“Sisters”is the first novel in Irish-American author Colum McCann’s short story collection-Fishing the Sloe-Black River,which tells the story of Sheona’s search for her identity between Ireland and the United Stat...“Sisters”is the first novel in Irish-American author Colum McCann’s short story collection-Fishing the Sloe-Black River,which tells the story of Sheona’s search for her identity between Ireland and the United States.Colum McCann is skilled in writing about the spiritual dilemmas and identity search of ethnic minorities living in a foreign land.Employing the space theory and Sheona’s perspective,this paper examines her identity loss in Ireland’s patriarchal system,her migration to the US for identity pursuit,and her subsequent transnational journey between the two nations to reconstruct her identity amidst physical and mental trauma.展开更多
An improvement method for the combining rule of Dempster evidence theory is proposed. Different from Dempster theory, the reliability of evidences isn't identical; and varies with the event. By weight evidence acc...An improvement method for the combining rule of Dempster evidence theory is proposed. Different from Dempster theory, the reliability of evidences isn't identical; and varies with the event. By weight evidence according to their reliability, the effect of unreliable evidence is reduced, and then get the fusion result that is closer to the truth. An example to expand the advantage of this method is given. The example proves that this method is helpful to find a correct result.展开更多
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se...Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.展开更多
Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these ...Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these features.Although environmental factors such as wind speed are important to distinguish oil spills and look-alikes,some oil spill detection algorithms do not consider the environmental factors.To distinguish oil spills and look-alikes more accurately based on environmental factors and image features,a new oil spill detection algorithm based on Dempster-Shafer evidence theory was proposed.The process of oil spill detection taking account of environmental factors was modeled using the subjective Bayesian model.The Faster-region convolutional neural networks(RCNN)model was used for oil spill detection based on the convolution features.The detection results of the two models were fused at decision level using Dempster-Shafer evidence theory.The establishment and test of the proposed algorithm were completed based on our oil spill and look-alike sample database that contains 1798 image samples and environmental information records related to the image samples.The analysis and evaluation of the proposed algorithm shows a good ability to detect oil spills at a higher detection rate,with an identifi cation rate greater than 75%and a false alarm rate lower than 19%from experiments.A total of 12 oil spill SAR images were collected for the validation and evaluation of the proposed algorithm.The evaluation result shows that the proposed algorithm has a good performance on detecting oil spills with an overall detection rate greater than 70%.展开更多
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific...Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.展开更多
In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-S...In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-Shafer(D-S) evidence theory are proposed at the relay node.Instead of traditional linear detection,the first proposed MIMO-DS NC scheme adopts D-S evidence theory to detect the signals of each source node before mapping them into network-coded signal.Moreover,different from traditional physical-layer network coding(PNC) based on virtual MIMO model,the further proposed MIMO-DS PNC comes from the vector space perspective and combines PNC mapping with D-S theory to obtain network-coded signal without estimating each source node signal.D-S theory can appropriately characterize uncertainty and make full use of multiple evidence source information by Dempster's combination rule to obtain reliable decisions.In the broadcast(BC) phase,the space-time coding(STC) and antenna selection(AS) schemes are adopted to achieve transmit diversity.Simulation results reveal that the STC and AS schemes both achieve full transmit diversity in the BC phase and the proposed MIMO-DS NC/PNC schemes obtain better end-to-end BER performance and throughputs compared with traditional schemes with a little complexity increasing and no matter which scheme is adopted in the BC phase,MIMO-DS PNC always achieves full end-to-end diversity gain as MIMO-ML NC but with a lower complexity and its throughput approaches the throughput of MIMO-ML NC in high SNR regime.展开更多
Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability ...Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability and are used to modify the cognitive failure probability(CFP).However,the levels of CPCs are usually determined by domain experts,whichmay be subjective and uncertain.What’smore,the classicCREAMassumes that the CPCs are independent,which is unrealistic.Ignoring the dependence among CPCs will result in repeated calculations of the influence of the CPCs on CFP and lead to unreasonable reliability evaluation.To address the issue of uncertain information modeling and processing,this paper introduces evidence theory to evaluate the CPC levels in specific scenarios.To address the issue of dependence modeling,the Decision-Making Trial and Evaluation Laboratory(DEMATEL)method is used to process the dependence among CPCs and calculate the relative weights of each CPC,thus modifying the multiplier of the CPCs.The detailed process of the proposed method is illustrated in this paper and the CFP estimated by the proposed method is more reasonable.展开更多
To study the scene classification in the Synthetic Aperture Radar (SAR) image, a novel method based on kernel estimate, with the Maxkov context and Dempster-Shafer evidence theory is proposed. Initially, a nonpaxame...To study the scene classification in the Synthetic Aperture Radar (SAR) image, a novel method based on kernel estimate, with the Maxkov context and Dempster-Shafer evidence theory is proposed. Initially, a nonpaxametric Probability Density Function (PDF) estimate method is introduced, to describe the scene of SAR images. And then under the Maxkov context, both the determinate PDF and the kernel estimate method axe adopted respectively, to form a primary classification. Next, the primary classification results are fused using the evidence theory in an unsupervised way to get the scene classification. Finally, a regularization step is used, in which an iterated maximum selecting approach is introduced to control the fragments and modify the errors of the classification. Use of the kernel estimate and evidence theory can describe the complicated scenes with little prior knowledge and eliminate the ambiguities of the primary classification results. Experimental results on real SAR images illustrate a rather impressive performance.展开更多
Transmembrane proteins are some special and important proteins in cells. Because of their importance and specificity, the prediction of the transmembrane regions has very important theoretical and practical significan...Transmembrane proteins are some special and important proteins in cells. Because of their importance and specificity, the prediction of the transmembrane regions has very important theoretical and practical significance. At present, the prediction methods are mainly based on the physicochemical property and statistic analysis of amino acids. However, these methods are suitable for some environments but inapplicable for other environments. In this paper, the multi-sources information fusion theory has been introduced to predict the transmembrane regions. The proposed method is test on a data set of transmembrane proteins. The results show that the proposed method has the ability of predicting the transmembrane regions as a good performance and powerful tool.展开更多
Cloud computing provides easy and on-demand access to computing resources in a configurable pool.The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using group...Cloud computing provides easy and on-demand access to computing resources in a configurable pool.The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines(VMs),instead of being restricted on a single physical server.When more and more network services are deployed on the cloud,the detection of the intrusion likes Distributed Denialof-Service(DDoS)attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud system.In this paper,we propose a cloud-based intrusion detection system(IDS)which inspects the features of data flow between neighboring VMs,analyzes the probability of being attacked on each pair of VMs and then regards it as independent evidence using Dempster-Shafer theory,and eventually combines the evidence among all pairs of VMs using the method of evidence fusion.Unlike the traditional IDS that focus on analyzing the entire network service externally,our proposed algorithm makes full use of the internal interactions between VMs,and the experiment proved that it can provide more accurate results than the traditional algorithm.展开更多
Aiming at solving the problems such as time consuming and application limiting presented in the existing synchronous cooperative spectrum sensing schemes,a triggered asynchronous scheme based on Dempster-Shafer(D-S) t...Aiming at solving the problems such as time consuming and application limiting presented in the existing synchronous cooperative spectrum sensing schemes,a triggered asynchronous scheme based on Dempster-Shafer(D-S) theory was proposed.Sensing asynchronously,each cognitive user calculated the confidence measure functions with double threshold spectrum sensing method.When the useful report was received by the fusion center,a fusion process would be triggered.Then the sensing results were fused together based on D-S theory.The analysis and simulation results show that the proposed scheme can improve the spectrum sensing efficiency and reduce the calculation amount of the fusion center compared with the existing schemes.展开更多
A Streetcar Named Desire unfolds the tragedy of a southern lady.The conflict betwixt southern Blanche and northern Stanley is the main contradiction in the play.In the end,Stanley drives Blanche crazy and sends her to...A Streetcar Named Desire unfolds the tragedy of a southern lady.The conflict betwixt southern Blanche and northern Stanley is the main contradiction in the play.In the end,Stanley drives Blanche crazy and sends her to an asylum.This paper attempts to analyze Blanche’s identity crisis from identity negotiation theory in cross-cultural communication,including identity security,identity inclusion,and identity predictability.Thereby it figures out that one who suffers hostile gazes from others in a strange environment,is unable to carry out an intimate and effective communication,which will eventually lead to a sense of loss and despair.This paper puts forward the methods to obtain identity recognition:be honest with others,be sure of oneself,and try one’s best to fit in the new environment,aiming to help people avoid identity crisis in interpersonal communication and establish a positive identity.展开更多
In this paper, it is proposed to apply the Dempster-Shafer Theory (DST) or the theory of evidence to map vegetation, aquatic and mineral surfaces with a view to detecting potential areas of observation of outcrops of ...In this paper, it is proposed to apply the Dempster-Shafer Theory (DST) or the theory of evidence to map vegetation, aquatic and mineral surfaces with a view to detecting potential areas of observation of outcrops of geological formations (rocks, breastplates, regolith, etc.). The proposed approach consists in aggregating information by using the DST. From pretreated Aster satellite images (geo-referencing, geometric correction and resampling at 15 m), new channels were produced by determining the spectral indices NDVI, MNDWI and NDBaI. Then, the DST formalism was modeled and generated under the MATLAB software, an image segmented into six classes including three absolute classes (E,V,M) and three classes of confusion ({E,V}, {M,V}, {E,M}). The control on the land, based on geographic coordinates of pixels of different classes on said image, has made it possible to make a concordant interpretation thereof. Our contribution lies in taking into account imperfections (inaccuracies and uncertainties) related to source information by using mass functions based on a simple support model (two focal elements: the discernment framework and the potential set of belonging of the pixel to be classified) with a normal law for the good management of these.展开更多
The Dempster-Shafer theory has been successfully applied to mineral resource potential mapping in GIS environmental. In this applied form, basic probability assignment and combined basic probability assignment are app...The Dempster-Shafer theory has been successfully applied to mineral resource potential mapping in GIS environmental. In this applied form, basic probability assignment and combined basic probability assignment are applied to measuring map pattem and map pattem combination, respectively; and the environment composed of the only two singleton sets (deposit set and non-deposit set), is used for expressing the entire map area. For a subarea in which the certain map pattern combination exists, the combined basic probability assignment corresponding to the map pattern combination existing in this subarea, expresses the belief of inferring the subarea belonging to the deposit set from the evidence that the corresponding map pattern combination existing in the subarea. Thus, it may be served as a statistical index measuring the relative mineral resource potentials of the subarea. And it may be determined like 1) dividing the map area into a series of small equal-sized grid cells and then select the training sample set composed of the well-known grid cells or the entire grid cells; 2) estimating the basic probability assignments corresponding to each map pattern fromthe training sample set; 3) determining the map pattern combination existing in each cell, and then appling the Dempster's Rule of Combination to integrating the all basic probability assignments corresponding to the map patterns existing in the cell into the combined basic probability assignment. Mineral resource potential mapping with the Dempster-Shafer theory is demonstrated on a case study to select mineral resource targets. The experimental results manifest that the model can be compared with the weights of evidence model in the effectiveness of mineral resource target selection.展开更多
As an efficient tool in handling uncertain issues, Dempster-Shafer evidence theory has been increasingly used in structural health monitoring and damage detection. In applications, however, Dempster-Shafer evidence th...As an efficient tool in handling uncertain issues, Dempster-Shafer evidence theory has been increasingly used in structural health monitoring and damage detection. In applications, however, Dempster-Shafer evidence theory sometimes leads to counter-intuitive results. In this study, a new fusion algorithm of evidence theory is put forward to address various counter-intuitive problems and manage the reliability difference of the evidence. The proposed algorithm comprises the following aspects:(1) Dempster's combination rule is generalized by introducing the concept of evidence ullage. The new rule allows classical Dempster's rule and can resolve counter-intuitive problems cause by evidence conflict and evidence compatibility;(2) a reliability assessing method based on a priori and posterior knowledge is proposed. Compared with conventional reliability assessment, the proposed method can reflect the actual evidence reliabilities and can efficiently reduce decision risk. Numerical examples confirm the validity and utility of the proposed algorithm. In addition, an experimental investigation on a spatial truss structure is carried out to illustrate the identified ability of the proposed approach. The results indicate that the fusion algorithm has no strict request on the accuracy and consistency of evidence sources and can efficiently enhance diagnostic accuracy.展开更多
International students choosing to study abroad face a change in self-identity, which in many cases takes them by surprise and which is affected by a multiplicity of factors. Within the framework of Tajfel's Social I...International students choosing to study abroad face a change in self-identity, which in many cases takes them by surprise and which is affected by a multiplicity of factors. Within the framework of Tajfel's Social Identity Theory, we examine the nature of identity and the many contexts in which it is shaped, mainly in reference to the ESL (English as a Second Language) classroom, but with broader implications for the students' experiences in Western classroom as a whole. We discuss the challenges facing not only students, but also faculty who wish to assist students in the formation of their new identities展开更多
文摘“Sisters”is the first novel in Irish-American author Colum McCann’s short story collection-Fishing the Sloe-Black River,which tells the story of Sheona’s search for her identity between Ireland and the United States.Colum McCann is skilled in writing about the spiritual dilemmas and identity search of ethnic minorities living in a foreign land.Employing the space theory and Sheona’s perspective,this paper examines her identity loss in Ireland’s patriarchal system,her migration to the US for identity pursuit,and her subsequent transnational journey between the two nations to reconstruct her identity amidst physical and mental trauma.
文摘An improvement method for the combining rule of Dempster evidence theory is proposed. Different from Dempster theory, the reliability of evidences isn't identical; and varies with the event. By weight evidence according to their reliability, the effect of unreliable evidence is reduced, and then get the fusion result that is closer to the truth. An example to expand the advantage of this method is given. The example proves that this method is helpful to find a correct result.
基金supported by the National Natural Science Foundation of China under Grant No.60903166 the National High Technology Research and Development Program of China(863 Program) under Grants No.2012AA012506,No.2012AA012901,No.2012AA012903+9 种基金 Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20121103120032 the Humanity and Social Science Youth Foundation of Ministry of Education of China under Grant No.13YJCZH065 the Opening Project of Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) under Grant No.C13613 the China Postdoctoral Science Foundation General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No.km201410005012 the Research on Education and Teaching of Beijing University of Technology under Grant No.ER2013C24 the Beijing Municipal Natural Science Foundation Sponsored by Hunan Postdoctoral Scientific Program Open Research Fund of Beijing Key Laboratory of Trusted Computing Funds for the Central Universities, Contract No.2012JBM030
文摘Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.
基金Supported by the National Key R&D Program of China(No.2017YFC1405600)the National Natural Science Foundation of China(Nos.42076197,41576032)the Major Program for the International Cooperation of the Chinese Academy of Sciences(No.133337KYSB20160002)。
文摘Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these features.Although environmental factors such as wind speed are important to distinguish oil spills and look-alikes,some oil spill detection algorithms do not consider the environmental factors.To distinguish oil spills and look-alikes more accurately based on environmental factors and image features,a new oil spill detection algorithm based on Dempster-Shafer evidence theory was proposed.The process of oil spill detection taking account of environmental factors was modeled using the subjective Bayesian model.The Faster-region convolutional neural networks(RCNN)model was used for oil spill detection based on the convolution features.The detection results of the two models were fused at decision level using Dempster-Shafer evidence theory.The establishment and test of the proposed algorithm were completed based on our oil spill and look-alike sample database that contains 1798 image samples and environmental information records related to the image samples.The analysis and evaluation of the proposed algorithm shows a good ability to detect oil spills at a higher detection rate,with an identifi cation rate greater than 75%and a false alarm rate lower than 19%from experiments.A total of 12 oil spill SAR images were collected for the validation and evaluation of the proposed algorithm.The evaluation result shows that the proposed algorithm has a good performance on detecting oil spills with an overall detection rate greater than 70%.
基金Supported by the Ministry of Educationin China (No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.
基金jointly supported by the National Natural Science Foundation of China under Grant 61201198 and 61372089the Beijing Natural Science Foundation under Grant 4132015,4132007and 4132019
文摘In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-Shafer(D-S) evidence theory are proposed at the relay node.Instead of traditional linear detection,the first proposed MIMO-DS NC scheme adopts D-S evidence theory to detect the signals of each source node before mapping them into network-coded signal.Moreover,different from traditional physical-layer network coding(PNC) based on virtual MIMO model,the further proposed MIMO-DS PNC comes from the vector space perspective and combines PNC mapping with D-S theory to obtain network-coded signal without estimating each source node signal.D-S theory can appropriately characterize uncertainty and make full use of multiple evidence source information by Dempster's combination rule to obtain reliable decisions.In the broadcast(BC) phase,the space-time coding(STC) and antenna selection(AS) schemes are adopted to achieve transmit diversity.Simulation results reveal that the STC and AS schemes both achieve full transmit diversity in the BC phase and the proposed MIMO-DS NC/PNC schemes obtain better end-to-end BER performance and throughputs compared with traditional schemes with a little complexity increasing and no matter which scheme is adopted in the BC phase,MIMO-DS PNC always achieves full end-to-end diversity gain as MIMO-ML NC but with a lower complexity and its throughput approaches the throughput of MIMO-ML NC in high SNR regime.
基金Shanghai Rising-Star Program(Grant No.21QA1403400)Shanghai Sailing Program(Grant No.20YF1414800)Shanghai Key Laboratory of Power Station Automation Technology(Grant No.13DZ2273800).
文摘Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability and are used to modify the cognitive failure probability(CFP).However,the levels of CPCs are usually determined by domain experts,whichmay be subjective and uncertain.What’smore,the classicCREAMassumes that the CPCs are independent,which is unrealistic.Ignoring the dependence among CPCs will result in repeated calculations of the influence of the CPCs on CFP and lead to unreasonable reliability evaluation.To address the issue of uncertain information modeling and processing,this paper introduces evidence theory to evaluate the CPC levels in specific scenarios.To address the issue of dependence modeling,the Decision-Making Trial and Evaluation Laboratory(DEMATEL)method is used to process the dependence among CPCs and calculate the relative weights of each CPC,thus modifying the multiplier of the CPCs.The detailed process of the proposed method is illustrated in this paper and the CFP estimated by the proposed method is more reasonable.
基金the National Nature Science Foundation of China (60372057).
文摘To study the scene classification in the Synthetic Aperture Radar (SAR) image, a novel method based on kernel estimate, with the Maxkov context and Dempster-Shafer evidence theory is proposed. Initially, a nonpaxametric Probability Density Function (PDF) estimate method is introduced, to describe the scene of SAR images. And then under the Maxkov context, both the determinate PDF and the kernel estimate method axe adopted respectively, to form a primary classification. Next, the primary classification results are fused using the evidence theory in an unsupervised way to get the scene classification. Finally, a regularization step is used, in which an iterated maximum selecting approach is introduced to control the fragments and modify the errors of the classification. Use of the kernel estimate and evidence theory can describe the complicated scenes with little prior knowledge and eliminate the ambiguities of the primary classification results. Experimental results on real SAR images illustrate a rather impressive performance.
基金Supported by the National Natural Science Foundation of China (No. 60874105, 61174022)the Program for New Century Excellent Talents in University (No. NCET-08-0345)the Chongqing Natural Science Foundation (No. CSCT, 2010BA2003)
文摘Transmembrane proteins are some special and important proteins in cells. Because of their importance and specificity, the prediction of the transmembrane regions has very important theoretical and practical significance. At present, the prediction methods are mainly based on the physicochemical property and statistic analysis of amino acids. However, these methods are suitable for some environments but inapplicable for other environments. In this paper, the multi-sources information fusion theory has been introduced to predict the transmembrane regions. The proposed method is test on a data set of transmembrane proteins. The results show that the proposed method has the ability of predicting the transmembrane regions as a good performance and powerful tool.
文摘Cloud computing provides easy and on-demand access to computing resources in a configurable pool.The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines(VMs),instead of being restricted on a single physical server.When more and more network services are deployed on the cloud,the detection of the intrusion likes Distributed Denialof-Service(DDoS)attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud system.In this paper,we propose a cloud-based intrusion detection system(IDS)which inspects the features of data flow between neighboring VMs,analyzes the probability of being attacked on each pair of VMs and then regards it as independent evidence using Dempster-Shafer theory,and eventually combines the evidence among all pairs of VMs using the method of evidence fusion.Unlike the traditional IDS that focus on analyzing the entire network service externally,our proposed algorithm makes full use of the internal interactions between VMs,and the experiment proved that it can provide more accurate results than the traditional algorithm.
基金Science and Technology Projects of Xuzhou City,China(No.XX10A001)Jiangsu Provincial National Natural Science Foundation of China(No:BK20130199)
文摘Aiming at solving the problems such as time consuming and application limiting presented in the existing synchronous cooperative spectrum sensing schemes,a triggered asynchronous scheme based on Dempster-Shafer(D-S) theory was proposed.Sensing asynchronously,each cognitive user calculated the confidence measure functions with double threshold spectrum sensing method.When the useful report was received by the fusion center,a fusion process would be triggered.Then the sensing results were fused together based on D-S theory.The analysis and simulation results show that the proposed scheme can improve the spectrum sensing efficiency and reduce the calculation amount of the fusion center compared with the existing schemes.
文摘A Streetcar Named Desire unfolds the tragedy of a southern lady.The conflict betwixt southern Blanche and northern Stanley is the main contradiction in the play.In the end,Stanley drives Blanche crazy and sends her to an asylum.This paper attempts to analyze Blanche’s identity crisis from identity negotiation theory in cross-cultural communication,including identity security,identity inclusion,and identity predictability.Thereby it figures out that one who suffers hostile gazes from others in a strange environment,is unable to carry out an intimate and effective communication,which will eventually lead to a sense of loss and despair.This paper puts forward the methods to obtain identity recognition:be honest with others,be sure of oneself,and try one’s best to fit in the new environment,aiming to help people avoid identity crisis in interpersonal communication and establish a positive identity.
文摘In this paper, it is proposed to apply the Dempster-Shafer Theory (DST) or the theory of evidence to map vegetation, aquatic and mineral surfaces with a view to detecting potential areas of observation of outcrops of geological formations (rocks, breastplates, regolith, etc.). The proposed approach consists in aggregating information by using the DST. From pretreated Aster satellite images (geo-referencing, geometric correction and resampling at 15 m), new channels were produced by determining the spectral indices NDVI, MNDWI and NDBaI. Then, the DST formalism was modeled and generated under the MATLAB software, an image segmented into six classes including three absolute classes (E,V,M) and three classes of confusion ({E,V}, {M,V}, {E,M}). The control on the land, based on geographic coordinates of pixels of different classes on said image, has made it possible to make a concordant interpretation thereof. Our contribution lies in taking into account imperfections (inaccuracies and uncertainties) related to source information by using mass functions based on a simple support model (two focal elements: the discernment framework and the potential set of belonging of the pixel to be classified) with a normal law for the good management of these.
基金Sponsored by China Natural Science Funds (No. 40471086) Jiln University Innovative Engineering Funds (No.419070200044)
文摘The Dempster-Shafer theory has been successfully applied to mineral resource potential mapping in GIS environmental. In this applied form, basic probability assignment and combined basic probability assignment are applied to measuring map pattem and map pattem combination, respectively; and the environment composed of the only two singleton sets (deposit set and non-deposit set), is used for expressing the entire map area. For a subarea in which the certain map pattern combination exists, the combined basic probability assignment corresponding to the map pattern combination existing in this subarea, expresses the belief of inferring the subarea belonging to the deposit set from the evidence that the corresponding map pattern combination existing in the subarea. Thus, it may be served as a statistical index measuring the relative mineral resource potentials of the subarea. And it may be determined like 1) dividing the map area into a series of small equal-sized grid cells and then select the training sample set composed of the well-known grid cells or the entire grid cells; 2) estimating the basic probability assignments corresponding to each map pattern fromthe training sample set; 3) determining the map pattern combination existing in each cell, and then appling the Dempster's Rule of Combination to integrating the all basic probability assignments corresponding to the map patterns existing in the cell into the combined basic probability assignment. Mineral resource potential mapping with the Dempster-Shafer theory is demonstrated on a case study to select mineral resource targets. The experimental results manifest that the model can be compared with the weights of evidence model in the effectiveness of mineral resource target selection.
基金National Natural Science Foundation of China under Grant No.51708446
文摘As an efficient tool in handling uncertain issues, Dempster-Shafer evidence theory has been increasingly used in structural health monitoring and damage detection. In applications, however, Dempster-Shafer evidence theory sometimes leads to counter-intuitive results. In this study, a new fusion algorithm of evidence theory is put forward to address various counter-intuitive problems and manage the reliability difference of the evidence. The proposed algorithm comprises the following aspects:(1) Dempster's combination rule is generalized by introducing the concept of evidence ullage. The new rule allows classical Dempster's rule and can resolve counter-intuitive problems cause by evidence conflict and evidence compatibility;(2) a reliability assessing method based on a priori and posterior knowledge is proposed. Compared with conventional reliability assessment, the proposed method can reflect the actual evidence reliabilities and can efficiently reduce decision risk. Numerical examples confirm the validity and utility of the proposed algorithm. In addition, an experimental investigation on a spatial truss structure is carried out to illustrate the identified ability of the proposed approach. The results indicate that the fusion algorithm has no strict request on the accuracy and consistency of evidence sources and can efficiently enhance diagnostic accuracy.
文摘International students choosing to study abroad face a change in self-identity, which in many cases takes them by surprise and which is affected by a multiplicity of factors. Within the framework of Tajfel's Social Identity Theory, we examine the nature of identity and the many contexts in which it is shaped, mainly in reference to the ESL (English as a Second Language) classroom, but with broader implications for the students' experiences in Western classroom as a whole. We discuss the challenges facing not only students, but also faculty who wish to assist students in the formation of their new identities