An approach of vessel collision risk assessment based on the D-S evidence theory

被引:92
|
作者
Li, Bo [1 ]
Pang, Fu-Wen [1 ]
机构
[1] Dalian Maritime Univ, Coll Informat Sci & Technol, Dalian 116026, Peoples R China
关键词
Collision risk; DCPA; TCPA; D-S evidence theory; AVOIDANCE;
D O I
10.1016/j.oceaneng.2013.09.016
中图分类号
U6 [水路运输]; P75 [海洋工程];
学科分类号
0814 ; 081505 ; 0824 ; 082401 ;
摘要
Computing time and decision correctness are the measurable indicators in vessel collision risk (CR) assessment. However, the existing CR assessment approaches, based on fuzzy theory or neural network, have lower accuracy and longer computing times. To overcome these drawbacks and obtain a compromised evaluation, an approach of vessel CR assessment based on the Dempster-Shafer (D-S) evidence theory is proposed in this paper. Considering that CR is associated with the membership functions corresponding to navigation parameters such as the distance to the closest point of approach (DCPA), the time to closest point of approach (TCPA) and the relative distance, we use the multiradar network to achieve them. Afterwards, applying the D-S evidence theory, we successfully assess CR with joint basic probability assignment (JBPA). Finally, the simulation results confirm the validity of the proposed approach. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:16 / 21
页数:6
相关论文
共 50 条
  • [1] Reliability Assessment Based on D-S Evidence Theory
    Sun, Yongquan
    Guo, Jianying
    [J]. PROCEEDINGS OF 2009 8TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY, VOLS I AND II: HIGHLY RELIABLE, EASY TO MAINTAIN AND READY TO SUPPORT, 2009, : 411 - 414
  • [2] Security Risk Assessment Model Based on AHP/D-S Evidence Theory
    Lu Simei
    Zhang Jianlin
    Sun Hao
    Luo Liming
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 530 - 534
  • [3] Information Security Risk Assessment Based on D-S Evidence Theory and Improved TOPSIS
    Wu, Xiaoqian
    Shen, Yongjun
    Zhang, Guidong
    Zhi, Hua
    [J]. PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 153 - 156
  • [4] Assessment of Power Quality Based on D-S Evidence Theory
    Chun-Xia Dou
    Ting Gui
    Ye-Fei Bi
    Jin-Zhao Yang
    Xiao-Gang Li
    [J]. Machine Intelligence Research, 2014, (06) : 635 - 643
  • [5] Assessment of power quality based on D-S evidence theory
    Dou C.-X.
    Gui T.
    Bi Y.-F.
    Yang J.-Z.
    Li X.-G.
    [J]. International Journal of Automation and Computing, 2014, 11 (06) : 635 - 643
  • [6] Risk Assessment for Distribution Transformer Burning-out Based on D-S Evidence Theory
    Zhang, Yu
    Gao, Fei
    Li, Jianfang
    Feng, Xueping
    Song, Xiaohui
    Li, Caixiu
    [J]. 2015 5TH INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES (DRPT 2015), 2015, : 1498 - 1503
  • [7] Risk Assessment and Reliability Analysis of Oil Pump Unit Based on D-S Evidence Theory
    Zhang, Xing
    Wei, Ranran
    Wu, Zhicai
    Dong, Liang
    Liu, Houlin
    [J]. ENERGIES, 2023, 16 (13)
  • [8] Quantitative Assessment of GNSS Vulnerability based on D-S Evidence Theory
    Liu, Xuan
    Zhan, Xingqun
    Chen, Maolin
    [J]. JOURNAL OF AERONAUTICS ASTRONAUTICS AND AVIATION, 2014, 46 (03): : 191 - 201
  • [9] Supply Chain Risk Evaluation Based on D-S Evidence Theory
    Pei, Xin-Tong
    Zhang, Zhen-Jiang
    Li, Chao
    Wang, Jia-Wei
    Mi, Kun
    [J]. Journal of Computers (Taiwan), 2019, 30 (06) : 311 - 322
  • [10] Online Risk Assessment of Intrusion Scenarios Using D-S Evidence Theory
    Mu, C. P.
    Li, X. J.
    Huang, H. K.
    Tian, S. F.
    [J]. COMPUTER SECURITY - ESORIC 2008, PROCEEDINGS, 2008, 5283 : 35 - +