Computational Intelligence - August 2013 - 63

References

[1] J. Chen, S. J. Swamidass, Y. Dou, J. Bruand, and P. Baldi, "ChemDB: A public database
of small molecules and related chemoinformatics resources," Bioinformatics, vol. 21, no. 22,
pp. 4133-4139, 2005.
[2] D. Lagorce, T. Pencheva, B. O. Villoutreix, and M. A. Miteva, "DG-AMMOS: A new
tool to generate 3D conformation of small molecules using distance geometry and automated molecular mechanics optimization for in silico screening," BMC Chemical Biol.,
vol. 9, no. 1, pp. 1-10, 2009.
[3] O. Sperandio, M. Souaille, F. Delfaud, M. A. Miteva, and B. O. Villoutreix, "MED3DMC: A new tool to generate 3D conformation ensembles of small molecules with a
monte carlo sampling of the conformational space," Eur. J. Med. Chem., vol. 44, no. 4,
pp. 1405-1409, 2009.
[4] M. A. Miteva, F. Guyon, and P. Tufféry, "Frog2: Efficient 3D conformation ensemble
generator for small compounds," Nucleic Acids Res., vol. 38, pp. W622-W627, July 2010.
[5] M. M. H. Ellabaan, Y. S. Ong, M. H. Lim, and J. L. Kuo, "Finding multiple first-order
saddle points using a valley-adaptive clearing genetic algorithm," in Proc. IEEE Int. Symp.
Computational Intelligence Robotics Automation, 2009, pp. 457-462.
[6] S. A. Trygubenko and D. J. Wales, "A doubly nudged elastic band method for finding
transition states," J. Chem. Phys., vol. 120, no. 5, pp. 2082-2094, 2004.
[7] J. M. Carr, S. A. Trygubenko, and D. J. Wales, "Finding pathways between distant
local minima," J. Chem. Phys., vol. 122, no. 23, pp. 234903-234909, 2005.
[8] E. S. Koslover, and D. J. Wales, "Comparison of double-ended transition state search
methods," J. Chem. Phys., vol. 127, no. 13, pp. 134102-134113, 2007.
[9] D. Sheppard, R. Terrell, and G. Henkelman, "Optimization methods for finding minimum energy paths," J. Chem. Phys., vol. 128, no. 13, pp. 134106-134115, 2008.
[10] R. A. Olsen, G. J. Kroes, G. Henkelman, A. Arnaldsson, and H. Jónsson, "Comparison of methods for finding saddle points without knowledge of the final states," J. Chem.
Phys., vol. 121, no. 20, pp. 9776-9792, 2004.
[11] P. Chaudhury and S. P. Bhattacharyya, "A simulated annealing based technique for locating first-order saddle points on multidimensional surfaces and constructing reaction paths:
Several model studies," J. Mol. Struct.: THEOCHEM, vol. 429, pp. 175-186, Mar. 1998.
[12] P. Chaudhury, S. P. Bhattacharyya, and W. Quapp, "A genetic algorithm based technique for locating first-order saddle point using a gradient-dominated recipe," Chem.
Phys., vol. 253, nos. 2-3, pp. 295-303, 2000.
[13] S. D. Bungay, R. A. Poirier, and R. J. Charron, "Optimization of transition state structures using genetic algorithms," J. Math. Chem., vol. 28, no. 4, pp. 389-401, Dec. 2000.
[14] J. H. Holland, Adaptation in Natural and Artificial Systems. Cambridge, MA: MIT Press,
1992.
[15] H. B. Schlegel, "Optimization of equilibrium geometries and transition structures,"
J. Comput. Chemistry, vol. 3, no. 2, pp. 214-218, 1982.
[16] M. M. H. Ellabaan and Y. S. Ong, "Valley-adaptive clearing scheme for multimodal
optimization evolutionary search," in Proc. 9th Int. Conf. Intelligent Systems Design Applications, 2009, pp. 1-6.
[17] Y. S. Ong and A. J. Keane, "Meta-Lamarckian learning in memetic algorithm," IEEE
Trans. Evol. Comput., vol. 8, no. 2, pp. 99-110, 2004.
[18] M. N. Le, Y. S. Ong, Y. Jin, and B. Sendhoff, "Lamarckian memetic algorithms:
Local optimum and connectivity structure analysis," Memetic Comput., vol. 1, no. 3, pp.
175-190, 2009.
[19] J. H. Ang, K. C. Tan, and A. A. Mamun, "An evolutionary memetic algorithm for
rule extraction," Expert Syst. Applicat., vol. 37, no. 2, pp. 1302-1315, 2010.
[20] C. L. Brooks III, J. N. Onuchic, and D. J. Wales, "Statistical thermodynamics. Taking
a walk on a landscape," Science, vol. 293, no. 5530, pp. 612-613, 2001.
[21] D. J. Wales, Energy Landscapes: Applications to Clusters, Biomolecules and Glasses. Cambridge, U.K.: Cambridge Univ. Press, 2003.
[22] H. Soh, Y. S. Ong, Q. C. Nguyen, Q. H. Nguyen, M. S. Habibullah, T. Hung,
and J. L. Kuo, "Discovering unique, low-energy pure water isomers: Memetic exploration, optimization, and landscape analysis," IEEE Trans. Evol. Comput., vol. 14, no. 3, pp.
419-437, 2010.
[23] F. Jensen, Introduction to Computational Chemistry, Hoboken, NJ: Wiley, 1999.
[24] T. Zhou, K. Lafleur, and A. Caflisch, "Complementing ultrafast shape recognition with
an optical isomerism descriptor," J. Mol. Graph. Model., vol. 29, no. 3, pp. 443-449, 2010.
[25] P. J. Ballester, "Ultrafast shape recognition: Method and applications," Future Med.
Chem., vol. 3, no. 1, pp. 65-78, 2011.
[26] T. N. Truong, and D. G. Truhlar, "Ab initio transition state theory calculations of the reaction rate for OH+CH4 " H2O+CH3," J. Chem. Phys., vol. 93, no. 3, pp. 1761-1769, 1990.
[27] G. Henkelman and G. Jóhannesson, "Methods for finding saddle points and minimum energy paths," Prog. Theor. Chem. Phys., vol. 5, pp. 269-302, 2002.
[28] P. Moscato, "On evolution, search, optimization, genetic algorithms, and martial
arts: Towards memetic algorithms," in Caltech Concurrent Computation Program, California Inst. Technol., Pasadena, CA, Tech. Rep. C3P-826, 1989.

[29] F. Neri, J. Toivanen, G. Cascella, and Y. S. Ong, "An adaptive multimeme algorithm
for designing HIV multidrug therapies," IEEE/ACM Trans. Comput. Biol. Bioinform., vol.
4, no. 2, pp. 264-278, 2007.
[30] J. E. Vitela and O. Castanos, "A real-coded niching memetic algorithm for continuous multimodal function optimization," in Proc. IEEE Congr. Evolutionary Computation,
2008, pp. 2170-2177.
[31] Y. S. Ong, M. H. Lim, and X. S. Chen, "Memetic computation-Past, present, &
future," IEEE Comput. Intell. Mag., vol. 5, no. 2, pp. 24-36, 2010.
[32] X. S. Chen, Y. S. Ong, M. H. Lim, and K. C. Tan, "A multi-facet survey on memetic
computation," IEEE Trans. Evol. Comput., vol. 15, no. 5, pp. 591-607, 2011.
[33] H. C. Cheng, T. C. Chiang, and L. C. Fu, "A two-stage hybrid memetic algorithm for multiobjective job shop scheduling," Expert Syst. Applicat., vol. 38, no. 9, pp.
10983-10998, 2011.
[34] J. Zhang, Z. Zhan, Y. Lin, N. Chen, Y. Gong, J. Zhong, H. S. H. Chung, Y. Li, and
Y. Shi, "Evolutionary computation meets machine learning: A survey," IEEE Comput.
Intell. Mag., vol. 6, no. 4, pp. 68-75, 2011.
[35] Y. Jin, K. Tang, X. Yu, B. Sendhoff, and X. Yao, "A framework for finding robust
optimal solutions over time," Memetic Comput., to be published.
[36] M. N. Le, Y. S. Ong, S. Menzel, Y. Jin, and B. Sendhoff, "Evolution by adapting
surrogates," Evol. Comput., to be published.
[37] J. Y. Chia, C. K. Goh, K. C. Tan, and V. A. Shim, "Memetic informed evolutionary
optimization via data mining," Memetic Comput., vol. 3, no. 2, pp. 73-87, 2011.
[38] S. Damas, O. Cordón, and J. Santamaría, "Medical image registration using evolutionary computation: An experimental survey," IEEE Comput. Intell. Mag., vol. 6, no. 4,
pp. 26-42, 2011.
[39] Y. Meng, Y. Zheng, and Y. Jin, "Autonomous self-reconfiguration of modular robots
by evolving a hierarchical mechanochemical model," IEEE Comput. Intell. Mag., vol. 6,
no. 1, pp. 43-54, 2011.
[40] V. A. Shim, K. C. Tan, J. Y. Chia, and J. K. Chong, "Evolutionary algorithms for
solving multi-objective travelling salesman problems," Flexible Services Manuf., vol. 23,
no. 2, pp. 207-241, 2011.
[41] M. N. Le, Y. S. Ong, Y. Jin, and B. Sendhoff, "A unified framework for symbiosis
of evolutionary mechanisms with application to water clusters potential model design,"
IEEE Comput. Intell. Mag., vol. 7, no. 1, pp. 20-35, 2012.
[42] M. M. H. Ellabaan, S. D. Handoko, Y. S. Ong, C. K. Kwoh, S. Bahnassy, F. Elassawy,
and H. Y. Man, "A tree-structured covalent-bond-driven molecular memetic algorithm
for optimization of ring-deficient molecules," Comput. Math. Applicat., vol. 64, no. 12,
pp. 3792-3804, 2012.
[43] M. M. H. Ellabaan, Y. S. Ong, Q. C. Nguyen, and J. L. Kuo, "Evolutionary discovery of transition states in water clusters," J. Theor. Comput. Chem., vol. 11, no. 5, pp.
965-995, 2012.
[44] M. M. H. Ellabaan and Y. S. Ong, "Experiences on memetic computation for locating transition states in biochemical applications," in Proc. Genetic Evolutionary Computation
Conf., 2012, pp. 623-624.
[45] S. A. Thomas and Y. Jin, "Evolving connectivity between genetic oscillators and
switches using evolutionary algorithms," J. Bioinform. Comput. Biol., to be published.
[46] W. Kabsch, "A solution for the best rotation to relate two sets of vectors," Acta Crystallogr., vol. 32, no. 5, pp. 922-923, 1976.
[47] R. C. Weast, Handbook of Chemistry and Physics. Boca Raton, FL: CRC Press, 1984.
[48] M. M. H. Ellabaan, X. S. Chen, and Q. H. Nguyen, "Multi-modal valleyadaptive
memetic algorithm for efficient discovery of first-order saddle points," in Proc. 9th Int.
Conf. Simulated Evolution Learning, 2012, pp. 83-92.
[49] S. Kok and C. Sandrock, "Locating and characterizing the stationary points of the
extended rosenbrock function," Evol. Comput., vol. 17, no. 3, pp. 437-453, 2009.
[50] S. Maeda, Y. Matsuda, S. Mizutani, A. Fujii, and K. Ohno, "Long-range migration of
a water molecule to catalyze a tautomerization in photoionization of the hydrated formamide cluster," J. Phys. Chem. A, vol. 114, no. 44, pp. 11896-11899, 2010.
[51] S. D. Handoko, C. K. Kwoh, and Y. S. Ong, "Using classification for constrained
memetic algorithm: A new paradigm," in Proc. IEEE Int. Conf. Systems, Man Cybernetics,
2008, pp. 547-552.
[52] S. D. Handoko, C. K. Kwoh, and Y. S. Ong, "Classification-assisted memetic algorithms for equality-constrained optimization problems," in Advances in Artificial Intelligence
(Lecture Notes in Computer Science), vol. 5866, 2009, pp. 391-400.
[53] S. D. Handoko, C. K. Kwoh, and Y. S. Ong, "Feasibility structure modeling: An
effective chaperone for constrained memetic algorithms," IEEE Trans. Evol. Comput., vol.
14, no. 5, pp. 740-758, 2010.
[54] S. D. Handoko, C. K. Kwoh, Y. S. Ong, and J. Chan, "Classificationassisted memetic
algorithms for solving optimization problems with restricted equality constraint function
mapping," in Proc. 2011 IEEE Congr. Evolutionary Computation, 2011, pp. 1209-1216.

august 2013 | IEEE ComputatIonal IntEllIgEnCE magazInE

63



Table of Contents for the Digital Edition of Computational Intelligence - August 2013

Computational Intelligence - August 2013 - Cover1
Computational Intelligence - August 2013 - Cover2
Computational Intelligence - August 2013 - 1
Computational Intelligence - August 2013 - 2
Computational Intelligence - August 2013 - 3
Computational Intelligence - August 2013 - 4
Computational Intelligence - August 2013 - 5
Computational Intelligence - August 2013 - 6
Computational Intelligence - August 2013 - 7
Computational Intelligence - August 2013 - 8
Computational Intelligence - August 2013 - 9
Computational Intelligence - August 2013 - 10
Computational Intelligence - August 2013 - 11
Computational Intelligence - August 2013 - 12
Computational Intelligence - August 2013 - 13
Computational Intelligence - August 2013 - 14
Computational Intelligence - August 2013 - 15
Computational Intelligence - August 2013 - 16
Computational Intelligence - August 2013 - 17
Computational Intelligence - August 2013 - 18
Computational Intelligence - August 2013 - 19
Computational Intelligence - August 2013 - 20
Computational Intelligence - August 2013 - 21
Computational Intelligence - August 2013 - 22
Computational Intelligence - August 2013 - 23
Computational Intelligence - August 2013 - 24
Computational Intelligence - August 2013 - 25
Computational Intelligence - August 2013 - 26
Computational Intelligence - August 2013 - 27
Computational Intelligence - August 2013 - 28
Computational Intelligence - August 2013 - 29
Computational Intelligence - August 2013 - 30
Computational Intelligence - August 2013 - 31
Computational Intelligence - August 2013 - 32
Computational Intelligence - August 2013 - 33
Computational Intelligence - August 2013 - 34
Computational Intelligence - August 2013 - 35
Computational Intelligence - August 2013 - 36
Computational Intelligence - August 2013 - 37
Computational Intelligence - August 2013 - 38
Computational Intelligence - August 2013 - 39
Computational Intelligence - August 2013 - 40
Computational Intelligence - August 2013 - 41
Computational Intelligence - August 2013 - 42
Computational Intelligence - August 2013 - 43
Computational Intelligence - August 2013 - 44
Computational Intelligence - August 2013 - 45
Computational Intelligence - August 2013 - 46
Computational Intelligence - August 2013 - 47
Computational Intelligence - August 2013 - 48
Computational Intelligence - August 2013 - 49
Computational Intelligence - August 2013 - 50
Computational Intelligence - August 2013 - 51
Computational Intelligence - August 2013 - 52
Computational Intelligence - August 2013 - 53
Computational Intelligence - August 2013 - 54
Computational Intelligence - August 2013 - 55
Computational Intelligence - August 2013 - 56
Computational Intelligence - August 2013 - 57
Computational Intelligence - August 2013 - 58
Computational Intelligence - August 2013 - 59
Computational Intelligence - August 2013 - 60
Computational Intelligence - August 2013 - 61
Computational Intelligence - August 2013 - 62
Computational Intelligence - August 2013 - 63
Computational Intelligence - August 2013 - 64
Computational Intelligence - August 2013 - 65
Computational Intelligence - August 2013 - 66
Computational Intelligence - August 2013 - 67
Computational Intelligence - August 2013 - 68
Computational Intelligence - August 2013 - 69
Computational Intelligence - August 2013 - 70
Computational Intelligence - August 2013 - 71
Computational Intelligence - August 2013 - 72
Computational Intelligence - August 2013 - 73
Computational Intelligence - August 2013 - 74
Computational Intelligence - August 2013 - 75
Computational Intelligence - August 2013 - 76
Computational Intelligence - August 2013 - 77
Computational Intelligence - August 2013 - 78
Computational Intelligence - August 2013 - 79
Computational Intelligence - August 2013 - 80
Computational Intelligence - August 2013 - 81
Computational Intelligence - August 2013 - 82
Computational Intelligence - August 2013 - 83
Computational Intelligence - August 2013 - 84
Computational Intelligence - August 2013 - 85
Computational Intelligence - August 2013 - 86
Computational Intelligence - August 2013 - 87
Computational Intelligence - August 2013 - 88
Computational Intelligence - August 2013 - Cover3
Computational Intelligence - August 2013 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com