{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T09:45:25Z","timestamp":1768297525393,"version":"3.49.0"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,1,19]],"date-time":"2018-01-19T00:00:00Z","timestamp":1516320000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771154,61301095"],"award-info":[{"award-number":["61771154,61301095"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Development Program of Basic Research of China","award":["JCKY2013604B001"],"award-info":[{"award-number":["JCKY2013604B001"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["GK2080260148 and HEUCF1508"],"award-info":[{"award-number":["GK2080260148 and HEUCF1508"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11036-018-1000-8","type":"journal-article","created":{"date-parts":[[2018,1,19]],"date-time":"2018-01-19T21:30:08Z","timestamp":1516397408000},"page":"677-685","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["A New Method of Cognitive Signal Recognition Based on Hybrid Information Entropy and D-S Evidence Theory"],"prefix":"10.1007","volume":"23","author":[{"given":"Hui","family":"Wang","sequence":"first","affiliation":[]},{"given":"Lili","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Dou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1379-9301","authenticated-orcid":false,"given":"Yun","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,19]]},"reference":[{"issue":"4","key":"1000_CR1","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1109\/26.664294","volume":"46","author":"AK Nandi","year":"1998","unstructured":"Nandi AK, Azzouz EE (1998) Algorithms for automatic modulation recognition of communication signals[J]. IEEE Trans Commun 46(4):431\u2013436","journal-title":"IEEE Trans Commun"},{"key":"1000_CR2","first-page":"1255","volume":"11","author":"J-j Guo","year":"2014","unstructured":"Guo J-j, Hong-dong Y, Lu J, Heng-fang M (2014) Recognition of Digital Modulation Signals via Higher Order Cumulants[J]. Communications Technology 11:1255\u20131260","journal-title":"Communications Technology"},{"key":"1000_CR3","first-page":"137","volume":"2","author":"L Zhu","year":"2009","unstructured":"Zhu L, Cheng H-W, Wu L-n (2009) Identification of Digital Modulation Signals Based on Cyclic Spectral Density and Statistical Parameters[J]. J Appl Sci 2:137\u2013143","journal-title":"J Appl Sci"},{"issue":"4","key":"1000_CR4","doi-asserted-by":"publisher","first-page":"5787","DOI":"10.1007\/s11042-014-2408-1","volume":"76","author":"S Liu","year":"2017","unstructured":"Liu S, Fu W, He L et al (2017) Distribution of primary additional errors in fractal encoding method [J]. Multimedia Tools and Applications 76(4):5787\u20135802","journal-title":"Multimedia Tools and Applications"},{"issue":"3","key":"1000_CR5","doi-asserted-by":"publisher","first-page":"1148","DOI":"10.22436\/jnsa.010.03.24","volume":"10","author":"S Liu","year":"2017","unstructured":"Liu S, Pan Z, Fu W, Cheng X (2017) Fractal generation method based on asymptote family of generalized Mandelbrot set and its application [J]. Journal of Nonlinear Sciences and Applications 10(3):1148\u20131161","journal-title":"Journal of Nonlinear Sciences and Applications"},{"issue":"12","key":"1000_CR6","first-page":"4934","volume":"9","author":"J Li","year":"2015","unstructured":"Li J (2015) A New Robust Signal Recognition Approach Based on Holder Cloud Features under Varying SNR Environment[J]. KSII Transactions on Internet and Information Systems 9(12):4934\u20134949 12.31","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"1000_CR7","doi-asserted-by":"crossref","unstructured":"Liu S, Pan Z, Cheng X (2017) A Novel Fast Fractal Image Compression Method based on Distance Clustering in High Dimensional Sphere Surface [J]. Fractals, 25(4), 1740004: 1\u201311","DOI":"10.1142\/S0218348X17400047"},{"issue":"6","key":"1000_CR8","doi-asserted-by":"publisher","first-page":"269","DOI":"10.3390\/e19060269","volume":"19","author":"S Liu","year":"2017","unstructured":"Liu S, Lu M, Liu G et al (2017) A Novel Distance Metric: Generalized Relative Entropy [J]. Entropy 19(6):269. \n                    https:\/\/doi.org\/10.3390\/e19060269","journal-title":"Entropy"},{"issue":"3","key":"1000_CR9","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TIFS.2011.2159000","volume":"6","author":"SU Pawar","year":"2011","unstructured":"Pawar SU, Doherty JF (2011) Modulation Recognition in Continuous Phase Modulation Using Approximate Entropy[J]. IEEE Transactions on Information Forensics & Security 6(3):843\u2013852","journal-title":"IEEE Transactions on Information Forensics & Security"},{"key":"1000_CR10","first-page":"1","volume":"2015","author":"J Li","year":"2015","unstructured":"Li J, Guo J (2015) A New Feature Extraction Algorithm Based on Entropy Cloud Characteristics of Communication Signals[J]. Math Probl Eng 2015:1\u20138","journal-title":"Math Probl Eng"},{"key":"1000_CR11","first-page":"40","volume":"5","author":"Z-y He","year":"2005","unstructured":"He Z-y, Yu-mei C, Qing-quan Q (2005) A Study of Wavelet Entropy Theory and its Application in Electric Power System Fault Detection[J]. Proceedings of the CSEE 5:40\u201345","journal-title":"Proceedings of the CSEE"},{"key":"1000_CR12","first-page":"15","volume":"7","author":"J Bo","year":"2015","unstructured":"Bo J, Dong X-z, Shen-xing S (2015) Application of approximate entropy to cross-country fault detection in distribution networks[J]. Power System Protection and Control 7:15\u201321","journal-title":"Power System Protection and Control"},{"key":"1000_CR13","first-page":"27","volume":"6","author":"Z Lin-yi","year":"2009","unstructured":"Lin-yi Z, Zhi-cheng L, He J-z (2009) Application of Hierarchy-Entropy Combination Assigning Method in Radar Emitter Recognition[J]. Command Control & Simulation 6:27\u201329","journal-title":"Command Control & Simulation"},{"key":"1000_CR14","doi-asserted-by":"publisher","unstructured":"Jing-chao Li, Yu-long Ying (2014) Radar Signal Recognition Algorithm Based on Entropy Theory[C]. 2014 2nd International Conference on Systems and Informatics, 718\u2013723. \n                    https:\/\/doi.org\/10.1109\/ICSAI.2014.7009379","DOI":"10.1109\/ICSAI.2014.7009379"},{"issue":"1","key":"1000_CR15","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.dsp.2014.07.013","volume":"34","author":"V Sucic","year":"2014","unstructured":"Sucic V, Saulig N, Boashash B (2014) Analysis of local time-frequency entropy features for nonstationary signal components time supports detection[J]. Digital Signal Processing 34(1):56\u201366","journal-title":"Digital Signal Processing"},{"key":"1000_CR16","first-page":"437","volume":"1","author":"B Hang","year":"2013","unstructured":"Hang B, Yong-jun Z, Shen W, Xu Y-g (2013) Radar emitter recognition based on r\u00e9nyi entropy of time-frequency distribution[J]. Journal of Circuits and System 1:437\u2013442","journal-title":"Journal of Circuits and System"},{"key":"1000_CR17","doi-asserted-by":"publisher","unstructured":"Rui Z, Si Z, He Z, et al (2015) A joint detection based on the DS evidence theory for multi-user superposition modulation[C]. IEEE International Conference on Network Infrastructure and Digital Content. IEEE, 390\u2013393. \n                    https:\/\/doi.org\/10.1109\/ICNIDC.2014.7000331","DOI":"10.1109\/ICNIDC.2014.7000331"},{"issue":"11","key":"1000_CR18","first-page":"258","volume":"8","author":"Y Xin","year":"2013","unstructured":"Xin Y, Zhu Q (2013) Cooperative Modulation Recognition Method based on Multi-Type Feature Parameters and Improved DS Evidence Theory[J]. J Converg Inf Technol 8(11):258\u2013266","journal-title":"J Converg Inf Technol"},{"key":"1000_CR19","first-page":"861","volume":"6","author":"L Lei","year":"2013","unstructured":"Lei L, Wang X-d, Ya-qiong X, Kai B (2013) Multi-polarized HRRP classification by SVM and DS evidence theory[J]. Control and Decision 6:861\u2013866","journal-title":"Control and Decision"},{"issue":"7","key":"1000_CR20","doi-asserted-by":"publisher","first-page":"2874","DOI":"10.1007\/s11227-016-1681-3","volume":"72","author":"Y Lin","year":"2016","unstructured":"Lin Y, Wang C, Ma C et al (2016) A new combination method for multisensor conflict information[J]. J Supercomput 72(7):2874\u20132890","journal-title":"J Supercomput"},{"key":"1000_CR21","first-page":"5502","volume":"22","author":"X Luo","year":"2012","unstructured":"Luo X, Luo H, Jin-deng Z, Lei L (2012) Error-correcting Output Codes Based on Classifier\u2019 Confidence for Multi-class Classification[J]. Science Technology and Engineering 22:5502\u20135508","journal-title":"Science Technology and Engineering"},{"key":"1000_CR22","first-page":"568","volume":"4","author":"DENG Wen-sheng","year":"2017","unstructured":"Wen-sheng DENG, Xiao-mei SHAO, Hai LIU (2017) Discussion of Remote Sensing Image Classification Method Based on Evidence Theory[J]. Journal of Remote Sensing 4:568\u2013573","journal-title":"Journal of Remote Sensing"},{"key":"1000_CR23","first-page":"218","volume":"31","author":"NIU Peng-fei","year":"2007","unstructured":"Peng-fei NIU, Sheng-da WANG, Jian MA (2007) Radar target recognition based on Subordinate Function and D-S Theory[J]. Microcomputer Information 31:218\u2013220","journal-title":"Microcomputer Information"},{"key":"1000_CR24","first-page":"33","volume":"4","author":"X Jie","year":"2006","unstructured":"Jie X (2006) Fuzzy recognition of airborne radar based on D-S evidence theory[J]. Command Control & Simulation 4:33\u201336","journal-title":"Command Control & Simulation"},{"issue":"3","key":"1000_CR25","first-page":"679","volume":"57","author":"R D\u2019Agostino","year":"1970","unstructured":"D\u2019Agostino R (1970) Transformation to normality of the null distribution of g1. Biometrika 57(3):679\u2013681","journal-title":"Biometrika"},{"issue":"3","key":"1000_CR26","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/0165-1765(80)90024-5","volume":"6","author":"C Jarque","year":"1980","unstructured":"Jarque C, Bera A (1980) Efficient tests for, normality, homoscedasticity and serial independence of regression residuals. Econ Lett 6(3):255\u2013259","journal-title":"Econ Lett"},{"key":"1000_CR27","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1080\/01621459.1967.10482916","volume":"62","author":"H Lilliefors","year":"1967","unstructured":"Lilliefors H (1967) On the Kolmogorov-Smirnov test for normality with mean and variance unknown. J Am Stat Assoc 62:399\u2013402","journal-title":"J Am Stat Assoc"},{"key":"1000_CR28","first-page":"167","volume":"3","author":"X-m Deng","year":"1964","unstructured":"Deng X-m, Ying-sheng Z (1964) The introduction of a simple method for the normal test[J]. Chinese School Health 3:167\u2013169","journal-title":"Chinese School Health"},{"key":"1000_CR29","doi-asserted-by":"crossref","unstructured":"Xu Pei-da; Deng Yong, Su, Xiao-yan. A new method to determine basic probability assignment from training data[J]. Knowl-Based Syst, 2013, 46(1): 69-80","DOI":"10.1016\/j.knosys.2013.03.005"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1000-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1000-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1000-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T22:06:37Z","timestamp":1589839597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1000-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,19]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["1000"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1000-8","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,19]]},"assertion":[{"value":"19 January 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"Meantime, all the authors declare that there is no conflict of interests regarding the publication of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}