Wyniki wyszukiwania dla: DEMPSTER-SHAFER THEORY - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: DEMPSTER-SHAFER THEORY
Przykład wyników znalezionych w innych katalogach

Wyniki wyszukiwania dla: DEMPSTER-SHAFER THEORY

  • Analysis of the objects images on the sea using Dempster-Shafer Theory

    Publikacja

    - Rok 2016

    The paper presents the concept of using aerial and satellite imagery or images coming from the marine radar to identify and track vessels at sea. The acquired data were subjected to a highly advanced image analysis. The development of remote sensing techniques allows to gain a huge amount of data. These data are useful information source however usually we have to use different data mining methods to gain interested information....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Dempster-shafer theory-based trust and selfishness evaluation in mobile ad hoc networks

    Publikacja

    - Rok 2009

    The paper addresses the problem of selfishness detec-tion in mobile ad hoc networks. It describes an approach based on Dempster-Shafer theory of evidence. Special attention is paid to trust evaluation and using it as a metric for coping with (weighted) recommendations from third-party nodes. Efficiency and robustness of the pre-sented solution is discussed with an emphasis on resil-iency to false recommendations.

  • Data-Centric Dempster-Shafer Theory-Based Selfishness Thwarting via Trust Evaluation in MANETs and WSNs

    Publikacja

    - Rok 2009

    Przedstawiono ramy wymiany informacji reputacyjnej pomiędzy terminalami sieci mobilnej ad hoc lub sensorowej, prowadzące do efektywnej lokalizacji terminali egoistycznych i jednocześnie zapobiegające skutkom fałszywych rekomendacji. Integrację miar zaufania i rekomendacji reputacyjnych oparto na teorii Dempstera-Shafera.

  • Using Dempster-Shafer approach to support reasoning about trust in IT infrastructures

    Publikacja

    W artykule przedstawiono zastosowanie podejścia Dempstera-Shafera do do wnioskowania o poziomie zaufania do infrastruktur TI.

  • A framework for detection of selfishness in multihop mobile ad hoc networks

    The paper discusses the need for a fully-distributed selfishness detection mechanism dedicated for multihop wireless ad hoc networks which nodes may exhibit selfish forwarding behaviour. The main contribution of this paper is an introduction to a novel approach for detecting and coping with the selfish nodes. Paper describes a new framework based on Dempster-Shafer Theory called Dempster-Shafer Theory-based Selfishness Detection...

    Pełny tekst do pobrania w portalu

  • Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components

    Publikacja

    The chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...

    Pełny tekst do pobrania w portalu

  • Support for argument structures review and assessment

    Argument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...

    Pełny tekst do pobrania w portalu

  • Evaluation of Decision Fusion Methods for Multimodal Biometrics in the Banking Application

    Publikacja

    An evaluation of decision fusion methods based on Dempster-Shafer Theory (DST) and its modifications is presented in the article, studied over real biometric data from the engineered multimodal banking client verification system. First, the approaches for multimodal biometric data fusion for verification are explained. Then the proposed implementation of comparison scores fusion is presented, including details on the application...

    Pełny tekst do pobrania w portalu

  • DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes

    Publikacja

    - Rok 2009

    . Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...

  • Workshop on Graph Theory

    Wydarzenia

    01-07-2019 00:00 - 05-07-2019 23:59

    The Gdańsk Workshop on Graph Theory (GWGT) is an annual, informal workshop whose goal is to provide a forum for scientists to meet, present their work, interact, and establish collaborations in the field of Graph Theory