{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T09:14:14Z","timestamp":1775121254564,"version":"3.50.1"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T00:00:00Z","timestamp":1451865600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"the Nature Science Foundation of China","award":["41404022"],"award-info":[{"award-number":["41404022"]}]},{"name":"the Nature Science Foundation of Shannxi Province","award":["2015JM4128"],"award-info":[{"award-number":["2015JM4128"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1186\/s13638-015-0498-8","type":"journal-article","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T07:43:31Z","timestamp":1451893411000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":110,"title":["Modeling and analyzing interference signal in a complex electromagnetic environment"],"prefix":"10.1186","volume":"2016","author":[{"given":"Chun-tong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Rong-jing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhen-xin","family":"He","sequence":"additional","affiliation":[]},{"given":"Xiao-feng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hong-cai","family":"Li","sequence":"additional","affiliation":[]},{"given":"Peng-zhi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,4]]},"reference":[{"issue":"10","key":"498_CR1","first-page":"1738","volume":"27","author":"B Gao","year":"2005","unstructured":"B Gao, S Lv, J Zhao, Implementation of effectiveness evaluation simulation system for ECM. Syst. Eng. Electron 27(10), 1738\u20131739 (2005)","journal-title":"Syst. Eng. Electron"},{"key":"498_CR2","volume-title":"Research on Complicated Electromagnetic Environment and Its Applications for Launch Mission","author":"Z Li","year":"2009","unstructured":"Z Li, Research on Complicated Electromagnetic Environment and Its Applications for Launch Mission (Chinese Academy of Sciences, China, 2009)"},{"key":"498_CR3","volume-title":"Principle of Radar Electronic Warfare","author":"Y Zhang","year":"2006","unstructured":"Y Zhang, N Tong, G Zhao, Principle of Radar Electronic Warfare (National Defense Industry Press, Beijing, 2006)"},{"issue":"2","key":"498_CR4","first-page":"160","volume":"4","author":"J Su","year":"2014","unstructured":"J Su, Z Song, Q Fu et al., Joint tracking method for the unresolved decoy and target with monopulse radar. J. Radars 4(2), 160\u2013161 (2014)","journal-title":"J. Radars"},{"key":"498_CR5","first-page":"49","volume":"10","author":"B Tao","year":"1993","unstructured":"B Tao, An ECCM model and the technical development trends to the demands of the future EW combat. Syst. Eng. Electron 10, 49\u201350 (1993)","journal-title":"Syst. Eng. Electron"},{"key":"498_CR6","volume-title":"Modeling and Simulation of Radar Electronic Jamming","author":"F Ji","year":"2013","unstructured":"F Ji, Modeling and Simulation of Radar Electronic Jamming (Dalian University of Technology, China, 2013)"},{"key":"498_CR7","volume-title":"Principle of Radar Countermeasure","author":"G Zhao","year":"2005","unstructured":"G Zhao, Principle of Radar Countermeasure (Xidian University Press, Xi\u2019an, 2005)"},{"issue":"4","key":"498_CR8","first-page":"997","volume":"20","author":"X Shen","year":"2008","unstructured":"X Shen, G Wang, L Wang et al., Effect evaluation for electronic jamming aircraft against netted surveillance radars. Syst. Simul 20(4), 997\u20131001 (2008)","journal-title":"Syst. Simul"},{"key":"498_CR9","volume-title":"Chaff Jamming Principle","author":"J Chen","year":"2007","unstructured":"J Chen, Chaff Jamming Principle (National Defense Industry Press, Beijing, 2007)"},{"issue":"2","key":"498_CR10","first-page":"68","volume":"22","author":"Y Chen","year":"2000","unstructured":"Y Chen, G Shao, S Zhang et al., Study on the key techniques in a simulation system of synthetic EW. Syst. Eng. Electron 22(2), 68\u201369 (2000)","journal-title":"Syst. Eng. Electron"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0498-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-015-0498-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0498-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0498-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T12:07:47Z","timestamp":1553602067000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-015-0498-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,4]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["498"],"URL":"https:\/\/doi.org\/10.1186\/s13638-015-0498-8","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,4]]},"article-number":"1"}}