期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Evidence fusion procedure based on hybrid DSm model 被引量:2
1
作者 Hongfei Li Hongbin Jin Kangsheng Tian 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第6期959-967,共9页
Dezert-Smarandache(DSm) theory, a new information fusion theory, is widely applied in image processing, multiple targets tracking identification, and other areas for its excellent processing ability of imperfect inf... Dezert-Smarandache(DSm) theory, a new information fusion theory, is widely applied in image processing, multiple targets tracking identification, and other areas for its excellent processing ability of imperfect information. However, earlier research on DSm theory mainly focused on one sort of questions. An evidence fusion procedure is proposed based on the hybrid DSm model to compensate for a lack of research on the entire information procedure of DSm theory. This paper analyzes the evidence fusion procedure, as well as correlative node input and output information. Key steps and detailed procedures of evidence fusion are also discussed. Finally, an experiment illustrates the efficiency of the proposed evidence fusion procedure. 展开更多
关键词 Dezert-Smarandache(DSm) theory evidence fusion procedure hybrid DSm model information fusion
下载PDF
A New Fusion Method for Conflicting Evidence
2
作者 彭颖 沈怀荣 马永一 《Defence Technology(防务技术)》 SCIE EI CAS 2011年第3期180-187,共8页
A new conflicting evidence fusion method is proposed for the deficiency of Dempster's rule which can not fuse the conflicting evidence. Evidence is divided into three categories:believable evidence, non-conflictin... A new conflicting evidence fusion method is proposed for the deficiency of Dempster's rule which can not fuse the conflicting evidence. Evidence is divided into three categories:believable evidence, non-conflicting evidence and conflicting evidence. The influences of these three categories of evidences on fusion results when discounted are analyzed respectively. On these bases, the evidence distance and the conjunctive conflict are utilized in sequence to recognize the believable evidence and non-conflicting evidence. The discounting factors of these two categories of evidences are set to one, which keeps the evidences support the true hypothesis to the greatest degree, and makes the fusion results focus onto the true hypothesis. Examples of some missile fault diagnosis show that the new method can effectively fuse the conflicting evidences, and is suited to fuse the relievable evidences. The new method improves the reliability and rationality of fusion results compared with traditional methods. 展开更多
关键词 artificial intelligence Dempster-Shafer theory CONFLICT evidence discount evidence fusion
下载PDF
D-S证据理论在审计证据融合中的应用研究 被引量:2
3
作者 陈圣磊 陈耿 薛晖 《计算机工程与应用》 CSCD 北大核心 2010年第36期23-25,共3页
古典概率难以解释审计判断的不确定性,而D-S证据理论是进行不确定性推理的有效方法,因此应用D-S证据理论进行审计证据融合的研究。针对审计证据的组合问题,提出了基于三角形模糊隶属度函数的基本概率分配函数计算方法,给出了证据组合结... 古典概率难以解释审计判断的不确定性,而D-S证据理论是进行不确定性推理的有效方法,因此应用D-S证据理论进行审计证据融合的研究。针对审计证据的组合问题,提出了基于三角形模糊隶属度函数的基本概率分配函数计算方法,给出了证据组合结果的判决规则,并通过实例验证了该方法的有效性。 展开更多
关键词 证据理论 审计证据 证据融合 信任函数 模糊隶属度
下载PDF
Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory
4
作者 Chak Fong Cheang Yiqin Wang +1 位作者 Zhiping Cai Gen Xu 《Computers, Materials & Continua》 SCIE EI 2018年第11期297-306,共10页
Cloud computing provides easy and on-demand access to computing resources in a configurable pool.The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using group... Cloud computing provides easy and on-demand access to computing resources in a configurable pool.The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines(VMs),instead of being restricted on a single physical server.When more and more network services are deployed on the cloud,the detection of the intrusion likes Distributed Denialof-Service(DDoS)attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud system.In this paper,we propose a cloud-based intrusion detection system(IDS)which inspects the features of data flow between neighboring VMs,analyzes the probability of being attacked on each pair of VMs and then regards it as independent evidence using Dempster-Shafer theory,and eventually combines the evidence among all pairs of VMs using the method of evidence fusion.Unlike the traditional IDS that focus on analyzing the entire network service externally,our proposed algorithm makes full use of the internal interactions between VMs,and the experiment proved that it can provide more accurate results than the traditional algorithm. 展开更多
关键词 Intrusion detection cloud computing Dempster-Shafer theory evidence fusion
下载PDF
A novel approximation of basic probability assignment based on rank-level fusion 被引量:4
5
作者 Yang Yi Han Deqiang +1 位作者 Han Chongzhao Cao Feng 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第4期993-999,共7页
Belief functions theory is an important tool in the field of information fusion. However, when the cardinality of the frame of discernment becomes large, the high computational cost of evidence combination will become... Belief functions theory is an important tool in the field of information fusion. However, when the cardinality of the frame of discernment becomes large, the high computational cost of evidence combination will become the bottleneck of belief functions theory in real applications. The basic probability assignment (BPA) approximations, which can reduce the complexity of the BPAs, are always used to reduce the computational cost of evidence combination. In this paper, both the cardinalities and the mass assignment values of focal elements are used as the criteria of reduction. The two criteria are jointly used by using rank-level fusion. Some experiments and related analyses are provided to illustrate and justify the proposed new BPA approximation approach. 展开更多
关键词 Belief approximation Distance of evidence evidence combination Information fusion Rank-level fusion
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部