Results 41 to 50 of about 1,080 (95)
A Dempster–Shafer, Fusion-Based Approach for Malware Detection
Dempster–Shafer theory (DST), a generalization of probability theory, is well suited for managing uncertainty and integrating information from diverse sources. In recent years, DST has gained attention in cybersecurity research.
Patricio Galdames +3 more
doaj +1 more source
Abstract Multiple sensors are strategically deployed within concrete dams to monitor structural behavior under intricate environmental conditions. The diverse monitoring parameters, spatial configurations, and temporal variations across these sensors often engender performance conflicts.
Xiaosong Shu +8 more
wiley +1 more source
Accurate quantification of uncertainty in solar photovoltaic (PV) generation forecasts is imperative for the efficient and reliable operation of the power grid. In this paper, a data-driven non-parametric probabilistic method based on the Naïve Bayes (NB)
Tawsif Ahmad +3 more
doaj +1 more source
Recursive Observation Evidence Fusion Method for Acoustic Resonance-Based Level Detection
Acoustic resonance-based level measurement principle needs to extract a sequence of resonance frequencies (RFs) from the synthesis wave and then calculate level height via this RF sequence.
Xiaobin Xu +5 more
doaj +1 more source
Vessels Route Planning Problem with Uncertain Data [PDF]
The purpose of this paper is to find a solution for route planning in a transport networks, where the costs of tracks, factor of safety and travel time are ambiguous.
Tomasz Neumann
doaj +1 more source
The management and combination of uncertain, imprecise, fuzzy and even paradoxical or high conflicting sources of information has always been, and still remains today, of primal importance for the development of reliable modern information systems ...
Dezert, Jean, Smarandache, Florentin
core +4 more sources
Guidance on the use of read‐across for chemical safety assessment in food and feed
Abstract Read‐across is a method used in chemical risk assessment to predict the toxicological properties of a target substance by using data from structurally and mechanistically similar substances, known as source substances. EFSA's Scientific Committee has developed an approach for using read‐across in food and feed risk assessment.
EFSA Scientific Committee +26 more
wiley +1 more source
Evidential MACE prediction of acute coronary syndrome using electronic health records
Background Major adverse cardiac event (MACE) prediction plays a key role in providing efficient and effective treatment strategies for patients with acute coronary syndrome (ACS) during their hospitalizations. Existing prediction models have limitations
Danqing Hu +5 more
doaj +1 more source
Deng Entropy Weighted Risk Priority Number Model for Failure Mode and Effects Analysis
Failure mode and effects analysis (FMEA), as a commonly used risk management method, has been extensively applied to the engineering domain. A vital parameter in FMEA is the risk priority number (RPN), which is the product of occurrence (O), severity (S),
Haixia Zheng, Yongchuan Tang
doaj +1 more source
Individuals use Vehicular Ad Hoc Networks (VANETs) to secure, reliable communication networks as a viable route of transmission. Platooning uses Inter-Vehicular Communication to supervise a group of vehicles (IVC).
R. Priya, N. Sivakumar
doaj +1 more source

