Results 21 to 30 of about 1,080 (95)

Weighted assignment fusion algorithm of evidence conflict based on Euclidean distance and weighting strategy, and application in the wind turbine system.

open access: yesPLoS ONE, 2022
In the process of intelligent system operation fault diagnosis and decision making, the multi-source, heterogeneous, complex, and fuzzy characteristics of information make the conflict, uncertainty, and validity problems appear in the process of ...
Liming Gou   +5 more
doaj   +2 more sources

A Novel Uncertainty Management Approach for Air Combat Situation Assessment Based on Improved Belief Entropy

open access: yesEntropy, 2019
Uncertain information exists in each procedure of an air combat situation assessment. To address this issue, this paper proposes an improved method to address the uncertain information fusion of air combat situation assessment in the Dempster– ...
Ying Zhou, Yongchuan Tang, Xiaozhe Zhao
doaj   +1 more source

Hierarchical Hybrid Trust Management Scheme in SDN‐Enabled VANETs

open access: yesMobile Information Systems, Volume 2021, Issue 1, 2021., 2021
One of the principal missions of security in the Internet of Vehicles (IoV) is to establish credible social relationships. The trust management system has been proved to be an effective security solution in a connected vehicle environment. The use of trust management can play a significant role in achieving reliable data collection and dissemination ...
Ming Mao   +6 more
wiley   +1 more source

A Novel Conflict Management Method Based on Uncertainty of Evidence and Reinforcement Learning for Multi-Sensor Information Fusion

open access: yesEntropy, 2021
Dempster–Shafer theory (DST), which is widely used in information fusion, can process uncertain information without prior information; however, when the evidence to combine is highly conflicting, it may lead to counter-intuitive results.
Fanghui Huang   +3 more
doaj   +1 more source

Failure mode and effects analysis using an improved pignistic probability transformation function and grey relational projection method

open access: yesComplex & Intelligent Systems, 2023
Failure mode and effects analysis (FMEA) is an important risk analysis tool that has been widely used in diverse areas to manage risk factors. However, how to manage the uncertainty in FMEA assessments is still an open issue.
Yongchuan Tang   +3 more
doaj   +1 more source

A Novel Belief Entropy for Measuring Uncertainty in Dempster-Shafer Evidence Theory Framework Based on Plausibility Transformation and Weighted Hartley Entropy

open access: yesEntropy, 2019
Dempster-Shafer evidence theory (DST) has shown its great advantages to tackle uncertainty in a wide variety of applications. However, how to quantify the information-based uncertainty of basic probability assignment (BPA) with belief entropy in DST ...
Qian Pan   +4 more
doaj   +1 more source

Using the Pattern-of-Life in Networks to Improve the Effectiveness of Intrusion Detection Systems [PDF]

open access: yes, 2017
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.As the complexity of cyber-attacks keeps increasing, new and more robust detection mechanisms need to be ...
Aparicio-Navarro, Francisco J.   +4 more
core   +3 more sources

Smart Antennas and Intelligent Sensors Based Systems: Enabling Technologies and Applications, 2020

open access: yes, 2022
Wireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022.
Fawad Zaman   +4 more
wiley   +1 more source

Partner selection in green supply chains using PSO – a practical approach [PDF]

open access: yes, 2016
Partner selection is crucial to green supply chain management as the focal firm is responsible for the environmental performance of the whole supply chain.
Chong Wu   +5 more
core   +1 more source

Detection of attacker and location in wireless sensor network as an application for border surveillance [PDF]

open access: yes, 2017
Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security.
Ahmed, Muhammad Raisuddin   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy