共 50 条
- [32] Information Fusion Based on Improved D-S Evidence Theory [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 49 - 52
- [33] Fault diagnosis method based on D-S evidence theory [J]. 2010 PROGNOSTICS AND SYSTEM HEALTH MANAGEMENT CONFERENCE, 2010, : 445 - 448
- [34] Unified Identity Authentication Based on D-S Evidence Theory [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 535 - 542
- [35] A trust method of manets based on D-S evidence theory [J]. Xie, H. (xiehui371@gmail.com), 1600, Advanced Institute of Convergence Information Technology (04):
- [36] Network anomaly detector based on the D-S evidence theory [J]. Ruan Jian Xue Bao, 2006, 3 (463-471):
- [37] Target Identification Based on the Improved D-S Evidence Theory [J]. PROCEEDINGS OF THE 27TH CHINESE CONTROL CONFERENCE, VOL 4, 2008, : 449 - +
- [38] Intrusion alert correlation based on D-S evidence theory [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 308 - 312
- [39] Safety Voting System Based on D-S Evidence Theory [J]. Pan, D. (pandb@swu.edu.cn), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
- [40] Fault Diagnosis based on PCA and D-S Evidence Theory [J]. 2009 ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), VOLS 1-7, 2009, : 1310 - +