{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T22:40:33Z","timestamp":1767998433922,"version":"3.49.0"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2022]]},"DOI":"10.1109\/access.2022.3168718","type":"journal-article","created":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T20:13:24Z","timestamp":1650312804000},"page":"43738-43750","source":"Crossref","is-referenced-by-count":8,"title":["New Weapon Target Assignment Algorithms for Multiple Targets Using a Rotational Strategy and Clustering Approach"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8002-267X","authenticated-orcid":false,"given":"Ji-Eun","family":"Kim","sequence":"first","affiliation":[{"name":"Department of Industrial and Systems Engineering, Graduate School of Knowledge Service Engineering, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0758-1974","authenticated-orcid":false,"given":"Chang-Hun","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Aerospace Engineering, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1784-8983","authenticated-orcid":false,"given":"Mun Yong","family":"Yi","sequence":"additional","affiliation":[{"name":"Department of Industrial and Systems Engineering, Graduate School of Knowledge Service Engineering, Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.6.3.346"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5784\/23-2-54"},{"key":"ref3","article-title":"Preferential defense strategies. Part I: The static case","author":"Hosein","year":"1990"},{"key":"ref4","article-title":"Preferential defense strategies. Part II: The dynamic case","author":"Hosein","year":"1990"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2006.09.011"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2009.07.082"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1004-4132(06)60097-2"},{"key":"ref8","first-page":"1054","article-title":"Weapon allocation is NP complete","volume-title":"Proc. IEEE Summer Comput. Simulation Conf.","author":"Lloyd"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1287\/opre.14.6.992"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1155\/2011\/873292"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1070.0440"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S1568-4946(02)00027-3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WCICA.2016.7578704"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14429\/dsj.54.2054"},{"issue":"2","key":"ref15","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1023\/A:1022525529778","article-title":"A Tabu search heuristic for resource management in naval warfare","volume":"9","author":"Blodgett","year":"2003","journal-title":"J. Heuristics"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2049261"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2030163"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/2936279"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4674920"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICInfA.2013.6720273"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/9781119266235.ch5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.9766\/KIMST.2020.23.4.381"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2089511"},{"key":"ref24","first-page":"2346","article-title":"An estimation of distribution algorithm with efficient constructive repair\/improvement operator for the dynamic weapon-target assignment","volume-title":"Proc. 31st Chin. Control Conf.","author":"Xin"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2784187"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ChiCC.2015.7260033"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2011.2159591"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1287\/opre.7.2.258"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2014.2360823"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.5772\/53606"},{"issue":"4","key":"ref31","first-page":"53","article-title":"A heuristic algorithm for weapon target assignment and scheduling","volume":"24","author":"Uhm","year":"2019","journal-title":"Mil. Oper. Res."},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2231673"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2898874"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TAES.2019.2923331"},{"key":"ref35","volume-title":"National Air Defense: Challenges, Solution Profiles, and Technology Needs","author":"Evans","year":"2011"},{"key":"ref36","volume-title":"Missile Defense Review","year":"2019"},{"key":"ref37","volume-title":"Drone Swarms","year":"2017"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2955482"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139177801.004"},{"key":"ref40","article-title":"Greed is good: Near-optimal submodular maximization via greedy optimization","author":"Feldman","year":"2017","journal-title":"arXiv:1704.01652"},{"key":"ref41","article-title":"Fast submodular maximization subject to K-extendible system constraints","author":"Li","year":"2018","journal-title":"arXiv:1811.07673"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/nav.3800020109"},{"key":"ref44","first-page":"2382","article-title":"Weapon-target assignment problem with interference constraints using mixed-integer linear programming","volume-title":"Proc. Asia Pacific Int. Symp. Aerosp. Technol.","author":"Shin"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9668973\/09759430.pdf?arnumber=9759430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T21:06:47Z","timestamp":1705957607000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9759430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/access.2022.3168718","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]}}}