{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T17:47:14Z","timestamp":1744825634005,"version":"3.28.0"},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers and Electrical Engineering"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1016\/j.compeleceng.2024.109378","type":"journal-article","created":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T09:34:27Z","timestamp":1719221667000},"page":"109378","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"PA","title":["Target assignment for multiple stages of weapons systems using a deep Q-learning network and a modified artificial bee colony method"],"prefix":"10.1016","volume":"118","author":[{"given":"Xiaochen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2024.109378_bib0001","article-title":"The weapon target assignment problem: rational inference of adversary target utility valuations from observed solutions","volume":"107","author":"Hughes","year":"2022","journal-title":"Omega (Westport)"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0002","first-page":"1","article-title":"Impact analysis of platform positioning and orientation error on warship weapon target strike","author":"Fengduan","year":"2021","journal-title":"Evol Intell"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0003","doi-asserted-by":"crossref","first-page":"43738","DOI":"10.1109\/ACCESS.2022.3168718","article-title":"New weapon target assignment algorithms for multiple targets using a rotational strategy and clustering approach","volume":"10","author":"Kim","year":"2022","journal-title":"IEEE Access"},{"issue":"7","key":"10.1016\/j.compeleceng.2024.109378_bib0004","doi-asserted-by":"crossref","first-page":"4426","DOI":"10.1109\/TSMC.2021.3096997","article-title":"Learning-based policy optimization for adversarial missile-target assignment","volume":"52","author":"Luo","year":"2021","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0005","doi-asserted-by":"crossref","first-page":"139668","DOI":"10.1109\/ACCESS.2021.3119363","article-title":"A novel elitism co-evolutionary algorithm for antagonistic weapon-target assignment","volume":"9","author":"Huang","year":"2021","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.compeleceng.2024.109378_bib0006","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1016\/j.ifacol.2022.05.033","article-title":"Adaptive grouping weapon-target assignment with field-of-view angle constraint","volume":"55","author":"HuangFu","year":"2022","journal-title":"IFAC-PapersOnLine"},{"issue":"9","key":"10.1016\/j.compeleceng.2024.109378_bib0007","doi-asserted-by":"crossref","first-page":"3787","DOI":"10.1016\/j.asr.2023.07.027","article-title":"Swarms of modular satellites decentralized guidance and target assignment strategy","volume":"72","author":"Lu","year":"2023","journal-title":"Adv Space Res"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0008","first-page":"1","article-title":"Weapon-Target assignment and firing scheduling for rapid engagement with heterogeneous interceptors","author":"Park","year":"2023","journal-title":"Int J Aeronaut Space Sci"},{"issue":"2","key":"10.1016\/j.compeleceng.2024.109378_bib0009","doi-asserted-by":"crossref","first-page":"581","DOI":"10.1007\/s10479-022-04525-6","article-title":"Weapon-target assignment problem: exact and approximate solution algorithms","volume":"312","author":"Andersen","year":"2022","journal-title":"Ann Oper Res"},{"issue":"1","key":"10.1016\/j.compeleceng.2024.109378_bib0010","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.jer.2023.11.021","article-title":"War game problem considering the mobility of weapons and targets","volume":"12","author":"Shamami","year":"2023","journal-title":"J Eng Res"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0011","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2022.108426","article-title":"Multi-swarm-based cooperative reconfiguration model for resilient unmanned weapon system-of-systems","volume":"222","author":"Sun","year":"2022","journal-title":"Reliab Eng Syst Saf"},{"issue":"7","key":"10.1016\/j.compeleceng.2024.109378_bib0012","doi-asserted-by":"crossref","first-page":"1219","DOI":"10.1016\/j.dt.2021.03.007","article-title":"Close-in weapon system planning based on multi-living agent theory","volume":"18","author":"Tang","year":"2022","journal-title":"Def Technol"},{"issue":"1","key":"10.1016\/j.compeleceng.2024.109378_bib0013","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s11023-020-09532-9","article-title":"Accountability and control over autonomous weapon systems: a framework for comprehensive human oversight","volume":"31","author":"Verdiesen","year":"2021","journal-title":"Minds Mach"},{"issue":"3","key":"10.1016\/j.compeleceng.2024.109378_bib0014","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1631\/FITEE.1900649","article-title":"Method for process-based modeling of combat scenarios using interaction analysis weapon systems","volume":"22","author":"Jeong","year":"2021","journal-title":"Frontiers of Information Technology & Electronic Engineering"},{"issue":"3","key":"10.1016\/j.compeleceng.2024.109378_bib0015","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1007\/s43681-022-00211-2","article-title":"Value elicitation on a scenario of autonomous weapon system deployment: a qualitative study based on the value deliberation process","volume":"3","author":"Verdiesen","year":"2023","journal-title":"AI Ethics"},{"issue":"1","key":"10.1016\/j.compeleceng.2024.109378_bib0016","doi-asserted-by":"crossref","first-page":"19370","DOI":"10.1038\/s41598-023-46660-5","article-title":"Research on the construction of weaponry indicator system and intelligent evaluation methods","volume":"13","author":"Wang","year":"2023","journal-title":"Sci Rep"},{"issue":"4","key":"10.1016\/j.compeleceng.2024.109378_bib0017","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.23919\/JSEE.2022.000097","article-title":"Firepower distribution method of anti-ship missile based on coupled path planning","volume":"33","author":"Liu","year":"2022","journal-title":"J Syst Eng Electron"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0018","doi-asserted-by":"crossref","first-page":"71832","DOI":"10.1109\/ACCESS.2021.3079152","article-title":"A modified MOEA\/D algorithm for solving bi-objective multi-stage weapon-target assignment problem","volume":"9","author":"Wu","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0019","doi-asserted-by":"crossref","first-page":"72210","DOI":"10.1109\/ACCESS.2019.2919794","article-title":"Adaptive weapon-to-target assignment model based on the real-time prediction of hit probability","volume":"7","author":"Jang","year":"2019","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.compeleceng.2024.109378_bib0020","doi-asserted-by":"crossref","first-page":"1007","DOI":"10.23919\/JSEE.2023.000102","article-title":"Shuffled frog leaping algorithm with non-dominated sorting for dynamic weapon-target assignment","volume":"34","author":"Zhao","year":"2023","journal-title":"J Syst Eng Electron"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0021","doi-asserted-by":"crossref","first-page":"113740","DOI":"10.1109\/ACCESS.2023.3324193","article-title":"Weapon-Target assignment strategy in joint combat decision-making based on multi-head deep reinforcement learning","volume":"11","author":"Li","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0022","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2023.106668","article-title":"A quantum algorithm for solving weapon target assignment problem","volume":"125","author":"Acar","year":"2023","journal-title":"Eng Appl Artif Intell"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0023","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2023.109303","article-title":"Adaptive large neighborhood search algorithm for multi-stage weapon target assignment problem","volume":"181","author":"Chang","year":"2023","journal-title":"Comput Ind Eng"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0024","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2022.105612","article-title":"Unmanned ground weapon target assignment based on deep Q-learning network with an improved multi-objective artificial bee colony algorithm","volume":"117","author":"Wang","year":"2023","journal-title":"Eng Appl Artif Intell"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0025","first-page":"1","article-title":"Bi-objective dynamic weapon-target assignment problem with stability measure","author":"Silav","year":"2022","journal-title":"Ann Oper Res"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0026","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11704-021-0395-8","article-title":"Weapon-target assignment in unreliable peer-to-peer architecture based on adapted artificial bee colony algorithm","volume":"16","author":"Liu","year":"2022","journal-title":"Front Comput Sci"},{"issue":"1","key":"10.1016\/j.compeleceng.2024.109378_bib0027","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1007\/s44196-023-00243-4","article-title":"Weapon\u2013Target assignment using a whale optimization algorithm","volume":"16","author":"Zhang","year":"2023","journal-title":"Int J Comput Intell Syst"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0028","doi-asserted-by":"crossref","DOI":"10.1016\/j.cie.2021.107717","article-title":"Two-stage hybrid heuristic search algorithm for novel weapon target assignment problems","volume":"162","author":"Ma","year":"2021","journal-title":"Comput Ind Eng"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0029","doi-asserted-by":"crossref","first-page":"129623","DOI":"10.1109\/ACCESS.2023.3332513","article-title":"A time-driven dynamic weapon target assignment method","volume":"11","author":"Liu","year":"2023","journal-title":"IEEE Access"},{"key":"10.1016\/j.compeleceng.2024.109378_bib0030","article-title":"A new exact algorithm for the weapon-target assignment problem","volume":"98","author":"Lu","year":"2021","journal-title":"Omega (Westport)"}],"container-title":["Computers and Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790624003069?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790624003069?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T07:48:10Z","timestamp":1731397690000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790624003069"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":30,"alternative-id":["S0045790624003069"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109378","relation":{},"ISSN":["0045-7906"],"issn-type":[{"type":"print","value":"0045-7906"}],"subject":[],"published":{"date-parts":[[2024,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Target assignment for multiple stages of weapons systems using a deep Q-learning network and a modified artificial bee colony method","name":"articletitle","label":"Article Title"},{"value":"Computers and Electrical Engineering","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109378","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"109378"}}