{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:06:40Z","timestamp":1753884400917,"version":"3.41.2"},"reference-count":63,"publisher":"World Scientific Pub Co Pte Ltd","issue":"06","funder":[{"DOI":"10.13039\/100014718","name":"Innovative Research Group Project of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61563008"],"award-info":[{"award-number":["61563008"]}],"id":[{"id":"10.13039\/100014718","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Artif. Intell. Tools"],"published-print":{"date-parts":[[2023,9]]},"abstract":"<jats:p> The Spotted Hyena Optimization (SHO) algorithm is inspired by simulating the predatory behavior of spotted hyenas. While the mathematical model of the SHO algorithm is simple and optimal, it is easy to fall into local optimization and causes premature convergence compared to some metaheuristic algorithms. To the end, we propose an enhanced Spotted Hyena Optimization algorithm, a hybrid SHO algorithm using Elite Opposition-Based Learning coupled with the Simplex Method called EOBL-SM-SHO. The EOBL-SM-SHO algorithm combines the characteristics of the simplex method\u2019s geometric transformations (reflection, inside contraction, expansion, and outside contraction) with more practical information on elite opposition-based learning strategy. They can significantly strengthen the SHO algorithm\u2019s search range and augment the hyena population\u2019s diversity. Furthermore, we employ eleven benchmark functions and three engineering design issues to gauge the effectiveness of the EOBL-SM-SHO algorithm. Our extensive experimental results unveil that EOBL-SM-SHO achieves better accuracy and convergence rate than the state-of-the-art algorithms (e.g., Artificial Gorilla Troops Optimizer (GTO), Cuckoo Search (CS), Farmland Fertility Algorithm (FFA), Particle Swarm Optimization (PSO), Grey Wolf Optimizer (GWO), Spotted Hyena Optimizer (SHO)). <\/jats:p>","DOI":"10.1142\/s0218213023500197","type":"journal-article","created":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T10:53:57Z","timestamp":1671447237000},"source":"Crossref","is-referenced-by-count":0,"title":["An Enhanced Spotted Hyena Optimization Algorithm and its Application to Engineering Design Scenario"],"prefix":"10.1142","volume":"32","author":[{"given":"Luna","family":"Fan","sequence":"first","affiliation":[{"name":"Department of Cultural Communication, Henan Vocational Institute of Arts, Zhengzhou, 450002, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1094-1563","authenticated-orcid":false,"given":"Jie","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Jinan University, Guangzhou 510632, China"}]},{"given":"Jingxin","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Electronic and Information Engineering, Southwest University, Chongqing 610101, China"},{"name":"School of Computing, National University of Singapore, 117417, Singapore"}]}],"member":"219","published-online":{"date-parts":[[2023,9,25]]},"reference":[{"key":"S0218213023500197BIB001","doi-asserted-by":"crossref","first-page":"8091","DOI":"10.1007\/s11042-020-10139-6","volume":"80","author":"Chahar V.","year":"2021","journal-title":"Multimedia Tools and Applications"},{"key":"S0218213023500197BIB002","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TEVC.2010.2059031","volume":"15","author":"Das S.","year":"2011","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"S0218213023500197BIB003","doi-asserted-by":"crossref","first-page":"754","DOI":"10.1109\/TEVC.2021.3064508","volume":"25","author":"Zhang K.","year":"2021","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"S0218213023500197BIB004","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1109\/TEVC.2008.919004","volume":"12","author":"Dan S.","year":"2008","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"S0218213023500197BIB005","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1016\/j.future.2019.07.015","volume":"101","author":"Hashim F. A.","year":"2019","journal-title":"Future Generation Computer Systems"},{"key":"S0218213023500197BIB006","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/101.17235","volume":"1","author":"Rutenbar R. A.","year":"1989","journal-title":"IEEE Circuits and Devices Magazine"},{"key":"S0218213023500197BIB007","doi-asserted-by":"crossref","first-page":"2353","DOI":"10.1007\/s10489-020-01947-2","volume":"51","author":"Abualigah L.","year":"2021","journal-title":"Applied Intelligence"},{"key":"S0218213023500197BIB008","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.compstruc.2012.09.003","volume":"112","author":"Kaveh A.","year":"2012","journal-title":"Computers and Structures"},{"key":"S0218213023500197BIB009","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.compstruc.2014.04.005","volume":"139","author":"Kaveh A.","year":"2014","journal-title":"Computers and Structures"},{"key":"S0218213023500197BIB010","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.ins.2015.06.044","volume":"324","author":"Patel V. K.","year":"2015","journal-title":"Information Sciences"},{"key":"S0218213023500197BIB011","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.engappai.2017.01.006","volume":"60","author":"Moosavi S. H. S.","year":"2017","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"S0218213023500197BIB012","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.asoc.2019.03.012","volume":"78","author":"Yapici H.","year":"2019","journal-title":"Applied Soft Computing"},{"key":"S0218213023500197BIB013","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/s11831-022-09804-w","volume":"30","author":"Gharehchopogh F. S.","year":"2023","journal-title":"Archives of Computational Methods in Engineering"},{"key":"S0218213023500197BIB014","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.chemolab.2015.08.020","volume":"149","author":"Marini F.","year":"2015","journal-title":"Chemometrics and Intelligent Laboratory Systems"},{"key":"S0218213023500197BIB015","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"Mirjalili S.","year":"2014","journal-title":"Advances in Engineering Software"},{"key":"S0218213023500197BIB016","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MCI.2006.329691","volume":"1","author":"Dorigo M.","year":"2006","journal-title":"IEEE Computational Intelligence Magazine"},{"key":"S0218213023500197BIB017","doi-asserted-by":"crossref","first-page":"49543","DOI":"10.1109\/ACCESS.2020.2974498","volume":"8","author":"Liang X.","year":"2020","journal-title":"IEEE Access"},{"key":"S0218213023500197BIB018","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1016\/j.advengsoft.2017.05.014","volume":"114","author":"Dhiman G.","year":"2017","journal-title":"Advances in Engineering Software"},{"key":"S0218213023500197BIB019","doi-asserted-by":"crossref","first-page":"1569","DOI":"10.1007\/s11831-021-09624-4","volume":"29","author":"Ghafori S.","year":"2022","journal-title":"Archives of Computational Methods in Engineering"},{"key":"S0218213023500197BIB020","first-page":"1","volume":"15","author":"Moghdani R.","year":"2020","journal-title":"Engineering with Computers"},{"key":"S0218213023500197BIB021","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cogsys.2020.09.001","volume":"65","author":"Luo Q.","year":"2021","journal-title":"Cognitive Systems Research"},{"key":"S0218213023500197BIB022","first-page":"1","volume":"2","author":"Luo Q.","year":"2019","journal-title":"Multimedia Tools and Applications"},{"key":"S0218213023500197BIB023","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1007\/s11277-020-07743-y","volume":"116","author":"Kumar V.","year":"2021","journal-title":"Wireless Personal Communications"},{"key":"S0218213023500197BIB024","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.asoc.2021.107349","volume":"106","author":"\u015eahman M. A.","year":"2021","journal-title":"Applied Soft Computing"},{"key":"S0218213023500197BIB025","first-page":"695","volume-title":"Int. Conf. on Computational Intelligence for Modelling, Control and Automation","author":"Tizhoosh H. R.","year":"2005"},{"key":"S0218213023500197BIB026","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/TEVC.2007.894200","volume":"12","author":"Rahnamayan S.","year":"2008","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"S0218213023500197BIB027","first-page":"727","volume-title":"2012 13th Int. Conf. on Parallel and Distributed Computing, Applications and Technologies","author":"Zhou X.","year":"2012"},{"key":"S0218213023500197BIB028","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.swevo.2017.09.010","volume":"39","author":"Mahdavi S.","year":"2018","journal-title":"Swarm and Evolutionary Computation"},{"key":"S0218213023500197BIB029","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1093\/comjnl\/7.4.308","volume":"7","author":"Nelder J. A.","year":"1965","journal-title":"The Computer Journal"},{"key":"S0218213023500197BIB030","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eswa.2020.113377","volume":"152","author":"Faramarzi A.","year":"2020","journal-title":"Expert Systems with Applications"},{"key":"S0218213023500197BIB031","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1016\/j.asej.2019.02.006","volume":"10","author":"Wang C.","year":"2019","journal-title":"Ain Shams Engineering Journal"},{"key":"S0218213023500197BIB032","doi-asserted-by":"crossref","first-page":"7581","DOI":"10.1007\/s11042-020-09831-4","volume":"80","author":"Mittal H.","year":"2021","journal-title":"Multimedia Tools and Applications"},{"key":"S0218213023500197BIB033","first-page":"240","volume-title":"2012 Int. Conf. on Unconventional Computing and Natural Computation, Lecture Notes in Computer Science","volume":"7445","author":"Yang X. S.","year":"2012"},{"key":"S0218213023500197BIB034","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.aci.2017.09.001","volume":"14","author":"Mareli M.","year":"2018","journal-title":"Applied Computing and Informatics"},{"key":"S0218213023500197BIB035","doi-asserted-by":"crossref","first-page":"6168","DOI":"10.1109\/ACCESS.2017.2695498","volume":"5","author":"Ling Y.","year":"2017","journal-title":"IEEE Access"},{"key":"S0218213023500197BIB036","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.neucom.2015.11.018","volume":"177","author":"Wang G. G.","year":"2016","journal-title":"Neurocomputing"},{"key":"S0218213023500197BIB037","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1007\/s00521-021-06399-4","volume":"34","author":"Durmu B.","year":"2022","journal-title":"Neural Computing and Applications"},{"key":"S0218213023500197BIB038","doi-asserted-by":"crossref","first-page":"1710","DOI":"10.1109\/TIE.2009.2031194","volume":"57","author":"Dai C.","year":"2010","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"S0218213023500197BIB039","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/s00521-016-2338-0","volume":"30","author":"Zou D. X.","year":"2016","journal-title":"Neural Computing and Applications"},{"key":"S0218213023500197BIB040","doi-asserted-by":"crossref","first-page":"2163","DOI":"10.1007\/s13369-019-04093-1","volume":"45","author":"Luo Q.","year":"2020","journal-title":"Arabian Journal for Science and Engineering"},{"key":"S0218213023500197BIB041","first-page":"1","volume":"8","author":"Karaboga N.","year":"2005","journal-title":"EURASIP Journal on Advances in Signal Processing"},{"key":"S0218213023500197BIB042","doi-asserted-by":"crossref","first-page":"2406","DOI":"10.1108\/EC-07-2017-0264","volume":"35","author":"Zhou Y.","year":"2018","journal-title":"Engineering Computations"},{"key":"S0218213023500197BIB043","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.engappai.2006.03.003","volume":"20","author":"He Q.","year":"2007","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"S0218213023500197BIB044","first-page":"215","volume-title":"2006 IEEE Int. Conf. on Evolutionary Computation","author":"Brest J.","year":"2006"},{"key":"S0218213023500197BIB045","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"Mirjalili S.","year":"2016","journal-title":"Advances in Engineering Software"},{"key":"S0218213023500197BIB046","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/s00366-019-00826-w","volume":"37","author":"Dhiman G.","year":"2021","journal-title":"Engineering with Computers"},{"key":"S0218213023500197BIB047","doi-asserted-by":"crossref","first-page":"8457","DOI":"10.1007\/s12652-020-02580-0","volume":"12","author":"Dhiman G.","year":"2021","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"S0218213023500197BIB048","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.engappai.2020.103541","volume":"90","author":"Kaur S.","year":"2020","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"S0218213023500197BIB049","doi-asserted-by":"crossref","first-page":"728","DOI":"10.1016\/j.asoc.2018.07.033","volume":"71","author":"Shayanfar H.","year":"2018","journal-title":"Applied Soft Computing"},{"key":"S0218213023500197BIB050","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1016\/j.knosys.2018.06.001","volume":"159","author":"Dhiman G.","year":"2018","journal-title":"Knowledge-Based Systems"},{"key":"S0218213023500197BIB051","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.swevo.2019.03.004","volume":"48","author":"Gharehchopogh F. S.","year":"2019","journal-title":"Swarm and Evolutionary Computation"},{"key":"S0218213023500197BIB052","doi-asserted-by":"crossref","first-page":"23281","DOI":"10.1007\/s11831-021-09698-0","volume":"29","author":"Gharehchopogh F. S.","year":"2022","journal-title":"Archives of Computational Methods in Engineering"},{"key":"S0218213023500197BIB053","doi-asserted-by":"crossref","first-page":"1177","DOI":"10.1007\/s42235-022-00185-1","volume":"19","author":"Gharehchopogh F. S.","year":"2022","journal-title":"Journal of Bionic Engineering"},{"key":"S0218213023500197BIB054","doi-asserted-by":"crossref","first-page":"2265","DOI":"10.1007\/s10462-019-09733-4","volume":"53","author":"Gharehchopogh F. S.","year":"2020","journal-title":"Artificial Intelligence Review"},{"key":"S0218213023500197BIB055","doi-asserted-by":"crossref","first-page":"5887","DOI":"10.1002\/int.22535","volume":"36","author":"Abdollahzadeh B.","year":"2021","journal-title":"International Journal of Intelligent Systems"},{"key":"S0218213023500197BIB056","doi-asserted-by":"crossref","first-page":"107408","DOI":"10.1016\/j.cie.2021.107408","volume":"158","author":"Abdollahzadeh B.","year":"2021","journal-title":"Computers and Industrial Engineering"},{"key":"S0218213023500197BIB057","doi-asserted-by":"crossref","first-page":"20017","DOI":"10.1007\/s00521-022-07530-9","volume":"34","author":"Ezugwu A. E.","year":"2022","journal-title":"Neural Computing and Applications"},{"key":"S0218213023500197BIB058","doi-asserted-by":"crossref","first-page":"114570","DOI":"10.1016\/j.cma.2022.114570","volume":"391","author":"Agushakaa J. O.","year":"2022","journal-title":"Computer Methods in Applied Mechanics and Engineering"},{"key":"S0218213023500197BIB059","doi-asserted-by":"crossref","first-page":"107250","DOI":"10.1016\/j.cie.2021.107250","volume":"157","author":"Abualigah L.","year":"2021","journal-title":"Computers Industrial Engineering"},{"key":"S0218213023500197BIB060","doi-asserted-by":"crossref","first-page":"16150","DOI":"10.1109\/ACCESS.2022.3147821","volume":"10","author":"Oyelade O. N.","year":"2022","journal-title":"IEEE Access"},{"key":"S0218213023500197BIB061","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.eswa.2021.116158","volume":"191","author":"Abualigah L.","year":"2022","journal-title":"Expert Systems with Applications"},{"key":"S0218213023500197BIB062","doi-asserted-by":"crossref","first-page":"113609","DOI":"10.1016\/j.cma.2020.113609","volume":"376","author":"Abualigah L.","year":"2021","journal-title":"Computer Methods in Applied Mechanics and Engineering"},{"key":"S0218213023500197BIB063","doi-asserted-by":"crossref","first-page":"2044","DOI":"10.1016\/j.ins.2009.12.010","volume":"180","author":"Garc\u00edca S.","year":"2010","journal-title":"Information Sciences"}],"container-title":["International Journal on Artificial Intelligence Tools"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218213023500197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T04:13:23Z","timestamp":1695960803000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0218213023500197"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9]]},"references-count":63,"journal-issue":{"issue":"06","published-print":{"date-parts":[[2023,9]]}},"alternative-id":["10.1142\/S0218213023500197"],"URL":"https:\/\/doi.org\/10.1142\/s0218213023500197","relation":{},"ISSN":["0218-2130","1793-6349"],"issn-type":[{"type":"print","value":"0218-2130"},{"type":"electronic","value":"1793-6349"}],"subject":[],"published":{"date-parts":[[2023,9]]},"article-number":"2350019"}}