An evaluation method oriented to the comprehensive credibility of simulation data source based on evidence theory
نویسندگان
چکیده
The operational effectiveness of the weapon systems is usually evaluated by the reasonable simulation results. But it is difficult to measure and evaluate the credibility of the simulation data source. An evaluation indices system of the credibility for the simulation data source is built up. A set of quantitative evaluation rules are set up based on the experts’ judgments and the fuzzy expression. The credibility is evaluated from the terminal layer indices to the top ones. First, many experts are assigned to evaluate the credibility of the terminal layer indices. Then the credibility of each terminal layer indices of simulation data source is combined and synthesized into the comprehensive credibility of the whole simulation data source. An evaluation method based on the evidence theory is established to integrate above different sub-credibility of simulation data source. All the lower layer indices are required to fuse into the upper ones, and finally get the comprehensive credibility of the simulation data source. For example, the credibility of the simulation data source for the armored equipment systems is evaluated based on above methods. The evaluation results show that the methods based on D-S evidence theory are reasonable and feasible.
منابع مشابه
CREDIBILITY THEORY ORIENTED PREFERENCE INDEX FOR RANKING FUZZY NUMBERS
This paper suggests a novel approach for ranking the most applicable fuzzy numbers, i.e. $LR$-fuzzy numbers. Applying the $alpha$-optimistic values of a fuzzy number, a preference criterion is proposed for ranking fuzzy numbers using the Credibility index. The main properties of the proposed preference criterion are also studied. Moreover, the proposed method is applied for ranking fuzz...
متن کاملQuantitative evaluation of software security: an approach based on UML/SecAM and evidence theory
Quantitative and model-based prediction of security in the architecture design stage facilitates early detection of design faults hence reducing modification costs in subsequent stages of software life cycle. However, an important question arises with respect to the accuracy of input parameters. In practice, security parameters can rarely be estimated accurately due to the lack of sufficient kn...
متن کاملCalculation of Leakage in Water Supply Network Based on Blind Source Separation Theory
The economic and environmental losses due to serious leakage in the urban water supply network have increased the effort to control the water leakage. However, current methods for leakage estimation are inaccurate leading to the development of ineffective leakage controls. Therefore, this study proposes a method based on the blind source separation theory (BSS) to calculate the leakage of water...
متن کاملUsing Greedy Clustering Method to Solve Capacitated Location-Routing Problem with Fuzzy Demands
Using Greedy Clustering Method to Solve Capacitated Location-Routing Problem with Fuzzy Demands Abstract In this paper, the capacitated location routing problem with fuzzy demands (CLRP_FD) is considered. In CLRP_FD, facility location problem (FLP) and vehicle routing problem (VRP) are observed simultaneously. Indeed the vehicles and the depots have a predefined capacity to serve the customerst...
متن کاملMethod integration: An approach to develop agent oriented methodologies
Agent oriented software engineering (AOSE) is an emerging field in computer science and proposes some systematic ideas for multi agent systems analysis, implementation and maintenance. Despite the various methodologies introduced in the agent-oriented software engineering, the main challenges are defects in different aspects of methodologies. According to the defects resulted from weaknesses ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Artif. Intell. Research
دوره 5 شماره
صفحات -
تاریخ انتشار 2016