Results 41 to 50 of about 1,187 (133)

Recursive Observation Evidence Fusion Method for Acoustic Resonance-Based Level Detection

open access: yesIEEE Access, 2019
Acoustic resonance-based level measurement principle needs to extract a sequence of resonance frequencies (RFs) from the synthesis wave and then calculate level height via this RF sequence.
Xiaobin Xu   +5 more
doaj   +1 more source

An integrated spatiotemporal trust and consensus fusion framework for dam safety assessment with multi‐sensor anomaly detection

open access: yesComputer-Aided Civil and Infrastructure Engineering, Volume 40, Issue 29, Page 5625-5648, 9 December 2025.
Abstract Multiple sensors are strategically deployed within concrete dams to monitor structural behavior under intricate environmental conditions. The diverse monitoring parameters, spatial configurations, and temporal variations across these sensors often engender performance conflicts.
Xiaosong Shu   +8 more
wiley   +1 more source

Enhancing Probabilistic Solar PV Forecasting: Integrating the NB-DST Method with Deterministic Models

open access: yesEnergies
Accurate quantification of uncertainty in solar photovoltaic (PV) generation forecasts is imperative for the efficient and reliable operation of the power grid. In this paper, a data-driven non-parametric probabilistic method based on the Naïve Bayes (NB)
Tawsif Ahmad   +3 more
doaj   +1 more source

Evidential MACE prediction of acute coronary syndrome using electronic health records

open access: yesBMC Medical Informatics and Decision Making, 2019
Background Major adverse cardiac event (MACE) prediction plays a key role in providing efficient and effective treatment strategies for patients with acute coronary syndrome (ACS) during their hospitalizations. Existing prediction models have limitations
Danqing Hu   +5 more
doaj   +1 more source

Guidance on the use of read‐across for chemical safety assessment in food and feed

open access: yesEFSA Journal, Volume 23, Issue 7, July 2025.
Abstract Read‐across is a method used in chemical risk assessment to predict the toxicological properties of a target substance by using data from structurally and mechanistically similar substances, known as source substances. EFSA's Scientific Committee has developed an approach for using read‐across in food and feed risk assessment.
EFSA Scientific Committee   +26 more
wiley   +1 more source

The Combination of Paradoxical, Uncertain, and Imprecise Sources of Information based on DSmT and Neutro-Fuzzy Inference [PDF]

open access: yes, 2004
The management and combination of uncertain, imprecise, fuzzy and even paradoxical or high conflicting sources of information has always been, and still remains today, of primal importance for the development of reliable modern information systems ...
Dezert, Jean, Smarandache, Florentin
core   +1 more source

A comparison between probabilistic and Dempster-Shafer Theory approaches to Model Uncertainty Analysis in the Performance Assessment of Radioactive Waste Repositories

open access: yes, 2010
Model uncertainty is a primary source of uncertainty in the assessment of the performance of repositories for the disposal of nuclear wastes, due to the complexity of the system and the large spatial and temporal scales involved.
Baraldi, Piero, Zio, Enrico
core   +4 more sources

Reinforcing Cloud Attack Tolerance on a Large Scale: Advanced Blockchain Technologies With Hierarchical Risk and Smart Contracts

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
We propose a blockchain‐based system to enhance cloud systems' resilience against distributed denial of service attacks. Our approach integrates a hierarchical risk‐based attack tolerance mechanism with smart contracts, dynamically estimating risks at local, cluster, and global levels using Dempster–Shafer theory. Simulations show improved availability,
Faiza Benmenzer   +2 more
wiley   +1 more source

A Method of Detections’ Fusion for GNSS Anti-Spoofing

open access: yesSensors, 2016
The spoofing attack is one of the security threats of systems depending on the Global Navigation Satellite System (GNSS). There have been many GNSS spoofing detection methods, and each of them focuses on a characteristic of the GNSS signal or a ...
Huiqi Tao, Hong Li, Mingquan Lu
doaj   +1 more source

General combination rules for qualitative and quantitative beliefs [PDF]

open access: yes, 2007
Martin and Osswald \cite{Martin07} have recently proposed many generalizations of combination rules on quantitative beliefs in order to manage the conflict and to consider the specificity of the responses of the experts.
Dezert, Jean   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy