An approach of vessel collision risk assessment based on the D-S evidence theory

被引:92
|
作者
Li, Bo [1 ]
Pang, Fu-Wen [1 ]
机构
[1] Dalian Maritime Univ, Coll Informat Sci & Technol, Dalian 116026, Peoples R China
关键词
Collision risk; DCPA; TCPA; D-S evidence theory; AVOIDANCE;
D O I
10.1016/j.oceaneng.2013.09.016
中图分类号
U6 [水路运输]; P75 [海洋工程];
学科分类号
0814 ; 081505 ; 0824 ; 082401 ;
摘要
Computing time and decision correctness are the measurable indicators in vessel collision risk (CR) assessment. However, the existing CR assessment approaches, based on fuzzy theory or neural network, have lower accuracy and longer computing times. To overcome these drawbacks and obtain a compromised evaluation, an approach of vessel CR assessment based on the Dempster-Shafer (D-S) evidence theory is proposed in this paper. Considering that CR is associated with the membership functions corresponding to navigation parameters such as the distance to the closest point of approach (DCPA), the time to closest point of approach (TCPA) and the relative distance, we use the multiradar network to achieve them. Afterwards, applying the D-S evidence theory, we successfully assess CR with joint basic probability assignment (JBPA). Finally, the simulation results confirm the validity of the proposed approach. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:16 / 21
页数:6
相关论文
共 50 条
  • [31] Risk assessment of water security in Haihe River Basin during drought periods based on D-S evidence theory
    Dong, Qian-jin
    Liu, Xia
    [J]. WATER SCIENCE AND ENGINEERING, 2014, 7 (02) : 119 - 132
  • [32] Information Fusion Based on Improved D-S Evidence Theory
    Pan, Guang
    Wu, Lin Li
    [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 49 - 52
  • [33] Fault diagnosis method based on D-S evidence theory
    Wu, Yueqin
    Ren, Zhanyong
    Zeng, Zhaoyang
    [J]. 2010 PROGNOSTICS AND SYSTEM HEALTH MANAGEMENT CONFERENCE, 2010, : 445 - 448
  • [34] Unified Identity Authentication Based on D-S Evidence Theory
    Wang, Jiawei
    Zhang, Zhenjiang
    Wang, Shih-Chen
    Peng, Sheng-Lung
    Rui, Yuqun
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 535 - 542
  • [35] A trust method of manets based on D-S evidence theory
    [J]. Xie, H. (xiehui371@gmail.com), 1600, Advanced Institute of Convergence Information Technology (04):
  • [36] Network anomaly detector based on the D-S evidence theory
    Institute of Computer Science and Technology, Peking University, Beijing 100871, China
    [J]. Ruan Jian Xue Bao, 2006, 3 (463-471):
  • [37] Target Identification Based on the Improved D-S Evidence Theory
    Hu Yulan
    Fan Xiaojing
    [J]. PROCEEDINGS OF THE 27TH CHINESE CONTROL CONFERENCE, VOL 4, 2008, : 449 - +
  • [38] Intrusion alert correlation based on D-S evidence theory
    Mei Haibin
    Gong Han
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 308 - 312
  • [39] Safety Voting System Based on D-S Evidence Theory
    [J]. Pan, D. (pandb@swu.edu.cn), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
  • [40] Fault Diagnosis based on PCA and D-S Evidence Theory
    Ma Yong-Guang
    Zhang Ji
    [J]. 2009 ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), VOLS 1-7, 2009, : 1310 - +