{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:59:52Z","timestamp":1729616392370,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/saci.2015.7208260","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:52:02Z","timestamp":1440107522000},"page":"523-528","source":"Crossref","is-referenced-by-count":1,"title":["Comparing memetic and simulated annealing approaches for discrete tomography on the triangular grid"],"prefix":"10.1109","author":[{"given":"Elisa Valentina","family":"Moisi","sequence":"first","affiliation":[]},{"given":"Tibor","family":"Lukic","sequence":"additional","affiliation":[]},{"given":"Benedek","family":"Nagy","sequence":"additional","affiliation":[]},{"given":"Vladimir-Ioan","family":"Cretu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"1989","author":"moscato","article-title":"On evolution, search, optimization, genetic algorithms and martial arts - towards memetic algorithms","key":"ref10"},{"key":"ref11","first-page":"403","article-title":"Evolution from molecules to man","author":"dawkins","year":"1983","journal-title":"ch Universal Darwinism"},{"year":"1976","journal-title":"The Selfish Gene","key":"ref12"},{"key":"ref13","first-page":"34","article-title":"A comparison between memetic algorithm and genetic algorithm for the cryptanalysis of simplified data encryption standard algo-rithm","volume":"1","author":"garg","year":"2009","journal-title":"International Journal of Network Security and Its Applications"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICPR.2014.195"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/978-3-642-33941-7_49"},{"key":"ref16","first-page":"579","article-title":"Discrete tomography on the triangular grid: a memetic approach","author":"moisi","year":"2011","journal-title":"Proc IEEE International Symposium on Image and Signal Processing and Analysis (ISPA' 11)"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","article-title":"Optimization by simulated annealing","volume":"220","author":"kirkpatrick","year":"1983","journal-title":"Scienc"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/978-3-642-34732-0_21"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.patrec.2014.05.014"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/0031-3203(68)90013-7"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.2140\/pjm.1957.7.1073"},{"key":"ref6","article-title":"Hexagonal image processing","author":"middleton","year":"2005","journal-title":"A Practical Approach"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/BF03025195"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.2498\/cit.2003.02.04"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1002\/(SICI)1098-1098(1998)9:2\/3<126::AID-IMA9>3.0.CO;2-D"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.4153\/CJM-1957-044-3"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-8176-4543-4","author":"herman","year":"2007","journal-title":"Advances in Discrete Tomography and Its Applications ser Applied and Numerical Harmonic Analysis"},{"key":"ref9","first-page":"6378","article-title":"Generalised triangular grids in digital geometry","volume":"20","year":"2004","journal-title":"Acta Mathematica Academiae Paedagogicae Nyregyhziensis"},{"year":"0","author":"bertsekas","journal-title":"Re-laxlV the MCFClass project","key":"ref20"}],"event":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (SACI)","start":{"date-parts":[[2015,5,21]]},"location":"Timisoara, Romania","end":{"date-parts":[[2015,5,23]]}},"container-title":["2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7165000\/7208165\/07208260.pdf?arnumber=7208260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T18:01:40Z","timestamp":1498240900000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208260\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/saci.2015.7208260","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}