共 50 条
- [21] Unified Identity Authentication Based on D-S Evidence Theory JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 535 - 542
- [22] A trust method of manets based on D-S evidence theory Xie, H. (xiehui371@gmail.com), 1600, Advanced Institute of Convergence Information Technology (04):
- [23] Intrusion alert correlation based on D-S evidence theory 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 308 - 312
- [24] Fault Diagnosis based on PCA and D-S Evidence Theory 2009 ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), VOLS 1-7, 2009, : 1310 - +
- [25] Fault Diagnosis of Generator Based on D-S Evidence Theory ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1, PROCEEDINGS, 2008, : 660 - 663
- [26] Safety Voting System Based on D-S Evidence Theory Pan, D. (pandb@swu.edu.cn), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
- [27] Network anomaly detector based on the D-S evidence theory Ruan Jian Xue Bao, 2006, 3 (463-471):
- [28] Target Identification Based on the Improved D-S Evidence Theory PROCEEDINGS OF THE 27TH CHINESE CONTROL CONFERENCE, VOL 4, 2008, : 449 - +