{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T06:11:23Z","timestamp":1768371083637,"version":"3.49.0"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Doctoral Science Foundation-Funded Project of China","award":["45832"],"award-info":[{"award-number":["45832"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2949989","type":"journal-article","created":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T19:54:30Z","timestamp":1572378870000},"page":"156834-156847","source":"Crossref","is-referenced-by-count":8,"title":["An Operation Planning Generation and Optimization Method for the New Intelligent Combat SoS"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1796-7560","authenticated-orcid":false,"given":"Hua","family":"He","sequence":"first","affiliation":[]},{"given":"Weiping","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yifan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xiaobo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11269-017-1759-6"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s12293-017-0240-7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2012.2227145"},{"key":"ref32","first-page":"832","article-title":"Indicator-based selection in multiobjective search","volume":"3242","author":"zitzler","year":"2004","journal-title":"Proc Int Conf Parallel Problem Solving Nature"},{"key":"ref31","first-page":"95","article-title":"SPEA2: Improving the strength Pareto evolutionary algorithm for multi objective optimization","volume":"103","author":"zitzler","year":"2001","journal-title":"Proc Evol Methods Design Optim Control Appl Ind Problems"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2016.7743895"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2281534"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1162\/evco.2009.17.3.411"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/3468.650319"},{"key":"ref10","article-title":"Dynamic complexity in system of systems","author":"johnson","year":"2007"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/11729976_4"},{"key":"ref11","first-page":"50","article-title":"Networked system-of-systems combat OODA command circulation time measuring modeling and experiment","volume":"1","author":"zhang","year":"2015","journal-title":"Journal of Command and Control"},{"key":"ref12","first-page":"56","article-title":"Research on invulnerability of combat net model based on complex networks","volume":"23","author":"di","year":"2011","journal-title":"J Syst Simul"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.8.1906-1912"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/9781118918937"},{"key":"ref15","article-title":"An information age combat model","author":"cares","year":"2004"},{"key":"ref16","author":"robinson","year":"0","journal-title":"Model development of large-scale DoD system-of-systems"},{"key":"ref17","article-title":"Modeling community containment for pandemic influenza: A letter report","author":"mahmoud","year":"2006"},{"key":"ref18","first-page":"19","article-title":"Measuring the agility of networked military forces","volume":"9","author":"dekker","year":"2006","journal-title":"J Battlefeild Technol"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1007\/s10588-013-9163-0","article-title":"Key potential-oriented criticality analysis for complex military organization based on FINC-E model","volume":"20","author":"yang","year":"2014","journal-title":"Comput Comput Math Org Theory"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/srep43597"},{"key":"ref4","first-page":"93","article-title":"Applying social network analysis concepts to military C4ISR architectures","volume":"24","author":"dekker","year":"2002","journal-title":"Connections"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1126\/science.298.5594.824"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/9781118918937"},{"key":"ref6","author":"boyd","year":"2018","journal-title":"A Discourse on Winning and Losing"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14429\/dsj.64.5534"},{"key":"ref5","first-page":"172","article-title":"Scaling up planning by teasing out resource scheduling","volume":"1809","author":"srivastava","year":"1999","journal-title":"Proc Eur Conf Planning"},{"key":"ref8","article-title":"DoD enterprise architecture conference applied joint mission thread","author":"behre","year":"0"},{"key":"ref7","article-title":"Targeting&#x2014;Air force doctrine document 2-1.9","author":"fogleman","year":"2006"},{"key":"ref2","first-page":"5","article-title":"A survey of military planning systems","author":"boukhtouta","year":"2004","journal-title":"Proc 9th ICCRTS Int Command Control Res Technol Symp"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2013.2281535"},{"key":"ref1","article-title":"Research on cloud ammuition system theory and method","author":"bing","year":"2014"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.06.008"},{"key":"ref20","article-title":"Modeling and resolving method of course of action planning under antagonism","author":"du","year":"2012"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/0893-6080(95)00107-7"},{"key":"ref22","first-page":"10","article-title":"Effects-based operations: A command philosophy","volume":"21","author":"elder","year":"2007","journal-title":"Air Space Power J"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2004.06.028"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/3468.867862"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1117\/12.719022"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-006-0001-4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.21236\/ADA467452"},{"key":"ref44","first-page":"93","article-title":"Improving crossover and mutation for adaptive genetic algorithm","volume":"42","author":"kuang","year":"2006","journal-title":"Comput Eng Appl"},{"key":"ref26","first-page":"25","article-title":"Influence net modeling with causal strengths: An evolutionary approach","volume":"1996","author":"rosen","year":"0","journal-title":"Proc Command Control Res Technol Symp"},{"key":"ref43","first-page":"1215","article-title":"Design optimization of brushless direct current motor based on adaptive genetic algorithm","volume":"36","author":"shi","year":"2002","journal-title":"J Xi&#x2019;an Jiaotong Univ"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2004.834424"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08886391.pdf?arnumber=8886391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T18:02:03Z","timestamp":1643306523000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8886391\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2949989","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}