{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,17]],"date-time":"2025-12-17T18:18:07Z","timestamp":1765995487256,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T00:00:00Z","timestamp":1734998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T00:00:00Z","timestamp":1734998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61931004","61931004"],"award-info":[{"award-number":["61931004","61931004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s11227-024-06768-5","type":"journal-article","created":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T10:15:39Z","timestamp":1735035339000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimization method of C2 system architecture based on ALCARO"],"prefix":"10.1007","volume":"81","author":[{"given":"Jian-wei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Cheng-sheng","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,24]]},"reference":[{"issue":"12","key":"6768_CR1","first-page":"183","volume":"7","author":"F Yuan","year":"2023","unstructured":"Yuan F (2023) Network centric warfare and command and control system analysis. Electron Compon Inf Technol 7(12):183\u2013186","journal-title":"Electron Compon Inf Technol"},{"issue":"1","key":"6768_CR2","first-page":"9","volume":"46","author":"JR Zhang","year":"2021","unstructured":"Zhang JR, Wang G, Wang SY (2021) Research on the architecture of air and missile defense of tactics-level command and control system. Fire Control Command Control 46(1):9\u201313","journal-title":"Fire Control Command Control"},{"key":"6768_CR3","doi-asserted-by":"crossref","unstructured":"Zhang YL, Dai ZJ, Zhang LF  et al (2020) Application of artificial intelligence in military: from projects view. In: 2020 6th International Conference on Big Data and Information Analytics (BigDIA), IEEE, pp 113\u2013116","DOI":"10.1109\/BigDIA51454.2020.00026"},{"key":"6768_CR4","unstructured":"Schubert J, Brynielsson J, Nilsson M et al (2018) Artificial intelligence for decision support in command and control systems. In: 23rd International Command and Control Research & Technology Symposium \u201cMulti-Domain C2\u201d, pp 18\u201333"},{"key":"6768_CR5","doi-asserted-by":"crossref","unstructured":"Cui J, Rao S (2021) US Army big data military applications and reflections. In: 2021 3rd International Conference on Big-data Service and Intelligent Computation, pp 92\u201396","DOI":"10.1145\/3502300.3502312"},{"key":"6768_CR6","first-page":"38","volume":"36","author":"MA Jones","year":"2020","unstructured":"Jones MA, Leon JD (2020) Multi-domain operations. Three Swords Mag 36:38\u201341","journal-title":"Three Swords Mag"},{"issue":"780","key":"6768_CR7","first-page":"18","volume":"103","author":"S Magnuson","year":"2018","unstructured":"Magnuson S (2018) DARPA pushes \u2018Mosaic Warfare\u2019 concept. National Defense 103(780):18\u201319","journal-title":"National Defense"},{"key":"6768_CR8","unstructured":"Chen C (2018) Research on Agile C2 oriented architecture for command and control system. National University of Defense Technology"},{"issue":"4","key":"6768_CR9","first-page":"1063","volume":"31","author":"DG Huang","year":"2020","unstructured":"Huang DG, Zhang YX, Lin HM et al (2020) Classification model based on rule-based reasoning network. J Softw 31(4):1063\u20131078","journal-title":"J Softw"},{"issue":"2","key":"6768_CR10","first-page":"60","volume":"6","author":"ZP Wu","year":"2009","unstructured":"Wu ZP, Xie XW (2009) Consensus convergence rate of multi-agent systems in regular networks. J Yangtze Univ (Natural Science Edition) 6(2):60\u201362","journal-title":"J Yangtze Univ (Natural Science Edition)"},{"key":"6768_CR11","doi-asserted-by":"publisher","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","volume":"6","author":"P Erd\u0151s","year":"1959","unstructured":"Erd\u0151s P, R\u00e9nyi A (1959) On random graphs. Publications Mathematicae 6:290\u2013297","journal-title":"Publications Mathematicae"},{"issue":"1","key":"6768_CR12","first-page":"261","volume":"12","author":"P Erd\u0151s","year":"1961","unstructured":"Erd\u0151s P, R\u00e9nyi A (1961) On the strength of connectedness of a random graph. Acta Math Hungar 12(1):261\u2013267","journal-title":"Acta Math Hungar"},{"issue":"6684","key":"6768_CR13","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1038\/30835","volume":"393","author":"W Dj","year":"1998","unstructured":"Dj W (1998) Collective dynamics of \u2019small-world\u2019 networks. Nature 393(6684):409\u2013410","journal-title":"Nature"},{"issue":"5439","key":"6768_CR14","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509\u2013512","journal-title":"Science"},{"issue":"4","key":"6768_CR15","doi-asserted-by":"publisher","first-page":"1141","DOI":"10.1214\/aoms\/1177706098","volume":"30","author":"EN Gilbert","year":"1959","unstructured":"Gilbert EN (1959) Random graphs. Ann Math Stat 30(4):1141\u20131144","journal-title":"Ann Math Stat"},{"issue":"6794","key":"6768_CR16","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/35019019","volume":"406","author":"R Albert","year":"2000","unstructured":"Albert R, Jeong H, Barab\u00e1si AL (2000) Error and attack tolerance of complex networks. Nature 406(6794):378\u2013382","journal-title":"Nature"},{"issue":"1\u20133","key":"6768_CR17","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1016\/j.physa.2004.04.031","volume":"340","author":"P Crucitti","year":"2004","unstructured":"Crucitti P, Latora V, Marchiori M et al (2004) Error and attack tolerance of complex networks. Physica A 340(1\u20133):388\u2013394","journal-title":"Physica A"},{"issue":"1","key":"6768_CR18","first-page":"19","volume":"1","author":"GY Si","year":"2015","unstructured":"Si GY, Wang YZ, Li RJ, Wang F (2015) Modeling C2 system-of-systems based on networks. J Command Control 1(1):19\u201324","journal-title":"J Command Control"},{"issue":"7","key":"6768_CR19","first-page":"30","volume":"49","author":"TD Li","year":"2024","unstructured":"Li TD, Wang G, Guo XK et al (2024) Topological characteristics of air defense and antimissile system based on complex network. Firepower Command Control 49(7):30\u201335","journal-title":"Firepower Command Control"},{"issue":"4","key":"6768_CR20","first-page":"60","volume":"46","author":"CS Pan","year":"2018","unstructured":"Pan CS, Xiong W, Qiu SM et al (2018) Research on multi-attribute weighted command and control network modeling method. Modern Defense Technol 46(4):60\u201366","journal-title":"Modern Defense Technol"},{"key":"6768_CR21","first-page":"87","volume":"2018","author":"H Hildmann","year":"2017","unstructured":"Hildmann H, Atia DY, Ruta D et al (2017) A model for wireless-access network topology and a PSO-based approach for its optimization. Recent Adv Comput Opt: Res Workshop Comput Opt WCO 2018:87\u2013116","journal-title":"Recent Adv Comput Opt: Res Workshop Comput Opt WCO"},{"issue":"6","key":"6768_CR22","first-page":"118","volume":"38","author":"CY Sun","year":"2017","unstructured":"Sun CY, Shen MX, Sheng H et al (2017) Invulnerability optimization design of air defense multi-sensor network structure. J Commun 38(6):118\u2013126","journal-title":"J Commun"},{"key":"6768_CR23","doi-asserted-by":"publisher","first-page":"96180","DOI":"10.1109\/ACCESS.2022.3204288","volume":"10","author":"SE Sabino","year":"2022","unstructured":"Sabino SE, Grilo AM (2022) NSGA-II based joint topology and routing optimization of flying backhaul networks. IEEE Access 10:96180\u201396196","journal-title":"IEEE Access"},{"issue":"6","key":"6768_CR24","first-page":"121","volume":"43","author":"Z Zhang","year":"2022","unstructured":"Zhang Z, Wang Y, Yan MD et al (2022) Optimization of close air support super-network structure based on heuristic genetic algorithm. Ordnance Equipment Eng 43(6):121\u2013127","journal-title":"Ordnance Equipment Eng"},{"issue":"2\/3","key":"6768_CR25","first-page":"929","volume":"9","author":"SR Victer","year":"2020","unstructured":"Victer SR (2020) Connectivity knowledge and the degree of structural formalization: a contribution to a contingency theory of organizational capability. J Organ Des 9(2\/3):929\u2013958","journal-title":"J Organ Des"},{"key":"6768_CR26","unstructured":"Xiang Z (2022) Research on force collaboration methods in mosaic warfare based on crowdsourcing. University of Defense Technology"},{"issue":"8","key":"6768_CR27","first-page":"1833","volume":"38","author":"Y Sun","year":"2016","unstructured":"Sun Y, Yao PY, Wu JX et al (2016) Design method of flat command and control structure of force organization. Syst Eng Electronic Technol 38(8):1833\u20131839","journal-title":"Syst Eng Electronic Technol"},{"key":"6768_CR28","unstructured":"Chen XL (2021) Research on the evaluation of command element allocation scheme for command relationship adjustment. Nanjing University of Science and Technology"},{"key":"6768_CR29","doi-asserted-by":"publisher","unstructured":"Wang JW, Pan CS (2024) Research on construction method of command and control network model based on complex network theory. IET Control Theory Appl Appl. 1\u201313. https:\/\/doi.org\/10.1049\/cth2.12756.","DOI":"10.1049\/cth2.12756"},{"issue":"1","key":"6768_CR30","first-page":"35","volume":"41","author":"Z Kong","year":"2020","unstructured":"Kong Z, Yang Q, Zhao J et al (2020) Adaptive adjustment of weights and search strategies-based whale optimization algorithm. J Northeastern Univ (Natural Science) 41(1):35","journal-title":"J Northeastern Univ (Natural Science)"},{"key":"6768_CR31","doi-asserted-by":"crossref","unstructured":"Francis B, Christophe P (2024) The statistics of Rayleigh-Levy flight extrema. Astron Astrophys 689","DOI":"10.1051\/0004-6361\/202449628"},{"key":"6768_CR32","doi-asserted-by":"publisher","first-page":"113810","DOI":"10.1109\/ACCESS.2019.2934994","volume":"7","author":"W Long","year":"2019","unstructured":"Long W, Jiao J, Liang X et al (2019) A random opposition-based learning grey wolf optimizer. IEEE Access 7:113810\u2013113825","journal-title":"IEEE Access"},{"key":"6768_CR33","unstructured":"Zhou F, Liu Z, Wu L (2013) Intelligent command and control system. National Defense Industry Press, pp 74\u201378"},{"issue":"15","key":"6768_CR34","doi-asserted-by":"publisher","first-page":"10733","DOI":"10.1007\/s00521-023-08261-1","volume":"35","author":"HA Shehadeh","year":"2023","unstructured":"Shehadeh HA (2023) Chernobyl disaster optimizer (CDO): a novel meta-heuristic method for global optimization. Neural Comput Appl 35(15):10733\u201310749","journal-title":"Neural Comput Appl"},{"key":"6768_CR35","doi-asserted-by":"publisher","first-page":"1126450","DOI":"10.3389\/fmech.2022.1126450","volume":"8","author":"M Dehghani","year":"2023","unstructured":"Dehghani M, Trojovsk\u00fd P (2023) Osprey optimization algorithm: a new bio-inspired metaheuristic algorithm for solving engineering optimization problems. Front Mech Eng 8:1126450","journal-title":"Front Mech Eng"},{"key":"6768_CR36","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367","journal-title":"Adv Eng Softw"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06768-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-024-06768-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-024-06768-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,24]],"date-time":"2024-12-24T11:05:16Z","timestamp":1735038316000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-024-06768-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,24]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["6768"],"URL":"https:\/\/doi.org\/10.1007\/s11227-024-06768-5","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2024,12,24]]},"assertion":[{"value":"23 November 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"330"}}