Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability ...Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability and are used to modify the cognitive failure probability(CFP).However,the levels of CPCs are usually determined by domain experts,whichmay be subjective and uncertain.What’smore,the classicCREAMassumes that the CPCs are independent,which is unrealistic.Ignoring the dependence among CPCs will result in repeated calculations of the influence of the CPCs on CFP and lead to unreasonable reliability evaluation.To address the issue of uncertain information modeling and processing,this paper introduces evidence theory to evaluate the CPC levels in specific scenarios.To address the issue of dependence modeling,the Decision-Making Trial and Evaluation Laboratory(DEMATEL)method is used to process the dependence among CPCs and calculate the relative weights of each CPC,thus modifying the multiplier of the CPCs.The detailed process of the proposed method is illustrated in this paper and the CFP estimated by the proposed method is more reasonable.展开更多
Structural reliability is an important method to measure the safety performance of structures under the influence of uncertain factors.Traditional structural reliability analysis methods often convert the limit state ...Structural reliability is an important method to measure the safety performance of structures under the influence of uncertain factors.Traditional structural reliability analysis methods often convert the limit state function to the polynomial form to measure whether the structure is invalid.The uncertain parameters mainly exist in the form of intervals.This method requires a lot of calculation and is often difficult to achieve efficiently.In order to solve this problem,this paper proposes an interval variable multivariate polynomial algorithm based on Bernstein polynomials and evidence theory to solve the structural reliability problem with cognitive uncertainty.Based on the non-probabilistic reliability index method,the extreme value of the limit state function is obtained using the properties of Bernstein polynomials,thus avoiding the need for a lot of sampling to solve the reliability analysis problem.The method is applied to numerical examples and engineering applications such as experiments,and the results show that the method has higher computational efficiency and accuracy than the traditional linear approximation method,especially for some reliability problems with higher nonlinearity.Moreover,this method can effectively improve the reliability of results and reduce the cost of calculation in practical engineering problems.展开更多
In the field of target recognition based on the temporal-spatial information fusion,evidence the-ory has received extensive attention.To achieve accurate and efficient target recognition by the evi-dence theory,an ada...In the field of target recognition based on the temporal-spatial information fusion,evidence the-ory has received extensive attention.To achieve accurate and efficient target recognition by the evi-dence theory,an adaptive temporal-spatial information fusion model is proposed.Firstly,an adaptive evaluation correction mechanism is constructed by the evidence distance and Deng entropy,which realizes the credibility discrimination and adaptive correction of the spatial evidence.Secondly,the credibility decay operator is introduced to obtain the dynamic credibility of temporal evidence.Finally,the sequential combination of temporal-spatial evidences is achieved by Shafer’s discount criterion and Dempster’s combination rule.The simulation results show that the proposed method not only considers the dynamic and sequential characteristics of the temporal-spatial evidences com-bination,but also has a strong conflict information processing capability,which provides a new refer-ence for the field of temporal-spatial information fusion.展开更多
Hydrogen is the new age alternative energy source to combat energy demand and climate change.Storage of hydrogen is vital for a nation’s growth.Works of literature provide different methods for storing the produced h...Hydrogen is the new age alternative energy source to combat energy demand and climate change.Storage of hydrogen is vital for a nation’s growth.Works of literature provide different methods for storing the produced hydrogen,and the rational selection of a viable method is crucial for promoting sustainability and green practices.Typically,hydrogen storage is associated with diverse sustainable and circular economy(SCE)criteria.As a result,the authors consider the situation a multi-criteria decision-making(MCDM)problem.Studies infer that previous models for hydrogen storage method(HSM)selection(i)do not consider preferences in the natural language form;(ii)weights of experts are not methodically determined;(iii)hesitation of experts during criteria weight assessment is not effectively explored;and(iv)three-stage solution of a suitable selection of HSM is unexplored.Driven by these gaps,in this paper,authors put forward a new integrated framework,which considers double hierarchy linguistic information for rating,criteria importance through inter-criteria correlation(CRITIC)for expert weight calculation,evidence-based Bayesian method for criteria weight estimation,and combined compromise solution(CoCoSo)for ranking HSMs.The applicability of the developed framework is testified by using a case example of HSM selection in India.Sensitivity and comparative analysis reveal the merits and limitations of the developed framework.展开更多
Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However,...Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However, in practical applications, the information obtained by a single device is limited, and it is necessary to integrate the information of maritime radar and AIS messages to achieve better recognition effects. In this study, the D-S evidence theory is used to fusion the two kinds of heterogeneous information: maritime radar images and AIS messages. Firstly, the radar image and AIS message are processed to get the targets of interest in the same coordinate system. Then, the coordinate position and heading of targets are chosen as the indicators for judging target similarity. Finally, a piece of D-S evidence theory based on the information fusion method is proposed to match the radar target and the AIS target of the same ship. Particularly, the effectiveness of the proposed method has been validated and evaluated through several experiments, which proves that such a method is practical in maritime safety supervision.展开更多
D-S evidence theory provides a good approach to fuse uncertain inlbrmation. In this article, we introduce seismic multi-attribute fusion based on D-S evidence theory to predict the coalbed methane (CBM) concentrated...D-S evidence theory provides a good approach to fuse uncertain inlbrmation. In this article, we introduce seismic multi-attribute fusion based on D-S evidence theory to predict the coalbed methane (CBM) concentrated areas. First, we choose seismic attributes that are most sensitive to CBM content changes with the guidance of CBM content measured at well sites. Then the selected seismic attributes are fused using D-S evidence theory and the fusion results are used to predict CBM-enriched area. The application shows that the predicted CBM content and the measured values are basically consistent. The results indicate that using D-S evidence theory in seismic multi-attribute fusion to predict CBM-enriched areas is feasible.展开更多
An improvement method for the combining rule of Dempster evidence theory is proposed. Different from Dempster theory, the reliability of evidences isn't identical; and varies with the event. By weight evidence acc...An improvement method for the combining rule of Dempster evidence theory is proposed. Different from Dempster theory, the reliability of evidences isn't identical; and varies with the event. By weight evidence according to their reliability, the effect of unreliable evidence is reduced, and then get the fusion result that is closer to the truth. An example to expand the advantage of this method is given. The example proves that this method is helpful to find a correct result.展开更多
The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, d...The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies.展开更多
As an alternative or complementary approach to the classical probability theory,the ability of the evidence theory in uncertainty quantification(UQ) analyses is subject of intense research in recent years.Two state-...As an alternative or complementary approach to the classical probability theory,the ability of the evidence theory in uncertainty quantification(UQ) analyses is subject of intense research in recent years.Two state-of-the-art numerical methods,the vertex method and the sampling method,are commonly used to calculate the resulting uncertainty based on the evidence theory.The vertex method is very effective for the monotonous system,but not for the non-monotonous one due to its high computational errors.The sampling method is applicable for both systems.But it always requires a high computational cost in UQ analyses,which makes it inefficient in most complex engineering systems.In this work,a computational intelligence approach is developed to reduce the computational cost and improve the practical utility of the evidence theory in UQ analyses.The method is demonstrated on two challenging problems proposed by Sandia National Laboratory.Simulation results show that the computational efficiency of the proposed method outperforms both the vertex method and the sampling method without decreasing the degree of accuracy.Especially,when the numbers of uncertain parameters and focal elements are large,and the system model is non-monotonic,the computational cost is five times less than that of the sampling method.展开更多
How to obtain proper prior distribution is one of the most critical problems in Bayesian analysis. In many practical cases, the prior information often comes from different sources, and the prior distribution form cou...How to obtain proper prior distribution is one of the most critical problems in Bayesian analysis. In many practical cases, the prior information often comes from different sources, and the prior distribution form could be easily known in some certain way while the parameters are hard to determine. In this paper, based on the evidence theory, a new method is presented to fuse the information of multiple sources and determine the parameters of the prior distribution when the form is known. By taking the prior distributions which result from the information of multiple sources and converting them into corresponding mass functions which can be combined by Dempster-Shafer (D-S) method, we get the combined mass function and the representative points of the prior distribution. These points are used to fit with the given distribution form to determine the parameters of the prior distribution. And then the fused prior distribution is obtained and Bayesian analysis can be performed. How to convert the prior distributions into mass functions properly and get the representative points of the fused prior distribution is the central question we address in this paper. The simulation example shows that the proposed method is effective.展开更多
Evidence theory has been widely used in the information fusion for its effectiveness of the uncertainty reasoning. However, the classical DS evidence theory involves counter-intuitive behaviors when the high conflict ...Evidence theory has been widely used in the information fusion for its effectiveness of the uncertainty reasoning. However, the classical DS evidence theory involves counter-intuitive behaviors when the high conflict information exists. Based on the analysis of some modified methods, Assigning the weighting factors according to the intrinsic characteristics of the existing evidence sources is proposed, which is determined on the evidence distance theory. From the numerical examples, the proposed method provides a reasonable result with good convergence efficiency. In addition, the new rule retrieves to the Yager's formula when all the evidence sources contradict to each other completely.展开更多
In this paper,we propose a novel Intrusion Detection System (IDS) architecture utilizing both the evidence theory and Rough Set Theory (RST). Evidence theory is an effective tool in dealing with uncertainty question. ...In this paper,we propose a novel Intrusion Detection System (IDS) architecture utilizing both the evidence theory and Rough Set Theory (RST). Evidence theory is an effective tool in dealing with uncertainty question. It relies on the expert knowledge to provide evidences,needing the evidences to be independent,and this make it difficult in application. To solve this problem,a hybrid system of rough sets and evidence theory is proposed. Firstly,simplification are made based on Variable Precision Rough Set (VPRS) conditional entropy. Thus,the Basic Belief Assignment (BBA) for all evidences can be calculated. Secondly,Dempster’s rule of combination is used,and a decision-making is given. In the proposed approach,the difficulties in acquiring the BBAs are solved,the correlativity among the evidences is reduced and the subjectivity of evidences is weakened. An illustrative example in an intrusion detection shows that the two theories combination is feasible and effective.展开更多
Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these ...Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these features.Although environmental factors such as wind speed are important to distinguish oil spills and look-alikes,some oil spill detection algorithms do not consider the environmental factors.To distinguish oil spills and look-alikes more accurately based on environmental factors and image features,a new oil spill detection algorithm based on Dempster-Shafer evidence theory was proposed.The process of oil spill detection taking account of environmental factors was modeled using the subjective Bayesian model.The Faster-region convolutional neural networks(RCNN)model was used for oil spill detection based on the convolution features.The detection results of the two models were fused at decision level using Dempster-Shafer evidence theory.The establishment and test of the proposed algorithm were completed based on our oil spill and look-alike sample database that contains 1798 image samples and environmental information records related to the image samples.The analysis and evaluation of the proposed algorithm shows a good ability to detect oil spills at a higher detection rate,with an identifi cation rate greater than 75%and a false alarm rate lower than 19%from experiments.A total of 12 oil spill SAR images were collected for the validation and evaluation of the proposed algorithm.The evaluation result shows that the proposed algorithm has a good performance on detecting oil spills with an overall detection rate greater than 70%.展开更多
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific...Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.展开更多
Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectivel...Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectively defend against attacks and attackers. To do this, correlative information provided by IDS must be gathered and the current intrusion characteristics and sit- uation must be analyzed and estimated. This paper applies D-S evidence theory to distributed intrusion detection system for fusing information from detection centers, making clear intrusion situation, and improving the early warning capability and detection efficiency of the IDS accord- ingly.展开更多
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se...Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.展开更多
According to fault type diversity and fault information uncertainty problem of the hydraulic driven rocket launcher servo system(HDRLSS) , the fault diagnosis method based on the evidence theory and neural network e...According to fault type diversity and fault information uncertainty problem of the hydraulic driven rocket launcher servo system(HDRLSS) , the fault diagnosis method based on the evidence theory and neural network ensemble is proposed. In order to overcome the shortcomings of the single neural network, two improved neural network models are set up at the com-mon nodes to simplify the network structure. The initial fault diagnosis is based on the iron spectrum data and the pressure, flow and temperature(PFT) characteristic parameters as the input vectors of the two improved neural network models, and the diagnosis result is taken as the basic probability distribution of the evidence theory. Then the objectivity of assignment is real-ized. The initial diagnosis results of two improved neural networks are fused by D-S evidence theory. The experimental results show that this method can avoid the misdiagnosis of neural network recognition and improve the accuracy of the fault diagnosis of HDRLSS.展开更多
In the last decade,IoT has been widely used in smart cities,autonomous driving and Industry 4.0,which lead to improve efficiency,reliability,security and economic benefits.However,with the rapid development of new tec...In the last decade,IoT has been widely used in smart cities,autonomous driving and Industry 4.0,which lead to improve efficiency,reliability,security and economic benefits.However,with the rapid development of new technologies,such as cognitive communication,cloud computing,quantum computing and big data,the IoT security is being confronted with a series of new threats and challenges.IoT device identification via Radio Frequency Fingerprinting(RFF)extracting from radio signals is a physical-layer method for IoT security.In physical-layer,RFF is a unique characteristic of IoT device themselves,which can difficultly be tampered.Just as people’s unique fingerprinting,different IoT devices exhibit different RFF which can be used for identification and authentication.In this paper,the structure of IoT device identification is proposed,the key technologies such as signal detection,RFF extraction,and classification model is discussed.Especially,based on the random forest and Dempster-Shafer evidence algorithm,a novel ensemble learning algorithm is proposed.Through theoretical modeling and experimental verification,the reliability and differentiability of RFF are extracted and verified,the classification result is shown under the real IoT device environments.展开更多
Although evidence theory has been widely used in information fusion due to its effectiveness of uncertainty reasoning, the classical DS evidence theory involves counter-intuitive behaviors when high conflict informati...Although evidence theory has been widely used in information fusion due to its effectiveness of uncertainty reasoning, the classical DS evidence theory involves counter-intuitive behaviors when high conflict information exists. Many modification methods have been developed which can be classified into the following two kinds of ideas, either modifying the combination rules or modifying the evidence sources. In order to make the modification more reasonable and more effective, this paper gives a thorough analysis of some typical existing modification methods firstly, and then extracts the intrinsic feature of the evidence sources by using evidence distance theory. Based on the extracted features, two modified plans of evidence theory according to the corresponding modification ideas have been proposed. The results of numerical examples prove the good performance of the plans when combining evidence sources with high conflict information.展开更多
Transmembrane proteins are some special and important proteins in cells. Because of their importance and specificity, the prediction of the transmembrane regions has very important theoretical and practical significan...Transmembrane proteins are some special and important proteins in cells. Because of their importance and specificity, the prediction of the transmembrane regions has very important theoretical and practical significance. At present, the prediction methods are mainly based on the physicochemical property and statistic analysis of amino acids. However, these methods are suitable for some environments but inapplicable for other environments. In this paper, the multi-sources information fusion theory has been introduced to predict the transmembrane regions. The proposed method is test on a data set of transmembrane proteins. The results show that the proposed method has the ability of predicting the transmembrane regions as a good performance and powerful tool.展开更多
基金Shanghai Rising-Star Program(Grant No.21QA1403400)Shanghai Sailing Program(Grant No.20YF1414800)Shanghai Key Laboratory of Power Station Automation Technology(Grant No.13DZ2273800).
文摘Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability and are used to modify the cognitive failure probability(CFP).However,the levels of CPCs are usually determined by domain experts,whichmay be subjective and uncertain.What’smore,the classicCREAMassumes that the CPCs are independent,which is unrealistic.Ignoring the dependence among CPCs will result in repeated calculations of the influence of the CPCs on CFP and lead to unreasonable reliability evaluation.To address the issue of uncertain information modeling and processing,this paper introduces evidence theory to evaluate the CPC levels in specific scenarios.To address the issue of dependence modeling,the Decision-Making Trial and Evaluation Laboratory(DEMATEL)method is used to process the dependence among CPCs and calculate the relative weights of each CPC,thus modifying the multiplier of the CPCs.The detailed process of the proposed method is illustrated in this paper and the CFP estimated by the proposed method is more reasonable.
文摘Structural reliability is an important method to measure the safety performance of structures under the influence of uncertain factors.Traditional structural reliability analysis methods often convert the limit state function to the polynomial form to measure whether the structure is invalid.The uncertain parameters mainly exist in the form of intervals.This method requires a lot of calculation and is often difficult to achieve efficiently.In order to solve this problem,this paper proposes an interval variable multivariate polynomial algorithm based on Bernstein polynomials and evidence theory to solve the structural reliability problem with cognitive uncertainty.Based on the non-probabilistic reliability index method,the extreme value of the limit state function is obtained using the properties of Bernstein polynomials,thus avoiding the need for a lot of sampling to solve the reliability analysis problem.The method is applied to numerical examples and engineering applications such as experiments,and the results show that the method has higher computational efficiency and accuracy than the traditional linear approximation method,especially for some reliability problems with higher nonlinearity.Moreover,this method can effectively improve the reliability of results and reduce the cost of calculation in practical engineering problems.
基金the National Natural Science Foundation of China(No.61976080)the Key Project on Research and Practice of Henan University Graduate Education and Teaching Reform(YJSJG2023XJ006)+1 种基金the Key Research and Development Projects of Henan Province(231111212500)the Henan University Graduate Education Innovation and Quality Improvement Program(SYLKC2023016).
文摘In the field of target recognition based on the temporal-spatial information fusion,evidence the-ory has received extensive attention.To achieve accurate and efficient target recognition by the evi-dence theory,an adaptive temporal-spatial information fusion model is proposed.Firstly,an adaptive evaluation correction mechanism is constructed by the evidence distance and Deng entropy,which realizes the credibility discrimination and adaptive correction of the spatial evidence.Secondly,the credibility decay operator is introduced to obtain the dynamic credibility of temporal evidence.Finally,the sequential combination of temporal-spatial evidences is achieved by Shafer’s discount criterion and Dempster’s combination rule.The simulation results show that the proposed method not only considers the dynamic and sequential characteristics of the temporal-spatial evidences com-bination,but also has a strong conflict information processing capability,which provides a new refer-ence for the field of temporal-spatial information fusion.
文摘Hydrogen is the new age alternative energy source to combat energy demand and climate change.Storage of hydrogen is vital for a nation’s growth.Works of literature provide different methods for storing the produced hydrogen,and the rational selection of a viable method is crucial for promoting sustainability and green practices.Typically,hydrogen storage is associated with diverse sustainable and circular economy(SCE)criteria.As a result,the authors consider the situation a multi-criteria decision-making(MCDM)problem.Studies infer that previous models for hydrogen storage method(HSM)selection(i)do not consider preferences in the natural language form;(ii)weights of experts are not methodically determined;(iii)hesitation of experts during criteria weight assessment is not effectively explored;and(iv)three-stage solution of a suitable selection of HSM is unexplored.Driven by these gaps,in this paper,authors put forward a new integrated framework,which considers double hierarchy linguistic information for rating,criteria importance through inter-criteria correlation(CRITIC)for expert weight calculation,evidence-based Bayesian method for criteria weight estimation,and combined compromise solution(CoCoSo)for ranking HSMs.The applicability of the developed framework is testified by using a case example of HSM selection in India.Sensitivity and comparative analysis reveal the merits and limitations of the developed framework.
文摘Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However, in practical applications, the information obtained by a single device is limited, and it is necessary to integrate the information of maritime radar and AIS messages to achieve better recognition effects. In this study, the D-S evidence theory is used to fusion the two kinds of heterogeneous information: maritime radar images and AIS messages. Firstly, the radar image and AIS message are processed to get the targets of interest in the same coordinate system. Then, the coordinate position and heading of targets are chosen as the indicators for judging target similarity. Finally, a piece of D-S evidence theory based on the information fusion method is proposed to match the radar target and the AIS target of the same ship. Particularly, the effectiveness of the proposed method has been validated and evaluated through several experiments, which proves that such a method is practical in maritime safety supervision.
基金supported by the National Basic Research Program of China (973 Program) (No. 2009CB219603)Key Special National Project (No. 2008ZX05035)Priority Academic Program Development of Jiangsu Higher Education Institutions
文摘D-S evidence theory provides a good approach to fuse uncertain inlbrmation. In this article, we introduce seismic multi-attribute fusion based on D-S evidence theory to predict the coalbed methane (CBM) concentrated areas. First, we choose seismic attributes that are most sensitive to CBM content changes with the guidance of CBM content measured at well sites. Then the selected seismic attributes are fused using D-S evidence theory and the fusion results are used to predict CBM-enriched area. The application shows that the predicted CBM content and the measured values are basically consistent. The results indicate that using D-S evidence theory in seismic multi-attribute fusion to predict CBM-enriched areas is feasible.
文摘An improvement method for the combining rule of Dempster evidence theory is proposed. Different from Dempster theory, the reliability of evidences isn't identical; and varies with the event. By weight evidence according to their reliability, the effect of unreliable evidence is reduced, and then get the fusion result that is closer to the truth. An example to expand the advantage of this method is given. The example proves that this method is helpful to find a correct result.
基金supported by the National Natural Science Foundation of China(Grants No.51190094,50909073,and 51179130)the Hubei Province Natural Science Foundation(Grant No.2010CDB08401)
文摘The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies.
基金supported by the Advanced Research of National Defense Foundation of China(426010501)
文摘As an alternative or complementary approach to the classical probability theory,the ability of the evidence theory in uncertainty quantification(UQ) analyses is subject of intense research in recent years.Two state-of-the-art numerical methods,the vertex method and the sampling method,are commonly used to calculate the resulting uncertainty based on the evidence theory.The vertex method is very effective for the monotonous system,but not for the non-monotonous one due to its high computational errors.The sampling method is applicable for both systems.But it always requires a high computational cost in UQ analyses,which makes it inefficient in most complex engineering systems.In this work,a computational intelligence approach is developed to reduce the computational cost and improve the practical utility of the evidence theory in UQ analyses.The method is demonstrated on two challenging problems proposed by Sandia National Laboratory.Simulation results show that the computational efficiency of the proposed method outperforms both the vertex method and the sampling method without decreasing the degree of accuracy.Especially,when the numbers of uncertain parameters and focal elements are large,and the system model is non-monotonic,the computational cost is five times less than that of the sampling method.
文摘How to obtain proper prior distribution is one of the most critical problems in Bayesian analysis. In many practical cases, the prior information often comes from different sources, and the prior distribution form could be easily known in some certain way while the parameters are hard to determine. In this paper, based on the evidence theory, a new method is presented to fuse the information of multiple sources and determine the parameters of the prior distribution when the form is known. By taking the prior distributions which result from the information of multiple sources and converting them into corresponding mass functions which can be combined by Dempster-Shafer (D-S) method, we get the combined mass function and the representative points of the prior distribution. These points are used to fit with the given distribution form to determine the parameters of the prior distribution. And then the fused prior distribution is obtained and Bayesian analysis can be performed. How to convert the prior distributions into mass functions properly and get the representative points of the fused prior distribution is the central question we address in this paper. The simulation example shows that the proposed method is effective.
文摘Evidence theory has been widely used in the information fusion for its effectiveness of the uncertainty reasoning. However, the classical DS evidence theory involves counter-intuitive behaviors when the high conflict information exists. Based on the analysis of some modified methods, Assigning the weighting factors according to the intrinsic characteristics of the existing evidence sources is proposed, which is determined on the evidence distance theory. From the numerical examples, the proposed method provides a reasonable result with good convergence efficiency. In addition, the new rule retrieves to the Yager's formula when all the evidence sources contradict to each other completely.
基金Supported by the National Natural Science Foundation of China (No. 60774029)
文摘In this paper,we propose a novel Intrusion Detection System (IDS) architecture utilizing both the evidence theory and Rough Set Theory (RST). Evidence theory is an effective tool in dealing with uncertainty question. It relies on the expert knowledge to provide evidences,needing the evidences to be independent,and this make it difficult in application. To solve this problem,a hybrid system of rough sets and evidence theory is proposed. Firstly,simplification are made based on Variable Precision Rough Set (VPRS) conditional entropy. Thus,the Basic Belief Assignment (BBA) for all evidences can be calculated. Secondly,Dempster’s rule of combination is used,and a decision-making is given. In the proposed approach,the difficulties in acquiring the BBAs are solved,the correlativity among the evidences is reduced and the subjectivity of evidences is weakened. An illustrative example in an intrusion detection shows that the two theories combination is feasible and effective.
基金Supported by the National Key R&D Program of China(No.2017YFC1405600)the National Natural Science Foundation of China(Nos.42076197,41576032)the Major Program for the International Cooperation of the Chinese Academy of Sciences(No.133337KYSB20160002)。
文摘Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these features.Although environmental factors such as wind speed are important to distinguish oil spills and look-alikes,some oil spill detection algorithms do not consider the environmental factors.To distinguish oil spills and look-alikes more accurately based on environmental factors and image features,a new oil spill detection algorithm based on Dempster-Shafer evidence theory was proposed.The process of oil spill detection taking account of environmental factors was modeled using the subjective Bayesian model.The Faster-region convolutional neural networks(RCNN)model was used for oil spill detection based on the convolution features.The detection results of the two models were fused at decision level using Dempster-Shafer evidence theory.The establishment and test of the proposed algorithm were completed based on our oil spill and look-alike sample database that contains 1798 image samples and environmental information records related to the image samples.The analysis and evaluation of the proposed algorithm shows a good ability to detect oil spills at a higher detection rate,with an identifi cation rate greater than 75%and a false alarm rate lower than 19%from experiments.A total of 12 oil spill SAR images were collected for the validation and evaluation of the proposed algorithm.The evaluation result shows that the proposed algorithm has a good performance on detecting oil spills with an overall detection rate greater than 70%.
基金Supported by the Ministry of Educationin China (No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.
文摘Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectively defend against attacks and attackers. To do this, correlative information provided by IDS must be gathered and the current intrusion characteristics and sit- uation must be analyzed and estimated. This paper applies D-S evidence theory to distributed intrusion detection system for fusing information from detection centers, making clear intrusion situation, and improving the early warning capability and detection efficiency of the IDS accord- ingly.
基金supported by the National Natural Science Foundation of China under Grant No.60903166 the National High Technology Research and Development Program of China(863 Program) under Grants No.2012AA012506,No.2012AA012901,No.2012AA012903+9 种基金 Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20121103120032 the Humanity and Social Science Youth Foundation of Ministry of Education of China under Grant No.13YJCZH065 the Opening Project of Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) under Grant No.C13613 the China Postdoctoral Science Foundation General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No.km201410005012 the Research on Education and Teaching of Beijing University of Technology under Grant No.ER2013C24 the Beijing Municipal Natural Science Foundation Sponsored by Hunan Postdoctoral Scientific Program Open Research Fund of Beijing Key Laboratory of Trusted Computing Funds for the Central Universities, Contract No.2012JBM030
文摘Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.
文摘According to fault type diversity and fault information uncertainty problem of the hydraulic driven rocket launcher servo system(HDRLSS) , the fault diagnosis method based on the evidence theory and neural network ensemble is proposed. In order to overcome the shortcomings of the single neural network, two improved neural network models are set up at the com-mon nodes to simplify the network structure. The initial fault diagnosis is based on the iron spectrum data and the pressure, flow and temperature(PFT) characteristic parameters as the input vectors of the two improved neural network models, and the diagnosis result is taken as the basic probability distribution of the evidence theory. Then the objectivity of assignment is real-ized. The initial diagnosis results of two improved neural networks are fused by D-S evidence theory. The experimental results show that this method can avoid the misdiagnosis of neural network recognition and improve the accuracy of the fault diagnosis of HDRLSS.
文摘In the last decade,IoT has been widely used in smart cities,autonomous driving and Industry 4.0,which lead to improve efficiency,reliability,security and economic benefits.However,with the rapid development of new technologies,such as cognitive communication,cloud computing,quantum computing and big data,the IoT security is being confronted with a series of new threats and challenges.IoT device identification via Radio Frequency Fingerprinting(RFF)extracting from radio signals is a physical-layer method for IoT security.In physical-layer,RFF is a unique characteristic of IoT device themselves,which can difficultly be tampered.Just as people’s unique fingerprinting,different IoT devices exhibit different RFF which can be used for identification and authentication.In this paper,the structure of IoT device identification is proposed,the key technologies such as signal detection,RFF extraction,and classification model is discussed.Especially,based on the random forest and Dempster-Shafer evidence algorithm,a novel ensemble learning algorithm is proposed.Through theoretical modeling and experimental verification,the reliability and differentiability of RFF are extracted and verified,the classification result is shown under the real IoT device environments.
文摘Although evidence theory has been widely used in information fusion due to its effectiveness of uncertainty reasoning, the classical DS evidence theory involves counter-intuitive behaviors when high conflict information exists. Many modification methods have been developed which can be classified into the following two kinds of ideas, either modifying the combination rules or modifying the evidence sources. In order to make the modification more reasonable and more effective, this paper gives a thorough analysis of some typical existing modification methods firstly, and then extracts the intrinsic feature of the evidence sources by using evidence distance theory. Based on the extracted features, two modified plans of evidence theory according to the corresponding modification ideas have been proposed. The results of numerical examples prove the good performance of the plans when combining evidence sources with high conflict information.
基金Supported by the National Natural Science Foundation of China (No. 60874105, 61174022)the Program for New Century Excellent Talents in University (No. NCET-08-0345)the Chongqing Natural Science Foundation (No. CSCT, 2010BA2003)
文摘Transmembrane proteins are some special and important proteins in cells. Because of their importance and specificity, the prediction of the transmembrane regions has very important theoretical and practical significance. At present, the prediction methods are mainly based on the physicochemical property and statistic analysis of amino acids. However, these methods are suitable for some environments but inapplicable for other environments. In this paper, the multi-sources information fusion theory has been introduced to predict the transmembrane regions. The proposed method is test on a data set of transmembrane proteins. The results show that the proposed method has the ability of predicting the transmembrane regions as a good performance and powerful tool.