In this paper,we propose a novel Intrusion Detection System (IDS) architecture utilizing both the evidence theory and Rough Set Theory (RST). Evidence theory is an effective tool in dealing with uncertainty question. ...In this paper,we propose a novel Intrusion Detection System (IDS) architecture utilizing both the evidence theory and Rough Set Theory (RST). Evidence theory is an effective tool in dealing with uncertainty question. It relies on the expert knowledge to provide evidences,needing the evidences to be independent,and this make it difficult in application. To solve this problem,a hybrid system of rough sets and evidence theory is proposed. Firstly,simplification are made based on Variable Precision Rough Set (VPRS) conditional entropy. Thus,the Basic Belief Assignment (BBA) for all evidences can be calculated. Secondly,Dempster’s rule of combination is used,and a decision-making is given. In the proposed approach,the difficulties in acquiring the BBAs are solved,the correlativity among the evidences is reduced and the subjectivity of evidences is weakened. An illustrative example in an intrusion detection shows that the two theories combination is feasible and effective.展开更多
Accuracy and roughness, proposed by Pawlak(1982), might draw a conclusion inconsistent with our intuition in some cases. This letter analyzes the limitations in these measures and proposes improved accuracy and roughn...Accuracy and roughness, proposed by Pawlak(1982), might draw a conclusion inconsistent with our intuition in some cases. This letter analyzes the limitations in these measures and proposes improved accuracy and roughness measures based on information theory.展开更多
Assessing probabilities for relevant and sometimes unique events in real-world decision situations can be problematic. This paper elucidates a 2-step process for assigning probabilities to relevant events enabling a r...Assessing probabilities for relevant and sometimes unique events in real-world decision situations can be problematic. This paper elucidates a 2-step process for assigning probabilities to relevant events enabling a rational decision process to supersede decision choices based only on a gut feeling. After assessing probabilities the decision maker can confirm or reverse a gut feeling choice using expected values for each available act and traditional decision theory methodology. A simple example involving a buy now or buy later situation with market uncertainty illustrates the process for typical yes or no decisions.展开更多
A relatively perfect coalmine fire risk-evaluating and order-arranging model that includes sixteen influential factors was established according to the statistical information of the fully mechanized coalface ground o...A relatively perfect coalmine fire risk-evaluating and order-arranging model that includes sixteen influential factors was established according to the statistical information of the fully mechanized coalface ground on the uncertainty measure theory. Then the single-index measure function of sixteen influential factors and the calculation method of computing the index weight ground on entropy theory were respectively established. The value assignment of sixteen influential factors was carried out by the qualitative analysis and observational data, respectively, in succession. The sequence of fire danger class of four experimental coalfaces could be obtained by the computational aids of Matlab according to the confidence level criterion. Some conclusions that the fire danger class of the No.l, No.2 and No.3 coalface belongs to high criticality can be obtained. But the fire danger class of the No.4 coalface belongs to higher criticality. The fire danger class of the No.4 coalface is more than that of the No.2 coalface. The fire danger class of the No.2 coalface is more than that of the No.1 coalface. Finally, the fire danger class of the No.1 coalface is more than that of the No.3 coalface.展开更多
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put...To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.展开更多
Underwater vehicles operating in complex ocean conditions present difficulties in determining accurate dynamic models. To guarantee robustness against parameter uncertainty, an adaptive controller for dive-plane contr...Underwater vehicles operating in complex ocean conditions present difficulties in determining accurate dynamic models. To guarantee robustness against parameter uncertainty, an adaptive controller for dive-plane control, based on Lyapunov theory and back-stepping techniques, was proposed. In the closed-loop system, asymptotic tracking of the reference depth and pitch angle trajectories was accomplished. Simulation results were presented which show effective dive-plane control in spite of the uncertainties in the system parameters.展开更多
The robust guaranteed cost sampled-data control was studied for a class of uncertain nonlinear systems with time-varying delay. The parameter uncertainties are time-varying norm-bounded and appear in both the state an...The robust guaranteed cost sampled-data control was studied for a class of uncertain nonlinear systems with time-varying delay. The parameter uncertainties are time-varying norm-bounded and appear in both the state and the input control matrices. By applying an input delay approach, the system was transformed into a continuous time-delay system. Attention was focused on the design of a robust guaranteed cost sampled-data control law which guarantees that the closed-loop system is asymptotically stable and the quadratic performance index is less than a certain bound for all admissible uncertainties. By applying Lyapunov stability theory, the theorems were derived to provide sufficient conditions for the existence of robust guaranteed cost sampled-data control law in the form of linear matrix inequalities (LMIs), especially an optimal state-feedback guaranteed cost sampled-data control law which ensures the minimization of the guaranteed cost was given. The effectiveness of the proposed method was illustrated by a simulation example with the asymptotically stable curves of system state under the initial condition of x(0)=[0.679 6 0].展开更多
Chaos theory is used to prove that erratic and chaotic fluctuations can indeed arise in completely deterministic models. Chaos theory reveals structure in aperiodic, dynamic systems. A number of non-linear business cy...Chaos theory is used to prove that erratic and chaotic fluctuations can indeed arise in completely deterministic models. Chaos theory reveals structure in aperiodic, dynamic systems. A number of non-linear business cycle models use chaos theory to explain complex motion of the economy. Chaotic systems exhibit a sensitive dependence on initial conditions: Seemingly insignificant changes in the initial conditions produce large differences in outcomes. The basic aim of this analysis is to provide a relatively simple chaotic real-exchange-rate growth model that is capable of generating stable equilibria, cycles, or chaos.展开更多
Interval-valued data appear as a way to represent the uncertainty affecting the observed values. Dealing with interval-valued information systems is helpful to generalize the applications of rough set theory. Attribut...Interval-valued data appear as a way to represent the uncertainty affecting the observed values. Dealing with interval-valued information systems is helpful to generalize the applications of rough set theory. Attribute reduction is a key issue in analysis of interval-valued data. Existing attribute reduction methods for single-valued data are unsuitable for interval-valued data. So far, there have been few studies on attribute reduction methods for interval-valued data. In this paper, we propose a framework for attribute reduction in interval-valued data from the viewpoint of information theory. Some information theory concepts, including entropy, conditional entropy, and joint entropy, are given in interval-valued information systems. Based on these concepts, we provide an information theory view for attribute reduction in interval-valued information systems. Consequently, attribute reduction algorithms are proposed. Experiments show that the proposed framework is effective for attribute reduction in interval-valued information systems.展开更多
In the traditional Markov chain model (MCM), aleatory uncertainty because of inherent randomness and epistemic uncertainty due to the lack of knowledge are not differentiated. Generalized interval probability provides...In the traditional Markov chain model (MCM), aleatory uncertainty because of inherent randomness and epistemic uncertainty due to the lack of knowledge are not differentiated. Generalized interval probability provides a concise representation for the two kinds of uncertainties simultaneously. In this paper, a generalized Markov chain model (GMCM), based on the generalized interval probability theory, is proposed to improve the reliability of prediction. In the GMCM, aleatory uncertainty is represented as probability; interval is used to capture epistemic uncertainty. A case study for predicting the average dynamic compliance in machining processes is provided to demonstrate the effectiveness of proposed GMCM. The results show that the proposed GMCM has a better prediction performance than that of MCM.展开更多
基金Supported by the National Natural Science Foundation of China (No. 60774029)
文摘In this paper,we propose a novel Intrusion Detection System (IDS) architecture utilizing both the evidence theory and Rough Set Theory (RST). Evidence theory is an effective tool in dealing with uncertainty question. It relies on the expert knowledge to provide evidences,needing the evidences to be independent,and this make it difficult in application. To solve this problem,a hybrid system of rough sets and evidence theory is proposed. Firstly,simplification are made based on Variable Precision Rough Set (VPRS) conditional entropy. Thus,the Basic Belief Assignment (BBA) for all evidences can be calculated. Secondly,Dempster’s rule of combination is used,and a decision-making is given. In the proposed approach,the difficulties in acquiring the BBAs are solved,the correlativity among the evidences is reduced and the subjectivity of evidences is weakened. An illustrative example in an intrusion detection shows that the two theories combination is feasible and effective.
基金National Natural Science Foundation of China(60073012)Natural Sceience Foundation of Jiangsu, China(BK2001004)Visiting Scholar Foundation of Key Lab in Wuhan University
文摘Accuracy and roughness, proposed by Pawlak(1982), might draw a conclusion inconsistent with our intuition in some cases. This letter analyzes the limitations in these measures and proposes improved accuracy and roughness measures based on information theory.
文摘Assessing probabilities for relevant and sometimes unique events in real-world decision situations can be problematic. This paper elucidates a 2-step process for assigning probabilities to relevant events enabling a rational decision process to supersede decision choices based only on a gut feeling. After assessing probabilities the decision maker can confirm or reverse a gut feeling choice using expected values for each available act and traditional decision theory methodology. A simple example involving a buy now or buy later situation with market uncertainty illustrates the process for typical yes or no decisions.
基金Supported by the National Foundation of China(50974055)the Program for Changjiang Scholars and Innovative Research Team in University(IRT0618)Henan Province Basic and Leading-edge Technology Research Program(082300463205)
文摘A relatively perfect coalmine fire risk-evaluating and order-arranging model that includes sixteen influential factors was established according to the statistical information of the fully mechanized coalface ground on the uncertainty measure theory. Then the single-index measure function of sixteen influential factors and the calculation method of computing the index weight ground on entropy theory were respectively established. The value assignment of sixteen influential factors was carried out by the qualitative analysis and observational data, respectively, in succession. The sequence of fire danger class of four experimental coalfaces could be obtained by the computational aids of Matlab according to the confidence level criterion. Some conclusions that the fire danger class of the No.l, No.2 and No.3 coalface belongs to high criticality can be obtained. But the fire danger class of the No.4 coalface belongs to higher criticality. The fire danger class of the No.4 coalface is more than that of the No.2 coalface. The fire danger class of the No.2 coalface is more than that of the No.1 coalface. Finally, the fire danger class of the No.1 coalface is more than that of the No.3 coalface.
基金Supported by the National Natural Science Foundation of China(No.60872041,61072066)Fundamental Research Funds for the Central Universities(JYI0000903001,JYI0000901034)
文摘To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.
基金Supported by the National Natural Science Foundation of China under Grant No.50909025/E091002
文摘Underwater vehicles operating in complex ocean conditions present difficulties in determining accurate dynamic models. To guarantee robustness against parameter uncertainty, an adaptive controller for dive-plane control, based on Lyapunov theory and back-stepping techniques, was proposed. In the closed-loop system, asymptotic tracking of the reference depth and pitch angle trajectories was accomplished. Simulation results were presented which show effective dive-plane control in spite of the uncertainties in the system parameters.
基金Project(12511109) supported by the Science and Technology Studies Foundation of Heilongjiang Educational Committee of 2011, China
文摘The robust guaranteed cost sampled-data control was studied for a class of uncertain nonlinear systems with time-varying delay. The parameter uncertainties are time-varying norm-bounded and appear in both the state and the input control matrices. By applying an input delay approach, the system was transformed into a continuous time-delay system. Attention was focused on the design of a robust guaranteed cost sampled-data control law which guarantees that the closed-loop system is asymptotically stable and the quadratic performance index is less than a certain bound for all admissible uncertainties. By applying Lyapunov stability theory, the theorems were derived to provide sufficient conditions for the existence of robust guaranteed cost sampled-data control law in the form of linear matrix inequalities (LMIs), especially an optimal state-feedback guaranteed cost sampled-data control law which ensures the minimization of the guaranteed cost was given. The effectiveness of the proposed method was illustrated by a simulation example with the asymptotically stable curves of system state under the initial condition of x(0)=[0.679 6 0].
文摘Chaos theory is used to prove that erratic and chaotic fluctuations can indeed arise in completely deterministic models. Chaos theory reveals structure in aperiodic, dynamic systems. A number of non-linear business cycle models use chaos theory to explain complex motion of the economy. Chaotic systems exhibit a sensitive dependence on initial conditions: Seemingly insignificant changes in the initial conditions produce large differences in outcomes. The basic aim of this analysis is to provide a relatively simple chaotic real-exchange-rate growth model that is capable of generating stable equilibria, cycles, or chaos.
基金Project supported by the National Natural Science Foundation of China(Nos.61473259,61502335,61070074,and60703038)the Zhejiang Provincial Natural Science Foundation(No.Y14F020118)the PEIYANG Young Scholars Program of Tianjin University,China(No.2016XRX-0001)
文摘Interval-valued data appear as a way to represent the uncertainty affecting the observed values. Dealing with interval-valued information systems is helpful to generalize the applications of rough set theory. Attribute reduction is a key issue in analysis of interval-valued data. Existing attribute reduction methods for single-valued data are unsuitable for interval-valued data. So far, there have been few studies on attribute reduction methods for interval-valued data. In this paper, we propose a framework for attribute reduction in interval-valued data from the viewpoint of information theory. Some information theory concepts, including entropy, conditional entropy, and joint entropy, are given in interval-valued information systems. Based on these concepts, we provide an information theory view for attribute reduction in interval-valued information systems. Consequently, attribute reduction algorithms are proposed. Experiments show that the proposed framework is effective for attribute reduction in interval-valued information systems.
基金supported by the National Key Basic Research Program of China (973 Program) (Grant No. 2011CB706803)the National Natural Science Foundation of China (Grant Nos. 51175208, 51075161)
文摘In the traditional Markov chain model (MCM), aleatory uncertainty because of inherent randomness and epistemic uncertainty due to the lack of knowledge are not differentiated. Generalized interval probability provides a concise representation for the two kinds of uncertainties simultaneously. In this paper, a generalized Markov chain model (GMCM), based on the generalized interval probability theory, is proposed to improve the reliability of prediction. In the GMCM, aleatory uncertainty is represented as probability; interval is used to capture epistemic uncertainty. A case study for predicting the average dynamic compliance in machining processes is provided to demonstrate the effectiveness of proposed GMCM. The results show that the proposed GMCM has a better prediction performance than that of MCM.