Results 41 to 50 of about 207 (118)

Resisting bad mouth attack in vehicular platoon using node-centric weight-based trust management algorithm (NC-WTM)

open access: yesConnection Science, 2022
Individuals use Vehicular Ad Hoc Networks (VANETs) to secure, reliable communication networks as a viable route of transmission. Platooning uses Inter-Vehicular Communication to supervise a group of vehicles (IVC).
R. Priya, N. Sivakumar
doaj   +1 more source

Reinforcing Cloud Attack Tolerance on a Large Scale: Advanced Blockchain Technologies With Hierarchical Risk and Smart Contracts

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
We propose a blockchain‐based system to enhance cloud systems' resilience against distributed denial of service attacks. Our approach integrates a hierarchical risk‐based attack tolerance mechanism with smart contracts, dynamically estimating risks at local, cluster, and global levels using Dempster–Shafer theory. Simulations show improved availability,
Faiza Benmenzer   +2 more
wiley   +1 more source

Distribution‐Matched Imputation for Incomplete Data Evidential Classification

open access: yesElectronics Letters, Volume 61, Issue 1, January/December 2025.
This paper introduces a novel distribution‐matched imputation (DMI) method that leverages evidential reasoning to address classification challenges in datasets with missing values, optimizing weights to minimize the inconsistency between training and test sets.
Qiong Hu   +5 more
wiley   +1 more source

An Extension to Deng’s Entropy in the Open World Assumption with an Application in Sensor Data Fusion

open access: yesSensors, 2018
Quantification of uncertain degree in the Dempster-Shafer evidence theory (DST) framework with belief entropy is still an open issue, even a blank field for the open world assumption.
Yongchuan Tang   +2 more
doaj   +1 more source

Reliability Analysis Based on Aleatory and Epistemic Uncertainty Using Binary Decision Diagrams

open access: yesInternational Journal of Intelligent Systems, Volume 2025, Issue 1, 2025.
The development of a mathematical model is an important step in reliability analysis. However, initial data are often not clearly defined, and some necessary information about the system’s behavior may be missing. Most mathematical models in reliability analysis primarily address aleatory uncertainty.
Elena Zaitseva   +2 more
wiley   +1 more source

Expert System for Early Childhood Talent Detection Using Certainty Factor and Dempster Shafer Algorithms

open access: yesJournal of Information Systems and Informatics
Early life is a crucial window for recognizing children’s interests and talents that shape later development. This study implements and compares two reasoning algorithms—Certainty Factor (CF) and Dempster–Shafer Theory (DST)—within a rule-based expert ...
Supardi Supardi   +2 more
doaj   +1 more source

A Method of Detections’ Fusion for GNSS Anti-Spoofing

open access: yesSensors, 2016
The spoofing attack is one of the security threats of systems depending on the Global Navigation Satellite System (GNSS). There have been many GNSS spoofing detection methods, and each of them focuses on a characteristic of the GNSS signal or a ...
Huiqi Tao, Hong Li, Mingquan Lu
doaj   +1 more source

Dynamic Twitter friend grouping based on similarity, interaction, and trust to account for ever‐evolving relationships

open access: yesIET Communications, Volume 18, Issue 17, Page 1018-1048, October 2024.
The proposed study aims to enhance online privacy within social networking platforms by categorizing users into three trust levels (acquaintances, friends, close friends) based on engagement and trust. The method dynamically adjusts relationship status over time, considering past and present offenses, offering a more realistic simulation of real‐world ...
Nisha P. Shetty   +4 more
wiley   +1 more source

Misbehavior Detection Based on Support Vector Machine and Dempster-Shafer Theory of Evidence in VANETs

open access: yesIEEE Access, 2018
Vehicular ad hoc networks (VANETs) support safety and comfortable driving through frequent information exchange among intelligent vehicles. As an open access environment, VANETs are vulnerable to security threats, such as electronic attack and privacy ...
Chunhua Zhang   +3 more
doaj   +1 more source

Fusion of GIS, remote sensing, geophysics and Dempster Shafer theory of evidence for mapping groundwater prospectivity: A case study of the central parts of Lagos State, Nigeria

open access: yesSolid Earth Sciences
Water utilization for different human activities is universally crucial, but it is not readily available for consumption in some areas, such as the central parts of Lagos State, Nigeria.
K.S. Ishola   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy