Results 21 to 30 of about 1,080 (95)
In the process of intelligent system operation fault diagnosis and decision making, the multi-source, heterogeneous, complex, and fuzzy characteristics of information make the conflict, uncertainty, and validity problems appear in the process of ...
Liming Gou +5 more
doaj +2 more sources
Uncertain information exists in each procedure of an air combat situation assessment. To address this issue, this paper proposes an improved method to address the uncertain information fusion of air combat situation assessment in the Dempster– ...
Ying Zhou, Yongchuan Tang, Xiaozhe Zhao
doaj +1 more source
Hierarchical Hybrid Trust Management Scheme in SDN‐Enabled VANETs
One of the principal missions of security in the Internet of Vehicles (IoV) is to establish credible social relationships. The trust management system has been proved to be an effective security solution in a connected vehicle environment. The use of trust management can play a significant role in achieving reliable data collection and dissemination ...
Ming Mao +6 more
wiley +1 more source
Dempster–Shafer theory (DST), which is widely used in information fusion, can process uncertain information without prior information; however, when the evidence to combine is highly conflicting, it may lead to counter-intuitive results.
Fanghui Huang +3 more
doaj +1 more source
Failure mode and effects analysis (FMEA) is an important risk analysis tool that has been widely used in diverse areas to manage risk factors. However, how to manage the uncertainty in FMEA assessments is still an open issue.
Yongchuan Tang +3 more
doaj +1 more source
Dempster-Shafer evidence theory (DST) has shown its great advantages to tackle uncertainty in a wide variety of applications. However, how to quantify the information-based uncertainty of basic probability assignment (BPA) with belief entropy in DST ...
Qian Pan +4 more
doaj +1 more source
Using the Pattern-of-Life in Networks to Improve the Effectiveness of Intrusion Detection Systems [PDF]
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.As the complexity of cyber-attacks keeps increasing, new and more robust detection mechanisms need to be ...
Aparicio-Navarro, Francisco J. +4 more
core +3 more sources
Smart Antennas and Intelligent Sensors Based Systems: Enabling Technologies and Applications, 2020
Wireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022.
Fawad Zaman +4 more
wiley +1 more source
Partner selection in green supply chains using PSO – a practical approach [PDF]
Partner selection is crucial to green supply chain management as the focal firm is responsible for the environmental performance of the whole supply chain.
Chong Wu +5 more
core +1 more source
Detection of attacker and location in wireless sensor network as an application for border surveillance [PDF]
Border surveillance is one of the high priority in the security of countries around the world. Typical and traditional border observations involve troops and checkpoints at borders, but these do not provide complete security.
Ahmed, Muhammad Raisuddin +4 more
core +2 more sources

