964 Hits in 4.8 sec

A Layered Dempster-Shafer Approach to Scenario Construction and Analysis

Antonio Sanfilippo, Bob Baddeley, Christian Posse, Paul Whitney
2007 2007 IEEE Intelligence and Security Informatics  
Dempster-Shafer theory adequate for relatively small and simple scenarios, this provides an evidentiary reasoning methodology for scenario construction and analysis that offers potential advantages when  ...  We a way of capturing generalizations about classes of evidence present a novel interface for this layered, Dempster-Shafer .. evidentiary reasoning approach and demonstrate the utility of .political repression  ...  USING HIDI FOR SCENARIO ANALYSIS a belief probability. We demonstrate the application of Dempster-Shafer theory in This approach has three main advantages.  ... 
doi:10.1109/isi.2007.379540 dblp:conf/isi/SanfilippoBPW07 fatcat:ibdjpu2vpzeinhjpxr54iaiiyu

Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network

Nishat I Mowla, Nguyen H. Tran, Inshil Doh, Kijoon Chae
2019 IEEE Access  
We enhance the proposed federated learning model with a client group prioritization technique leveraging the Dempster-Shafer theory.  ...  Third, given a huge number of UAV clients, the global model may need to choose a sub-group of UAV clients for providing a timely global update.  ...  Hence, we pre-process both the datasets to derive two unbalanced sub-datasets, which enable the comparison analysis between the proposed approach and the baseline approach in a more realistic scenario.  ... 
doi:10.1109/access.2019.2962873 fatcat:u72rla7pljfl7gojdmzoekocdu

Assessment of Enhanced Dempster-Shafer Theory for Uncertainty Modeling in a GIS-Based Seismic Vulnerability Assessment Model, Case Study—Tabriz City

Mahmoud Reza Delavar, Mansoureh Sadrykia
2020 ISPRS International Journal of Geo-Information  
However, when there is a conflict among information sources, classical Dempster rule of combination is not efficient.  ...  This paper analyses the uncertainty sources in a geospatial information system (GIS)-based seismic vulnerability assessment of buildings and then focuses on assessing the efficiency of Dempster rule of  ...  The authors would like to thank the local/national organizations mentioned in Table 1 for providing the data for this research. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/ijgi9040195 fatcat:qru6vtx6nrae3nexnvlkm5jm5m

Situational Awareness Using Distributed Data Fusion with Evidence Discounting [chapter]

Antonio Di Pietro, Stefano Panzieri, Andrea Gasparri
2015 IFIP Advances in Information and Communication Technology  
Data fusion provides a means for combining pieces of information from various sources and sensors.  ...  Simulation results demonstrate that the methodology is resilient to temporary faults in the critical infrastructure communications layer.  ...  The theory, introduced by Dempster [3] and Shafer [17] (also known as the Dempster-Shafer theory), embraces the intuitive idea of associating a number between zero and one to model the degree of confidence  ... 
doi:10.1007/978-3-319-26567-4_17 fatcat:ucwglavbgngf7ia3o2yoob4vtm

Synergistic integration of agent technologies for military simulation

Sean Owens, Paul Scerri, Robin Glinton, Bin Yu, Katia Sycara
2006 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems - AAMAS '06  
Critical extensions were required to the language describing required behavior to allow the pieces to work together.  ...  To perform large-scale coordination in real-world environments requires that many individually complex technologies come together to form integrated solutions.  ...  And the fourth bar shows the survivor average where both Dempster-Shafer and Terrain Analysis output were used to adjust confidence levels during sensor fusion.  ... 
doi:10.1145/1160633.1160906 dblp:conf/atal/OwensSGYS06 fatcat:3i7ydoijkndzhgo3ktcgxd4vgy

Synergistic Integration of Agent Technologies for Military Simulation

Paul Scerri, Sean Owens, Robin Glinton, Katia Sycara
2007 2007 International Conference on Integration of Knowledge Intensive Multi-Agent Systems  
Critical extensions were required to the language describing required behavior to allow the pieces to work together.  ...  To perform large-scale coordination in real-world environments requires that many individually complex technologies come together to form integrated solutions.  ...  And the fourth bar shows the survivor average where both Dempster-Shafer and Terrain Analysis output were used to adjust confidence levels during sensor fusion.  ... 
doi:10.1109/kimas.2007.369809 fatcat:3mnqjjxxafh6zbmouhxbyfcilu

Investigating The Impact Of Adaptive Risk Aware Response System With Ds Importance Factors In Manets
IJARCCE - Computer and Communication Engineering

2014 IJARCCE  
Hence, in this paper, An Adaptive Risk Aware Response System with Dempster Shafer theory that includes a notion of importance factors (ARSDSIF) is analysed and implemented.  ...  The effectiveness of our approach is analysed with respect to several performance metrics using NS-2 simulator.  ...  ACKNOWLEDGEMENT I am very thankful to our Prof. Dr. B. Prabhakara Rao and Assoc prof. B.A.S. Roopa Devi for their consistent support and guidance throughout the project period.  ... 
doi:10.17148/ijarcce.2014.31045 fatcat:2bhug6riavbm5icurnyufd4qlq

GIS-based bivariate statistical techniques for groundwater potential analysis (an example of Iran)

Ali Haghizadeh, Davoud Davoudi Moghaddam, Hamid Reza Pourghasemi
2017 Proceedings of the Indian Academy of Sciences, Earth and Planetary Sciences  
This study shows the potency of two GIS-based data driven bivariate techniques namely statistical index (SI) and Dempster-Shafer theory (DST) to analyze groundwater potential in Broujerd region of Iran  ...  Groundwater potential analysis prepares better comprehension of hydrological settings of different regions.  ...  Also, authors would like to thank two anonymous reviewers and editorial positive comments.  ... 
doi:10.1007/s12040-017-0888-x fatcat:egoridj7mfejhndeb6yftxhmom

A Network Forensic Framework for Port Scan Attack based on Efficient Packet Capturing

Forensic investigator needs to back up these recorded data to free up recording media and to preserve the data for future analysis.  ...  The objective of the proposed work is to build a network forensics framework that precisely scrutinizes only the relevant packets .In this work, a network forensic framework is developed subjected to port  ...  TIAN Zhihong, et al. [16] presented an approach to fuse evidence collected from various hosts and sub networks using dempster shafer evidence theory.  ... 
doi:10.35940/ijitee.l3850.1081219 fatcat:uhocjpcedvazppmdfeacjsg5ya

A Context Quality Model to Support Transparent Reasoning with Uncertain Context [chapter]

Susan McKeever, Juan Ye, Lorcan Coyle, Simon Dobson
2009 Lecture Notes in Computer Science  
In this paper, we combine these two strands, exploring the problem of how to identify and propagate quality through the dierent context layers in order to support the context reasoning process.  ...  We present a generalised, structured context quality model that supports aggregation of quality from sensor up to situation level.  ...  Examples of such mechanisms are voting [2] , Dempster Shafer [13] and fuzzy logic [10] .  ... 
doi:10.1007/978-3-642-04559-2_6 fatcat:rvm65j74ujhbdfrcjlz2ys2j3q

Risk-Aware Response Mechanism with Extended D-S theory

G. Nirmala, T. Kalai selvi
2012 International Journal of Computer Applications Technology and Research  
In this paper, we propose a adaptive risk-aware response mechanism with extended Dempster-Shafer theory in MANET to identify the routing attacks and malicious node.  ...  , and it leads to uncertainty in finding routing attacks in MANET.  ...  EXTENDED DEMPSTER SHAFER THEORY OF EVIDENCE The Dempster-Shafer mathematical theory of evidence is both a theory of evidence and a theory of probable reasoning.  ... 
doi:10.7753/ijcatr0201.1002 fatcat:hecfbgcoqvhehngmgkmnhsfssu

Estimating risk of contaminant intrusion in water distribution networks using Dempster–Shafer theory of evidence

Rehan Sadiq, Yehuda Kleiner, Balvant Rajani
2006 Civil engineering and environmental systems (Print)  
lang=fr Access and use of this website and the material on it are subject to the Terms and Conditions set forth at Estimating risk of contaminant intrusion in distribution networks using Dempster-Shafer  ...  B. Estimating risk of contaminant intrusion in water distribution networks using Dempster-Shafer theory of evidence NRCC-45408 Sadiq, R., Kleiner, Y. ; Rajani, B.  ...  ) and National Research Council (NRC) of Canada.  ... 
doi:10.1080/10286600600789276 fatcat:zcjbt54qcbfulf4gkvbjmsj3ue

Adaptive and robust evidence theory with applications in prediction of floor water inrush in coal mine

Fenglian Li, Xueying Zhang, Xiaolei Chen, Yu-Chu Tian
2017 Transactions of the Institute of Measurement and Control  
To address this problem, an Adaptive and Robust evidence Theory (ART) is presented in this paper through a robust combination of conjunctive and disjunctive rules.  ...  The ART approach presented in this paper was demonstrated to behave better than the existing methods.  ...  Evidence theory was first proposed by Dempster and then further developed by Shafer. So it was also called Dempster-Shafer theory (DST) or evidence theory.  ... 
doi:10.1177/0142331216687816 fatcat:cqevido3ynbxzdbthrxljyytje

Capabilities-based force aggregation using random sets

P. Svenson
2005 2005 7th International Conference on Information Fusion  
Force aggregation is one of the most important functionalities of a situation analysis system.  ...  The kind of doctrinal knowledge required by the approach suggested here is similar to the one needed to put together task-forces for solving a specific mission, ie, it is capabilities oriented.  ...  Acknowledgement: I thank Christian Mårtenson for commenting on a draft version of this manuscript and Johan Schubert for valuable discussions on force aggregation.  ... 
doi:10.1109/icif.2005.1591950 fatcat:znaztgojhngvpc4ihkj64d4bwe

Feature Fusion Using Automatic Generated RBF Neural Network

ZhiWen Wang, GongKun Luo
2015 Information Technology Journal  
Automatically generated RBF neural network is constructed and feature fusion is realized by using Dempster-Shafer combination rules and network learning.  ...  A B S T R A C T In this study, a strategy for feature fusion for team behaviors recognition using automatically generated RBF neural network is proposed, for various features need to be extracted in the  ...  ACKNOWLEDGMENT This study was supported in part by National Natural Science Foundation of China (61462008) and a grant from Natural Science Foundation of Guangxi (2013GXNSFAA019336) and the Foundation  ... 
doi:10.3923/itj.2015.16.23 fatcat:pbybhcpy45g7jfxpmobcefhqli
« Previous Showing results 1 — 15 out of 964 results