首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 10 毫秒
1.
为有效解决冲突证据的组合问题,文中提出一种证据组合方法.该方法首先在一种新的冲突表示的基础上,量化证据之间的关联性,进而计算各个证据的权重,并与平均权重进行比较,识别出冲突证据或较低可信度证据.对冲突证据或较低可信度证据进行折扣修正,最大限度地利用原始证据源信息,最后利用D-S组合规则进行组合.仿真实例结果表明,该方法与其它典型方法相比体现出良好效果,收敛快、可靠性高.  相似文献   

2.
为解决证据组合规则中一票否决和弱决策证据在低冲突情况下出现的反直观推理的现象,提出一种有效折扣证据源的冲突证据合成方法。首先根据证据的信任函数和似然函数求得证据间的相似度,然后求出证据之间的支持程度,并确定折扣因子,最后采用Dempster组合规则合成利用折扣因子修正后的证据源。数值算例分析结果表明,改进后的证据组合方法可以有效地处理证据冲突。  相似文献   

3.
张军  涂国平 《微计算机信息》2007,23(33):202-203,225
D-S证据理论是一种重要的处理不确定性问题的方法。但是,证据合成规则在处理冲突证据时产生的失效问题,影响了证据理论的应用。针对证据失效问题,国内外的各种改进方法主要分为对融合公式的改进和对融合模型的改进两个方向。本文在Murphy规则和邓勇方法的基础上提出了一种新的对证据本身进行加权平均,然后融合的方法来解决冲突问题。  相似文献   

4.
多传感器冲突信息的加权融合算法   总被引:3,自引:3,他引:3  
针对在多传感器目标识别系统中,DS规则对高冲突信息融合结果不合理的问题,提出了一种新的加权融合算法.在多源证据信息融合时,首先根据两证据距离大小来确定其相互支持度,将证据支持度矩阵模最大特征值对应的特征向量作为证据的权重向量,然后确定各证据的相对折扣因子,并修正证据信息,最后用DS规则融合.通过实验仿真对比分析了多种方法的融合效果,表明了新方法可以较好的解决高冲突信息融合的问题.  相似文献   

5.
潘恺  李辉  邢钢 《计算机工程》2013,39(1):290-293
雷达目标识别中多源信息融合面临各种不确定冲突信息。为此,提出一种基于置信距离的冲突证据合成方法。在不改变D-S证据组合规则的前提下,考虑到证据之间的关联性,通过计算证据间的相似度和可信度,利用可信度的加权平均来代替冲突证据,从而消除冲突证据并进行信息融合。仿真实验结果证明,该方法能有效进行冲突证据的合成。  相似文献   

6.
为解决Dempster-Shafer证据理论在对高度冲突的证据进行融合时可能导致与直观结果相悖的问题,本文提出一种有效处理冲突证据的融合方法。通过引入距离函数,确定证据之间的相互支持度,进而确定证据的权值。采用平均证据代替冲突证据,通过证据的权值修改证据源模型,然后基于Dempster组合规则进行证据组合,以减少冲突证据在组合规则中的作用能力,有效降低干扰对最终融合结果的影响,充分利用了原始证据信息,使得组合结果收敛到正确的目标的效率比较高。  相似文献   

7.
针对多传感器数据融合领域中使用D-S组合规则无法有效融合传感器不确定证据信息的问题,提出一种迭代修正的冲突证据改进方法。该方法通过计算证据之间的相互支持度和证据之间的相似度,综合度量每个证据的修正参数。利用修正参数修正证据,并通过D-S组合规则融合。然后,以融合结果作为参考证据,重新度量每一个原始证据的修正参数,修正原始证据再融合。通过多次迭代修正融合,直至最后两次的融合结果收敛为止,最后通过两组冲突证据验证了该方法具有很好的融合效果。  相似文献   

8.
对冲突证据使用D-S证据理论进行融合前,应确定证据之间冲突的程度。为此,基于信任度和虚假度对冲突进行衡量与修正。计算证据的信任度和虚假度,分别对其进行排序,将具有较小信任度和较大虚假度的证据判定为高冲突证据并加权修正,再使用Dempster组合规则进行证据融合。实验结果表明,该方法可以正确判断高冲突证据,避免融合结果与事实相悖的情况,同时提高收敛的速度和精度。  相似文献   

9.
证据推理广泛应用于不确定推理和数据融合等许多方面,但D-S合成规则对于高冲突证据的处理不是十分合理的。论文在分析D-S合成规则以及一些改进方法的基础上,提出了一种基于冲突强度和非正则化的冲突证据合成规则,并引入确定度的概念来衡量合成的效果。仿真实验结果表明,该规则比D-S合成规则有了明显的改进。  相似文献   

10.
针对Dempster组合规则在高冲突证据融合的情况下常常会得到违背直觉的结果,提出了一种基于向量冲突表示方法的Dempster(VCRD)组合规则。首先,通过实例分析了冲突因子和Jousselme距离存在的不足;然后,利用证据向量的相似性和差异性共同衡量证据之间的冲突程度,通过证据之间的冲突程度确定修正证据的权重因子,对融合证据进行预处理;最后,利用Dempster组合规则进行融合。理论分析和仿真实验结果表明:与Dempster组合规则及其它改进算法相比,VCRD组合规则能够合理地处理高冲突证据情况下的融合问题,降低了决策风险。  相似文献   

11.
D-S证据理论是不确定推理的一种重要方法,在许多方面都得到了广泛的应用。针对D-S证据理论在网络安全态势感知的数据融合过程中的应用,就多源数据的证据组合结果与直觉相悖的问题进行深入研究,提出了一种新的解决方案。该方案通过支持度的思想对冲突证据源进行修正以达到解决证据冲突的目的。最后,以网络安全态势感知环境为背景进行数值算例,证明了所提方法的可行性。  相似文献   

12.
陶洋  任步廷 《计算机工程》2012,38(15):268-270
针对证据合成法则在证据高度冲突情况下常得出有悖常理的结论,通过理论分析、对比多种改进的合成方法,提出一种基于局部冲突分配策略的组合规则,采用以冲突焦元在局部冲突组合证据中所占的实际比值为权重的方法,将冲突在产生冲突焦元中分解。实验结果证明,即使在证据高度冲突的情况下,改进后的合成法则依然能够取得理想的合成结果。  相似文献   

13.
14.
User Modeling and User-Adapted Interaction - An individual’s conflict resolution styles can have a large impact on the decision making process of a group. This impact is affected by a variety...  相似文献   

15.
Entrepreneurship has become increasingly important for innovations and economic development. However, there is limited information systems research examining the role of regional ICT for entrepreneurs. This study investigates the direct effect of regional ICT access on individuals’ entrepreneurial performance and the interaction effect between regional ICT access and guanxi in the context of Chinese business and economy. Drawing upon a matched large-scale dataset, we found that regional ICT access in terms of access to the Internet, fixed phone, and mobile phone had a significant impact on performance. Furthermore, regional ICT access had a positive interaction effect with guanxi.  相似文献   

16.
Because a system's software architecture strongly influences its quality attributes such as modifiability, performance, and security, it is important to analyze and reason about that architecture. However, architectural documentation frequently does not exist, and when it does, it is often out of sync with the implemented system. In addition, it is rare that software development begins with a clean slate; systems are almost always constrained by existing legacy code. As a consequence, we need to be able to extract information from existing system implementations and utilize this information for architectural reasoning. This paper presents Dali, an open, lightweight workbench that aids an analyst in extracting, manipulating, and interpreting architectural information. By assisting in the reconstruction of architectures from extracted information, Dali helps an analyst redocument architectures, discover the relationship between as-implemented and as-designed architectures, analyze architectural quality attributes and plan for architectural change.  相似文献   

17.
Using decadal data for 1961–2011, the paper explores the demographic dividend of major Indian states. Accordingly, we first explore Zipf’s law and thereafter, examine Gibrat’s law for the growth of state population. Based on these findings, we investigate the demographic dividend of state population. The results appear to suggest that the demographic dividend varies across states and these “dividends” are in fact, large in magnitude, especially for the laggard states.  相似文献   

18.
19.
This paper uses the notion of control from programming languages to look at the organization of mental code. Data for the analysis comes principally from language breakdown. The paper first outlines the well known distinction between logic and control in algorithms and argues that the same distinction holds in mental code. Discussion then focuses mainly on control—the management of data flow—and shows that a variety of language disorders affect either the logic component of the mental algorithms for language (e.g., Specific Language Impairment) or the control component (e.g., Williams syndrome and Turner syndrome). A comparative study of the loss of morphology in Williams syndrome and Specific Language Impairment reinforces the logic/control split as an accurate guide to the explanation of linguistic behavior in these disorders. The data, moreover, are not accountable to sheer performance factors, but to the way the disorders disrupt the structure of mental algorithms. The paper closes with a discussion of how control and the management of cross-domain computation fit into recent theories of modular mental architecture and proposals about the explicitness of representations and their availability to working memory.  相似文献   

20.
In this study, we empirically investigate the relationship between financial and auditing requirements, capital requirements, official supervisory power, and the likelihood of receiving a qualified audit opinion. The sample consists of 71 qualified financial statements and 17,526 unqualified ones, from 3,642 banking institutions operating in 15 old and new EU countries over the period 1999–2006. The results indicate that financial and auditing requirements have a negative influence, while supervisory power has a positive impact, on the likelihood of qualified audit opinions. Concerning capital requirements, we find that only initial stringency has an impact on audit opinions.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号