{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:03Z","timestamp":1750220643303,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,20]]},"DOI":"10.1145\/3424978.3425028","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T19:06:17Z","timestamp":1602788777000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Credibility Evaluation Method of Simulation System Based on Improved Evidence Theory"],"prefix":"10.1145","author":[{"given":"Fankang","family":"Bu","sequence":"first","affiliation":[{"name":"National Key Laboratory of Science and Technology on ATR, College of Electronic Science, National University of Defense Technology, Changsha, China"}]},{"given":"Jun","family":"He","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on ATR, College of Electronic Science, National University of Defense Technology, Changsha, China"}]},{"given":"Haorun","family":"Li","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on ATR, College of Electronic Science, National University of Defense Technology, Changsha, China"}]},{"given":"Qiang","family":"Fu","sequence":"additional","affiliation":[{"name":"National Key Laboratory of Science and Technology on ATR, College of Electronic Science, National University of Defense Technology, Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/3275382.3275416"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apm.2018.02.011"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2016.12.013"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jedc.2017.06.001"},{"key":"e_1_3_2_1_5_1","volume-title":"Hu Q and Zha Y","author":"Tang J","year":"2015","unstructured":"Tang J , Guo T , Hu Q and Zha Y ( 2015 ). Research on the Credibility Evaluation Methods of Combat Simulation[J]. Applied Mechanics and Materials . 713--715, 2139--2142. Tang J, Guo T, Hu Q and Zha Y (2015). Research on the Credibility Evaluation Methods of Combat Simulation[J]. Applied Mechanics and Materials. 713--715, 2139--2142."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.905"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2014.2316915"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07227-2_7"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58475-1_18"},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Information Fusion, 1--8.","author":"Deqiang H","year":"2017","unstructured":"Deqiang H , Ruhuan L , Jean D , ( 2017 ). A novel edge detector for color images based on MCDM with evidential reasoning[C] . International Conference on Information Fusion, 1--8. Deqiang H, Ruhuan L, Jean D, et al. (2017). A novel edge detector for color images based on MCDM with evidential reasoning[C]. International Conference on Information Fusion, 1--8."},{"key":"e_1_3_2_1_11_1","volume-title":"Method for uncertain multi-attribute decision making based on evidential reasoning and third-generation prospect theory[J]. Control and Decision, 104--111","author":"Jin L Q","year":"2016","unstructured":"Jin L Q and Xu Y ( 2016 ). Method for uncertain multi-attribute decision making based on evidential reasoning and third-generation prospect theory[J]. Control and Decision, 104--111 . Jin L Q and Xu Y (2016). Method for uncertain multi-attribute decision making based on evidential reasoning and third-generation prospect theory[J]. Control and Decision, 104--111."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2659764"},{"key":"e_1_3_2_1_13_1","first-page":"81","article-title":"Improved D-S evidence combination rule based on reliability of sensors[J]","volume":"18","author":"Li C","year":"2017","unstructured":"Li C , Zhou Y , Lin H , ( 2017 ). Improved D-S evidence combination rule based on reliability of sensors[J] . Journal of PLA University of ence and Technology (Natural ence Edition) , 18 , 81 -- 86 . Li C, Zhou Y, Lin H, et al. (2017). Improved D-S evidence combination rule based on reliability of sensors[J]. Journal of PLA University of ence and Technology (Natural ence Edition), 18, 81--86.","journal-title":"Journal of PLA University of ence and Technology (Natural ence Edition)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.09.020"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2017.2718484"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(87)90007-7"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2009.05.005"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.092"},{"key":"e_1_3_2_1_19_1","volume-title":"Combining belief functions when evidence conflicts[J]. Decision support systems, 29(1), 1--9","author":"Murphy C K","year":"2000","unstructured":"Murphy C K ( 2000 ). Combining belief functions when evidence conflicts[J]. Decision support systems, 29(1), 1--9 . Murphy C K (2000). Combining belief functions when evidence conflicts[J]. Decision support systems, 29(1), 1--9."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECT.2009.96"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijar.2014.05.010"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1566-2535(01)00026-4"}],"event":{"name":"CSAE 2020: The 4th International Conference on Computer Science and Application Engineering","acronym":"CSAE 2020","location":"Sanya China"},"container-title":["Proceedings of the 4th International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424978.3425028","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3424978.3425028","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:10Z","timestamp":1750197730000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424978.3425028"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":22,"alternative-id":["10.1145\/3424978.3425028","10.1145\/3424978"],"URL":"https:\/\/doi.org\/10.1145\/3424978.3425028","relation":{},"subject":[],"published":{"date-parts":[[2020,10,20]]},"assertion":[{"value":"2020-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}