An evaluation method oriented to the comprehensive credibility of simulation data source based on evidence theory

نویسندگان

  • Yanyan Huang
  • Xin He
  • Jianyu Wang
  • Zhen Lei
چکیده

The operational effectiveness of the weapon systems is usually evaluated by the reasonable simulation results. But it is difficult to measure and evaluate the credibility of the simulation data source. An evaluation indices system of the credibility for the simulation data source is built up. A set of quantitative evaluation rules are set up based on the experts’ judgments and the fuzzy expression. The credibility is evaluated from the terminal layer indices to the top ones. First, many experts are assigned to evaluate the credibility of the terminal layer indices. Then the credibility of each terminal layer indices of simulation data source is combined and synthesized into the comprehensive credibility of the whole simulation data source. An evaluation method based on the evidence theory is established to integrate above different sub-credibility of simulation data source. All the lower layer indices are required to fuse into the upper ones, and finally get the comprehensive credibility of the simulation data source. For example, the credibility of the simulation data source for the armored equipment systems is evaluated based on above methods. The evaluation results show that the methods based on D-S evidence theory are reasonable and feasible.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CREDIBILITY THEORY ORIENTED PREFERENCE INDEX FOR RANKING FUZZY NUMBERS

This paper suggests  a novel approach for ranking the most applicable fuzzy numbers, i.e.  $LR$-fuzzy numbers. Applying the  $alpha$-optimistic values of a fuzzy number, a preference criterion is proposed for ranking fuzzy numbers using the Credibility index. The main properties of the proposed  preference criterion  are also studied.  Moreover, the proposed method is   applied for ranking fuzz...

متن کامل

Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory

Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...

متن کامل

Calculation of Leakage in Water Supply Network Based on Blind Source Separation Theory

The economic and environmental losses due to serious leakage in the urban water supply network have increased the effort to control the water leakage. However, current methods for leakage estimation are inaccurate leading to the development of ineffective leakage controls. Therefore, this study proposes a method based on the blind source separation theory (BSS) to calculate the leakage of water...

متن کامل

Using Greedy Clustering Method to Solve Capacitated Location-Routing Problem with Fuzzy Demands

Using Greedy Clustering Method to Solve Capacitated Location-Routing Problem with Fuzzy Demands Abstract In this paper, the capacitated location routing problem with fuzzy demands (CLRP_FD) is considered. In CLRP_FD, facility location problem (FLP) and vehicle routing problem (VRP) are observed simultaneously. Indeed the vehicles and the depots have a predefined capacity to serve the customerst...

متن کامل

Method integration: An approach to develop agent oriented methodologies

Agent oriented software engineering (AOSE) is an emerging field in computer science  and  proposes some systematic ideas for multi agent systems analysis, implementation and maintenance. Despite the various methodologies introduced in the agent-oriented software engineering, the main challenges are defects in different aspects of methodologies. According to the defects resulted from weaknesses ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Artif. Intell. Research

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2016