{"id":"https://openalex.org/W3113358373","doi":"https://doi.org/10.1109/syscon47679.2020.9275874","title":"Surrogate Model-Based Rapid optimization for the Deployment of Combat System of Systems","display_name":"Surrogate Model-Based Rapid optimization for the Deployment of Combat System of Systems","publication_year":2020,"publication_date":"2020-08-24","ids":{"openalex":"https://openalex.org/W3113358373","doi":"https://doi.org/10.1109/syscon47679.2020.9275874","mag":"3113358373"},"language":"en","primary_location":{"id":"doi:10.1109/syscon47679.2020.9275874","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon47679.2020.9275874","pdf_url":null,"source":{"id":"https://openalex.org/S4306498685","display_name":"2020 IEEE International Systems Conference (SysCon)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028747132","display_name":"Bingfeng Ge","orcid":"https://orcid.org/0000-0002-0331-7260"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bingfeng Ge","raw_affiliation_strings":["College of Systems Engineering, National University of Defense Technology, ChangSha, China"],"affiliations":[{"raw_affiliation_string":"College of Systems Engineering, National University of Defense Technology, ChangSha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018248096","display_name":"Boyuan Xia","orcid":"https://orcid.org/0000-0002-4736-0703"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Boyuan Xia","raw_affiliation_strings":["College of Systems Engineering, National University of Defense Technology, ChangSha, China"],"affiliations":[{"raw_affiliation_string":"College of Systems Engineering, National University of Defense Technology, ChangSha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100544565","display_name":"Kewei Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kewei Yang","raw_affiliation_strings":["College of Systems Engineering, National University of Defense Technology, ChangSha, China"],"affiliations":[{"raw_affiliation_string":"College of Systems Engineering, National University of Defense Technology, ChangSha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101573737","display_name":"Qingsong Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qingsong Zhao","raw_affiliation_strings":["College of Systems Engineering, National University of Defense Technology, ChangSha, China"],"affiliations":[{"raw_affiliation_string":"College of Systems Engineering, National University of Defense Technology, ChangSha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087359629","display_name":"Yajie Dou","orcid":"https://orcid.org/0000-0003-2226-072X"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yajie Dou","raw_affiliation_strings":["College of Systems Engineering, National University of Defense Technology, ChangSha, China"],"affiliations":[{"raw_affiliation_string":"College of Systems Engineering, National University of Defense Technology, ChangSha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100567296","display_name":"Zhu Xiang","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhu Xiang","raw_affiliation_strings":["College of Systems Engineering, National University of Defense Technology, ChangSha, China"],"affiliations":[{"raw_affiliation_string":"College of Systems Engineering, National University of Defense Technology, ChangSha, China","institution_ids":["https://openalex.org/I170215575"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5028747132"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.5167,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.58380567,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12000","display_name":"Systems Engineering Methodologies and Applications","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12000","display_name":"Systems Engineering Methodologies and Applications","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11195","display_name":"Simulation Techniques and Applications","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12888","display_name":"Military Strategy and Technology","score":0.9829000234603882,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7535897493362427},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6407502293586731},{"id":"https://openalex.org/keywords/surrogate-model","display_name":"Surrogate model","score":0.6159648895263672},{"id":"https://openalex.org/keywords/optimization-problem","display_name":"Optimization problem","score":0.47467756271362305},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4700806438922882},{"id":"https://openalex.org/keywords/bilevel-optimization","display_name":"Bilevel optimization","score":0.463078111410141},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4426054358482361},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.39378198981285095},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.250327467918396},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.1287274956703186},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11373674869537354}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7535897493362427},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6407502293586731},{"id":"https://openalex.org/C131675550","wikidata":"https://www.wikidata.org/wiki/Q7646884","display_name":"Surrogate model","level":2,"score":0.6159648895263672},{"id":"https://openalex.org/C137836250","wikidata":"https://www.wikidata.org/wiki/Q984063","display_name":"Optimization problem","level":2,"score":0.47467756271362305},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4700806438922882},{"id":"https://openalex.org/C3309286","wikidata":"https://www.wikidata.org/wiki/Q4907693","display_name":"Bilevel optimization","level":3,"score":0.463078111410141},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4426054358482361},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.39378198981285095},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.250327467918396},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.1287274956703186},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11373674869537354},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/syscon47679.2020.9275874","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon47679.2020.9275874","pdf_url":null,"source":{"id":"https://openalex.org/S4306498685","display_name":"2020 IEEE International Systems Conference (SysCon)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1983161303","https://openalex.org/W1997176541","https://openalex.org/W2071204941","https://openalex.org/W2106944478","https://openalex.org/W2776493547","https://openalex.org/W2791310311","https://openalex.org/W2811460593","https://openalex.org/W2894616417","https://openalex.org/W2916888157","https://openalex.org/W3004784263","https://openalex.org/W4236993164","https://openalex.org/W6676169587"],"related_works":["https://openalex.org/W2890257643","https://openalex.org/W1495503294","https://openalex.org/W2161149697","https://openalex.org/W2340378315","https://openalex.org/W2013038594","https://openalex.org/W1604175135","https://openalex.org/W255338418","https://openalex.org/W3090200643","https://openalex.org/W2602322400","https://openalex.org/W2795565301"],"abstract_inverted_index":{"The":[0],"deployment":[1,153],"of":[2,6,43,84,98,108,116,136,154],"a":[3,10,15,32,55,147,157,168,185],"combat":[4],"system":[5,53],"systems":[7],"(CSoS)":[8],"is":[9,36,58,79,93,143,163,176],"key":[11],"step":[12],"to":[13,38,60,145,178],"win":[14],"confrontation.":[16],"However,":[17],"traditional":[18],"optimization":[19,34,149,170],"methods":[20],"usually":[21],"consume":[22],"fairly":[23],"time,":[24],"resulting":[25],"in":[26,28],"passivity":[27],"military":[29],"operations.":[30],"Therefore,":[31],"rapid":[33,148],"model":[35,61,127,132,175],"required":[37],"meet":[39],"the":[40,44,62,67,76,82,87,96,99,105,113,117,125,129,152,173],"rapidity":[41],"feature":[42],"information":[45],"war.":[46],"Firstly,":[47],"considering":[48],"connections":[49],"and":[50,72,112,140],"interactions":[51],"among":[52],"entities,":[54,86],"network-based":[56],"method":[57,171],"adopted":[59],"CSoS.":[63,155],"Secondly,":[64],"based":[65,102],"on":[66,103,151],"operation":[68],"loop":[69,111],"(OODA)":[70],"theory,":[71],"simultaneously,":[73],"given":[74],"that":[75],"connection":[77,88,106],"quality":[78],"affected":[80],"by":[81],"distance":[83],"two":[85,91,134,160],"probability":[89,107],"between":[90],"entities":[92],"calculated":[94],"as":[95],"assessment":[97,114],"edge":[100],"quality,":[101],"which,":[104],"an":[109,180],"OODA":[110],"result":[115],"whole":[118],"CSoS":[119],"can":[120],"be":[121],"obtained.":[122],"Thirdly,":[123],"with":[124,133,159,167,184],"evaluation":[126],"constructed,":[128],"Kriging":[130],"surrogate":[131,174],"steps":[135],"response":[137],"face":[138],"fitting":[139],"guided":[141],"optimizing":[142],"used":[144],"provide":[146],"strategy":[150],"Finally,":[156],"case":[158],"confront":[161],"parts":[162],"studied.":[164],"By":[165],"comparing":[166],"mature":[169],"DE,":[172],"proved":[177],"have":[179],"approximate":[181],"optimal":[182],"solution":[183],"shorter":[186],"time.":[187]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
