{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:27:57Z","timestamp":1740101277874,"version":"3.37.3"},"reference-count":14,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T00:00:00Z","timestamp":1670630400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,10]],"date-time":"2022-12-10T00:00:00Z","timestamp":1670630400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,12,10]]},"DOI":"10.1109\/icsai57119.2022.10005539","type":"proceedings-article","created":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T21:28:16Z","timestamp":1673299696000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Multi-target Threat Assessment Method Based on An Effective Reduction Method"],"prefix":"10.1109","author":[{"given":"Yang","family":"Gao","sequence":"first","affiliation":[{"name":"Air Force Engineering University,Information and Navigation College,Xi&#x2019;an,China"}]},{"given":"Na","family":"Lv","sequence":"additional","affiliation":[{"name":"Air Force Engineering University,Information and Navigation College,Xi&#x2019;an,China"}]}],"member":"263","reference":[{"key":"ref1","first-page":"172180","article-title":"Target threat assessment model based on M-ANFIS-PNN","volume":"44","author":"Yu","year":"2022","journal-title":"Systems Engineering and Electronics"},{"key":"ref2","first-page":"542","article-title":"Multi-target threat assessment method based on VIKOR under intuitionistic fuzzy information","volume":"49","author":"Gao","year":"2021","journal-title":"Acta Electronica Sinica"},{"key":"ref3","first-page":"108","article-title":"Air target threat assessment based on intuitionistic fuzzy analytic hierarchy process","volume":"41","author":"Xiao","year":"2019","journal-title":"Journal of Detection Control"},{"key":"ref4","first-page":"82","article-title":"Threat assessment of target recognition system based on interval number sequencing","volume":"37","author":"Gao","year":"2015","journal-title":"Journal of Detection and Control"},{"key":"ref5","first-page":"39","article-title":"Threat assessment of target recognition system based on combination weight","volume":"41","author":"Gao","year":"2016","journal-title":"Fire Control & Command Control"},{"key":"ref6","first-page":"154","article-title":"Intuitionistic fuzzy threat assessment for cooperative target recognition system","volume":"36","author":"Gao","year":"2016","journal-title":"Journal of Missiles, Arrows and Guidance"},{"key":"ref7","first-page":"859","article-title":"Relative threat assessment model based on ANP index weight","volume-title":"Proceedings of the 3th China Command and Control Conference","volume":"7","author":"Gao"},{"key":"ref8","first-page":"189","article-title":"Research on Multi-target threat Assessment","volume-title":"Proceedings of the 4th China Command and Control Conference","volume":"7","author":"Gao"},{"key":"ref9","first-page":"857","article-title":"Threat evaluation method of targets situation based on eclectic variable weight","volume-title":"Proceedings of the 6th China Command and Control Congress","volume":"7","author":"Gao"},{"key":"ref10","first-page":"66","article-title":"Flight target prediction method Combined with grey model and neural network","volume":"9","author":"Pan","year":"2018","journal-title":"Command Information System and Technology"},{"key":"ref11","first-page":"29","article-title":"Research of Aerial Target Threat AssessmentBased on Fuzzy Dynamic Bayesian Network","volume":"44","author":"Yang","year":"2019","journal-title":"Fire Control Command Control"},{"key":"ref12","first-page":"288","article-title":"LSS Targets Threat Assessment Method Based on Bayesian Network","volume":"5","author":"Xin","year":"2019","journal-title":"Journal of command and control"},{"key":"ref13","first-page":"46","article-title":"Design and implementation of ANP analysis tool based on Analytic Network Process","volume":"48","author":"Fan","year":"2020","journal-title":"Computer & Digital Engineering"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2020.11.004"}],"event":{"name":"2022 8th International Conference on Systems and Informatics (ICSAI)","start":{"date-parts":[[2022,12,10]]},"location":"Kunming, China","end":{"date-parts":[[2022,12,12]]}},"container-title":["2022 8th International Conference on Systems and Informatics (ICSAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10005314\/10005319\/10005539.pdf?arnumber=10005539","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T09:27:46Z","timestamp":1707470866000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10005539\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/icsai57119.2022.10005539","relation":{},"subject":[],"published":{"date-parts":[[2022,12,10]]}}}