期刊文献+
共找到240篇文章
< 1 2 12 >
每页显示 20 50 100
A Heterogeneous Information Fusion Method for Maritime Radar and AIS Based on D-S Evidence Theory
1
作者 Chao Wu Qing Wu +1 位作者 Feng Ma Shuwu Wang 《Engineering(科研)》 2023年第12期821-842,共22页
Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However,... Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However, in practical applications, the information obtained by a single device is limited, and it is necessary to integrate the information of maritime radar and AIS messages to achieve better recognition effects. In this study, the D-S evidence theory is used to fusion the two kinds of heterogeneous information: maritime radar images and AIS messages. Firstly, the radar image and AIS message are processed to get the targets of interest in the same coordinate system. Then, the coordinate position and heading of targets are chosen as the indicators for judging target similarity. Finally, a piece of D-S evidence theory based on the information fusion method is proposed to match the radar target and the AIS target of the same ship. Particularly, the effectiveness of the proposed method has been validated and evaluated through several experiments, which proves that such a method is practical in maritime safety supervision. 展开更多
关键词 d-s Evidence theory Heterogeneous Information Fusion Radar Image AIS Message
下载PDF
Risk assessment of water security in Haihe River Basin during drought periods based on D-S evidence theory 被引量:6
2
作者 Qian-jin DONG Xia LIU 《Water Science and Engineering》 EI CAS CSCD 2014年第2期119-132,共14页
The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, d... The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies. 展开更多
关键词 risk assessment water security drought periods entropy d-s evidence theory "evidential reasoning algorithm Haihe River Basin
下载PDF
Risk Assessment of Agricultural Products Supply-Chain Finance Based on D-S Theory 被引量:3
3
作者 Yuan Zhang Lian Duan Gefu Zhang 《American Journal of Computational Mathematics》 2014年第4期366-375,共10页
Agricultural products supply-chain finance, as one of the solutions to the issue of “capital problems” of agriculture, countryside and farmers, has proposed a kind of characteristics model to assess the risk of agri... Agricultural products supply-chain finance, as one of the solutions to the issue of “capital problems” of agriculture, countryside and farmers, has proposed a kind of characteristics model to assess the risk of agricultural production, processing and marketing, which can improve the issue of farmers and enterprises lacking of funds. This model is proposed on the basis of uncertain information processing method of D-S theory and its data combination rules, combined with the “discount rate” correction model, and it includes a risk assessment index system of agricultural products supply-chain finance, fully considering the five aspects of production, processing, marketing, cooperation of supply chain and collateral. At last, a taro supply chain is taken for example. And the risk assessment of its supply-chain finance based on this model has been discussed in detail. And the result has proved that the model and its algorithm are practical and feasible. 展开更多
关键词 Supply-Chain FINANCE Risk AGRICULTURAL Products TARO d-s theory
下载PDF
Large Power Transformer Fault Diagnosis and Prognostic Based on DBNC and D-S Evidence Theory 被引量:2
4
作者 Gang Li Changhai Yu +3 位作者 Hui Fan Shuguo Gao Yu Song Yunpeng Liu 《Energy and Power Engineering》 2017年第4期232-239,共8页
Power transformer is a core equipment of power system, which undertakes the important functions of power transmission and transformation, and its safe and stable operation has great significance to the normal operatio... Power transformer is a core equipment of power system, which undertakes the important functions of power transmission and transformation, and its safe and stable operation has great significance to the normal operation of the whole power system. Due to the complex structure of the transformer, the use of single information for condition-based maintenance (CBM) has certain limitations, with the help of advanced sensor monitoring and information fusion technology, multi-source information is applied to the prognostic and health management (PHM) of power transformer, which is an important way to realize the CBM of power transformer. This paper presents a method which combine deep belief network classifier (DBNC) and D-S evidence theory, and it is applied to the PHM of the large power transformer. The experimental results show that the proposed method has a high correct rate of fault diagnosis for the power transformer with a large number of multi-source data. 展开更多
关键词 Power Transformer PROGNOSTIC and Health Management (PHM) Deep BELIEF Network CLASSIFIER (DBNC) d-s EVIDENCE theory
下载PDF
Fault Isolation of Light Rail Vehicle Suspension System Based on D-S Evidence Theory and Improvement Application Case 被引量:1
5
作者 Xiukun Wei Kun Guo +2 位作者 Limin Jia Guangwu Liu Minzheng Yuan 《Journal of Intelligent Learning Systems and Applications》 2013年第4期245-253,共9页
This paper presents an innovative approach for the fault isolation of Light Rail Vehicle (LRV) suspension system based on the Dempster-Shafer (D-S) evidence theory and its improvement application case. The considered ... This paper presents an innovative approach for the fault isolation of Light Rail Vehicle (LRV) suspension system based on the Dempster-Shafer (D-S) evidence theory and its improvement application case. The considered LRV has three rolling stocks and each one equips three sensors for monitoring the suspension system. A Kalman filter is applied to generate the residuals for fault diagnosis. For the purpose of fault isolation, a fault feature database is built in advance. The Eros and the norm distance between the fault feature of the new occurred fault and the one in the feature database are applied to measure the similarity of the feature which is the basis for the basic belief assignment to the fault, respectively. After the basic belief assignments are obtained, they are fused by using the D-S evidence theory. The fusion of the basic belief assignments increases the isolation accuracy significantly. The efficiency of the proposed method is demonstrated by two case studies. 展开更多
关键词 SUSPENSION System FAULT ISOLATION d-s Evidence theory Information Fusion SIMILARITY Measurement
下载PDF
Study on Evaluation Method of Teaching Quality Based on Cloud Model and D-S Theory
6
作者 Jianting Shi Jun Sun +2 位作者 Jiancai Wang Jingping Cao Chunyuan Liu 《国际计算机前沿大会会议论文集》 2019年第2期300-302,共3页
The Evaluation of teaching quality is a complicated project. It’s a typical problem of uncertainty. A design scheme of teaching quality evaluation method based on cloud model and D-S theory is proposed with the schoo... The Evaluation of teaching quality is a complicated project. It’s a typical problem of uncertainty. A design scheme of teaching quality evaluation method based on cloud model and D-S theory is proposed with the school teaching evaluation index. With the experiences and knowledge of experts, evaluation index was described by cloud model and judgment matrix of AHP was revised by D-S theory. The weight of evaluation indexes was determined reasonably and objectively. Applied in the actual environment, the method can make an accurate and efficient evaluation with a certain practical value. 展开更多
关键词 TEACHING QUALITY EVALUATION CLOUD model d-s theory
下载PDF
D-S证据理论应用中的一种验证方法 被引量:2
7
作者 石春和 梁伟 《火力与指挥控制》 CSCD 北大核心 2006年第11期48-50,共3页
D-S证据理论是一种比概率论确定性弱的不确定性理论,它能将“不知道”和“不确定”两个认知学上的主要概念区别开来,在多传感器数据融合中具有广泛的应用前景。D-S证据理论在实际应用中却存在一个困难,当目标的个数较多时,需要计算的项... D-S证据理论是一种比概率论确定性弱的不确定性理论,它能将“不知道”和“不确定”两个认知学上的主要概念区别开来,在多传感器数据融合中具有广泛的应用前景。D-S证据理论在实际应用中却存在一个困难,当目标的个数较多时,需要计算的项数太多,容易造成漏项,引起计算错误。提出了一种确定计算项数的算法,作为验证计算结果的必要条件,并通过图解的方法找出需要计算的项。 展开更多
关键词 D—S证据理论 数据融合
下载PDF
改进的D-S证据理论在海上目标融合识别模型中的应用 被引量:6
8
作者 崔玮 《舰船科学技术》 北大核心 2017年第4X期109-111,共3页
船舶海上航行的过程中传感器获取到的信息间会存在冲突。本文对传统的D-S证据理论进行改进,通过权重来调整不同证据的可信度,然后利用Dempster合并法则实现目标信息的融合。最后通过对比实验证明本文改进算法的有效性和稳定性优于其他... 船舶海上航行的过程中传感器获取到的信息间会存在冲突。本文对传统的D-S证据理论进行改进,通过权重来调整不同证据的可信度,然后利用Dempster合并法则实现目标信息的融合。最后通过对比实验证明本文改进算法的有效性和稳定性优于其他对比算法。 展开更多
关键词 d-s证据理论 目标融合 可信度函数
下载PDF
D-S证据理论应用中的一种图解方法
9
作者 张淼 胡建旺 +1 位作者 梁伟 童俊 《火力与指挥控制》 CSCD 北大核心 2009年第12期35-37,共3页
D-S证据理论是对概率论的进一步扩充,在多传感器数据融合中,有着广泛的应用。当利用D-S合成公式进行融合时,由于需计算的项数较多且不易直接判定具体该有哪些项,容易造成漏项或错项,引起计算错误。提出了一种直观、简单的图解法,可使需... D-S证据理论是对概率论的进一步扩充,在多传感器数据融合中,有着广泛的应用。当利用D-S合成公式进行融合时,由于需计算的项数较多且不易直接判定具体该有哪些项,容易造成漏项或错项,引起计算错误。提出了一种直观、简单的图解法,可使需计算的项一目了然。 展开更多
关键词 d-s证据理论 数据融合 图解方法
下载PDF
基于D-S证据理论的航空装备技术状态决策研究
10
作者 黄建新 邱盎 《航空工程进展》 CSCD 2018年第A01期88-92,共5页
要准确确定航空装备的维修内容和时机,在对维修类型进行决策时是以装备技术状态作为主要依据的。为了更全面、更准确地获得航空装备整机技术状态信息,提出基于D-S证据理论的航空装备技术状态决策模型。实例证明:经过多证据融合后,... 要准确确定航空装备的维修内容和时机,在对维修类型进行决策时是以装备技术状态作为主要依据的。为了更全面、更准确地获得航空装备整机技术状态信息,提出基于D-S证据理论的航空装备技术状态决策模型。实例证明:经过多证据融合后,该模型可有效提高航空装备技术状态决策的准确性和可靠性,为武器装备技术状态决策提供了新思路。 展开更多
关键词 d-s证据理论 技术状态 航空装备 决策
下载PDF
A Renormalizable Theory of Quantum Gravity: Renormalization Proof of the Gauge Theory of Volume Preserving Diffeomorphisms
11
作者 Christian Wiesendanger 《Journal of Modern Physics》 2014年第10期959-983,共25页
Inertial and gravitational mass or energy momentum need not be the same for virtual quantum states. Separating their roles naturally leads to the gauge theory of volume-preserving diffeomorphisms of an inner four-dime... Inertial and gravitational mass or energy momentum need not be the same for virtual quantum states. Separating their roles naturally leads to the gauge theory of volume-preserving diffeomorphisms of an inner four-dimensional space. The gauge-fixed action and the path integral measure occurring in the generating functional for the quantum Green functions of the theory are shown to obey a BRST-type symmetry. The related Zinn-Justin-type equation restricting the corresponding quantum effective action is established. This equation limits the infinite parts of the quantum effective action to have the same form as the gauge-fixed Lagrangian of the theory proving its spacetime renormalizability. The inner space integrals occurring in the quantum effective action which are divergent due to the gauge group’s infinite volume are shown to be regularizable in a way consistent with the symmetries of the theory demonstrating as a byproduct that viable quantum gauge field theories are not limited to finite-dimensional compact gauge groups as is commonly assumed. 展开更多
关键词 RENORMALIZATION proof of GAUGE Field theory of Volume-Preserving DIFFEOMORPHISMS
下载PDF
人工智能医疗侵权纠纷中的责任承担与举证分配 被引量:3
12
作者 林洧 《太原理工大学学报(社会科学版)》 2024年第1期21-28,共8页
涉及人工智能医疗技术的民事医疗纠纷中的侵权责任与举证分配已成为愈发重要的法学课题。不同国家对于人工智能侵权责任的分配机制是不同的。在我国,人工智能医疗侵权责任具有医疗损害责任与产品责任两种属性。根据实体法上的法律要件... 涉及人工智能医疗技术的民事医疗纠纷中的侵权责任与举证分配已成为愈发重要的法学课题。不同国家对于人工智能侵权责任的分配机制是不同的。在我国,人工智能医疗侵权责任具有医疗损害责任与产品责任两种属性。根据实体法上的法律要件分类进行举证责任的分配是民事案件的一般规则。鉴于人工智能医疗存在技术上的特殊性与证据偏在的情形,有必要对其适用危险领域理论的举证责任分配规则。法院需要在人工智能医疗纠纷中根据具体情形进行举证责任的倒置与举证责任的减轻;同时,法院也可依当事人申请进行证据调查活动,通过文书提出命令等手段平衡双方当事人的证据收集能力。 展开更多
关键词 人工智能 医疗纠纷 产品责任 医疗损害责任 举证责任 危险领域理论
下载PDF
System Reliability Analysis Method Based on T-S FTA and HE-BN
13
作者 Qing Xia Yonghua Li +1 位作者 Dongxu Zhang YufengWang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1769-1794,共26页
For high-reliability systems in military,aerospace,and railway fields,the challenges of reliability analysis lie in dealing with unclear failure mechanisms,complex fault relationships,lack of fault data,and uncertaint... For high-reliability systems in military,aerospace,and railway fields,the challenges of reliability analysis lie in dealing with unclear failure mechanisms,complex fault relationships,lack of fault data,and uncertainty of fault states.To overcome these problems,this paper proposes a reliability analysismethod based on T-S fault tree analysis(T-S FTA)and Hyper-ellipsoidal Bayesian network(HE-BN).The method describes the connection between the various systemfault events by T-S fuzzy gates and translates them into a Bayesian network(BN)model.Combining the advantages of T-S fault tree modeling with the advantages of Bayesian network computation,a reliability modeling method is proposed that can fully reflect the fault characteristics of complex systems.Experts describe the degree of failure of the event in the form of interval numbers.The knowledge and experience of experts are fused with the D-S evidence theory to obtain the initial failure probability interval of the BN root node.Then,the Hyper-ellipsoidal model(HM)constrains the initial failure probability interval and constructs a HE-BN for the system.A reliability analysismethod is proposed to solve the problem of insufficient failure data and uncertainty in the degree of failure.The failure probability of the system is further calculated and the key components that affect the system’s reliability are identified.The proposedmethod accounts for the uncertainty and incompleteness of the failure data in complex multi-state systems and establishes an easily computable reliability model that fully reflects the characteristics of complex faults and accurately identifies system weaknesses.The feasibility and accuracy of the method are further verified by conducting case studies. 展开更多
关键词 System reliability d-s evidence theory hyper-ellipsoidal bayesian network T-S fault tree
下载PDF
Privacy-preserving Distributed Location Proof Generating System 被引量:3
14
作者 LIU Mengjun LIU Shubo +3 位作者 ZHANG Rui Li Yongkai WANG Jun CAO Hui 《China Communications》 SCIE CSCD 2016年第3期203-218,共16页
The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, pr... The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results. 展开更多
关键词 分布式定位 证明 基于位置的服务 保护 系统 检测效率 秘密共享方案 安全分析
下载PDF
一类决策模型的payoff-proof纳什均衡解
15
作者 孙晓勋 方奇志 《中国海洋大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第S2期167-170,共4页
研究1种基于线性规划约束的多人决策模型。首先,运用线性规划和对偶理论给出了纳什均衡点存在的充分必要条件,进而证明了在这种模型下的纳什均衡点可以在多项式时间内求解。其次,在原有的纳什均衡定义的基础上,定义了1个强均衡的概念—p... 研究1种基于线性规划约束的多人决策模型。首先,运用线性规划和对偶理论给出了纳什均衡点存在的充分必要条件,进而证明了在这种模型下的纳什均衡点可以在多项式时间内求解。其次,在原有的纳什均衡定义的基础上,定义了1个强均衡的概念—payoff-proof纳什均衡,并对前述模型研究了payoff-proof纳什均衡的性质和存在性。 展开更多
关键词 纳什均衡 对偶定理 payoff-proof纳什均衡
下载PDF
An Introduction to Convex Optimization Theory in Communication Signals Recognition
16
作者 Jin-Feng Pang Yun Lin +2 位作者 Xiao-Chun Xu Zheng Dou Zi-Cheng Wang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2013年第5期14-19,共6页
In this paper,convex optimization theory is introduced into the recognition of communication signals. The detailed content contains three parts. The first part gives a survey of basic concepts,main technology and reco... In this paper,convex optimization theory is introduced into the recognition of communication signals. The detailed content contains three parts. The first part gives a survey of basic concepts,main technology and recognition model of convex optimization theory. Special emphasis is placed on how to set up the new recognition model of communication signals with multisensor reports. The second part gives the solution method of the recognition model,which is called Logarithmic Penalty Barrier Function. The last part gives several numeric simulations,in contrast to D-S evidence inference method,this new method can also generate reasonable recognition results. Moreover,this new method can deal with the form of sensor reports which is more general than that allowed by the D-S evidence inference method,and it has much lower computation complexity than that of D-S evidence inference method. In addition,this new method has better recognition result,stronger anti-interference and robustness. Therefore,the convex optimization methods can be widely used in the recognition of communication signals. 展开更多
关键词 CONVEX optimization theory signal RECOGNITION d-s evidence theory logarithmic PENALTY BARRIER function
下载PDF
Performance analysis of blockchain for civil aviation business data based on M/G/1 queuing theory
17
作者 刘逸玮 Zhang Yanhua +2 位作者 Yang Ruizhe Gao Yuan Zhang Xuanyi 《High Technology Letters》 EI CAS 2021年第4期388-396,共9页
An Ethereum blockchain based on proof of stake ( PoS) consensus mechanism is used to achieve the data sharing within the civil aviation service platform for both airport group management and passengers. Considering th... An Ethereum blockchain based on proof of stake ( PoS) consensus mechanism is used to achieve the data sharing within the civil aviation service platform for both airport group management and passengers. Considering the Gas consumption of Ethereum, the dynamic batch-service capacity constraint by the Block Gas Limit and the priority mechanism depending on the different Gas Price of transactions, M/ G/1 queuing theory with batch-service is used to construct the service model of transactions confirmation process in the proposed blockchain system, where the effects of transactions arrival rate, block capacity, service rate and number of nodes on the average confirmation time of transactions with different priority are analyzed, and eventually a performance analysis model of blockchain for civil aviation business data is proposed. The simulation results prove the usability and accuracy of the model, which can provide both theoretical basis for data sharing of civil aviation using Ethereum blockchain and the further optimization of transactions confirmation time. 展开更多
关键词 blockchain Ethereum proof of stake(PoS)consensus mechanism M/G/1 queuing theory PRIORITY
下载PDF
从实践应用到证据法定:大数据证据的理论证成与规则建构 被引量:2
18
作者 张全涛 《四川轻化工大学学报(社会科学版)》 2023年第3期12-22,共11页
伴随着大数据时代的到来,大数据证据在司法实践中的证明价值愈加凸显。在肯定大数据证据实践证明价值的同时,囿于大数据证据在我国证据法地位的缺失、证据审查判断规则的缺位,使得大数据证据在法庭审查判断时表现混乱、在法庭质证时辩... 伴随着大数据时代的到来,大数据证据在司法实践中的证明价值愈加凸显。在肯定大数据证据实践证明价值的同时,囿于大数据证据在我国证据法地位的缺失、证据审查判断规则的缺位,使得大数据证据在法庭审查判断时表现混乱、在法庭质证时辩护效率低下,导致证据裁判规则规范侦查行为的价值功能失灵。从大数据证据的内生应用逻辑出发,大数据证据成为独立证据具有实践基础,包括大数据证据改变了传统证据的司法认知路径,推动了印证证明模式向综合验证模式的转向;大数据证据成为独立证据具有现实基础,包括电子数据无法与大数据证据等同、书证难以包容大数据证据、鉴定意见与大数据证据存在明显区分以及大数据证据与勘验、检查笔录和证人证言等法定证据类型存在诸多区别;大数据证据成为独立证据具有法理基础,从程序法的角度可以发现我国法定证据的分类存在着与取证型侦查行为密切相关的司法逻辑,即一种取证型侦查行为的诞生便会产生一种相对应的证据分类,结合当前我国新型犯罪侦查治理的需要,基于大数据搜索、大数据挖掘等新的取证型大数据侦查行为的出现,大数据证据成为独立证据类型也同样符合我国基于取证型侦查行为的诞生而伴生新的证据类型的法理基础。从大数据证据的真实性审查、合法性审查、科学性审查以及关联性审查等方面建构我国大数据证据的审查判断规则;以印证证明为基础,建构证据与证据之间、证据与案件事实之间、事实与事实之间,及其证据、事实与数据之间“网状式验证”的综合验证规则;以及建构包括绝对排除、相对排除为内容的大数据证据排除规则,可以有效推动我国大数据证据的基本理论证成与证据应用规则的完善。 展开更多
关键词 大数据证据 理论证成 审查判断规则 综合验证规则 证据排除规则
下载PDF
Origin of Magnetic Fields of Stellar Objects in the Universe Based on the 5D Projection Theory
19
作者 Peter C. W. Fung K. W. Wong 《Journal of Modern Physics》 2017年第4期668-746,共79页
Beginning with a 5D homogeneous universe [1], we have provided a plausible explanation of the self-rotation phenomenon of stellar objects previously with illustration of large number of star samples [2], via a 5D-4D p... Beginning with a 5D homogeneous universe [1], we have provided a plausible explanation of the self-rotation phenomenon of stellar objects previously with illustration of large number of star samples [2], via a 5D-4D projection. The origin of such rotation is the balance of the angular momenta of stars and that of positive and negative charged e-trino pairs, within a 3D &otimes;1D?void of the stellar object, the existence of which is based on conservation/parity laws in physics if one starts with homogeneous 5D universe. While the in-phase e-trino pairs are proposed to be responsible for the generation of angular momentum, the anti-phase but oppositely charge pairs necessarily produce currents. In the 5D to 4D projection, one space variable in the 5D manifold was compacted to zero in most other 5D theories (including theories of Kaluza-Klein and Einstein [3] [4]). We have demonstrated, using the Fermat’s Last Theorem [5], that for validity of gauge invariance at the 4D-5D boundary, the 4th space variable in the 5D manifold is mapped into two current rings at both magnetic poles as required by Perelman entropy mapping;these loops are the origin of the dipolar magnetic field. One conclusion we draw is that there is no gravitational singularity, and hence no black holes in the universe, a result strongly supported by the recent discovery of many stars with masses well greater than 100 solar mass [6] [7] [8], without trace of phenomena observed (such as strong gamma and X ray emissions), which are supposed to be associated with black holes. We analyze the properties of such loop currents on the 4D-5D boundary, where Maxwell equations are valid. We derive explicit expressions for the dipolar fields over the whole temperature range. We then compare our prediction with measured surface magnetic fields of many stars. Since there is coupling in distribution between the in-phase and anti-phase pairs of e-trinos, the generated mag-netic field is directly related to the angular momentum, leading to the result that the magnetic field can be expressible in terms of only the mechanical variables (mass M, radius R, rotation period P)of a star, as if Maxwell equations are “hidden”. An explanation for the occurrence of this “un-expected result” is provided in Section (7.6). Therefore we provide satisfactory answers to a number of “mysteries” of magnetism in astrophysics such as the “Magnetic Bode’s Relation/Law” [9] and the experimental finding that B-P graph in the log-log plot is linear. Moreover, we have developed a new method for studying the relations among the data (M, R, P) during stellar evolution. Ten groups of stellar objects, effectively over 2000 samples are used in various parts of the analysis. We also explain the emergence of huge magnetic field in very old stars like White Dwarfs in terms of formation of 2D Semion state on stellar surface and release of magnetic flux as magnetic storms upon changing the 2D state back to 3D structure. Moreover, we provide an explanation, on the ground of the 5D theory, for the detection of extremely weak fields in Venus and Mars and the asymmetric distribution of magnetic field on the Martian surface. We predict the equatorial fields B of the newly discovered Trappist-1 star and the 6 nearest planets. The log B?&minus;?log P graph for the 6 planets is linear and they satisfy the Magnetic Bode’s relation. Based on the above analysis, we have discovered several new laws of stellar magnetism, which are summarized in Section (7.6). 展开更多
关键词 5D Projection theory Fermat’s Last Theorem Perelman’s Mappings Self-Rotation Dipolar MAGNETIC FIELD of Stars LAWS of STELLAR Magnetism LAWS of STELLAR Angular Momentum MAGNETIC Bode’s Law NON-EXISTENCE of Gravitational Singularity Semion State of Atoms in STELLAR Surface MAGNETIC Storm Planetary MAGNETIC FIELD Maxwell Equations at 4d-5D Boundary MAGNETIC Fields of the Trappist-1 System
下载PDF
Data Fusion Algorithm Based on Fuzzy Sets and D-S Theory of Evidence 被引量:19
20
作者 Guangzhe Zhao Aiguo Chen +1 位作者 Guangxi Lu Wei Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第1期12-19,共8页
In cyber-physical systems, multidimensional data fusion is an important method to achieve comprehensive evaluation decisions and reduce data redundancy. In this paper, a data fusion algorithm based on fuzzy set theory... In cyber-physical systems, multidimensional data fusion is an important method to achieve comprehensive evaluation decisions and reduce data redundancy. In this paper, a data fusion algorithm based on fuzzy set theory and Dempster-Shafer(D-S) evidence theory is proposed to overcome the shortcomings of the existing decision-layer multidimensional data fusion algorithms. The basic probability distribution of evidence is determined based on fuzzy set theory and attribute weights, and the data fusion of attribute evidence is combined with the credibility of sensor nodes in a cyber-physical systems network. Experimental analysis shows that the proposed method has obvious advantages in the degree of the differentiation of the results. 展开更多
关键词 data FUSION FUZZY SETS Dempster-Shafer(d-s) theory
原文传递
上一页 1 2 12 下一页 到第
使用帮助 返回顶部