How to effectively evaluate the firing precision of weapon equipment at low cost is one of the core contents of improving the test level of weapon system.A new method to evaluate the firing precision of the MLRS consi...How to effectively evaluate the firing precision of weapon equipment at low cost is one of the core contents of improving the test level of weapon system.A new method to evaluate the firing precision of the MLRS considering the credibility of simulation system based on Bayesian theory is proposed in this paper.First of all,a comprehensive index system for the credibility of the simulation system of the firing precision of the MLRS is constructed combined with the group analytic hierarchy process.A modified method for determining the comprehensive weight of the index is established to improve the rationality of the index weight coefficients.The Bayesian posterior estimation formula of firing precision considering prior information is derived in the form of mixed prior distribution,and the rationality of prior information used in estimation model is discussed quantitatively.With the simulation tests,the different evaluation methods are compared to validate the effectiveness of the proposed method.Finally,the experimental results show that the effectiveness of estimation method for firing precision is improved by more than 25%.展开更多
In this study, a blockchain based federated learning system using an enhanced weighted mean vector optimization algorithm, known as EINFO, is proposed. The proposed EINFO addresses the limitations of federated averagi...In this study, a blockchain based federated learning system using an enhanced weighted mean vector optimization algorithm, known as EINFO, is proposed. The proposed EINFO addresses the limitations of federated averaging during global update and model training, where data is unevenly distributed among devices and there are variations in the number of data samples. Using a well-defined structure and updating the vector positions by local searching, vector combining, and updating rules, the EINFO algorithm maximizes the shared model parameters. In order to increase the exploration and exploitation capabilities, the model convergence rate is improved and new vectors are generated through the use of a weighted mean vector based on the inverse square law. To choose validators, miners, and to propagate new blocks, a delegated proof of stake based on the reliability of blockchain nodes is suggested. Federated learning is included into the blockchain to protect nodes from both external and internal threats. To determine how well the suggested system performs in relation to current models in the literature, extensive simulations are run. The simulation results show that the proposed system outperforms existing schemes in terms of accuracy, sensitivity and specificity.展开更多
Government credibility is an important asset of contemporary national governance, an important criterion for evaluating government legitimacy, and a key factor in measuring the effectiveness of government governance. ...Government credibility is an important asset of contemporary national governance, an important criterion for evaluating government legitimacy, and a key factor in measuring the effectiveness of government governance. In recent years, researchers’ research on government credibility has mostly focused on exploring theories and mechanisms, with little empirical research on this topic. This article intends to apply variable selection models in the field of social statistics to the issue of government credibility, in order to achieve empirical research on government credibility and explore its core influencing factors from a statistical perspective. Specifically, this article intends to use four regression-analysis-based methods and three random-forest-based methods to study the influencing factors of government credibility in various provinces in China, and compare the performance of these seven variable selection methods in different dimensions. The research results show that there are certain differences in simplicity, accuracy, and variable importance ranking among different variable selection methods, which present different importance in the study of government credibility issues. This study provides a methodological reference for variable selection models in the field of social science research, and also offers a multidimensional comparative perspective for analyzing the influencing factors of government credibility.展开更多
It is quite often that the theoretic model used in the Kalman filtering may not be sufficiently accurate for practical applications,due to the fact that the covariances of noises are not exactly known.Our previous wor...It is quite often that the theoretic model used in the Kalman filtering may not be sufficiently accurate for practical applications,due to the fact that the covariances of noises are not exactly known.Our previous work reveals that in such scenario the filter calculated mean square errors(FMSE)and the true mean square errors(TMSE)become inconsistent,while FMSE and TMSE are consistent in the Kalman filter with accurate models.This can lead to low credibility of state estimation regardless of using Kalman filters or adaptive Kalman filters.Obviously,it is important to study the inconsistency issue since it is vital to understand the quantitative influence induced by the inaccurate models.Aiming at this,the concept of credibility is adopted to discuss the inconsistency problem in this paper.In order to formulate the degree of the credibility,a trust factor is constructed based on the FMSE and the TMSE.However,the trust factor can not be directly computed since the TMSE cannot be found for practical applications.Based on the definition of trust factor,the estimation of the trust factor is successfully modified to online estimation of the TMSE.More importantly,a necessary and sufficient condition is found,which turns out to be the basis for better design of Kalman filters with high performance.Accordingly,beyond trust factor estimation with Sage-Husa technique(TFE-SHT),three novel trust factor estimation methods,which are directly numerical solving method(TFE-DNS),the particle swarm optimization method(PSO)and expectation maximization-particle swarm optimization method(EM-PSO)are proposed.The analysis and simulation results both show that the proposed TFE-DNS is better than the TFE-SHT for the case of single unknown noise covariance.Meanwhile,the proposed EMPSO performs completely better than the EM and PSO on the estimation of the credibility degree and state when both noise covariances should be estimated online.展开更多
The growth of the internet and technology has had a significant effect on social interactions.False information has become an important research topic due to the massive amount of misinformed content on social network...The growth of the internet and technology has had a significant effect on social interactions.False information has become an important research topic due to the massive amount of misinformed content on social networks.It is very easy for any user to spread misinformation through the media.Therefore,misinformation is a problem for professionals,organizers,and societies.Hence,it is essential to observe the credibility and validity of the News articles being shared on social media.The core challenge is to distinguish the difference between accurate and false information.Recent studies focus on News article content,such as News titles and descriptions,which has limited their achievements.However,there are two ordinarily agreed-upon features of misinformation:first,the title and text of an article,and second,the user engagement.In the case of the News context,we extracted different user engagements with articles,for example,tweets,i.e.,read-only,user retweets,likes,and shares.We calculate user credibility and combine it with article content with the user’s context.After combining both features,we used three Natural language processing(NLP)feature extraction techniques,i.e.,Term Frequency-Inverse Document Frequency(TF-IDF),Count-Vectorizer(CV),and Hashing-Vectorizer(HV).Then,we applied different machine learning classifiers to classify misinformation as real or fake.Therefore,we used a Support Vector Machine(SVM),Naive Byes(NB),Random Forest(RF),Decision Tree(DT),Gradient Boosting(GB),and K-Nearest Neighbors(KNN).The proposed method has been tested on a real-world dataset,i.e.,“fakenewsnet”.We refine the fakenewsnet dataset repository according to our required features.The dataset contains 23000+articles with millions of user engagements.The highest accuracy score is 93.4%.The proposed model achieves its highest accuracy using count vector features and a random forest classifier.Our discoveries confirmed that the proposed classifier would effectively classify misinformation in social networks.展开更多
More and more uncertain factors in power systems and more and more complex operation modes of power systems put forward higher requirements for online transient stability assessment methods.The traditional modeldriven...More and more uncertain factors in power systems and more and more complex operation modes of power systems put forward higher requirements for online transient stability assessment methods.The traditional modeldriven methods have clear physical mechanisms and reliable evaluation results but the calculation process is time-consuming,while the data-driven methods have the strong fitting ability and fast calculation speed but the evaluation results lack interpretation.Therefore,it is a future development trend of transient stability assessment methods to combine these two kinds of methods.In this paper,the rate of change of the kinetic energy method is used to calculate the transient stability in the model-driven stage,and the support vector machine and extreme learning machine with different internal principles are respectively used to predict the transient stability in the data-driven stage.In order to quantify the credibility level of the data-driven methods,the credibility index of the output results is proposed.Then the switching function controlling whether the rate of change of the kinetic energy method is activated or not is established based on this index.Thus,a newparallel integratedmodel-driven and datadriven online transient stability assessment method is proposed.The accuracy,efficiency,and adaptability of the proposed method are verified by numerical examples.展开更多
With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is ...With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is the key to organically maximizing their efficiency.However,in the context of increasingly strict global data security supervision and compliance,numerous problems,including complex types of connected vehicle data,poor data collaboration between the IT(information technology)domain and OT(operation technology)domain,different data format standards,lack of shared trust sources,difficulty in ensuring the quality of shared data,lack of data control rights,as well as difficulty in defining data ownership,make vehicle data sharing face a lot of problems,and data islands are widespread.This study proposes FADSF(Fuzzy Anonymous Data Share Frame),an automobile data sharing scheme based on blockchain.The data holder publishes the shared data information and forms the corresponding label storage on the blockchain.The data demander browses the data directory information to select and purchase data assets and verify them.The data demander selects and purchases data assets and verifies them by browsing the data directory information.Meanwhile,this paper designs a data structure Data Discrimination Bloom Filter(DDBF),making complaints about illegal data.When the number of data complaints reaches the threshold,the audit traceability contract is triggered to punish the illegal data publisher,aiming to improve the data quality and maintain a good data sharing ecology.In this paper,based on Ethereum,the above scheme is tested to demonstrate its feasibility,efficiency and security.展开更多
Computer simulation models may by used to gain further information about missile performance variability. Model validation is an important aspect of the test program for a missile system. Validation provides a basis f...Computer simulation models may by used to gain further information about missile performance variability. Model validation is an important aspect of the test program for a missile system. Validation provides a basis for confidence in the model's results and is a necessary step if the model is to be used to draw inference about the behavior of the real missile. This paper is a review of methods useful for validation of computer simulation models of missile systems and provides a new method with high degree of confidence for validation of computer simulation models of missile systems. Some examples of the use of the new method in validating computer simulation models are given.展开更多
LINEX(linear and exponential) loss function is a useful asymmetric loss function. The purpose of using a LINEX loss function in credibility models is to solve the problem of very high premium by suing a symmetric quad...LINEX(linear and exponential) loss function is a useful asymmetric loss function. The purpose of using a LINEX loss function in credibility models is to solve the problem of very high premium by suing a symmetric quadratic loss function in most of classical credibility models. The Bayes premium and the credibility premium are derived under LINEX loss function. The consistency of Bayes premium and credibility premium were also checked. Finally, the simulation was introduced to show the differences between the credibility estimator we derived and the classical one.展开更多
In the hierarchical random effect linear model, the Bayes estimator of random parameter are not only dependent on specific prior distribution but also it is difficult to calculate in most cases. This paper derives the...In the hierarchical random effect linear model, the Bayes estimator of random parameter are not only dependent on specific prior distribution but also it is difficult to calculate in most cases. This paper derives the distributed-free optimal linear estimator of random parameters in the model by means of the credibility theory method. The estimators the authors derive can be applied in more extensive practical scenarios since they are only dependent on the first two moments of prior parameter rather than on specific prior distribution. Finally, the results are compared with some classical models and a numerical example is given to show the effectiveness of the estimators.展开更多
With the wide applications of sensor network technology in traffic information acquisition systems,a new measure will be quite necessary to evaluate spatially related properties of traffic information credibility.The ...With the wide applications of sensor network technology in traffic information acquisition systems,a new measure will be quite necessary to evaluate spatially related properties of traffic information credibility.The heterogeneity of spatial distribution of information credibility from sensor networks is analyzed and a new measure,information credibility function(ICF),is proposed to describe this heterogeneity.Three possible functional forms of sensor ICF and their corresponding expressions are presented.Then,two feasible operations of spatial superposition of sensor ICFs are discussed.Finally,a numerical example is introduced to show the calibration method of sensor ICF and obtain the spatially related properties of expressway in Beijing.The results show that the sensor ICF of expressway in Beijing possesses a negative exponent property.The traffic information is more abundant at or near the locations of sensor,while with the distance away from the sensor increasing,the traffic information credibility will be declined by an exponential trend.The new measure provides theoretical bases for the optimal locations of traffic sensor networks and the mechanism research of spatial distribution of traffic information credibility.展开更多
The Confucianism has played a prominent role for thousands of years in boosting the tenacity of the Chinese nation towards innovation and development as well as in promoting and inheriting the traditional Chinese cult...The Confucianism has played a prominent role for thousands of years in boosting the tenacity of the Chinese nation towards innovation and development as well as in promoting and inheriting the traditional Chinese culture. Based on the five constant virtues of Confucianism,this paper analyzes the relationship between "benevolence,righteousness,etiquette,wisdom and credit"and creditability that We Media should construct,and elaborates the construction of value dimension system of We Media's creditability on talents, environments,orientations and innovations from four aspects. Namely,the cognitive and spiritual orientations that reinforce the five constant virtues,the propaganda cultivation that fuses them and the endogenous impetus stimulated by using them as reference.This paper is designed to tell all of the media and media practitioners to constantly remain vigilant of the social responsibilities they are taking and the social value they should create.T hey should take an initiative to guide their serving objects to foster a proper consensus outlook and value and meeting the mass audience's demands and desires on information.展开更多
Evaluation is the major activity of performing Verification, Validation and Accreditation (VV&A) of a simulation system. Unfortunately, there is a lack of reasonable and operable evaluation methods. Moreover, ther...Evaluation is the major activity of performing Verification, Validation and Accreditation (VV&A) of a simulation system. Unfortunately, there is a lack of reasonable and operable evaluation methods. Moreover, there are other problems to address in VV&A evaluation, such as index definition, conclusion analysis, etc. In this paper, a VV&A evaluation system is introduced to try to resolve these problems. The system is based on a method called hierarchical evaluation, and it uses a good combination of evaluation processes and indexes. First, a thorough analysis of the VV&A evaluation’s essentials and principles are given, then the uncertainty of the evaluation results caused by various analysis of the evaluators is pointed out, then a hierarchical evaluation mechanism based on evaluator weight and evaluation hierarchy is brought forward, and finally a comprehensive VV&A evaluation system with evaluation flow processing, index management and hierarchical evaluation fulfillment is established. The system gives good consideration to ease of operation, reasonableness of evaluation conclusion, and the ability to comprehensively resolve VV&A problems. Since VV&A is attracting more and more recognition, it is meaningful to provide a good system for implementing credible simulation systems. It is hoped that this VV&A evaluation will provide a good way.展开更多
The development of Global Energy Interconnection(GEI)is essential for supporting a wide range of basic data resources.The Global Energy Interconnection Development and Cooperation Organization has established a compre...The development of Global Energy Interconnection(GEI)is essential for supporting a wide range of basic data resources.The Global Energy Interconnection Development and Cooperation Organization has established a comprehensive data center covering six major systems.However,methods for accurately describing and scientifically evaluating the credibility of the massive amount of GEI data remain underdeveloped.To address this lack of such methods,a GEI data credibility quantitative evaluation model is proposed here.An evaluation indicator system is established to evaluate data credibility from multiple perspectives and ensure the comprehensiveness and impartiality of evaluation results.The Cloud Model abandons the hard division of comments to ensure objectivity and accuracy in evaluation results.To evaluate the suitability of the proposed method,a case analysis is conducted,wherein the proposed method demonstrates sufficient validity and feasibility.展开更多
A writer's decision to localize a news article and the valence of the frame the writer employs can affect readers' perceptions of credibility and bias as well as readers' factual recall and the likelihood that read...A writer's decision to localize a news article and the valence of the frame the writer employs can affect readers' perceptions of credibility and bias as well as readers' factual recall and the likelihood that readers would want to read the newspaper further. A 2 (proximity: local, non-local) ~ 3 (frame valence: positive, neutral, negative) factorial experiment (N = 136) tested the effects of proximity and frame valence on credibility, perceived bias, recall, and reading intentions. Articles that localized enjoyed greater perceptions of credibility but not recall, while articles with either a positive or negative frame yielded greater recall than articles with a neutral frame. Neither factor exhibited a main effect in predicting perceived bias, but their interaction was a significant predictor. In addition, localization and frame valence also influence the likelihood that participants would want to read the source newspaper again. Implications for theory and media practice are discussed.展开更多
Digital evidence investigation in QQ software is the current research focus.In order to identify the authenticity and credibility of QQ chat records,the method based on attacking QQ chat records is proposed.Firstly,an...Digital evidence investigation in QQ software is the current research focus.In order to identify the authenticity and credibility of QQ chat records,the method based on attacking QQ chat records is proposed.Firstly,an evaluation model on checking the authenticity of QQ chat records is proposed.The cases on kinds of changing QQ chat records are discussed.The challenge in identifying the authenticity of QQ chat records is raised.Secondly,case study on attacking QQ chat records is proposed to check the relationship between the authenticity of QQ chat records and the difficulty of changing them.A couple of experiments on changing QQ chat records are finished to find how difficult changing records is and whether there are clues left on changing them or not.Finally,a kind of QQ chat forensic process is presented,which can help for digital evidence investigation in the authenticity and credibility of QQ chat records.The practices in QQ forensic cases show that it works well.展开更多
A method for modeling the parallel machine scheduling problems with fuzzy parameters and precedence constraints based on credibility measure is provided. For the given n jobs to be processed on m machines, it is assum...A method for modeling the parallel machine scheduling problems with fuzzy parameters and precedence constraints based on credibility measure is provided. For the given n jobs to be processed on m machines, it is assumed that the processing times and the due dates are nonnegative fuzzy numbers and all the weights are positive, crisp numbers. Based on credibility measure, three parallel machine scheduling problems and a goal-programming model are formulated. Feasible schedules are evaluated not only by their objective values but also by the credibility degree of satisfaction with their precedence constraints. The genetic algorithm is utilized to find the best solutions in a short period of time. An illustrative numerical example is also given. Simulation results show that the proposed models are effective, which can deal with the parallel machine scheduling problems with fuzzy parameters and precedence constraints based on credibility measure.展开更多
An approach to characterize the credibility of beliefs of an agent is proposed in this paper, which can define the uncertainty of beliefs, calculation rules and inference rules about credibility and a method for belie...An approach to characterize the credibility of beliefs of an agent is proposed in this paper, which can define the uncertainty of beliefs, calculation rules and inference rules about credibility and a method for belief revision based on abductive reasoning is also given. When an agent receives some new information, if the new information is consistent with the current belief set, then incorporate this new information with an appropriate credibility, otherwise the choice will be different depending on the characters of agents, and the deliberated agents will choose the belief with a better explanation under the current belief set. Removing one belief may cause the removal of those beliefs that, together with others, logically entail the formula to be removed. A method based on abduction is proposed to solve these problems.展开更多
The numerical characteristics of fuzzy numbers include the optimistic value, pessimistic value, expected value, and the variance. We mainly provide the calculation formulae of several numerical characteristics of fuzz...The numerical characteristics of fuzzy numbers include the optimistic value, pessimistic value, expected value, and the variance. We mainly provide the calculation formulae of several numerical characteristics of fuzzy numbers based on credibility measure. Especially, the variance of symmetric fuzzy numbers is formulated, and a super bound for the variance of fuzzy numbers is presented. Meanwhile, some conclusions relative to credibility measure, optimistic and pessimistic values are also given.展开更多
The paper develops a design of optimal Bonus-Malus System (BMS) based on exact equitable credibility,in which the relative error function is taken as loss function. In BMS,both the frequency and the severity compone...The paper develops a design of optimal Bonus-Malus System (BMS) based on exact equitable credibility,in which the relative error function is taken as loss function. In BMS,both the frequency and the severity components are considered. This design is compared with traditional BMS derived from classical squared-error loss function.展开更多
基金National Natural Science Foundation of China(Grant Nos.11972193 and 92266201)。
文摘How to effectively evaluate the firing precision of weapon equipment at low cost is one of the core contents of improving the test level of weapon system.A new method to evaluate the firing precision of the MLRS considering the credibility of simulation system based on Bayesian theory is proposed in this paper.First of all,a comprehensive index system for the credibility of the simulation system of the firing precision of the MLRS is constructed combined with the group analytic hierarchy process.A modified method for determining the comprehensive weight of the index is established to improve the rationality of the index weight coefficients.The Bayesian posterior estimation formula of firing precision considering prior information is derived in the form of mixed prior distribution,and the rationality of prior information used in estimation model is discussed quantitatively.With the simulation tests,the different evaluation methods are compared to validate the effectiveness of the proposed method.Finally,the experimental results show that the effectiveness of estimation method for firing precision is improved by more than 25%.
文摘In this study, a blockchain based federated learning system using an enhanced weighted mean vector optimization algorithm, known as EINFO, is proposed. The proposed EINFO addresses the limitations of federated averaging during global update and model training, where data is unevenly distributed among devices and there are variations in the number of data samples. Using a well-defined structure and updating the vector positions by local searching, vector combining, and updating rules, the EINFO algorithm maximizes the shared model parameters. In order to increase the exploration and exploitation capabilities, the model convergence rate is improved and new vectors are generated through the use of a weighted mean vector based on the inverse square law. To choose validators, miners, and to propagate new blocks, a delegated proof of stake based on the reliability of blockchain nodes is suggested. Federated learning is included into the blockchain to protect nodes from both external and internal threats. To determine how well the suggested system performs in relation to current models in the literature, extensive simulations are run. The simulation results show that the proposed system outperforms existing schemes in terms of accuracy, sensitivity and specificity.
文摘Government credibility is an important asset of contemporary national governance, an important criterion for evaluating government legitimacy, and a key factor in measuring the effectiveness of government governance. In recent years, researchers’ research on government credibility has mostly focused on exploring theories and mechanisms, with little empirical research on this topic. This article intends to apply variable selection models in the field of social statistics to the issue of government credibility, in order to achieve empirical research on government credibility and explore its core influencing factors from a statistical perspective. Specifically, this article intends to use four regression-analysis-based methods and three random-forest-based methods to study the influencing factors of government credibility in various provinces in China, and compare the performance of these seven variable selection methods in different dimensions. The research results show that there are certain differences in simplicity, accuracy, and variable importance ranking among different variable selection methods, which present different importance in the study of government credibility issues. This study provides a methodological reference for variable selection models in the field of social science research, and also offers a multidimensional comparative perspective for analyzing the influencing factors of government credibility.
基金supported by the National Natural Science Foundation of China(62033010)Aeronautical Science Foundation of China(2019460T5001)。
文摘It is quite often that the theoretic model used in the Kalman filtering may not be sufficiently accurate for practical applications,due to the fact that the covariances of noises are not exactly known.Our previous work reveals that in such scenario the filter calculated mean square errors(FMSE)and the true mean square errors(TMSE)become inconsistent,while FMSE and TMSE are consistent in the Kalman filter with accurate models.This can lead to low credibility of state estimation regardless of using Kalman filters or adaptive Kalman filters.Obviously,it is important to study the inconsistency issue since it is vital to understand the quantitative influence induced by the inaccurate models.Aiming at this,the concept of credibility is adopted to discuss the inconsistency problem in this paper.In order to formulate the degree of the credibility,a trust factor is constructed based on the FMSE and the TMSE.However,the trust factor can not be directly computed since the TMSE cannot be found for practical applications.Based on the definition of trust factor,the estimation of the trust factor is successfully modified to online estimation of the TMSE.More importantly,a necessary and sufficient condition is found,which turns out to be the basis for better design of Kalman filters with high performance.Accordingly,beyond trust factor estimation with Sage-Husa technique(TFE-SHT),three novel trust factor estimation methods,which are directly numerical solving method(TFE-DNS),the particle swarm optimization method(PSO)and expectation maximization-particle swarm optimization method(EM-PSO)are proposed.The analysis and simulation results both show that the proposed TFE-DNS is better than the TFE-SHT for the case of single unknown noise covariance.Meanwhile,the proposed EMPSO performs completely better than the EM and PSO on the estimation of the credibility degree and state when both noise covariances should be estimated online.
文摘The growth of the internet and technology has had a significant effect on social interactions.False information has become an important research topic due to the massive amount of misinformed content on social networks.It is very easy for any user to spread misinformation through the media.Therefore,misinformation is a problem for professionals,organizers,and societies.Hence,it is essential to observe the credibility and validity of the News articles being shared on social media.The core challenge is to distinguish the difference between accurate and false information.Recent studies focus on News article content,such as News titles and descriptions,which has limited their achievements.However,there are two ordinarily agreed-upon features of misinformation:first,the title and text of an article,and second,the user engagement.In the case of the News context,we extracted different user engagements with articles,for example,tweets,i.e.,read-only,user retweets,likes,and shares.We calculate user credibility and combine it with article content with the user’s context.After combining both features,we used three Natural language processing(NLP)feature extraction techniques,i.e.,Term Frequency-Inverse Document Frequency(TF-IDF),Count-Vectorizer(CV),and Hashing-Vectorizer(HV).Then,we applied different machine learning classifiers to classify misinformation as real or fake.Therefore,we used a Support Vector Machine(SVM),Naive Byes(NB),Random Forest(RF),Decision Tree(DT),Gradient Boosting(GB),and K-Nearest Neighbors(KNN).The proposed method has been tested on a real-world dataset,i.e.,“fakenewsnet”.We refine the fakenewsnet dataset repository according to our required features.The dataset contains 23000+articles with millions of user engagements.The highest accuracy score is 93.4%.The proposed model achieves its highest accuracy using count vector features and a random forest classifier.Our discoveries confirmed that the proposed classifier would effectively classify misinformation in social networks.
基金funded by the Science and Technology Project of State Grid Shanxi Electric Power Co.,Ltd.(Project No.520530200013).
文摘More and more uncertain factors in power systems and more and more complex operation modes of power systems put forward higher requirements for online transient stability assessment methods.The traditional modeldriven methods have clear physical mechanisms and reliable evaluation results but the calculation process is time-consuming,while the data-driven methods have the strong fitting ability and fast calculation speed but the evaluation results lack interpretation.Therefore,it is a future development trend of transient stability assessment methods to combine these two kinds of methods.In this paper,the rate of change of the kinetic energy method is used to calculate the transient stability in the model-driven stage,and the support vector machine and extreme learning machine with different internal principles are respectively used to predict the transient stability in the data-driven stage.In order to quantify the credibility level of the data-driven methods,the credibility index of the output results is proposed.Then the switching function controlling whether the rate of change of the kinetic energy method is activated or not is established based on this index.Thus,a newparallel integratedmodel-driven and datadriven online transient stability assessment method is proposed.The accuracy,efficiency,and adaptability of the proposed method are verified by numerical examples.
基金This work was financially supported by the National Key Research and Development Program of China(2022YFB3103200).
文摘With the development of technology,the connected vehicle has been upgraded from a traditional transport vehicle to an information terminal and energy storage terminal.The data of ICV(intelligent connected vehicles)is the key to organically maximizing their efficiency.However,in the context of increasingly strict global data security supervision and compliance,numerous problems,including complex types of connected vehicle data,poor data collaboration between the IT(information technology)domain and OT(operation technology)domain,different data format standards,lack of shared trust sources,difficulty in ensuring the quality of shared data,lack of data control rights,as well as difficulty in defining data ownership,make vehicle data sharing face a lot of problems,and data islands are widespread.This study proposes FADSF(Fuzzy Anonymous Data Share Frame),an automobile data sharing scheme based on blockchain.The data holder publishes the shared data information and forms the corresponding label storage on the blockchain.The data demander browses the data directory information to select and purchase data assets and verify them.The data demander selects and purchases data assets and verifies them by browsing the data directory information.Meanwhile,this paper designs a data structure Data Discrimination Bloom Filter(DDBF),making complaints about illegal data.When the number of data complaints reaches the threshold,the audit traceability contract is triggered to punish the illegal data publisher,aiming to improve the data quality and maintain a good data sharing ecology.In this paper,based on Ethereum,the above scheme is tested to demonstrate its feasibility,efficiency and security.
文摘Computer simulation models may by used to gain further information about missile performance variability. Model validation is an important aspect of the test program for a missile system. Validation provides a basis for confidence in the model's results and is a necessary step if the model is to be used to draw inference about the behavior of the real missile. This paper is a review of methods useful for validation of computer simulation models of missile systems and provides a new method with high degree of confidence for validation of computer simulation models of missile systems. Some examples of the use of the new method in validating computer simulation models are given.
基金Supported by the NNSF of China(71001046)Supported by the NSF of Jiangxi Province(20114BAB211004)
文摘LINEX(linear and exponential) loss function is a useful asymmetric loss function. The purpose of using a LINEX loss function in credibility models is to solve the problem of very high premium by suing a symmetric quadratic loss function in most of classical credibility models. The Bayes premium and the credibility premium are derived under LINEX loss function. The consistency of Bayes premium and credibility premium were also checked. Finally, the simulation was introduced to show the differences between the credibility estimator we derived and the classical one.
基金supported by the National Science Foundation of China under Grant Nos.71361015,71340010,71371074the Jiangxi Provincial Natural Science Foundation under Grant No.20142BAB201013+2 种基金China Postdoctoral Science Foundation under Grant No.2013M540534China Postdoctoral Fund special Project under Grant No.2014T70615Jiangxi Postdoctoral Science Foundation under Grant No.2013KY53
文摘In the hierarchical random effect linear model, the Bayes estimator of random parameter are not only dependent on specific prior distribution but also it is difficult to calculate in most cases. This paper derives the distributed-free optimal linear estimator of random parameters in the model by means of the credibility theory method. The estimators the authors derive can be applied in more extensive practical scenarios since they are only dependent on the first two moments of prior parameter rather than on specific prior distribution. Finally, the results are compared with some classical models and a numerical example is given to show the effectiveness of the estimators.
基金Project(61104164)supported by the National Natural Science Foundation of ChinaProject(2012AA112401)supported by the National High Technology Research and Development Program of ChinaProject(2012YJS059)supported by the Fundamental Research Funds for the Central Universities of China
文摘With the wide applications of sensor network technology in traffic information acquisition systems,a new measure will be quite necessary to evaluate spatially related properties of traffic information credibility.The heterogeneity of spatial distribution of information credibility from sensor networks is analyzed and a new measure,information credibility function(ICF),is proposed to describe this heterogeneity.Three possible functional forms of sensor ICF and their corresponding expressions are presented.Then,two feasible operations of spatial superposition of sensor ICFs are discussed.Finally,a numerical example is introduced to show the calibration method of sensor ICF and obtain the spatially related properties of expressway in Beijing.The results show that the sensor ICF of expressway in Beijing possesses a negative exponent property.The traffic information is more abundant at or near the locations of sensor,while with the distance away from the sensor increasing,the traffic information credibility will be declined by an exponential trend.The new measure provides theoretical bases for the optimal locations of traffic sensor networks and the mechanism research of spatial distribution of traffic information credibility.
基金the rusult of the project of the Five Constant Virtues of Confucianism and Value Dimension Construction of Mainstream’s Credibility(Sk2014A440)
文摘The Confucianism has played a prominent role for thousands of years in boosting the tenacity of the Chinese nation towards innovation and development as well as in promoting and inheriting the traditional Chinese culture. Based on the five constant virtues of Confucianism,this paper analyzes the relationship between "benevolence,righteousness,etiquette,wisdom and credit"and creditability that We Media should construct,and elaborates the construction of value dimension system of We Media's creditability on talents, environments,orientations and innovations from four aspects. Namely,the cognitive and spiritual orientations that reinforce the five constant virtues,the propaganda cultivation that fuses them and the endogenous impetus stimulated by using them as reference.This paper is designed to tell all of the media and media practitioners to constantly remain vigilant of the social responsibilities they are taking and the social value they should create.T hey should take an initiative to guide their serving objects to foster a proper consensus outlook and value and meeting the mass audience's demands and desires on information.
文摘Evaluation is the major activity of performing Verification, Validation and Accreditation (VV&A) of a simulation system. Unfortunately, there is a lack of reasonable and operable evaluation methods. Moreover, there are other problems to address in VV&A evaluation, such as index definition, conclusion analysis, etc. In this paper, a VV&A evaluation system is introduced to try to resolve these problems. The system is based on a method called hierarchical evaluation, and it uses a good combination of evaluation processes and indexes. First, a thorough analysis of the VV&A evaluation’s essentials and principles are given, then the uncertainty of the evaluation results caused by various analysis of the evaluators is pointed out, then a hierarchical evaluation mechanism based on evaluator weight and evaluation hierarchy is brought forward, and finally a comprehensive VV&A evaluation system with evaluation flow processing, index management and hierarchical evaluation fulfillment is established. The system gives good consideration to ease of operation, reasonableness of evaluation conclusion, and the ability to comprehensively resolve VV&A problems. Since VV&A is attracting more and more recognition, it is meaningful to provide a good system for implementing credible simulation systems. It is hoped that this VV&A evaluation will provide a good way.
基金supported by the State Grid Science and Technology Project (No. 52450018000H)
文摘The development of Global Energy Interconnection(GEI)is essential for supporting a wide range of basic data resources.The Global Energy Interconnection Development and Cooperation Organization has established a comprehensive data center covering six major systems.However,methods for accurately describing and scientifically evaluating the credibility of the massive amount of GEI data remain underdeveloped.To address this lack of such methods,a GEI data credibility quantitative evaluation model is proposed here.An evaluation indicator system is established to evaluate data credibility from multiple perspectives and ensure the comprehensiveness and impartiality of evaluation results.The Cloud Model abandons the hard division of comments to ensure objectivity and accuracy in evaluation results.To evaluate the suitability of the proposed method,a case analysis is conducted,wherein the proposed method demonstrates sufficient validity and feasibility.
文摘A writer's decision to localize a news article and the valence of the frame the writer employs can affect readers' perceptions of credibility and bias as well as readers' factual recall and the likelihood that readers would want to read the newspaper further. A 2 (proximity: local, non-local) ~ 3 (frame valence: positive, neutral, negative) factorial experiment (N = 136) tested the effects of proximity and frame valence on credibility, perceived bias, recall, and reading intentions. Articles that localized enjoyed greater perceptions of credibility but not recall, while articles with either a positive or negative frame yielded greater recall than articles with a neutral frame. Neither factor exhibited a main effect in predicting perceived bias, but their interaction was a significant predictor. In addition, localization and frame valence also influence the likelihood that participants would want to read the source newspaper again. Implications for theory and media practice are discussed.
基金Sponsored by Science&Technology Research Program of the Municipal Education Committee of Chongqing of China(No.KJ110505)Key Project of Science and Technology and Natural Science Foundation Project of CQ CSTC of China(No.cstc2011AC2155 and cstc2011jjA 40031)
文摘Digital evidence investigation in QQ software is the current research focus.In order to identify the authenticity and credibility of QQ chat records,the method based on attacking QQ chat records is proposed.Firstly,an evaluation model on checking the authenticity of QQ chat records is proposed.The cases on kinds of changing QQ chat records are discussed.The challenge in identifying the authenticity of QQ chat records is raised.Secondly,case study on attacking QQ chat records is proposed to check the relationship between the authenticity of QQ chat records and the difficulty of changing them.A couple of experiments on changing QQ chat records are finished to find how difficult changing records is and whether there are clues left on changing them or not.Finally,a kind of QQ chat forensic process is presented,which can help for digital evidence investigation in the authenticity and credibility of QQ chat records.The practices in QQ forensic cases show that it works well.
基金Sponsored by the Basic Research Foundation of Beijing Institute of Technology (BIT-UBF-200508G4212)
文摘A method for modeling the parallel machine scheduling problems with fuzzy parameters and precedence constraints based on credibility measure is provided. For the given n jobs to be processed on m machines, it is assumed that the processing times and the due dates are nonnegative fuzzy numbers and all the weights are positive, crisp numbers. Based on credibility measure, three parallel machine scheduling problems and a goal-programming model are formulated. Feasible schedules are evaluated not only by their objective values but also by the credibility degree of satisfaction with their precedence constraints. The genetic algorithm is utilized to find the best solutions in a short period of time. An illustrative numerical example is also given. Simulation results show that the proposed models are effective, which can deal with the parallel machine scheduling problems with fuzzy parameters and precedence constraints based on credibility measure.
文摘An approach to characterize the credibility of beliefs of an agent is proposed in this paper, which can define the uncertainty of beliefs, calculation rules and inference rules about credibility and a method for belief revision based on abductive reasoning is also given. When an agent receives some new information, if the new information is consistent with the current belief set, then incorporate this new information with an appropriate credibility, otherwise the choice will be different depending on the characters of agents, and the deliberated agents will choose the belief with a better explanation under the current belief set. Removing one belief may cause the removal of those beliefs that, together with others, logically entail the formula to be removed. A method based on abduction is proposed to solve these problems.
文摘The numerical characteristics of fuzzy numbers include the optimistic value, pessimistic value, expected value, and the variance. We mainly provide the calculation formulae of several numerical characteristics of fuzzy numbers based on credibility measure. Especially, the variance of symmetric fuzzy numbers is formulated, and a super bound for the variance of fuzzy numbers is presented. Meanwhile, some conclusions relative to credibility measure, optimistic and pessimistic values are also given.
基金Supported by the National Natural Science Foundation of China(70271019).
文摘The paper develops a design of optimal Bonus-Malus System (BMS) based on exact equitable credibility,in which the relative error function is taken as loss function. In BMS,both the frequency and the severity components are considered. This design is compared with traditional BMS derived from classical squared-error loss function.