{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T14:06:54Z","timestamp":1730297214729,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,9]],"date-time":"2022-10-09T00:00:00Z","timestamp":1665273600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,9]],"date-time":"2022-10-09T00:00:00Z","timestamp":1665273600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,9]]},"DOI":"10.1109\/smc53654.2022.9945225","type":"proceedings-article","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T20:49:04Z","timestamp":1668804544000},"page":"385-390","source":"Crossref","is-referenced-by-count":0,"title":["A new generation method of basic probability assignment based on the normal membership function"],"prefix":"10.1109","author":[{"given":"Yun","family":"Fu","sequence":"first","affiliation":[{"name":"Chongqing University,College of Computer Science,Chongqing,China,400030"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yongchuan","family":"Tang","sequence":"additional","affiliation":[{"name":"Chongqing University,School of Big Data and Software Engineering,Chongqing,China,401331"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Deyun","family":"Zhou","sequence":"additional","affiliation":[{"name":"Northwestern Polytechnical University,School of Microelectronics,Xi&#x2019;an,Shaanxi,China,710072"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2016.10.017"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-020-01876-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICIF.2005.1591955"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-03804-y"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-017-0436-5"},{"key":"ref15","first-page":"65","article-title":"Analyzing approximation algorithms in the theory of evidence","volume":"4731","author":"jousselme","year":"2002","journal-title":"Sensor Fusion Architectures Algorithms and Applications VI"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.cja.2019.05.003"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-006-8867-y"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-021-06011-w"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-3006-9"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177698950"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-016-0877-9"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-020-00964-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/IRI.2003.1251435"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-021-00966-0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1515\/9780691214696"},{"key":"ref8","article-title":"Vulnerability assessment of physical protection systems: A bio-inspired approach","volume":"11","author":"deng","year":"2015","journal-title":"International Journal of Unconventional Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-019-00620-2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.12.037"},{"key":"ref9","first-page":"618","article-title":"Evidence combination based on credal belief redistribution for pattern classification","volume":"28","author":"zhun-ga","year":"2019","journal-title":"IEEE Transactions on Fuzzy Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03643-0_4"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2021.12.032"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.01.033"},{"key":"ref21","first-page":"1092","article-title":"Determination of basic probability assignment based on interval numbers and its application","volume":"40","author":"kang","year":"2012","journal-title":"Acta Electronica Sinica"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2002.806496"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"2503","DOI":"10.1016\/j.cja.2019.05.003","article-title":"Basic belief assignment approximations using degree of non-redundancy for focal element","volume":"32","author":"yi","year":"2019","journal-title":"Chinese Journal of Aeronautics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.03.005"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2008.06.002"}],"event":{"name":"2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","start":{"date-parts":[[2022,10,9]]},"location":"Prague, Czech Republic","end":{"date-parts":[[2022,10,12]]}},"container-title":["2022 IEEE International Conference on Systems, Man, and Cybernetics (SMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9945068\/9945069\/09945225.pdf?arnumber=9945225","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:53:49Z","timestamp":1670874829000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9945225\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/smc53654.2022.9945225","relation":{},"subject":[],"published":{"date-parts":[[2022,10,9]]}}}