ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Education
Economy
Social Sciences
Religion
Technology
Research
Languages
Literature
Architecture and Urbanism
Pure sciences
all records (73)

Languages
English
Spanish
Portuguese
German
French

Countries
Indonesia
USA
Brazil
South Africa
Ukraine
Austria
Germany
Cuba
Russia
Turkey, Turkish Republic
all records (74)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
38.562  Articles
1 of 3.857 pages  |  10  records  |  more records»
Dempster-Shafer theory of evidence has been widely used in many data fusion application systems. However, how to determine basic probability assignment, which is the main and the first step in evidence theory, is still an open issue. In this paper, an imp... see more

Dempster-Shafer theory is widely used in decision-making and considered as one of the potential mathematical tools in order to fuse the evidence. However, existing studies in this theory show disadvantage due to conflicting nature of standard evidence set... see more

The negation of probability provides a new way of looking at information representation. However, the negation of basic probability assignment (BPA) is still an open issue. To address this issue, a novel negation method of basic probability assignment bas... see more

Target recognition in uncertain environments is a hot issue, especially in extremely uncertain situation where both the target attribution and the sensor report are not clearly represented. To address this issue, a model which combines fractal theory, Dem... see more

Data fusion technology is widely used in automatic target recognition system. Problems in data fusion system are complex by nature and can often be characterised by not only randomness but also by fuzziness. To accommodate complex natural proble... see more

A method based on improved fuzzy theory of evidence was presented to solve the problem that there exist all kinds of uncertainty in the process of information security risk assessment. The hierarchy model for the information systems risk assessment was es... see more

1 of 3.857 pages  |  10  records  |  more records»