Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se...Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.展开更多
To study the scene classification in the Synthetic Aperture Radar (SAR) image, a novel method based on kernel estimate, with the Maxkov context and Dempster-Shafer evidence theory is proposed. Initially, a nonpaxame...To study the scene classification in the Synthetic Aperture Radar (SAR) image, a novel method based on kernel estimate, with the Maxkov context and Dempster-Shafer evidence theory is proposed. Initially, a nonpaxametric Probability Density Function (PDF) estimate method is introduced, to describe the scene of SAR images. And then under the Maxkov context, both the determinate PDF and the kernel estimate method axe adopted respectively, to form a primary classification. Next, the primary classification results are fused using the evidence theory in an unsupervised way to get the scene classification. Finally, a regularization step is used, in which an iterated maximum selecting approach is introduced to control the fragments and modify the errors of the classification. Use of the kernel estimate and evidence theory can describe the complicated scenes with little prior knowledge and eliminate the ambiguities of the primary classification results. Experimental results on real SAR images illustrate a rather impressive performance.展开更多
Transmembrane proteins are some special and important proteins in cells. Because of their importance and specificity, the prediction of the transmembrane regions has very important theoretical and practical significan...Transmembrane proteins are some special and important proteins in cells. Because of their importance and specificity, the prediction of the transmembrane regions has very important theoretical and practical significance. At present, the prediction methods are mainly based on the physicochemical property and statistic analysis of amino acids. However, these methods are suitable for some environments but inapplicable for other environments. In this paper, the multi-sources information fusion theory has been introduced to predict the transmembrane regions. The proposed method is test on a data set of transmembrane proteins. The results show that the proposed method has the ability of predicting the transmembrane regions as a good performance and powerful tool.展开更多
Cloud computing provides easy and on-demand access to computing resources in a configurable pool.The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using group...Cloud computing provides easy and on-demand access to computing resources in a configurable pool.The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines(VMs),instead of being restricted on a single physical server.When more and more network services are deployed on the cloud,the detection of the intrusion likes Distributed Denialof-Service(DDoS)attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud system.In this paper,we propose a cloud-based intrusion detection system(IDS)which inspects the features of data flow between neighboring VMs,analyzes the probability of being attacked on each pair of VMs and then regards it as independent evidence using Dempster-Shafer theory,and eventually combines the evidence among all pairs of VMs using the method of evidence fusion.Unlike the traditional IDS that focus on analyzing the entire network service externally,our proposed algorithm makes full use of the internal interactions between VMs,and the experiment proved that it can provide more accurate results than the traditional algorithm.展开更多
The Dempster-Shafer theory has been successfully applied to mineral resource potential mapping in GIS environmental. In this applied form, basic probability assignment and combined basic probability assignment are app...The Dempster-Shafer theory has been successfully applied to mineral resource potential mapping in GIS environmental. In this applied form, basic probability assignment and combined basic probability assignment are applied to measuring map pattem and map pattem combination, respectively; and the environment composed of the only two singleton sets (deposit set and non-deposit set), is used for expressing the entire map area. For a subarea in which the certain map pattern combination exists, the combined basic probability assignment corresponding to the map pattern combination existing in this subarea, expresses the belief of inferring the subarea belonging to the deposit set from the evidence that the corresponding map pattern combination existing in the subarea. Thus, it may be served as a statistical index measuring the relative mineral resource potentials of the subarea. And it may be determined like 1) dividing the map area into a series of small equal-sized grid cells and then select the training sample set composed of the well-known grid cells or the entire grid cells; 2) estimating the basic probability assignments corresponding to each map pattern fromthe training sample set; 3) determining the map pattern combination existing in each cell, and then appling the Dempster's Rule of Combination to integrating the all basic probability assignments corresponding to the map patterns existing in the cell into the combined basic probability assignment. Mineral resource potential mapping with the Dempster-Shafer theory is demonstrated on a case study to select mineral resource targets. The experimental results manifest that the model can be compared with the weights of evidence model in the effectiveness of mineral resource target selection.展开更多
In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-S...In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-Shafer(D-S) evidence theory are proposed at the relay node.Instead of traditional linear detection,the first proposed MIMO-DS NC scheme adopts D-S evidence theory to detect the signals of each source node before mapping them into network-coded signal.Moreover,different from traditional physical-layer network coding(PNC) based on virtual MIMO model,the further proposed MIMO-DS PNC comes from the vector space perspective and combines PNC mapping with D-S theory to obtain network-coded signal without estimating each source node signal.D-S theory can appropriately characterize uncertainty and make full use of multiple evidence source information by Dempster's combination rule to obtain reliable decisions.In the broadcast(BC) phase,the space-time coding(STC) and antenna selection(AS) schemes are adopted to achieve transmit diversity.Simulation results reveal that the STC and AS schemes both achieve full transmit diversity in the BC phase and the proposed MIMO-DS NC/PNC schemes obtain better end-to-end BER performance and throughputs compared with traditional schemes with a little complexity increasing and no matter which scheme is adopted in the BC phase,MIMO-DS PNC always achieves full end-to-end diversity gain as MIMO-ML NC but with a lower complexity and its throughput approaches the throughput of MIMO-ML NC in high SNR regime.展开更多
Aiming at solving the problems such as time consuming and application limiting presented in the existing synchronous cooperative spectrum sensing schemes,a triggered asynchronous scheme based on Dempster-Shafer(D-S) t...Aiming at solving the problems such as time consuming and application limiting presented in the existing synchronous cooperative spectrum sensing schemes,a triggered asynchronous scheme based on Dempster-Shafer(D-S) theory was proposed.Sensing asynchronously,each cognitive user calculated the confidence measure functions with double threshold spectrum sensing method.When the useful report was received by the fusion center,a fusion process would be triggered.Then the sensing results were fused together based on D-S theory.The analysis and simulation results show that the proposed scheme can improve the spectrum sensing efficiency and reduce the calculation amount of the fusion center compared with the existing schemes.展开更多
In this paper, it is proposed to apply the Dempster-Shafer Theory (DST) or the theory of evidence to map vegetation, aquatic and mineral surfaces with a view to detecting potential areas of observation of outcrops of ...In this paper, it is proposed to apply the Dempster-Shafer Theory (DST) or the theory of evidence to map vegetation, aquatic and mineral surfaces with a view to detecting potential areas of observation of outcrops of geological formations (rocks, breastplates, regolith, etc.). The proposed approach consists in aggregating information by using the DST. From pretreated Aster satellite images (geo-referencing, geometric correction and resampling at 15 m), new channels were produced by determining the spectral indices NDVI, MNDWI and NDBaI. Then, the DST formalism was modeled and generated under the MATLAB software, an image segmented into six classes including three absolute classes (E,V,M) and three classes of confusion ({E,V}, {M,V}, {E,M}). The control on the land, based on geographic coordinates of pixels of different classes on said image, has made it possible to make a concordant interpretation thereof. Our contribution lies in taking into account imperfections (inaccuracies and uncertainties) related to source information by using mass functions based on a simple support model (two focal elements: the discernment framework and the potential set of belonging of the pixel to be classified) with a normal law for the good management of these.展开更多
In the field of target recognition based on the temporal-spatial information fusion,evidence the-ory has received extensive attention.To achieve accurate and efficient target recognition by the evi-dence theory,an ada...In the field of target recognition based on the temporal-spatial information fusion,evidence the-ory has received extensive attention.To achieve accurate and efficient target recognition by the evi-dence theory,an adaptive temporal-spatial information fusion model is proposed.Firstly,an adaptive evaluation correction mechanism is constructed by the evidence distance and Deng entropy,which realizes the credibility discrimination and adaptive correction of the spatial evidence.Secondly,the credibility decay operator is introduced to obtain the dynamic credibility of temporal evidence.Finally,the sequential combination of temporal-spatial evidences is achieved by Shafer’s discount criterion and Dempster’s combination rule.The simulation results show that the proposed method not only considers the dynamic and sequential characteristics of the temporal-spatial evidences com-bination,but also has a strong conflict information processing capability,which provides a new refer-ence for the field of temporal-spatial information fusion.展开更多
Data fusion has shown potential to improve the accuracy of land cover mapping,and selection of the optimal fusion technique remains a challenge.This study investigated the performance of fusing Sentinel-1(S-1)and Sent...Data fusion has shown potential to improve the accuracy of land cover mapping,and selection of the optimal fusion technique remains a challenge.This study investigated the performance of fusing Sentinel-1(S-1)and Sentinel-2(S-2)data,using layer-stacking method at the pixel level and Dempster-Shafer(D-S)theory-based approach at the decision level,for mapping six land cover classes in Thu Dau Mot City,Vietnam.At the pixel level,S-1 and S-2 bands and their extracted textures and indices were stacked into the different single-sensor and multi-sensor datasets(i.e.fused datasets).The datasets were categorized into two groups.One group included the datasets containing only spectral and backscattering bands,and the other group included the datasets consisting of these bands and their extracted features.The random forest(RF)classifier was then applied to the datasets within each group.At the decision level,the RF classification outputs of the single-sensor datasets within each group were fused together based on D-S theory.Finally,the accuracy of the mapping results at both levels within each group was compared.The results showed that fusion at the decision level provided the best mapping accuracy compared to the results from other products within each group.The highest overall accuracy(OA)and Kappa coefficient of the map using D-S theory were 92.67%and 0.91,respectively.The decision-level fusion helped increase the OA of the map by 0.75%to 2.07%compared to that of corresponding S-2 products in the groups.Meanwhile,the data fusion at the pixel level delivered the mapping results,which yielded an OA of 4.88%to 6.58%lower than that of corresponding S-2 products in the groups.展开更多
Multi-source information can be utilized collaboratively to improve the performance of information retrieval. To make full use of the document and collection information, this paper introduces a new informa- tion retr...Multi-source information can be utilized collaboratively to improve the performance of information retrieval. To make full use of the document and collection information, this paper introduces a new informa- tion retrieval model that relies on the Dempster-Shafer theory of evidence. Each query-document pair is taken as a piece of evidence for the relevance between a document and a query. The evidence is combined using Dempster's rule of combination, and the belief committed to the relevance is obtained. Retrieved documents are then ranked according to the belief committed to the relevance. Several basic probability as- signments are also proposed. Extensive experiments over the Text REtrieval Conference (TREC) test col- lection ClueWeb09 show that the proposed model provides performance similar to that of the Vector Space Model (VSM). Under certain probability assignments, the proposed model outperforms the VSM by 63% in terms of mean average precision,展开更多
As a result of noise and intensity non-uniformity,automatic segmentation of brain tissue in magnetic resonance imaging (MRI) is a challenging task.In this study a novel brain MRI segmentation approach is presented whi...As a result of noise and intensity non-uniformity,automatic segmentation of brain tissue in magnetic resonance imaging (MRI) is a challenging task.In this study a novel brain MRI segmentation approach is presented which employs Dempster-Shafer theory (DST) to perform information fusion.In the proposed method,fuzzy c-mean (FCM) is applied to separate features and then the outputs of FCM are interpreted as basic belief structures.The salient aspect of this paper is the interpretation of each FCM output as a belief structure with particular focal elements.The results of the proposed method are evaluated using Dice similarity and Accuracy indices.Qualitative and quantitative comparisons show that our method performs better and is more robust than the existing method.展开更多
An improvement method for the combining rule of Dempster evidence theory is proposed. Different from Dempster theory, the reliability of evidences isn't identical; and varies with the event. By weight evidence acc...An improvement method for the combining rule of Dempster evidence theory is proposed. Different from Dempster theory, the reliability of evidences isn't identical; and varies with the event. By weight evidence according to their reliability, the effect of unreliable evidence is reduced, and then get the fusion result that is closer to the truth. An example to expand the advantage of this method is given. The example proves that this method is helpful to find a correct result.展开更多
Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these ...Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these features.Although environmental factors such as wind speed are important to distinguish oil spills and look-alikes,some oil spill detection algorithms do not consider the environmental factors.To distinguish oil spills and look-alikes more accurately based on environmental factors and image features,a new oil spill detection algorithm based on Dempster-Shafer evidence theory was proposed.The process of oil spill detection taking account of environmental factors was modeled using the subjective Bayesian model.The Faster-region convolutional neural networks(RCNN)model was used for oil spill detection based on the convolution features.The detection results of the two models were fused at decision level using Dempster-Shafer evidence theory.The establishment and test of the proposed algorithm were completed based on our oil spill and look-alike sample database that contains 1798 image samples and environmental information records related to the image samples.The analysis and evaluation of the proposed algorithm shows a good ability to detect oil spills at a higher detection rate,with an identifi cation rate greater than 75%and a false alarm rate lower than 19%from experiments.A total of 12 oil spill SAR images were collected for the validation and evaluation of the proposed algorithm.The evaluation result shows that the proposed algorithm has a good performance on detecting oil spills with an overall detection rate greater than 70%.展开更多
In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at ...In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at extremely high temperatures.However,stochastic density functional theory(SDFT)can overcome this limitation.Recently,SDFT and the related mixed stochastic–deterministic density functional theory,based on a plane-wave basis set,have been implemented in the first-principles electronic structure software ABACUS[Q.Liu and M.Chen,Phys.Rev.B 106,125132(2022)].In this study,we combine SDFT with the Born–Oppenheimer molecular dynamics method to investigate systems with temperatures ranging from a few tens of eV to 1000 eV.Importantly,we train machine-learning-based interatomic models using the SDFT data and employ these deep potential models to simulate large-scale systems with long trajectories.Subsequently,we compute and analyze the structural properties,dynamic properties,and transport coefficients of warm dense matter.展开更多
Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability ...Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability and are used to modify the cognitive failure probability(CFP).However,the levels of CPCs are usually determined by domain experts,whichmay be subjective and uncertain.What’smore,the classicCREAMassumes that the CPCs are independent,which is unrealistic.Ignoring the dependence among CPCs will result in repeated calculations of the influence of the CPCs on CFP and lead to unreasonable reliability evaluation.To address the issue of uncertain information modeling and processing,this paper introduces evidence theory to evaluate the CPC levels in specific scenarios.To address the issue of dependence modeling,the Decision-Making Trial and Evaluation Laboratory(DEMATEL)method is used to process the dependence among CPCs and calculate the relative weights of each CPC,thus modifying the multiplier of the CPCs.The detailed process of the proposed method is illustrated in this paper and the CFP estimated by the proposed method is more reasonable.展开更多
This paper introduces a systems theory-driven framework to integration artificial intelligence(AI)into traditional Chinese medicine(TCM)research,enhancing the understanding of TCM’s holistic material basis while adhe...This paper introduces a systems theory-driven framework to integration artificial intelligence(AI)into traditional Chinese medicine(TCM)research,enhancing the understanding of TCM’s holistic material basis while adhering to evidence-based principles.Utilizing the System Function Decoding Model(SFDM),the research progresses through define,quantify,infer,and validate phases to systematically explore TCM’s material basis.It employs a dual analytical approach that combines top-down,systems theory-guided perspectives with bottom-up,elements-structure-function methodologies,provides comprehensive insights into TCM’s holistic material basis.Moreover,the research examines AI’s role in quantitative assessment and predictive analysis of TCM’s material components,proposing two specific AIdriven technical applications.This interdisciplinary effort underscores AI’s potential to enhance our understanding of TCM’s holistic material basis and establishes a foundation for future research at the intersection of traditional wisdom and modern technology.展开更多
Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties...Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties and environmental resilience. Biological composite structures with helicoidal schemes and designs have remarkable capacities to absorb impact energy and withstand damage. However, there is a dearth of extensive study on the influence of fiber redirection and reorientation inside the matrix of a helicoid structure on its mechanical performance and reactivity. The present study aimed to explore the static and transient responses of a bio-inspired helicoid laminated composite(B-iHLC) shell under the influence of an explosive load using an isomorphic method. The structural integrity of the shell is maintained by a viscoelastic basis known as the Pasternak foundation, which encompasses two coefficients of stiffness and one coefficient of damping. The equilibrium equations governing shell dynamics are obtained by using Hamilton's principle and including the modified first-order shear theory,therefore obviating the need to employ a shear correction factor. The paper's model and approach are validated by doing numerical comparisons with respected publications. The findings of this study may be used in the construction of military and civilian infrastructure in situations when the structure is subjected to severe stresses that might potentially result in catastrophic collapse. The findings of this paper serve as the foundation for several other issues, including geometric optimization and the dynamic response of similar mechanical structures.展开更多
Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suf...Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.展开更多
基金supported by the National Natural Science Foundation of China under Grant No.60903166 the National High Technology Research and Development Program of China(863 Program) under Grants No.2012AA012506,No.2012AA012901,No.2012AA012903+9 种基金 Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20121103120032 the Humanity and Social Science Youth Foundation of Ministry of Education of China under Grant No.13YJCZH065 the Opening Project of Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) under Grant No.C13613 the China Postdoctoral Science Foundation General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No.km201410005012 the Research on Education and Teaching of Beijing University of Technology under Grant No.ER2013C24 the Beijing Municipal Natural Science Foundation Sponsored by Hunan Postdoctoral Scientific Program Open Research Fund of Beijing Key Laboratory of Trusted Computing Funds for the Central Universities, Contract No.2012JBM030
文摘Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.
基金the National Nature Science Foundation of China (60372057).
文摘To study the scene classification in the Synthetic Aperture Radar (SAR) image, a novel method based on kernel estimate, with the Maxkov context and Dempster-Shafer evidence theory is proposed. Initially, a nonpaxametric Probability Density Function (PDF) estimate method is introduced, to describe the scene of SAR images. And then under the Maxkov context, both the determinate PDF and the kernel estimate method axe adopted respectively, to form a primary classification. Next, the primary classification results are fused using the evidence theory in an unsupervised way to get the scene classification. Finally, a regularization step is used, in which an iterated maximum selecting approach is introduced to control the fragments and modify the errors of the classification. Use of the kernel estimate and evidence theory can describe the complicated scenes with little prior knowledge and eliminate the ambiguities of the primary classification results. Experimental results on real SAR images illustrate a rather impressive performance.
基金Supported by the National Natural Science Foundation of China (No. 60874105, 61174022)the Program for New Century Excellent Talents in University (No. NCET-08-0345)the Chongqing Natural Science Foundation (No. CSCT, 2010BA2003)
文摘Transmembrane proteins are some special and important proteins in cells. Because of their importance and specificity, the prediction of the transmembrane regions has very important theoretical and practical significance. At present, the prediction methods are mainly based on the physicochemical property and statistic analysis of amino acids. However, these methods are suitable for some environments but inapplicable for other environments. In this paper, the multi-sources information fusion theory has been introduced to predict the transmembrane regions. The proposed method is test on a data set of transmembrane proteins. The results show that the proposed method has the ability of predicting the transmembrane regions as a good performance and powerful tool.
文摘Cloud computing provides easy and on-demand access to computing resources in a configurable pool.The flexibility of the cloud environment attracts more and more network services to be deployed on the cloud using groups of virtual machines(VMs),instead of being restricted on a single physical server.When more and more network services are deployed on the cloud,the detection of the intrusion likes Distributed Denialof-Service(DDoS)attack becomes much more challenging than that on the traditional servers because even a single network service now is possibly provided by groups of VMs across the cloud system.In this paper,we propose a cloud-based intrusion detection system(IDS)which inspects the features of data flow between neighboring VMs,analyzes the probability of being attacked on each pair of VMs and then regards it as independent evidence using Dempster-Shafer theory,and eventually combines the evidence among all pairs of VMs using the method of evidence fusion.Unlike the traditional IDS that focus on analyzing the entire network service externally,our proposed algorithm makes full use of the internal interactions between VMs,and the experiment proved that it can provide more accurate results than the traditional algorithm.
基金Sponsored by China Natural Science Funds (No. 40471086) Jiln University Innovative Engineering Funds (No.419070200044)
文摘The Dempster-Shafer theory has been successfully applied to mineral resource potential mapping in GIS environmental. In this applied form, basic probability assignment and combined basic probability assignment are applied to measuring map pattem and map pattem combination, respectively; and the environment composed of the only two singleton sets (deposit set and non-deposit set), is used for expressing the entire map area. For a subarea in which the certain map pattern combination exists, the combined basic probability assignment corresponding to the map pattern combination existing in this subarea, expresses the belief of inferring the subarea belonging to the deposit set from the evidence that the corresponding map pattern combination existing in the subarea. Thus, it may be served as a statistical index measuring the relative mineral resource potentials of the subarea. And it may be determined like 1) dividing the map area into a series of small equal-sized grid cells and then select the training sample set composed of the well-known grid cells or the entire grid cells; 2) estimating the basic probability assignments corresponding to each map pattern fromthe training sample set; 3) determining the map pattern combination existing in each cell, and then appling the Dempster's Rule of Combination to integrating the all basic probability assignments corresponding to the map patterns existing in the cell into the combined basic probability assignment. Mineral resource potential mapping with the Dempster-Shafer theory is demonstrated on a case study to select mineral resource targets. The experimental results manifest that the model can be compared with the weights of evidence model in the effectiveness of mineral resource target selection.
基金jointly supported by the National Natural Science Foundation of China under Grant 61201198 and 61372089the Beijing Natural Science Foundation under Grant 4132015,4132007and 4132019
文摘In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-Shafer(D-S) evidence theory are proposed at the relay node.Instead of traditional linear detection,the first proposed MIMO-DS NC scheme adopts D-S evidence theory to detect the signals of each source node before mapping them into network-coded signal.Moreover,different from traditional physical-layer network coding(PNC) based on virtual MIMO model,the further proposed MIMO-DS PNC comes from the vector space perspective and combines PNC mapping with D-S theory to obtain network-coded signal without estimating each source node signal.D-S theory can appropriately characterize uncertainty and make full use of multiple evidence source information by Dempster's combination rule to obtain reliable decisions.In the broadcast(BC) phase,the space-time coding(STC) and antenna selection(AS) schemes are adopted to achieve transmit diversity.Simulation results reveal that the STC and AS schemes both achieve full transmit diversity in the BC phase and the proposed MIMO-DS NC/PNC schemes obtain better end-to-end BER performance and throughputs compared with traditional schemes with a little complexity increasing and no matter which scheme is adopted in the BC phase,MIMO-DS PNC always achieves full end-to-end diversity gain as MIMO-ML NC but with a lower complexity and its throughput approaches the throughput of MIMO-ML NC in high SNR regime.
基金Science and Technology Projects of Xuzhou City,China(No.XX10A001)Jiangsu Provincial National Natural Science Foundation of China(No:BK20130199)
文摘Aiming at solving the problems such as time consuming and application limiting presented in the existing synchronous cooperative spectrum sensing schemes,a triggered asynchronous scheme based on Dempster-Shafer(D-S) theory was proposed.Sensing asynchronously,each cognitive user calculated the confidence measure functions with double threshold spectrum sensing method.When the useful report was received by the fusion center,a fusion process would be triggered.Then the sensing results were fused together based on D-S theory.The analysis and simulation results show that the proposed scheme can improve the spectrum sensing efficiency and reduce the calculation amount of the fusion center compared with the existing schemes.
文摘In this paper, it is proposed to apply the Dempster-Shafer Theory (DST) or the theory of evidence to map vegetation, aquatic and mineral surfaces with a view to detecting potential areas of observation of outcrops of geological formations (rocks, breastplates, regolith, etc.). The proposed approach consists in aggregating information by using the DST. From pretreated Aster satellite images (geo-referencing, geometric correction and resampling at 15 m), new channels were produced by determining the spectral indices NDVI, MNDWI and NDBaI. Then, the DST formalism was modeled and generated under the MATLAB software, an image segmented into six classes including three absolute classes (E,V,M) and three classes of confusion ({E,V}, {M,V}, {E,M}). The control on the land, based on geographic coordinates of pixels of different classes on said image, has made it possible to make a concordant interpretation thereof. Our contribution lies in taking into account imperfections (inaccuracies and uncertainties) related to source information by using mass functions based on a simple support model (two focal elements: the discernment framework and the potential set of belonging of the pixel to be classified) with a normal law for the good management of these.
基金the National Natural Science Foundation of China(No.61976080)the Key Project on Research and Practice of Henan University Graduate Education and Teaching Reform(YJSJG2023XJ006)+1 种基金the Key Research and Development Projects of Henan Province(231111212500)the Henan University Graduate Education Innovation and Quality Improvement Program(SYLKC2023016).
文摘In the field of target recognition based on the temporal-spatial information fusion,evidence the-ory has received extensive attention.To achieve accurate and efficient target recognition by the evi-dence theory,an adaptive temporal-spatial information fusion model is proposed.Firstly,an adaptive evaluation correction mechanism is constructed by the evidence distance and Deng entropy,which realizes the credibility discrimination and adaptive correction of the spatial evidence.Secondly,the credibility decay operator is introduced to obtain the dynamic credibility of temporal evidence.Finally,the sequential combination of temporal-spatial evidences is achieved by Shafer’s discount criterion and Dempster’s combination rule.The simulation results show that the proposed method not only considers the dynamic and sequential characteristics of the temporal-spatial evidences com-bination,but also has a strong conflict information processing capability,which provides a new refer-ence for the field of temporal-spatial information fusion.
基金the Hungarian Scientific Research Fund in support of the ongoing research,“Time series analysis of land cover dynamics using medium-and high-resolution satellite images”[grant number NKFIH 124648K],at the Department of Physical Geography and Geoinformatics(the former name of the Department of Geoinformatics,Physical and Environmental Geography),University of Szeged,Szeged,Hungary.
文摘Data fusion has shown potential to improve the accuracy of land cover mapping,and selection of the optimal fusion technique remains a challenge.This study investigated the performance of fusing Sentinel-1(S-1)and Sentinel-2(S-2)data,using layer-stacking method at the pixel level and Dempster-Shafer(D-S)theory-based approach at the decision level,for mapping six land cover classes in Thu Dau Mot City,Vietnam.At the pixel level,S-1 and S-2 bands and their extracted textures and indices were stacked into the different single-sensor and multi-sensor datasets(i.e.fused datasets).The datasets were categorized into two groups.One group included the datasets containing only spectral and backscattering bands,and the other group included the datasets consisting of these bands and their extracted features.The random forest(RF)classifier was then applied to the datasets within each group.At the decision level,the RF classification outputs of the single-sensor datasets within each group were fused together based on D-S theory.Finally,the accuracy of the mapping results at both levels within each group was compared.The results showed that fusion at the decision level provided the best mapping accuracy compared to the results from other products within each group.The highest overall accuracy(OA)and Kappa coefficient of the map using D-S theory were 92.67%and 0.91,respectively.The decision-level fusion helped increase the OA of the map by 0.75%to 2.07%compared to that of corresponding S-2 products in the groups.Meanwhile,the data fusion at the pixel level delivered the mapping results,which yielded an OA of 4.88%to 6.58%lower than that of corresponding S-2 products in the groups.
基金Supported by the Self-Directed Program of Tsinghua University (No. 2011Z01033)
文摘Multi-source information can be utilized collaboratively to improve the performance of information retrieval. To make full use of the document and collection information, this paper introduces a new informa- tion retrieval model that relies on the Dempster-Shafer theory of evidence. Each query-document pair is taken as a piece of evidence for the relevance between a document and a query. The evidence is combined using Dempster's rule of combination, and the belief committed to the relevance is obtained. Retrieved documents are then ranked according to the belief committed to the relevance. Several basic probability as- signments are also proposed. Extensive experiments over the Text REtrieval Conference (TREC) test col- lection ClueWeb09 show that the proposed model provides performance similar to that of the Vector Space Model (VSM). Under certain probability assignments, the proposed model outperforms the VSM by 63% in terms of mean average precision,
文摘As a result of noise and intensity non-uniformity,automatic segmentation of brain tissue in magnetic resonance imaging (MRI) is a challenging task.In this study a novel brain MRI segmentation approach is presented which employs Dempster-Shafer theory (DST) to perform information fusion.In the proposed method,fuzzy c-mean (FCM) is applied to separate features and then the outputs of FCM are interpreted as basic belief structures.The salient aspect of this paper is the interpretation of each FCM output as a belief structure with particular focal elements.The results of the proposed method are evaluated using Dice similarity and Accuracy indices.Qualitative and quantitative comparisons show that our method performs better and is more robust than the existing method.
文摘An improvement method for the combining rule of Dempster evidence theory is proposed. Different from Dempster theory, the reliability of evidences isn't identical; and varies with the event. By weight evidence according to their reliability, the effect of unreliable evidence is reduced, and then get the fusion result that is closer to the truth. An example to expand the advantage of this method is given. The example proves that this method is helpful to find a correct result.
基金Supported by the National Key R&D Program of China(No.2017YFC1405600)the National Natural Science Foundation of China(Nos.42076197,41576032)the Major Program for the International Cooperation of the Chinese Academy of Sciences(No.133337KYSB20160002)。
文摘Features of oil spills and look-alikes in polarimetric synthetic aperture radar(SAR)images always play an important role in oil spill detection.Many oil spill detection algorithms have been implemented based on these features.Although environmental factors such as wind speed are important to distinguish oil spills and look-alikes,some oil spill detection algorithms do not consider the environmental factors.To distinguish oil spills and look-alikes more accurately based on environmental factors and image features,a new oil spill detection algorithm based on Dempster-Shafer evidence theory was proposed.The process of oil spill detection taking account of environmental factors was modeled using the subjective Bayesian model.The Faster-region convolutional neural networks(RCNN)model was used for oil spill detection based on the convolution features.The detection results of the two models were fused at decision level using Dempster-Shafer evidence theory.The establishment and test of the proposed algorithm were completed based on our oil spill and look-alike sample database that contains 1798 image samples and environmental information records related to the image samples.The analysis and evaluation of the proposed algorithm shows a good ability to detect oil spills at a higher detection rate,with an identifi cation rate greater than 75%and a false alarm rate lower than 19%from experiments.A total of 12 oil spill SAR images were collected for the validation and evaluation of the proposed algorithm.The evaluation result shows that the proposed algorithm has a good performance on detecting oil spills with an overall detection rate greater than 70%.
基金supported by the National Natural Science Foundation of China under Grant Nos.12122401 and 12074007.
文摘In traditional finite-temperature Kohn–Sham density functional theory(KSDFT),the partial occupation of a large number of high-energy KS eigenstates restricts the use of first-principles molecular dynamics methods at extremely high temperatures.However,stochastic density functional theory(SDFT)can overcome this limitation.Recently,SDFT and the related mixed stochastic–deterministic density functional theory,based on a plane-wave basis set,have been implemented in the first-principles electronic structure software ABACUS[Q.Liu and M.Chen,Phys.Rev.B 106,125132(2022)].In this study,we combine SDFT with the Born–Oppenheimer molecular dynamics method to investigate systems with temperatures ranging from a few tens of eV to 1000 eV.Importantly,we train machine-learning-based interatomic models using the SDFT data and employ these deep potential models to simulate large-scale systems with long trajectories.Subsequently,we compute and analyze the structural properties,dynamic properties,and transport coefficients of warm dense matter.
基金Shanghai Rising-Star Program(Grant No.21QA1403400)Shanghai Sailing Program(Grant No.20YF1414800)Shanghai Key Laboratory of Power Station Automation Technology(Grant No.13DZ2273800).
文摘Cognitive Reliability and Error Analysis Method(CREAM)is widely used in human reliability analysis(HRA).It defines nine common performance conditions(CPCs),which represent the factors thatmay affect human reliability and are used to modify the cognitive failure probability(CFP).However,the levels of CPCs are usually determined by domain experts,whichmay be subjective and uncertain.What’smore,the classicCREAMassumes that the CPCs are independent,which is unrealistic.Ignoring the dependence among CPCs will result in repeated calculations of the influence of the CPCs on CFP and lead to unreasonable reliability evaluation.To address the issue of uncertain information modeling and processing,this paper introduces evidence theory to evaluate the CPC levels in specific scenarios.To address the issue of dependence modeling,the Decision-Making Trial and Evaluation Laboratory(DEMATEL)method is used to process the dependence among CPCs and calculate the relative weights of each CPC,thus modifying the multiplier of the CPCs.The detailed process of the proposed method is illustrated in this paper and the CFP estimated by the proposed method is more reasonable.
基金supported by the National Natural Science Foundation of China(82230117).
文摘This paper introduces a systems theory-driven framework to integration artificial intelligence(AI)into traditional Chinese medicine(TCM)research,enhancing the understanding of TCM’s holistic material basis while adhering to evidence-based principles.Utilizing the System Function Decoding Model(SFDM),the research progresses through define,quantify,infer,and validate phases to systematically explore TCM’s material basis.It employs a dual analytical approach that combines top-down,systems theory-guided perspectives with bottom-up,elements-structure-function methodologies,provides comprehensive insights into TCM’s holistic material basis.Moreover,the research examines AI’s role in quantitative assessment and predictive analysis of TCM’s material components,proposing two specific AIdriven technical applications.This interdisciplinary effort underscores AI’s potential to enhance our understanding of TCM’s holistic material basis and establishes a foundation for future research at the intersection of traditional wisdom and modern technology.
文摘Investigating natural-inspired applications is a perennially appealing subject for scientists. The current increase in the speed of natural-origin structure growth may be linked to their superior mechanical properties and environmental resilience. Biological composite structures with helicoidal schemes and designs have remarkable capacities to absorb impact energy and withstand damage. However, there is a dearth of extensive study on the influence of fiber redirection and reorientation inside the matrix of a helicoid structure on its mechanical performance and reactivity. The present study aimed to explore the static and transient responses of a bio-inspired helicoid laminated composite(B-iHLC) shell under the influence of an explosive load using an isomorphic method. The structural integrity of the shell is maintained by a viscoelastic basis known as the Pasternak foundation, which encompasses two coefficients of stiffness and one coefficient of damping. The equilibrium equations governing shell dynamics are obtained by using Hamilton's principle and including the modified first-order shear theory,therefore obviating the need to employ a shear correction factor. The paper's model and approach are validated by doing numerical comparisons with respected publications. The findings of this study may be used in the construction of military and civilian infrastructure in situations when the structure is subjected to severe stresses that might potentially result in catastrophic collapse. The findings of this paper serve as the foundation for several other issues, including geometric optimization and the dynamic response of similar mechanical structures.
基金supported by the National Natural Science Foundation of China(Nos.51977113,62293500,62293501 and 62293505).
文摘Malicious attacks against data are unavoidable in the interconnected,open and shared Energy Internet(EI),Intrusion tolerant techniques are critical to the data security of EI.Existing intrusion tolerant techniques suffered from problems such as low adaptability,policy lag,and difficulty in determining the degree of tolerance.To address these issues,we propose a novel adaptive intrusion tolerance model based on game theory that enjoys two-fold ideas:(1)it constructs an improved replica of the intrusion tolerance model of the dynamic equation evolution game to induce incentive weights;and (2)it combines a tournament competition model with incentive weights to obtain optimal strategies for each stage of the game process.Extensive experiments are conducted in the IEEE 39-bus system,whose results demonstrate the feasibility of the incentive weights,confirm the proposed strategy strengthens the system’s ability to tolerate aggression,and improves the dynamic adaptability and response efficiency of the aggression-tolerant system in the case of limited resources.