{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T04:08:47Z","timestamp":1747541327622,"version":"3.40.5"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/wsc.2014.7020131","type":"proceedings-article","created":{"date-parts":[[2015,1,27]],"date-time":"2015-01-27T15:30:56Z","timestamp":1422372656000},"page":"2907-2918","source":"Crossref","is-referenced-by-count":7,"title":["A dddams-based UAV and UGV team formation approach for surveillance and crowd control"],"prefix":"10.1109","author":[{"given":"Amirreza M.","family":"Khaleghi","sequence":"first","affiliation":[]},{"given":"Dong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Sara","family":"Minaeian","sequence":"additional","affiliation":[]},{"given":"Mingyang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yifei","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Young-Jun","family":"Son","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Vo","sequence":"additional","affiliation":[]},{"given":"Jyh-Ming","family":"Lien","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"A Comparative Study of Control Architectures in UAV\/UGV-Based Surveillance System","author":"khaleghi","year":"2014","journal-title":"Proceedings of the 2014 Industrial and Systems Engineering Research Conference"},{"journal-title":"The EM Algorithm and Extensions","year":"1996","author":"mclachlan","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1214\/09-SS053"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(98)00045-9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2006.878948"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176346060"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2009.5403123"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum Likelihood from Incomplete Data via the EM Algorithm","author":"dempster","year":"1977","journal-title":"Journal Royal Statistical Society B"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2006.1678135"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1177\/0278364904045564"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.07.039"},{"key":"ref7","article-title":"Homeland Security: Unmanned Aerial Vehicles and Border Surveillance","author":"haddal","year":"2010","journal-title":"Washington D C Congressional Research Service The Library of Congress"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2307\/2532201"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2006.806"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2013.6721530"}],"event":{"name":"2014 Winter Simulation Conference - (WSC 2014)","start":{"date-parts":[[2014,12,7]]},"location":"Savanah, GA, USA","end":{"date-parts":[[2014,12,10]]}},"container-title":["Proceedings of the Winter Simulation Conference 2014"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7002492\/7019868\/07020131.pdf?arnumber=7020131","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T21:21:38Z","timestamp":1747516898000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7020131\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wsc.2014.7020131","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}