{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T20:01:12Z","timestamp":1768593672819,"version":"3.49.0"},"reference-count":14,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1997,9,1]],"date-time":"1997-09-01T00:00:00Z","timestamp":873072000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Fuzzy Sets and Systems"],"published-print":{"date-parts":[[1997,9]]},"DOI":"10.1016\/s0165-0114(96)00125-x","type":"journal-article","created":{"date-parts":[[2003,4,5]],"date-time":"2003-04-05T01:00:31Z","timestamp":1049504431000},"page":"307-316","source":"Crossref","is-referenced-by-count":78,"title":["Fuzzy system reliability analysis by the use of T\u03c9 (the weakest t-norm) on fuzzy number arithmetic operations"],"prefix":"10.1016","volume":"90","author":[{"family":"Dug Hun Hong","sequence":"first","affiliation":[]},{"family":"Hae Young Do","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0165-0114(96)00125-X_BIB1","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/0951-8320(91)90030-B","article-title":"Fuzzy reliability modeling of gracefully degradable computing systems","volume":"33","author":"Cai","year":"1991","journal-title":"Reliability Eng. Systems Safety"},{"key":"10.1016\/S0165-0114(96)00125-X_BIB2","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/0165-0114(91)90143-E","article-title":"Fuzzy variables as a basis for a theory of fuzzy reliability in the possibility context","volume":"42","author":"Cai","year":"1991","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(96)00125-X_BIB3","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/0165-0114(91)90018-L","article-title":"Posbist reliability behavior of typical systems with two types of failure","volume":"43","author":"Cai","year":"1991","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(96)00125-X_BIB4","doi-asserted-by":"crossref","first-page":"2253","DOI":"10.1016\/0026-2714(93)90065-7","article-title":"Fuzzy states as a basis for a theory of fuzzy reliability","volume":"33","author":"Cai","year":"1993","journal-title":"Microelectron Reliability"},{"key":"10.1016\/S0165-0114(96)00125-X_BIB5","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/0165-0114(94)90004-3","article-title":"Fuzzy system reliability analysis using fuzzy number arithmetic operations","volume":"64","author":"Chen","year":"1994","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(96)00125-X_BIB6","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1016\/0165-0114(93)90182-H","article-title":"Fuzzy system reliability analysis by interval of confidence","volume":"56","author":"Cheng","year":"1993","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(96)00125-X_BIB7","series-title":"Fuzzy Mathematical Models in Engineering and Management Science","author":"Kaufmann","year":"1988"},{"key":"10.1016\/S0165-0114(96)00125-X_BIB8","series-title":"Introduction to Fuzzy Arithmetic Theory and Applications","author":"Kaufmann","year":"1991"},{"key":"10.1016\/S0165-0114(96)00125-X_BIB9","unstructured":"A. Koles\u00e1rov\u00e1, Additive preserving the linearity of fuzzy intervals, to appear in Tetra Mountains Math. Publ."},{"key":"10.1016\/S0165-0114(96)00125-X_BIB10","doi-asserted-by":"crossref","first-page":"189","DOI":"10.5486\/PMD.1965.12.1-4.19","article-title":"Representation of associative functions","volume":"12","author":"Ling","year":"1965","journal-title":"Publ. Math. Debrecen"},{"key":"10.1016\/S0165-0114(96)00125-X_BIB11","unstructured":"R. Mesiar, Shape preserving additions of fuzzy intervals, to appear in Fuzzy Sets and Systems."},{"key":"10.1016\/S0165-0114(96)00125-X_BIB12","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/0165-0114(94)90330-1","article-title":"Fuzzy system reliability analysis for components with different membership functions","volume":"64","author":"Mon","year":"1994","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(96)00125-X_BIB13","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/0165-0114(90)90154-X","article-title":"A fuzzy set approach to fault tree and reliability analysis","volume":"34","author":"Singer","year":"1990","journal-title":"Fuzzy Sets and Systems"},{"key":"10.1016\/S0165-0114(96)00125-X_BIB14","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Inform. and Control"}],"container-title":["Fuzzy Sets and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016501149600125X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S016501149600125X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,9]],"date-time":"2023-04-09T14:10:51Z","timestamp":1681049451000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S016501149600125X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,9]]},"references-count":14,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1997,9]]}},"alternative-id":["S016501149600125X"],"URL":"https:\/\/doi.org\/10.1016\/s0165-0114(96)00125-x","relation":{},"ISSN":["0165-0114"],"issn-type":[{"value":"0165-0114","type":"print"}],"subject":[],"published":{"date-parts":[[1997,9]]}}}