{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:51:28Z","timestamp":1775065888871,"version":"3.50.1"},"reference-count":123,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61773388"],"award-info":[{"award-number":["61773388"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61751304"],"award-info":[{"award-number":["61751304"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61833016"],"award-info":[{"award-number":["61833016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702142"],"award-info":[{"award-number":["61702142"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004761","name":"Key Research and Development Plan of Hainan","doi-asserted-by":"publisher","award":["ZDYF2019007"],"award-info":[{"award-number":["ZDYF2019007"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004761","name":"Key Research and Development Plan of Hainan","doi-asserted-by":"publisher","award":["2019CXTD405"],"award-info":[{"award-number":["2019CXTD405"]}],"id":[{"id":"10.13039\/501100004761","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst. Man Cybern, Syst."],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1109\/tsmc.2019.2944893","type":"journal-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T20:48:06Z","timestamp":1573159686000},"page":"4944-4958","source":"Crossref","is-referenced-by-count":176,"title":["A Survey of Belief Rule-Base Expert System"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0508-4648","authenticated-orcid":false,"given":"Zhi-Jie","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Guan-Yu","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1545-9100","authenticated-orcid":false,"given":"Chang-Hua","family":"Hu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2471-2849","authenticated-orcid":false,"given":"Cheng-Lin","family":"Wen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0126-0635","authenticated-orcid":false,"given":"Lei-Lei","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/S0888-613X(00)00046-3"},{"key":"ref38","first-page":"1","article-title":"Map matching algorithm using belief function theory","author":"nassreddine","year":"2008","journal-title":"Proc IEEE Int Conf Inf Fusion"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1038\/nature20584","article-title":"High-resolution mapping of global surface water and its long-term changes","volume":"540","author":"pekel","year":"2016","journal-title":"Nature"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.04.038"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2013.09.003"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/21.259681"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2035707"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2012.01.009"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176350603"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44792-4_20"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2307\/1269559"},{"key":"ref27","author":"shortliffe","year":"1984","journal-title":"Rule-Based Expert Systems"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2005.851270"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/0888-613X(88)90120-X"},{"key":"ref22","author":"hunt","year":"1986","journal-title":"Introduction to Artificial Intelligence and Expert Systems"},{"key":"ref21","author":"negoita","year":"1985","journal-title":"Expert Systems and Fuzzy Systems"},{"key":"ref24","author":"turban","year":"1992","journal-title":"Expert Systems and Applied Artificial Intelligence"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(82)90038-8"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.07.029"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-9035-6_82"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.12.009"},{"key":"ref25","article-title":"Development of expert systems for analyzing electronic documents","volume":"363","author":"al-azzawi","year":"2018","journal-title":"Proc IOP Conf Mater Sci Eng"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2016.2622247"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2503381"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.677.418"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2013.10.021"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.cja.2013.04.039"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2759026"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-017-0667-1"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.09.010"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2012.07.008"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/00207543.2011.652262"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ISIC.1991.187371"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10439-015-1464-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ergon.2015.11.008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.scitotenv.2016.07.043"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.01.026"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2732-2"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2710205"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0685-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2011.10.044"},{"key":"ref46","first-page":"233","article-title":"Representing belief function knowledge with graphical models","author":"boukhris","year":"2011","journal-title":"Proc Int Conf Knowl Sci"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.accinf.2010.12.003"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2718483"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2019.2911915"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11191-9_6"},{"key":"ref41","first-page":"506","article-title":"A state estimation method for multiple model systems using belief function theory","author":"nassreddine","year":"2009","journal-title":"Proc IEEE Int Conf Inf Fusion"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.201"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2009.5345929"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2241251"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2012.02.006"},{"key":"ref71","first-page":"634","article-title":"Emergency alternative adaptation method based on belief rule-base","volume":"45","author":"jing","year":"2016","journal-title":"Inf Control"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.03.005"},{"key":"ref76","first-page":"287","article-title":"An algorithm for training parameters in belief rule-bases based on the gradient and dichotomy methods","volume":"6","author":"chang","year":"2007","journal-title":"Syst Eng"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.05.047"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2356460"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2007.897606"},{"key":"ref78","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1109\/TFUZZ.2011.2130527","article-title":"A new prediction model based on belief rule base for system&#x2019;s behaviour prediction","volume":"19","author":"si","year":"2011","journal-title":"IEEE Trans Fuzzy Syst"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.11.015"},{"key":"ref60","first-page":"1580","article-title":"Fault prognosis based on evolving belief-rule-base system","volume":"29","author":"xiao-sheng","year":"2012","journal-title":"Control Theory Appl"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSUSC.2017.2697768"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1504\/IJNKM.2009.027064"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2011.2147312"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2015.2426207"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2012.10.016"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.039"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.12.013"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.08.019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1111\/gcb.13689"},{"key":"ref69","first-page":"2155","article-title":"Data driven construction and inference methodology of belief rule-base","volume":"34","author":"ruiyin","year":"2014","journal-title":"J Comput Appl"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.6340198"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2020.106147"},{"key":"ref95","first-page":"1651","article-title":"GDA based ensemble learning methods for parameter training in belief rule base","volume":"10","author":"wu","year":"2016","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2524404"},{"key":"ref94","first-page":"989","article-title":"Parameter training approach for belief rule base using the accelerating of gradient algorithm","volume":"8","author":"weikun","year":"2014","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"ref107","first-page":"245","article-title":"Assessment of equipment&#x2019;s life based on BRB and DE approach","volume":"15","author":"liu","year":"2015","journal-title":"Sci Technol Eng"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/s10898-010-9605-x"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.09.006"},{"key":"ref92","first-page":"21","article-title":"Rule reduction approach to belief rule base using correlation coefficient and standard deviation integrated method","volume":"44","author":"yang","year":"2015","journal-title":"Inf Control"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.11.039"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2016.11.011"},{"key":"ref104","article-title":"YARBUS: Yet another rule based belief update system","author":"fix","year":"2015"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.09.105"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2017.02.021"},{"key":"ref102","first-page":"1216","article-title":"Structure learning approach of belief rule base for best decision structure","volume":"8","author":"yang","year":"2014","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.07.067"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2010.09.055"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2665880"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-018-1211-0"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/IHMSC.2016.83"},{"key":"ref96","first-page":"2161","article-title":"Parameter training approach based on variable particle swarm optimization for belief rule base","volume":"34","author":"qun","year":"2014","journal-title":"J Comput Appl"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.02.055"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2014.6944178"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2837185.2837212"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12110"},{"key":"ref13","author":"kong","year":"2011","journal-title":"An Online Belief Rule-Based Group Clinical Decision Support System"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60137-3_8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2016.10.007"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.04.019"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6501\/aa966e"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2781365"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.12.002"},{"key":"ref17","article-title":"Expert systems and probabilistic network models","author":"castillo","year":"1997","journal-title":"Monographs in Computer Science"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.09.001"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MEX.1986.5006506","article-title":"Introduction to expert systems","volume":"1","author":"jackson","year":"1986","journal-title":"IEEE Expert"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2017.09.027"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-017-2732-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(95)00009-7"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2678607"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.08.016"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.10.052"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2015.10.014"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0394.2009.00500.x"},{"key":"ref115","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1016\/j.asoc.2016.05.046","article-title":"A method for predicting the network security situation based on hidden BRB model and revised CMA-ES algorithm","volume":"48","author":"hu","year":"2016","journal-title":"Appl Soft Comput"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0685-8"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/0888-613X(93)90005-X"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2504047"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2011.12.002"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.11.012"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2012.2208266"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2010.02.002"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2007.03.004"},{"key":"ref88","first-page":"180","article-title":"A study on generalising Bayesian inference to evidential reasoning","author":"yang","year":"2014","journal-title":"Proc 3rd Int Conf Belief Functions"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics: Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221021\/9488259\/08894055.pdf?arnumber=8894055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:06Z","timestamp":1652194386000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8894055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8]]},"references-count":123,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tsmc.2019.2944893","relation":{},"ISSN":["2168-2216","2168-2232"],"issn-type":[{"value":"2168-2216","type":"print"},{"value":"2168-2232","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8]]}}}