{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T05:16:36Z","timestamp":1774588596926,"version":"3.50.1"},"reference-count":29,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Applied Computational Intelligence and Soft Computing"],"published-print":{"date-parts":[[2012]]},"abstract":"<jats:p>People use search engines to find information they desire with the aim that their information needs will be met. Information retrieval (IR) is a field that is concerned primarily with the searching and retrieving of information in the documents and also searching the search engine, online databases, and Internet. Genetic algorithms (GAs) are robust, efficient, and optimizated methods in a wide area of search problems motivated by Darwin\u2019s principles of natural selection and survival of the fittest. This paper describes information retrieval systems (IRS) components. This paper looks at how GAs can be applied in the field of IR and specifically the relevance of genetic algorithms to internet web search. Finally, from the proposals surveyed it turns out that GA is applied to diverse problem fields of internet web search.<\/jats:p>","DOI":"10.1155\/2012\/152385","type":"journal-article","created":{"date-parts":[[2012,11,14]],"date-time":"2012-11-14T21:00:49Z","timestamp":1352926849000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["State-of-the-Art Review on Relevance of Genetic Algorithm to Internet Web Search"],"prefix":"10.1155","volume":"2012","author":[{"given":"Kehinde","family":"Agbele","sequence":"first","affiliation":[{"name":"Department of Computer Science, Soft Computing and Intelligent Systems Research Group, University of the Western Cape, Private Bag X17, Bellville, Cape Town, South Africa"}]},{"given":"Ademola","family":"Adesina","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Soft Computing and Intelligent Systems Research Group, University of the Western Cape, Private Bag X17, Bellville, Cape Town, South Africa"}]},{"given":"Daniel","family":"Ekong","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences (Computer Science Option), Ekiti State University, Ado-Ekiti, PMB 5363, Ado-Ekiti, Ekiti State, Nigeria"}]},{"given":"Oluwafemi","family":"Ayangbekun","sequence":"additional","affiliation":[{"name":"College of Information and Communication Technology, Crescent University, Abeokuta, Ogun-State, Nigeria"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.3923\/rjit.2011.24.34"},{"key":"2","year":"1999"},{"key":"3","doi-asserted-by":"crossref","first-page":"17","DOI":"10.3923\/jmcomm.2010.17.22","volume":"4","year":"2010","journal-title":"Journal of Mobile Communication"},{"key":"4","year":"1975"},{"key":"5","year":"1975"},{"key":"6","year":"1989"},{"issue":"4","key":"7","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1002\/(SICI)1097-4571(199006)41:4<288::AID-ASI8>3.0.CO;2-H","volume":"41","year":"1990","journal-title":"Journal of the American Society for Information Science"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00406-0"},{"key":"12","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/45.282292","volume":"12","year":"1993","journal-title":"IEEE Potentials"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(02)00048-1"},{"issue":"1","key":"14","first-page":"65","volume":"7","year":"2007","journal-title":"International Journal of Computer Science and Network Security"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190703"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.3923\/rjit.2010.139.144"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2002.1000345"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2004.04.002"},{"issue":"1","key":"22","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/S0167-9236(98)00035-9","volume":"23","year":"1998","journal-title":"Decision Support Systems"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2008.07.003"},{"key":"24","year":"1997"},{"issue":"3","key":"25","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1108\/eb026931","volume":"50","year":"1994","journal-title":"Journal of Documentation"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/63039.63044"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1269663"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0548(03)00194-1"},{"issue":"6","key":"40","doi-asserted-by":"crossref","first-page":"1863","DOI":"10.1016\/j.ipm.2007.12.012","volume":"44","year":"2008","journal-title":"Information Processing and Management"},{"key":"39","first-page":"522","year":"1999","journal-title":"ICPP Workshops"},{"issue":"9","key":"38","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1002\/(SICI)1097-4571(1999)50:9<760::AID-ASI4>3.0.CO;2-O","volume":"50","year":"1999","journal-title":"Journal of the American Society for Information Science"},{"issue":"11","key":"41","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/2.881697","volume":"33","year":"2000","journal-title":"IEEE Computer"},{"key":"30","year":"1979"},{"issue":"6","key":"31","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1177\/016555159702300603","volume":"23","year":"1997","journal-title":"Journal of Information Science"},{"issue":"2","key":"32","first-page":"165","volume":"7","year":"1994","journal-title":"International Journal of Expert Systems"}],"container-title":["Applied Computational Intelligence and Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2012\/152385.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2012\/152385.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/acisc\/2012\/152385.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T02:40:28Z","timestamp":1498012828000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/acisc\/2012\/152385\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":29,"alternative-id":["152385","152385"],"URL":"https:\/\/doi.org\/10.1155\/2012\/152385","relation":{},"ISSN":["1687-9724","1687-9732"],"issn-type":[{"value":"1687-9724","type":"print"},{"value":"1687-9732","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}