Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However,...Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However, in practical applications, the information obtained by a single device is limited, and it is necessary to integrate the information of maritime radar and AIS messages to achieve better recognition effects. In this study, the D-S evidence theory is used to fusion the two kinds of heterogeneous information: maritime radar images and AIS messages. Firstly, the radar image and AIS message are processed to get the targets of interest in the same coordinate system. Then, the coordinate position and heading of targets are chosen as the indicators for judging target similarity. Finally, a piece of D-S evidence theory based on the information fusion method is proposed to match the radar target and the AIS target of the same ship. Particularly, the effectiveness of the proposed method has been validated and evaluated through several experiments, which proves that such a method is practical in maritime safety supervision.展开更多
Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability ...Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability and are used to modify the cognitive failure probability(CFP).However,the levels of CPCs are usually determined by domain experts,whichmay be subjective and uncertain.What’smore,the classicCREAMassumes that the CPCs are independent,which is unrealistic.Ignoring the dependence among CPCs will result in repeated calculations of the influence of the CPCs on CFP and lead to unreasonable reliability evaluation.To address the issue of uncertain information modeling and processing,this paper introduces evidence theory to evaluate the CPC levels in specific scenarios.To address the issue of dependence modeling,the Decision-Making Trial and Evaluation Laboratory(DEMATEL)method is used to process the dependence among CPCs and calculate the relative weights of each CPC,thus modifying the multiplier of the CPCs.The detailed process of the proposed method is illustrated in this paper and the CFP estimated by the proposed method is more reasonable.展开更多
D-S evidence theory provides a good approach to fuse uncertain inlbrmation. In this article, we introduce seismic multi-attribute fusion based on D-S evidence theory to predict the coalbed methane (CBM) concentrated...D-S evidence theory provides a good approach to fuse uncertain inlbrmation. In this article, we introduce seismic multi-attribute fusion based on D-S evidence theory to predict the coalbed methane (CBM) concentrated areas. First, we choose seismic attributes that are most sensitive to CBM content changes with the guidance of CBM content measured at well sites. Then the selected seismic attributes are fused using D-S evidence theory and the fusion results are used to predict CBM-enriched area. The application shows that the predicted CBM content and the measured values are basically consistent. The results indicate that using D-S evidence theory in seismic multi-attribute fusion to predict CBM-enriched areas is feasible.展开更多
The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, d...The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies.展开更多
Power transformer is a core equipment of power system, which undertakes the important functions of power transmission and transformation, and its safe and stable operation has great significance to the normal operatio...Power transformer is a core equipment of power system, which undertakes the important functions of power transmission and transformation, and its safe and stable operation has great significance to the normal operation of the whole power system. Due to the complex structure of the transformer, the use of single information for condition-based maintenance (CBM) has certain limitations, with the help of advanced sensor monitoring and information fusion technology, multi-source information is applied to the prognostic and health management (PHM) of power transformer, which is an important way to realize the CBM of power transformer. This paper presents a method which combine deep belief network classifier (DBNC) and D-S evidence theory, and it is applied to the PHM of the large power transformer. The experimental results show that the proposed method has a high correct rate of fault diagnosis for the power transformer with a large number of multi-source data.展开更多
Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectivel...Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectively defend against attacks and attackers. To do this, correlative information provided by IDS must be gathered and the current intrusion characteristics and sit- uation must be analyzed and estimated. This paper applies D-S evidence theory to distributed intrusion detection system for fusing information from detection centers, making clear intrusion situation, and improving the early warning capability and detection efficiency of the IDS accord- ingly.展开更多
Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classific...Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.展开更多
This paper presents an innovative approach for the fault isolation of Light Rail Vehicle (LRV) suspension system based on the Dempster-Shafer (D-S) evidence theory and its improvement application case. The considered ...This paper presents an innovative approach for the fault isolation of Light Rail Vehicle (LRV) suspension system based on the Dempster-Shafer (D-S) evidence theory and its improvement application case. The considered LRV has three rolling stocks and each one equips three sensors for monitoring the suspension system. A Kalman filter is applied to generate the residuals for fault diagnosis. For the purpose of fault isolation, a fault feature database is built in advance. The Eros and the norm distance between the fault feature of the new occurred fault and the one in the feature database are applied to measure the similarity of the feature which is the basis for the basic belief assignment to the fault, respectively. After the basic belief assignments are obtained, they are fused by using the D-S evidence theory. The fusion of the basic belief assignments increases the isolation accuracy significantly. The efficiency of the proposed method is demonstrated by two case studies.展开更多
According to fault type diversity and fault information uncertainty problem of the hydraulic driven rocket launcher servo system(HDRLSS) , the fault diagnosis method based on the evidence theory and neural network e...According to fault type diversity and fault information uncertainty problem of the hydraulic driven rocket launcher servo system(HDRLSS) , the fault diagnosis method based on the evidence theory and neural network ensemble is proposed. In order to overcome the shortcomings of the single neural network, two improved neural network models are set up at the com-mon nodes to simplify the network structure. The initial fault diagnosis is based on the iron spectrum data and the pressure, flow and temperature(PFT) characteristic parameters as the input vectors of the two improved neural network models, and the diagnosis result is taken as the basic probability distribution of the evidence theory. Then the objectivity of assignment is real-ized. The initial diagnosis results of two improved neural networks are fused by D-S evidence theory. The experimental results show that this method can avoid the misdiagnosis of neural network recognition and improve the accuracy of the fault diagnosis of HDRLSS.展开更多
In the last decade,IoT has been widely used in smart cities,autonomous driving and Industry 4.0,which lead to improve efficiency,reliability,security and economic benefits.However,with the rapid development of new tec...In the last decade,IoT has been widely used in smart cities,autonomous driving and Industry 4.0,which lead to improve efficiency,reliability,security and economic benefits.However,with the rapid development of new technologies,such as cognitive communication,cloud computing,quantum computing and big data,the IoT security is being confronted with a series of new threats and challenges.IoT device identification via Radio Frequency Fingerprinting(RFF)extracting from radio signals is a physical-layer method for IoT security.In physical-layer,RFF is a unique characteristic of IoT device themselves,which can difficultly be tampered.Just as people’s unique fingerprinting,different IoT devices exhibit different RFF which can be used for identification and authentication.In this paper,the structure of IoT device identification is proposed,the key technologies such as signal detection,RFF extraction,and classification model is discussed.Especially,based on the random forest and Dempster-Shafer evidence algorithm,a novel ensemble learning algorithm is proposed.Through theoretical modeling and experimental verification,the reliability and differentiability of RFF are extracted and verified,the classification result is shown under the real IoT device environments.展开更多
文摘Maritime radar and automatic identification systems (AIS), which are essential auxiliary equipment for navigation safety in the shipping industry, have played significant roles in maritime safety supervision. However, in practical applications, the information obtained by a single device is limited, and it is necessary to integrate the information of maritime radar and AIS messages to achieve better recognition effects. In this study, the D-S evidence theory is used to fusion the two kinds of heterogeneous information: maritime radar images and AIS messages. Firstly, the radar image and AIS message are processed to get the targets of interest in the same coordinate system. Then, the coordinate position and heading of targets are chosen as the indicators for judging target similarity. Finally, a piece of D-S evidence theory based on the information fusion method is proposed to match the radar target and the AIS target of the same ship. Particularly, the effectiveness of the proposed method has been validated and evaluated through several experiments, which proves that such a method is practical in maritime safety supervision.
基金Shanghai Rising-Star Program(Grant No.21QA1403400)Shanghai Sailing Program(Grant No.20YF1414800)Shanghai Key Laboratory of Power Station Automation Technology(Grant No.13DZ2273800).
文摘Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability and are used to modify the cognitive failure probability(CFP).However,the levels of CPCs are usually determined by domain experts,whichmay be subjective and uncertain.What’smore,the classicCREAMassumes that the CPCs are independent,which is unrealistic.Ignoring the dependence among CPCs will result in repeated calculations of the influence of the CPCs on CFP and lead to unreasonable reliability evaluation.To address the issue of uncertain information modeling and processing,this paper introduces evidence theory to evaluate the CPC levels in specific scenarios.To address the issue of dependence modeling,the Decision-Making Trial and Evaluation Laboratory(DEMATEL)method is used to process the dependence among CPCs and calculate the relative weights of each CPC,thus modifying the multiplier of the CPCs.The detailed process of the proposed method is illustrated in this paper and the CFP estimated by the proposed method is more reasonable.
基金supported by the National Basic Research Program of China (973 Program) (No. 2009CB219603)Key Special National Project (No. 2008ZX05035)Priority Academic Program Development of Jiangsu Higher Education Institutions
文摘D-S evidence theory provides a good approach to fuse uncertain inlbrmation. In this article, we introduce seismic multi-attribute fusion based on D-S evidence theory to predict the coalbed methane (CBM) concentrated areas. First, we choose seismic attributes that are most sensitive to CBM content changes with the guidance of CBM content measured at well sites. Then the selected seismic attributes are fused using D-S evidence theory and the fusion results are used to predict CBM-enriched area. The application shows that the predicted CBM content and the measured values are basically consistent. The results indicate that using D-S evidence theory in seismic multi-attribute fusion to predict CBM-enriched areas is feasible.
基金supported by the National Natural Science Foundation of China(Grants No.51190094,50909073,and 51179130)the Hubei Province Natural Science Foundation(Grant No.2010CDB08401)
文摘The weights of the drought risk index (DRI), which linearly combines the reliability, resiliency, and vulnerability, are difficult to obtain due to complexities in water security during drought periods. Therefore, drought entropy was used to determine the weights of the three critical indices. Conventional simulation results regarding the risk load of water security during drought periods were often regarded as precise. However, neither the simulation process nor the DRI gives any consideration to uncertainties in drought events. Therefore, the Dempster-Shafer (D-S) evidence theory and the evidential reasoning algorithm were introduced, and the DRI values were calculated with consideration of uncertainties of the three indices. The drought entropy and evidential reasoning algorithm were used in a case study of the Haihe River Basin to assess water security risks during drought periods. The results of the new DRI values in two scenarios were compared and analyzed. It is shown that the values of the DRI in the D-S evidence algorithm increase slightly from the original results of Zhang et al. (2005), and the results of risk assessment of water security during drought periods are reasonable according to the situation in the study area. This study can serve as a reference for further practical application and planning in the Haihe River Basin, and other relevant or similar studies.
文摘Power transformer is a core equipment of power system, which undertakes the important functions of power transmission and transformation, and its safe and stable operation has great significance to the normal operation of the whole power system. Due to the complex structure of the transformer, the use of single information for condition-based maintenance (CBM) has certain limitations, with the help of advanced sensor monitoring and information fusion technology, multi-source information is applied to the prognostic and health management (PHM) of power transformer, which is an important way to realize the CBM of power transformer. This paper presents a method which combine deep belief network classifier (DBNC) and D-S evidence theory, and it is applied to the PHM of the large power transformer. The experimental results show that the proposed method has a high correct rate of fault diagnosis for the power transformer with a large number of multi-source data.
文摘Application of data fusion technique in intrusion detection is the trend of next- generation Intrusion Detection System (IDS). In network security, adopting security early warn- ing technique is feasible to effectively defend against attacks and attackers. To do this, correlative information provided by IDS must be gathered and the current intrusion characteristics and sit- uation must be analyzed and estimated. This paper applies D-S evidence theory to distributed intrusion detection system for fusing information from detection centers, making clear intrusion situation, and improving the early warning capability and detection efficiency of the IDS accord- ingly.
基金Supported by the Ministry of Educationin China (No.104086)
文摘Ubiquitous computing systems typically have lots of security problems in the area of identity authentication by means of classical PKI methods. The limited computing resources, the disconnection network, the classification requirements of identity authentication, the requirement of trust transfer and cross identity authentication, the bi-directional identity authentication, the security delegation and the simple privacy protection etc are all these unsolved problems. In this paper, a new novel ubiquitous computing identity authentication mechanism, named UCIAMdess, is presented. It is based on D-S Evidence Theory and extended SPKI/SDSI. D-S Evidence Theory is used in UCIAMdess to compute the trust value from the ubiquitous computing environment to the principal or between the different ubiquitous computing environments. SPKI-based authorization is expanded by adding the trust certificate in UCIAMdess to solve above problems in the ubiquitous computing environments. The identity authentication mechanism and the algorithm of certificate reduction are given in the paper to solve the multi-levels trust-correlative identity authentication problems. The performance analyses show that UCIAMdess is a suitable security mechanism in solving the complex ubiquitous computing problems.
文摘This paper presents an innovative approach for the fault isolation of Light Rail Vehicle (LRV) suspension system based on the Dempster-Shafer (D-S) evidence theory and its improvement application case. The considered LRV has three rolling stocks and each one equips three sensors for monitoring the suspension system. A Kalman filter is applied to generate the residuals for fault diagnosis. For the purpose of fault isolation, a fault feature database is built in advance. The Eros and the norm distance between the fault feature of the new occurred fault and the one in the feature database are applied to measure the similarity of the feature which is the basis for the basic belief assignment to the fault, respectively. After the basic belief assignments are obtained, they are fused by using the D-S evidence theory. The fusion of the basic belief assignments increases the isolation accuracy significantly. The efficiency of the proposed method is demonstrated by two case studies.
文摘According to fault type diversity and fault information uncertainty problem of the hydraulic driven rocket launcher servo system(HDRLSS) , the fault diagnosis method based on the evidence theory and neural network ensemble is proposed. In order to overcome the shortcomings of the single neural network, two improved neural network models are set up at the com-mon nodes to simplify the network structure. The initial fault diagnosis is based on the iron spectrum data and the pressure, flow and temperature(PFT) characteristic parameters as the input vectors of the two improved neural network models, and the diagnosis result is taken as the basic probability distribution of the evidence theory. Then the objectivity of assignment is real-ized. The initial diagnosis results of two improved neural networks are fused by D-S evidence theory. The experimental results show that this method can avoid the misdiagnosis of neural network recognition and improve the accuracy of the fault diagnosis of HDRLSS.
文摘In the last decade,IoT has been widely used in smart cities,autonomous driving and Industry 4.0,which lead to improve efficiency,reliability,security and economic benefits.However,with the rapid development of new technologies,such as cognitive communication,cloud computing,quantum computing and big data,the IoT security is being confronted with a series of new threats and challenges.IoT device identification via Radio Frequency Fingerprinting(RFF)extracting from radio signals is a physical-layer method for IoT security.In physical-layer,RFF is a unique characteristic of IoT device themselves,which can difficultly be tampered.Just as people’s unique fingerprinting,different IoT devices exhibit different RFF which can be used for identification and authentication.In this paper,the structure of IoT device identification is proposed,the key technologies such as signal detection,RFF extraction,and classification model is discussed.Especially,based on the random forest and Dempster-Shafer evidence algorithm,a novel ensemble learning algorithm is proposed.Through theoretical modeling and experimental verification,the reliability and differentiability of RFF are extracted and verified,the classification result is shown under the real IoT device environments.