{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T05:29:37Z","timestamp":1734067777875,"version":"3.30.2"},"reference-count":13,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T00:00:00Z","timestamp":1728604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T00:00:00Z","timestamp":1728604800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,11]]},"DOI":"10.1109\/icceic64099.2024.10775765","type":"proceedings-article","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:21:58Z","timestamp":1733955718000},"page":"42-46","source":"Crossref","is-referenced-by-count":0,"title":["Research on the Impact Calculation of Penetrators on Typical Metal Protective Structures Based on Unity3D"],"prefix":"10.1109","author":[{"given":"Xiaokai","family":"Fei","sequence":"first","affiliation":[{"name":"School of Equipment Engineering, Shenyang University of Technology,Shenyang,Liaoning,China,110159"}]},{"given":"Hongzhi","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Equipment Engineering, Shenyang University of Technology,Shenyang,Liaoning,China,110159"}]},{"given":"Yan","family":"Cheng","sequence":"additional","affiliation":[{"name":"School of Equipment Engineering, Shenyang University of Technology,Shenyang,Liaoning,China,110159"}]},{"given":"Jia","family":"Tian","sequence":"additional","affiliation":[{"name":"School of Equipment Engineering, Shenyang University of Technology,Shenyang,Liaoning,China,110159"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/2486001.2486013"},{"volume-title":"The research on visual simulation of Damage Assessment of Large-caliber explosive grenades [D]","year":"2015","author":"Peng","key":"ref2"},{"issue":"06","key":"ref3","first-page":"274","article-title":"Target Vulnerability Analysis and Damage Assessment of Main Battle Tank[J]","volume":"29","author":"Guohui","year":"2009","journal-title":"Journal of Projectile Rockets Missiles and Guidance"},{"issue":"09","key":"ref4","first-page":"66","article-title":"A Method for Damage Evaluation of Fire Attack Schemes for Armored Targets[J]","volume":"47","author":"Mengyan","year":"2022","journal-title":"Fire Control & Command Control"},{"issue":"06","key":"ref5","first-page":"49","article-title":"Research on Visual Simulation of Airdefense Missile Fuze-warhead Coordination Based on Unity 3D[J]","volume":"41","author":"Dao","year":"2021","journal-title":"Journal of Projectiles Rockets Missiles and Guidance"},{"issue":"4","key":"ref6","first-page":"321","article-title":"The Role of Damage Assessment in Modern Military Strategy [J]","volume":"45","author":"Thompson","year":"2020","journal-title":"Military Strategy Journal"},{"issue":"2","key":"ref7","first-page":"78","article-title":"Utilizing Damage Assessment Tools for Unmanned Aerial Systems in Combat[J]","volume":"33","author":"Park","year":"2021","journal-title":"Military Tech Review"},{"key":"ref8","first-page":"7","article-title":"The Forward and adjoint monte carlo estimation of the kill probability of a critical component inside an armored vehicle by a burst of fragments","author":"Beverly","year":"1980","journal-title":"AD-A093503"},{"volume-title":"Vulnerability science: A taxonomy for the Vulnerabilit \/ Lethalit AnaKsis process ADA205536","year":"1922","author":"Starts","key":"ref9"},{"issue":"01","key":"ref10","first-page":"105","article-title":"Rapid Modeling Technique for Target Vulnerability Model of Armored Vehicle[J]","volume":"40","author":"Zhengang","year":"2020","journal-title":"Journal of Projectiles Rockets Missiles and Guidance"},{"volume-title":"Study on damage assessment of armouredcluster targets by Anti- armour submunitions [D]","year":"2022","author":"BX","key":"ref11"},{"issue":"S2","key":"ref12","first-page":"148","article-title":"Definition of Equivalent Surrogate Targets for Damage Analysis[J]","author":"Yulin","year":"2003","journal-title":"Journal of Projectile Rockets Missiles and Guidance"},{"key":"ref13","first-page":"426","volume-title":"Terminal Effects Studies [M]","author":"Shuyuan","year":"2020"}],"event":{"name":"2024 5th International Conference on Computer Engineering and Intelligent Control (ICCEIC)","start":{"date-parts":[[2024,10,11]]},"location":"Guangzhou, China","end":{"date-parts":[[2024,10,13]]}},"container-title":["2024 5th International Conference on Computer Engineering and Intelligent Control (ICCEIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10774577\/10775297\/10775765.pdf?arnumber=10775765","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:05:34Z","timestamp":1734030334000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10775765\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icceic64099.2024.10775765","relation":{},"subject":[],"published":{"date-parts":[[2024,10,11]]}}}