{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:17:34Z","timestamp":1760141854779,"version":"build-2065373602"},"reference-count":5,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T00:00:00Z","timestamp":1758067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1109\/acit65614.2025.11185606","type":"proceedings-article","created":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:58Z","timestamp":1760032258000},"page":"70-74","source":"Crossref","is-referenced-by-count":0,"title":["Enhancement of the logic-probabilistic trajectory modelling method for calculating the probability of pairwise connectivity in an Electronic Ground Surveillance Complex"],"prefix":"10.1109","author":[{"given":"Leonid","family":"Ozirkovskyy","sequence":"first","affiliation":[{"name":"Lviv Polytechnic National University,Department of Software and Hardware Systems of Infocommunications,Lviv,Ukraine"}]},{"given":"Bohdan","family":"Volochiy","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Department of Software and Hardware Systems of Infocommunications,Lviv,Ukraine"}]},{"given":"Nazar","family":"Pryymak","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Department of Software and Hardware Systems of Infocommunications,Lviv,Ukraine"}]},{"given":"Yurii","family":"Zhuk","sequence":"additional","affiliation":[{"name":"Lviv Polytechnic National University,Department of Software and Hardware Systems of Infocommunications,Lviv,Ukraine"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/acit62333.2024.10712562"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.47839\/ijc.23.2.3533"},{"journal-title":"Reliability and Availability in Virtualized Networks: A Survey on Standards, Modelling Approaches, and Research Challenges","year":"2025","author":"Di Mauro","key":"ref3"},{"key":"ref4","first-page":"160","volume-title":"Applied Reliability Theory","author":"Golinkevich","year":"1977"},{"volume-title":"Fundamentals of Reliability Theory of Automatic Control Systems (in Russian)","year":"1984","author":"Glazunov","key":"ref5"}],"event":{"name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2025,9,17]]},"location":"Sibenik, Croatia","end":{"date-parts":[[2025,9,19]]}},"container-title":["2025 15th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11185059\/11185456\/11185606.pdf?arnumber=11185606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T05:22:50Z","timestamp":1760073770000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185606\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,17]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/acit65614.2025.11185606","relation":{},"subject":[],"published":{"date-parts":[[2025,9,17]]}}}