{"id":"https://openalex.org/W2892565315","doi":"https://doi.org/10.3233/978-1-61499-785-6-8","title":"A Preprocessing Algorithm Before Conflict Detection Based on Hybrid Surveillance","display_name":"A Preprocessing Algorithm Before Conflict Detection Based on Hybrid Surveillance","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2892565315","doi":"https://doi.org/10.3233/978-1-61499-785-6-8","mag":"2892565315"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-61499-785-6-8","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-785-6-8","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100383184","display_name":"Y\u00fcbo Wang","orcid":"https://orcid.org/0000-0002-2708-3526"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wang Yu-bo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100629362","display_name":"Haijun Wang","orcid":"https://orcid.org/0000-0003-2481-9662"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang Hai-jun","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Jiao Wei-dong","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jiao Wei-dong","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073712929","display_name":"Bo Zhou","orcid":"https://orcid.org/0000-0003-2746-350X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhou Bo","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Shen Xiao-yun","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shen Xiao-yun","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100383184"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.26672535,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"8","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7975999712944031,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7975999712944031,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.7973730564117432},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6229222416877747},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.41138195991516113},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.40848231315612793},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3795396089553833},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33538123965263367},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.33093327283859253}],"concepts":[{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.7973730564117432},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6229222416877747},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.41138195991516113},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.40848231315612793},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3795396089553833},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33538123965263367},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.33093327283859253}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3233/978-1-61499-785-6-8","is_oa":false,"landing_page_url":"https://doi.org/10.3233/978-1-61499-785-6-8","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},{"id":"mag:2892565315","is_oa":false,"landing_page_url":"https://dblp.uni-trier.de/db/conf/itits/itits2017.html#WangWJZS17","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/13","score":0.5600000023841858,"display_name":"Climate action"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2989490741","https://openalex.org/W3092506759","https://openalex.org/W2367545121","https://openalex.org/W4248881655","https://openalex.org/W2482165163","https://openalex.org/W3010890513","https://openalex.org/W120741642","https://openalex.org/W138569904","https://openalex.org/W2390914021","https://openalex.org/W2952736244"],"abstract_inverted_index":{"The":[0,131,146],"probability":[1],"of":[2,8,11,16,31,47,69,87,120,140,157],"flight":[3,12,17],"conflict":[4,38,88],"is":[5,124,149],"increased":[6],"because":[7],"the":[9,20,44,60,73,85,98,116,121,155],"increasing":[10],"flow":[13],"and":[14,59,107,118,151],"uncertainty":[15],"route.":[18],"Considering":[19],"problem":[21],"that":[22,101,135],"redundant":[23],"operation":[24],"which":[25],"caused":[26],"by":[27,66,126],"a":[28],"large":[29],"number":[30],"non-related":[32],"targets.":[33],"A":[34],"preprocessing":[35],"algorithm":[36,123,148],"before":[37],"detection":[39],"was":[40,64,94],"proposed.":[41],"Aircrafts":[42],"within":[43],"surveillance":[45],"scope":[46],"Automatic":[48],"Dependent":[49],"Surveillance-Broadcast":[50],"(ADS-B)":[51],"IN":[52],"were":[53,76,82],"divided":[54],"into":[55],"26":[56],"different":[57],"regions,":[58],"correlation":[61,156],"between":[62],"targets":[63,75,93],"distinguished":[65],"special":[67],"rule":[68],"each":[70],"region.":[71],"Then":[72],"correlated":[74],"further":[77],"processed,":[78],"but":[79,111],"uncorrelated":[80],"ones":[81],"blocked.":[83,145],"So":[84],"calculation":[86],"analysis":[89],"for":[90,153],"surveilling":[91],"surrounding":[92],"decreased.":[95],"Above":[96],"all,":[97],"processing":[99],"principle":[100],"security":[102],"first":[103],"should":[104],"be":[105],"followed,":[106],"rather":[108],"false":[109],"alarm":[110],"never":[112],"leakage":[113],"alarm.":[114],"Finally,":[115],"necessity":[117],"validity":[119],"proposed":[122,147],"examined":[125],"using":[127],"Monte":[128],"Carlo":[129],"experiment.":[130],"simulation":[132],"results":[133],"show":[134],"not":[136],"less":[137],"than":[138],"30%":[139],"30":[141],"random":[142],"objects":[143],"are":[144],"effective":[150],"accurate":[152],"detecting":[154],"them.":[158]},"counts_by_year":[],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
