{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:39:34Z","timestamp":1761709174111,"version":"3.37.3"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T00:00:00Z","timestamp":1480550400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100006398","name":"Consejo de Ciencia y Tecnolog\u00eda del Estado de Guanajuato as part of the plan \u201cInvestigadores J\u00f3venes\u2014DPP-2014\u201d","doi-asserted-by":"publisher","award":["14-IJ-DPP-Q182-11"],"award-info":[{"award-number":["14-IJ-DPP-Q182-11"]}],"id":[{"id":"10.13039\/501100006398","id-type":"DOI","asserted-by":"publisher"}]},{"name":"UMI LAFMIA 3175 CNRS at CINVESTAV-IPN"},{"DOI":"10.13039\/501100003141","name":"Consejo Nacional de Ciencia y Tecnolog\u00eda","doi-asserted-by":"publisher","award":["221551"],"award-info":[{"award-number":["221551"]}],"id":[{"id":"10.13039\/501100003141","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003141","name":"CONACyT","doi-asserted-by":"publisher","award":["24542-51667-Y"],"award-info":[{"award-number":["24542-51667-Y"]}],"id":[{"id":"10.13039\/501100003141","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cybern."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/tcyb.2015.2501726","type":"journal-article","created":{"date-parts":[[2015,12,4]],"date-time":"2015-12-04T19:06:11Z","timestamp":1449255971000},"page":"3233-3246","source":"Crossref","is-referenced-by-count":37,"title":["A Novel Diversity-Based Replacement Strategy for Evolutionary Algorithms"],"prefix":"10.1109","volume":"46","author":[{"given":"Carlos","family":"Segura","sequence":"first","affiliation":[{"name":"Computer Science Department, Centre for Research in Mathematics, Guanajuato, Mexico"}]},{"given":"Carlos A.","family":"Coello Coello","sequence":"additional","affiliation":[{"name":"Computer Science Department, Evolutionary Computation Group, CINVESTAV-IPN, Mexico City, Mexico"}]},{"given":"Eduardo","family":"Segredo","sequence":"additional","affiliation":[{"name":"Departamento de Ingenier&#x00ED;a Inform&#x00E1;tica y de Sistemas, Parallel Algorithms and Languages Group, Universidad de La Laguna, Santa Cruz de Tenerife, Spain"}]},{"given":"Arturo Hern\u00e1ndez","family":"Aguirre","sequence":"additional","affiliation":[{"name":"Computer Science Department, Centre for Research in Mathematics, Guanajuato, Mexico"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/11844297_103"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/FI-1998-35123403","article-title":"On evolutionary exploration and exploitation","volume":"35","author":"eiben","year":"1998","journal-title":"Fundam Inform"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69432-8_9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2014.6900585"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2008.927706"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2279211"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2005.860765"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45712-7_4"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2008.2003008"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2014.01.005"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213009000275"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2009.2034647"},{"key":"ref61","article-title":"Two-dimensional encoding schema and genetic operators","author":"hong","year":"2006","journal-title":"Proc Joint Conf Inf Sci (JCIS)"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37140-0_61"},{"key":"ref28","first-page":"42","article-title":"An investigation of niche and species formation in genetic function optimization","author":"deb","year":"1989","journal-title":"Proc 3rd Int Conf Genet Algorithms"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2014.2326101"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24855-2_28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1162\/EVCO_a_00067"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2337117"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008202821328"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570085"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2367499"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1569942"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2013.2282491"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2015.2447574"},{"journal-title":"Efficient and Accurate Parallel Genetic Algorithms","year":"2000","author":"cantu-paz","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1887\/0750308958\/b386c56"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18272-3_10"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s10288-013-0248-x"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2014.2331994"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15844-5_52"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2003.810752"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1109\/TSMCB.2005.856143","article-title":"Classification of adaptive memetic algorithms: A comparative study","volume":"36","author":"ong","year":"2006","journal-title":"IEEE Trans Syst Man Cybern B Cybern"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-015-2017-z"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44719-9_19"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2001576.2001793"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2013.6557961"},{"article-title":"Niching methods for genetic algorithms","year":"1995","author":"mahfoud","key":"ref10"},{"journal-title":"Evolutionary Computation A Unified Approach","year":"2006","author":"de jong","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2043365"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-050684-5.50020-3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1996.4.4.361"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/0471739383"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05094-1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.08.056"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2012.07.018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068177"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-013-0088-4"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33206-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/b101874"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480752"},{"key":"ref5","first-page":"95","article-title":"Adaptation of genetic algorithm parameters based on fuzzy logic controllers","author":"herrera","year":"1996","journal-title":"Genetic Algorithms and Soft Computing"},{"journal-title":"Introduction to Genetic Algorithms","year":"2007","author":"sivanandam","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-002-0238-y"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2005.1554987"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.08.025"},{"key":"ref46","first-page":"24","article-title":"Finding multimodal solutions using restricted tournament selection","author":"harik","year":"1995","journal-title":"Proceedings of the 6th International Conference on Genetic Algorithms"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24854-5_91"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.07.031"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICEC.1996.542703"},{"article-title":"An analysis of the behavior of a class of genetic adaptive systems","year":"1975","author":"de jong","key":"ref42"},{"article-title":"Adaptive search using simulated evolution","year":"1970","author":"cavicchio","key":"ref41"},{"key":"ref44","first-page":"409","article-title":"Probabilistic crowding: Deterministic crowding with probabilistic replacement","author":"mengshoel","year":"1999","journal-title":"Proc Genet Evol Comput Conf (GECCO)"},{"key":"ref43","first-page":"27","article-title":"Crowding and preselection revisited","author":"mahfoud","year":"1992","journal-title":"Parallel Problem Solving from Nature 2"}],"container-title":["IEEE Transactions on Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221036\/7744634\/07347400.pdf?arnumber=7347400","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T18:01:51Z","timestamp":1720720911000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7347400\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":64,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tcyb.2015.2501726","relation":{},"ISSN":["2168-2267","2168-2275"],"issn-type":[{"type":"print","value":"2168-2267"},{"type":"electronic","value":"2168-2275"}],"subject":[],"published":{"date-parts":[[2016,12]]}}}