메뉴 건너뛰기




Volumn 7, Issue 13, 2010, Pages 2871-2878

Risk analysis of physical protection system based on evidence theory

Author keywords

D S evidence theory; Information fusion; Protection system; Risk evaluation; Threat

Indexed keywords

D S EVIDENCE THEORY; EVALUATION METHOD; EVIDENCE THEORIES; INDIVIDUAL COMPONENTS; MULTI-SOURCE INFORMATION FUSION; NUMERICAL EXAMPLE; PHYSICAL PROTECTION SYSTEMS; PROTECTION SYSTEM; PROTECTION SYSTEMS; REAL ENVIRONMENTS; RESOURCES ALLOCATION; RISK EVALUATION; THREAT;

EID: 79955036409     PISSN: 15487741     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (15)

References (12)
  • 1
    • 0031462659 scopus 로고    scopus 로고
    • Evaluation of the validity of the us epa's cancer risk assessment of arsenic for low-level exposures: A likelihood ratio approach
    • H. R. Guo, P. A. Valberg, Evaluation of the validity of the us epa's cancer risk assessment of arsenic for low-level exposures: A likelihood ratio approach, Environmental Geochemistry and Health, 19 (1997) 133-141
    • (1997) Environmental Geochemistry and Health , vol.19 , pp. 133-141
    • Guo, H.R.1    Valberg, P.A.2
  • 2
    • 77954306676 scopus 로고    scopus 로고
    • Risk evaluation of information system based on grey and fuzzy comprehensive method
    • C. B. Li, L. Zhang, Risk evaluation of information system based on grey and fuzzy comprehensive method, Journal of Computational Information Systems, 5 (2009) 1705-1712
    • (2009) Journal of Computational Information Systems , vol.5 , pp. 1705-1712
    • Li, C.B.1    Zhang, L.2
  • 4
    • 69049119246 scopus 로고    scopus 로고
    • Risk analysis of chemical, biological, or radionuclear threats: Implications for food security
    • H. Mohtadi, A. P. Murshid, Risk analysis of chemical, biological, or radionuclear threats: Implications for food security, Risk Analysis, 29 (2009) 1317-1335
    • (2009) Risk Analysis , vol.29 , pp. 1317-1335
    • Mohtadi, H.1    Murshid, A.P.2
  • 6
    • 77956618534 scopus 로고    scopus 로고
    • Modeling contaminant intrusion in water distribution networks: A new similarity-based DST method
    • Y. Deng, W. Jiang, R. Sadiq, Modeling contaminant intrusion in water distribution networks: A new similarity-based DST method, Expert Systems With Applications, 38 (2011) 571-578
    • (2011) Expert Systems With Applications , vol.38 , pp. 571-578
    • Deng, Y.1    Jiang, W.2    Sadiq, R.3
  • 7
    • 77957592770 scopus 로고    scopus 로고
    • Target recognition based on fuzzy dempster data fusion method
    • Y. Deng, X. Y. Su, D. Wang, Q. Li, Target Recognition Based on Fuzzy Dempster Data Fusion Method, Defence Science Journal, 60 (2010) 525-530
    • (2010) Defence Science Journal , vol.60 , pp. 525-530
    • Deng, Y.1    Su, X.Y.2    Wang, D.3    Li, Q.4
  • 8
    • 41149173608 scopus 로고    scopus 로고
    • A subjective methodology for risk quantification based on generalized fuzzy numbers
    • Q. Liu, J. Xiong, Y. Deng, A subjective methodology for risk quantification based on generalized fuzzy numbers, International Journal Of General Systems, 37 (2008) 149-165
    • (2008) International Journal Of General Systems , vol.37 , pp. 149-165
    • Liu, Q.1    Xiong, J.2    Deng, Y.3
  • 9
    • 0000516376 scopus 로고
    • Upper and lower probabilities induced by multivalued mapping
    • A. Dempster, Upper and lower probabilities induced by multivalued mapping, Annual Mathmatics Statistics, 38 (1967) 325-339
    • (1967) Annual Mathmatics Statistics , vol.38 , pp. 325-339
    • Dempster, A.1
  • 12
    • 33745854779 scopus 로고    scopus 로고
    • Analyzing the degree of conflict among belief functions
    • W. Liu, Analyzing the degree of conflict among belief functions, Artificial Intelligence, 170 (2006) 909-924
    • (2006) Artificial Intelligence , vol.170 , pp. 909-924
    • Liu, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.