{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:50:47Z","timestamp":1730281847392,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,7]]},"DOI":"10.1109\/meco55406.2022.9797148","type":"proceedings-article","created":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T19:47:45Z","timestamp":1655840865000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["A Survey of Some Important Algorithms Used in Military Applications"],"prefix":"10.1109","author":[{"given":"I.","family":"Capuni","sequence":"first","affiliation":[{"name":"Barleti University,Tirana,Albania"}]},{"given":"V.","family":"Milutinovic","sequence":"additional","affiliation":[{"name":"University of Indiana,Bloomington,IN,USA"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/s11554-020-00952-5"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"55","DOI":"10.3724\/SP.J.2096-5796.2018.0008","article-title":"A survey on image and video stitching","volume":"1","author":"wei","year":"2019","journal-title":"Virtual Reality Intell Hardw"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.3390\/electronics10050627"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/CVPR.2016.91"},{"key":"ref14","first-page":"1","article-title":"Support vector machine for network intrusion and cyber-attack detection","author":"kinan","year":"0","journal-title":"2017 Sensor Signal Processing for Defence Conference (SSPD)"},{"key":"ref15","first-page":"1","article-title":"Performance of adaboost classifier in recognition of superposed modulations for mimo twrc with physical-layer network coding","author":"chikha","year":"0","journal-title":"2017 25th International Conference on Software Telecommunications and Computer Networks (SoftCOM)"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-319-16229-4"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/MC.1987.1663597"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/2447976.2447989"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/MM.1994.363067"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.5711\/morj.14.2.19"},{"key":"ref3","article-title":"A survey of selected algorithms used in military applications from the viewpoints of dataflow and gaas","author":"capuni","year":"2021","journal-title":"ArXiv Preprint"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1177\/1548512910364390","article-title":"Two-stage stochastic optimization for the allocation of medical assets in steady-state combat operations","volume":"7","author":"lawrence","year":"2010","journal-title":"The Journal of Defense Modeling and Simulation"},{"key":"ref5","first-page":"738","article-title":"Solving the army's cyber workforce planning problem using stochastic optimization and discrete-event simulation modeling","author":"nathaniel","year":"0","journal-title":"2019 Winter Simulation Conference (WSC)"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.15607\/RSS.2019.XV.003"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/BF01386316"},{"key":"ref2","first-page":"1","article-title":"The best method for presentation of research results","author":"milutinovic","year":"1996","journal-title":"IEEE TCCA Newsletter"},{"key":"ref1","first-page":"1","article-title":"The ultimate dataflow for ultimate supercomputers-on-a-chip, for scientific computing, geo physics, complex mathematics, and information processing","author":"milutinovi?","year":"0","journal-title":"2021 10th Mediterranean Conference on Embedded Computing (MECO)"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/SIU.2012.6204585"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/MC.1986.1663062"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TC.1987.1676964"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/12.16503"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/MC.1986.1663177"}],"event":{"name":"2022 11th Mediterranean Conference on Embedded Computing (MECO)","start":{"date-parts":[[2022,6,7]]},"location":"Budva, Montenegro","end":{"date-parts":[[2022,6,10]]}},"container-title":["2022 11th Mediterranean Conference on Embedded Computing (MECO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9797068\/9797069\/09797148.pdf?arnumber=9797148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,11]],"date-time":"2022-07-11T19:58:53Z","timestamp":1657569533000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9797148\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/meco55406.2022.9797148","relation":{},"subject":[],"published":{"date-parts":[[2022,6,7]]}}}