{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:52Z","timestamp":1750308832220,"version":"3.41.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319594620"},{"type":"electronic","value":"9783319594637"}],"license":[{"start":{"date-parts":[[2017,5,28]],"date-time":"2017-05-28T00:00:00Z","timestamp":1495929600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-59463-7_26","type":"book-chapter","created":{"date-parts":[[2017,5,27]],"date-time":"2017-05-27T02:26:44Z","timestamp":1495852004000},"page":"262-272","source":"Crossref","is-referenced-by-count":2,"title":["Target Recognition Method Based on Multi-class SVM and Evidence Theory"],"prefix":"10.1007","author":[{"given":"Wen","family":"Quan","sequence":"first","affiliation":[]},{"given":"Jian","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Maolin","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,28]]},"reference":[{"key":"26_CR1","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1504\/IJGUC.2009.027921","volume":"1","author":"S Pllana","year":"2009","unstructured":"Pllana, S., Benkner, S., Xhafa, F., Barolli, L.: A novel approach for hybrid performance modeling and prediction of large-scale computing systems. Int. J. Grid Util. Comput. 1, 316\u2013327 (2009)","journal-title":"Int. J. Grid Util. Comput."},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Bouaziz, R., Krichen, F., Coulette, B.: C-SCRIP: collaborative security pattern integration process. Int. J. Inform. Technol. Web Eng. 10, 31\u201346 (2015)","DOI":"10.4018\/IJITWE.2015010102"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Qu, D.C., Meng, X.W., Huang, J., He, Y.: Research of artificial neural network intelligent recognition technology assisted by Dempster Shafer evidence combination theory. In: 7th International Conference on Signal Processing, vol. 1, pp. 46\u201349 (2004)","DOI":"10.1109\/ICOSP.2004.1452577"},{"key":"26_CR4","unstructured":"Wang, M., Li, S., Mao, S.: Method of using neural network combined with D-S theory to carry out HRR target recognition, vol. 4. Beijing University of Aeronautics and Astronautics (2001)"},{"key":"26_CR5","unstructured":"Guo, H.: Approach to evidence combination based on fuzzy theory and its applications. Control Decis. 2 (2008)"},{"key":"26_CR6","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.3724\/SP.J.1016.2009.01229","volume":"32","author":"G-Y Wang","year":"2009","unstructured":"Wang, G.-Y., Yao, Y.-Y., Yu, H.: A survey on rough set theory and applications. Chin. J. Comput. 32, 1229\u20131240 (2009)","journal-title":"Chin. J. Comput."},{"key":"26_CR7","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1504\/IJSSC.2011.039109","volume":"1","author":"N Bssis","year":"2011","unstructured":"Bssis, N., Asimakopoulou, E., Xhafa, F.: A next generation emerging technologies roadmap for enabling collective computational intelligence in disaster management. Int. J. Space-Based Situated Comput. 1, 76\u201385 (2011)","journal-title":"Int. J. Space-Based Situated Comput."},{"key":"26_CR8","first-page":"10","volume":"32","author":"S Mu","year":"2008","unstructured":"Mu, S., Tian, S., Yin, C.: Multiple kernel learning based on cooperative clustering. J. Beijing Jiaotong Univ. 32, 10\u201313 (2008)","journal-title":"J. Beijing Jiaotong Univ."},{"key":"26_CR9","first-page":"1","volume":"10","author":"W Kun","year":"2015","unstructured":"Kun, W., Kang, J., Chi, K.: Research on fault diagnosis method using improved multi-class classification algorithm and relevance vector machine. Int. J. Inf. Technol. Web. Eng. 10, 1\u201316 (2015)","journal-title":"Int. J. Inf. Technol. Web. Eng."},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Lin, H.-C.K., Su, S.-H., Wang, S.-C.: Influence of cognitive style and cooperative learning on application of augmented reality to natural science learning. Int. J. Technol. Human Interact. 11, 41\u201366 (2015)","DOI":"10.4018\/IJTHI.2015100103"},{"key":"26_CR11","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1504\/IJGUC.2012.047758","volume":"3","author":"DV Bernardo","year":"2012","unstructured":"Bernardo, D.V., Hoang, D.B., Bernardo, D.V.: Multi-layer Security analysis and experimentation of high speed protocol data transfer for GRID. Int. J. Grid Util. Comput. 3, 81\u201388 (2012)","journal-title":"Int. J. Grid Util. Comput."},{"key":"26_CR12","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1109\/21.155943","volume":"22","author":"L Xu","year":"1992","unstructured":"Xu, L., Krzyzak, C., Suen, C.Y.: Methods of combining multiple classifiers and their applications to handwriting recognition. Trans. Syst. Man Cybern. 22, 418\u2013435 (1992)","journal-title":"Trans. Syst. Man Cybern."},{"key":"26_CR13","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1016\/0020-0255(82)90017-2","volume":"26","author":"SN Srihari","year":"1982","unstructured":"Srihari, S.N.: Reliability analysis of majority vote systems. Inf. Sci. 26, 243\u2013256 (1982)","journal-title":"Inf. Sci."},{"key":"26_CR14","volume-title":"Theory of Fuzzy Integrals and its Applications","author":"M Sugeno","year":"1974","unstructured":"Sugeno, M.: Theory of Fuzzy Integrals and its Applications. Tokyo Institute of Technology, Tokyo, Japan (1974)"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Hinton, G.E.: Products of experts. In: Proceedings of the Ninth International Conference on Artificial Neural Networks, Edinburgh, Scotland, pp. 1\u20136 (1999)","DOI":"10.1049\/cp:19991075"},{"key":"26_CR16","unstructured":"Li, Y., Cai, Y., Yin, R., Xu, X.: Support vector machine ensemble based on evidence theory for multi-class classification. J. Comput. Res. Dev., 45, 571\u2013578 (2008)"},{"key":"26_CR17","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1504\/IJSSC.2012.045563","volume":"2","author":"Z Li","year":"2012","unstructured":"Li, Z., O\u2019Brien, L., Zhang, H.: Circumstantial-evidence-based effort judgement for web service composition-based SOA implementations. Int. J. Space-Based Situated Comput. 2, 31\u201344 (2012)","journal-title":"Int. J. Space-Based Situated Comput."},{"key":"26_CR18","doi-asserted-by":"crossref","first-page":"48","DOI":"10.4018\/IJTHI.2016040104","volume":"12","author":"K Yang","year":"2016","unstructured":"Yang, K., Liu, S., Li, X., Wang, X.A.: D-S evidence theory based trust detection scheme in wireless sensor networks. Int. J. Technol. Hum. Interact. 12, 48\u201359 (2016)","journal-title":"Int. J. Technol. Hum. Interact."},{"key":"26_CR19","unstructured":"Zhang, X., Xiao, X., Xu, G.-Y.: Probabilistic outputs for support vector machines based on the maximum entropy estimation. Control Decis. 7, 767\u2013770 (2006)"},{"key":"26_CR20","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1023\/A:1012489924661","volume":"46","author":"P Sollich","year":"2002","unstructured":"Sollich, P.: Bayesian methods for support vector machines, evidence and predictive class probabilities. Mach. Learn. 46, 21\u201352 (2002)","journal-title":"Mach. Learn."},{"key":"26_CR21","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1109\/72.788642","volume":"10","author":"JTY Kwok","year":"1999","unstructured":"Kwok, J.T.Y.: Moderating the outputs of support vector machine classifiers. IEEE Trans. Neural Netw. 10, 1018\u20131031 (1999)","journal-title":"IEEE Trans. Neural Netw."},{"key":"26_CR22","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1214\/aos\/1028144844","volume":"26","author":"T Hastie","year":"1998","unstructured":"Hastie, T., Tibshirani, R.: Classification by pairwise coupling. Ann. Stat. 26, 451\u2013471 (1998)","journal-title":"Ann. Stat."},{"key":"26_CR23","volume-title":"Statistical Learning Theory","author":"V Vapnik","year":"1998","unstructured":"Vapnik, V.: Statistical Learning Theory. Wiley, New York (1998)"},{"key":"26_CR24","unstructured":"Platt John, C.: Probabilistic output for support vector machine and comparisons to regularized likelihood methods. In: Advances in Large Margin Classifier, pp. 1\u201311. MIT Press, Cambridge (1999)"},{"key":"26_CR25","unstructured":"Lin, H.T, Lin, C.J., Weng, R.C.: A Note on Platt\u2019s Probabilistic Outputs for Support Vector Machines. National Taiwan University, Taipei (2003)"},{"key":"26_CR26","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.neucom.2003.03.002","volume":"62","author":"A Madevska-Bogdanova","year":"2004","unstructured":"Madevska-Bogdanova, A., Nikolik, D., Curfs, L.: Probabilistic SVM outputs for pattern recognition using analytical geometry. Neurocomputing 62, 293\u2013303 (2004)","journal-title":"Neurocomputing"},{"key":"26_CR27","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1016\/j.neucom.2014.03.072","volume":"149","author":"Z Wang","year":"2015","unstructured":"Wang, Z., Zhao, Z., Weng, S., Zhang, C.: Solving one-class problem with outlier examples by SVM. Neurocomputing 149, 100\u2013105 (2015)","journal-title":"Neurocomputing"},{"key":"26_CR28","first-page":"1566","volume":"21","author":"H Zhou","year":"2008","unstructured":"Zhou, H., Li, S.: Combination of support vector machine and evidence theory in information fusion. Chinese J. Sens. Actuators 21, 1566\u20131570 (2008)","journal-title":"Chinese J. Sens. Actuators"},{"key":"26_CR29","doi-asserted-by":"crossref","unstructured":"Liu, W.: Analyzing the degree of conflict among belief functions. Artif. Intell. 170, 909\u2013924 (2006)","DOI":"10.1016\/j.artint.2006.05.002"},{"key":"26_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0167-9236(99)00084-6","volume":"29","author":"CK Murphy","year":"2000","unstructured":"Murphy, C.K.: Combining belief functions when evidence conflicts. Decis. Support Syst. 29, 1\u20139 (2000). Elsevier Publisher","journal-title":"Decis. Support Syst."},{"key":"26_CR31","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1109\/34.58871","volume":"12","author":"LK Hansen","year":"1990","unstructured":"Hansen, L.K., Salamon, P.: Neural network ensembles. IEEE Trans. Pattern Anal. Mach. Intell. 12, 993\u20131001 (1990)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internetworking, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59463-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:36:05Z","timestamp":1750278965000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59463-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,28]]},"ISBN":["9783319594620","9783319594637"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59463-7_26","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,5,28]]}}}