{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T06:28:22Z","timestamp":1762410502166,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/cisda.2014.7035622","type":"proceedings-article","created":{"date-parts":[[2015,2,11]],"date-time":"2015-02-11T17:27:28Z","timestamp":1423675648000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Effects of the cookie cutter function shapes on Monte Carlo simulations of weapon effectiveness"],"prefix":"10.1109","author":[{"given":"Pawat","family":"Chusilp","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weerawut","family":"Charubhun","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Otsin","family":"Nilubol","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","first-page":"67","article-title":"Comparison of lethal zone characteristics of several natural fragmenting warheads","volume":"5","author":"zecevic","year":"2008","journal-title":"Central European Journal of Energetic Materials"},{"key":"17","article-title":"Using a Rayleigh-based circular lethality coverage for naval surface fire support","author":"kim","year":"2002","journal-title":"Industrial Engineering Research Conference"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1177\/1548512913484400"},{"year":"1996","key":"15"},{"key":"16","article-title":"A comparison of damage functions for use in artillery effectiveness codes","author":"klopcic","year":"1990","journal-title":"BRL-MR-3823 Ballistic Research Laboratory Aberdeen Proving Ground"},{"journal-title":"Generalized Weapon Effectiveness Modeling","year":"2004","author":"anderson","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.14429\/dsj.58.1702"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.21236\/ADA423541","author":"driels","year":"2004","journal-title":"Determining the Number of Iterations for Monte Carlo Simulation of Weapon Effectiveness"},{"journal-title":"Simulation and the Monte Carlo Method","year":"2008","author":"rubinstein","key":"12"},{"journal-title":"Computer Graphics Principles and Practice","year":"1995","author":"foley","key":"21"},{"key":"20","article-title":"Analysis of terminal effectiveness for several types of HE projectiles and impact angles using coupled numerical-CAD technique","author":"catovic","year":"2009","journal-title":"12th Seminar on New Trends in Research of Energetic Materials"},{"journal-title":"Experimental Design","year":"1995","author":"kirk","key":"22"},{"journal-title":"Statistical Power Analysis for the Behavioral Sciences","year":"1988","author":"cohen","key":"23"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1002\/0471749214","author":"fogel","year":"2005","journal-title":"Evolutionary Computation Toward a New Philosophy of Machine Intelligence"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2010.939578"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.21236\/AD0675401","author":"breaux","year":"1968","journal-title":"Computational Procedure for the Coverage Problem for Multiple Shots"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1287\/opre.14.6.1014"},{"journal-title":"Weaponeering Conventional Weapon System Effectiveness","year":"2013","author":"driels","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.2307\/2312184"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.21236\/ADA953517","author":"eckler","year":"1972","journal-title":"Mathematical Models of Target Coverage and Missile Allocation"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1287\/opre.19.3.655"},{"journal-title":"A Review of Literature on the Theory of Hit and Kill Probabilities","year":"1970","author":"denney","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1287\/opre.16.5.1021"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.2514\/4.862137"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1287\/opre.24.3.586"}],"event":{"name":"2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2014,12,14]]},"location":"Cau Giay, Vietnam","end":{"date-parts":[[2014,12,17]]}},"container-title":["the 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7010459\/7035614\/07035622.pdf?arnumber=7035622","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T05:02:47Z","timestamp":1691211767000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7035622\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/cisda.2014.7035622","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}