Results 31 to 40 of about 201 (114)

Interval-valued Evidence Updating with Reliability and Sensitivity Analysis for Fault Diagnosis

open access: yesInternational Journal of Computational Intelligence Systems, 2016
Information fusion methods based on Dempster-Shafer evidence theory (DST) have been widely used in fault diagnosis. In DST-based methods, the monitoring information collected from sensors is modeled as multiple pieces of diagnosis evidence in the form of
Xiaobin Xu   +3 more
doaj   +1 more source

AMWRPN: Ambiguity Measure Weighted Risk Priority Number Model for Failure Mode and Effects Analysis

open access: yesIEEE Access, 2018
The relative importance of each risk factor in failure mode and effects analysis (FMEA) should be addressed properly. Intuitively, in the assessments coming from the FEMA experts, there exists a potential judgement on which risk factor has a higher ...
Yongchuan Tang   +2 more
doaj   +1 more source

Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM)

open access: yesConnection Science, 2022
Individuals use Vehicular Ad Hoc Networks (VANETs) to secure, reliable communication networks as a viable route of transmission. Platooning uses Inter-Vehicular Communication to supervise a group of vehicles (IVC).
R. Priya, N. Sivakumar
doaj   +1 more source

Antioxidants promote metabolic remodeling in cattle rumen epithelium revealed by single‐cell resolution

open access: yesiMeta, Volume 4, Issue 6, December 2025.
Single‐cell and transcriptomics from 1.79 million cells identify the forestomach epithelium as the dominant site of antioxidant activity and oxidative phosphorylation (OXPHOS) in the bovine gastrointestinal tract. Along the basal‐to‐luminal differentiation axis, antioxidant capacity and OXPHOS rise in a coordinated metabolic–redox gradient.
Sen‐Lin Zhu   +21 more
wiley   +1 more source

A Dempster–Shafer, Fusion-Based Approach for Malware Detection

open access: yesMathematics
Dempster–Shafer theory (DST), a generalization of probability theory, is well suited for managing uncertainty and integrating information from diverse sources. In recent years, DST has gained attention in cybersecurity research.
Patricio Galdames   +3 more
doaj   +1 more source

Recursive Observation Evidence Fusion Method for Acoustic Resonance-Based Level Detection

open access: yesIEEE Access, 2019
Acoustic resonance-based level measurement principle needs to extract a sequence of resonance frequencies (RFs) from the synthesis wave and then calculate level height via this RF sequence.
Xiaobin Xu   +5 more
doaj   +1 more source

An integrated spatiotemporal trust and consensus fusion framework for dam safety assessment with multi‐sensor anomaly detection

open access: yesComputer-Aided Civil and Infrastructure Engineering, Volume 40, Issue 29, Page 5625-5648, 9 December 2025.
Abstract Multiple sensors are strategically deployed within concrete dams to monitor structural behavior under intricate environmental conditions. The diverse monitoring parameters, spatial configurations, and temporal variations across these sensors often engender performance conflicts.
Xiaosong Shu   +8 more
wiley   +1 more source

Enhancing Probabilistic Solar PV Forecasting: Integrating the NB-DST Method with Deterministic Models

open access: yesEnergies
Accurate quantification of uncertainty in solar photovoltaic (PV) generation forecasts is imperative for the efficient and reliable operation of the power grid. In this paper, a data-driven non-parametric probabilistic method based on the Naïve Bayes (NB)
Tawsif Ahmad   +3 more
doaj   +1 more source

Evidential MACE prediction of acute coronary syndrome using electronic health records

open access: yesBMC Medical Informatics and Decision Making, 2019
Background Major adverse cardiac event (MACE) prediction plays a key role in providing efficient and effective treatment strategies for patients with acute coronary syndrome (ACS) during their hospitalizations. Existing prediction models have limitations
Danqing Hu   +5 more
doaj   +1 more source

Guidance on the use of read‐across for chemical safety assessment in food and feed

open access: yesEFSA Journal, Volume 23, Issue 7, July 2025.
Abstract Read‐across is a method used in chemical risk assessment to predict the toxicological properties of a target substance by using data from structurally and mechanistically similar substances, known as source substances. EFSA's Scientific Committee has developed an approach for using read‐across in food and feed risk assessment.
EFSA Scientific Committee   +26 more
wiley   +1 more source

Home - About - Disclaimer - Privacy