Adapting operator probabilities in genetic algorithms","author":"davis","year":"1989","journal-title":"In Proceedings of the Third International Conference on Genetic Algorithms"},{"key":"ref8","first-page":"21","article-title":"Adaptive niching via co-evolutionary sharing","author":"goldberg","year":"1997","journal-title":"Genetic Algorithms in Engineering and Computer Science"},{"key":"ref7","article-title":"Optimizing Global-Local Search Hybrids","author":"goldberg","year":"1999","journal-title":"In Proceedings of the Genetic and Evolutionary Computation Conference 1999 (GECCO-99)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1887\/0750308958"},{"key":"ref1","first-page":"51","article-title":"An overview of parameter control methods by self-adaptation in evolutionary algorithms","author":"back","year":"1999","journal-title":"Evolutionary Computation"},{"article-title":"Genetic algorithms in search, optimization and machine learning","year":"1989","author":"goldberg","key":"ref9"}],"event":{"name":"SMC'03 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483)","acronym":"ICSMC-03","location":"Washington, DC, USA"},"container-title":["SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8811\/27871\/01243839.pdf?arnumber=1243839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T10:15:33Z","timestamp":1585822533000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1243839\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/icsmc.2003.1243839","relation":{},"subject":[]}}