Results 31 to 40 of about 201 (114)
Interval-valued Evidence Updating with Reliability and Sensitivity Analysis for Fault Diagnosis
Information fusion methods based on Dempster-Shafer evidence theory (DST) have been widely used in fault diagnosis. In DST-based methods, the monitoring information collected from sensors is modeled as multiple pieces of diagnosis evidence in the form of
Xiaobin Xu +3 more
doaj +1 more source
AMWRPN: Ambiguity Measure Weighted Risk Priority Number Model for Failure Mode and Effects Analysis
The relative importance of each risk factor in failure mode and effects analysis (FMEA) should be addressed properly. Intuitively, in the assessments coming from the FEMA experts, there exists a potential judgement on which risk factor has a higher ...
Yongchuan Tang +2 more
doaj +1 more source
Individuals use Vehicular Ad Hoc Networks (VANETs) to secure, reliable communication networks as a viable route of transmission. Platooning uses Inter-Vehicular Communication to supervise a group of vehicles (IVC).
R. Priya, N. Sivakumar
doaj +1 more source
Single‐cell and transcriptomics from 1.79 million cells identify the forestomach epithelium as the dominant site of antioxidant activity and oxidative phosphorylation (OXPHOS) in the bovine gastrointestinal tract. Along the basal‐to‐luminal differentiation axis, antioxidant capacity and OXPHOS rise in a coordinated metabolic–redox gradient.
Sen‐Lin Zhu +21 more
wiley +1 more source
A Dempster–Shafer, Fusion-Based Approach for Malware Detection
Dempster–Shafer theory (DST), a generalization of probability theory, is well suited for managing uncertainty and integrating information from diverse sources. In recent years, DST has gained attention in cybersecurity research.
Patricio Galdames +3 more
doaj +1 more source
Recursive Observation Evidence Fusion Method for Acoustic Resonance-Based Level Detection
Acoustic resonance-based level measurement principle needs to extract a sequence of resonance frequencies (RFs) from the synthesis wave and then calculate level height via this RF sequence.
Xiaobin Xu +5 more
doaj +1 more source
Abstract Multiple sensors are strategically deployed within concrete dams to monitor structural behavior under intricate environmental conditions. The diverse monitoring parameters, spatial configurations, and temporal variations across these sensors often engender performance conflicts.
Xiaosong Shu +8 more
wiley +1 more source
Accurate quantification of uncertainty in solar photovoltaic (PV) generation forecasts is imperative for the efficient and reliable operation of the power grid. In this paper, a data-driven non-parametric probabilistic method based on the Naïve Bayes (NB)
Tawsif Ahmad +3 more
doaj +1 more source
Evidential MACE prediction of acute coronary syndrome using electronic health records
Background Major adverse cardiac event (MACE) prediction plays a key role in providing efficient and effective treatment strategies for patients with acute coronary syndrome (ACS) during their hospitalizations. Existing prediction models have limitations
Danqing Hu +5 more
doaj +1 more source
Guidance on the use of read‐across for chemical safety assessment in food and feed
Abstract Read‐across is a method used in chemical risk assessment to predict the toxicological properties of a target substance by using data from structurally and mechanistically similar substances, known as source substances. EFSA's Scientific Committee has developed an approach for using read‐across in food and feed risk assessment.
EFSA Scientific Committee +26 more
wiley +1 more source

