Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Research on Damage Identification of Cable-Stayed Bridges Based on Modal Fingerprint Data Fusion

    Yue Cao1,2, Longsheng Bao1, Xiaowei Zhang1,*, Zhanfei Wang1, Bingqian Li1

    Structural Durability & Health Monitoring, Vol.18, No.4, pp. 485-503, 2024, DOI:10.32604/sdhm.2024.049698 - 05 June 2024

    Abstract This study addresses the issue of inaccurate single damage fingerprint recognition during the process of bridge damage identification. To improve accuracy, the proposed approach involves fusing displacement mode difference and curvature mode difference data for single damage identification, and curvature mode difference and displacement mode wavelet coefficient difference data for two damage identification. The methodology begins by establishing a finite element model of the cable-stayed bridge and obtaining the original damage fingerprints, displacement modes, curvature modes, and wavelet coefficient differences of displacement modes through modal analysis. A fusion program based on the D-S evidence theory… More > Graphic Abstract

    Research on Damage Identification of Cable-Stayed Bridges Based on Modal Fingerprint Data Fusion

  • Open Access

    ARTICLE

    An Improved CREAM Model Based on DS Evidence Theory and DEMATEL

    Zhihui Xu1, Shuwen Shang2, Yuntong Pu3, Xiaoyan Su2,*, Hong Qian2, Xiaolei Pan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2597-2617, 2024, DOI:10.32604/cmes.2023.031247 - 15 December 2023

    Abstract Cognitive Reliability and Error Analysis Method (CREAM) is widely used in human reliability analysis (HRA). It defines nine common performance conditions (CPCs), which represent the factors that may affect human reliability and are used to modify the cognitive failure probability (CFP). However, the levels of CPCs are usually determined by domain experts, which may be subjective and uncertain. What’s more, the classic CREAM assumes that the CPCs are independent, which is unrealistic. Ignoring the dependence among CPCs will result in repeated calculations of the influence of the CPCs on CFP and lead to unreasonable reliability More > Graphic Abstract

    An Improved CREAM Model Based on DS Evidence Theory and DEMATEL

  • Open Access

    ARTICLE

    An Evidence-Based CoCoSo Framework with Double Hierarchy Linguistic Data for Viable Selection of Hydrogen Storage Methods

    Raghunathan Krishankumar1, Dhruva Sundararajan2, K. S. Ravichandran2, Edmundas Kazimieras Zavadskas3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2845-2872, 2024, DOI:10.32604/cmes.2023.029438 - 15 December 2023

    Abstract Hydrogen is the new age alternative energy source to combat energy demand and climate change. Storage of hydrogen is vital for a nation’s growth. Works of literature provide different methods for storing the produced hydrogen, and the rational selection of a viable method is crucial for promoting sustainability and green practices. Typically, hydrogen storage is associated with diverse sustainable and circular economy (SCE) criteria. As a result, the authors consider the situation a multi-criteria decision-making (MCDM) problem. Studies infer that previous models for hydrogen storage method (HSM) selection (i) do not consider preferences in the… More >

  • Open Access

    ARTICLE

    System Reliability Analysis Method Based on T-S FTA and HE-BN

    Qing Xia1, Yonghua Li2,*, Dongxu Zhang2, Yufeng Wang2

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1769-1794, 2024, DOI:10.32604/cmes.2023.030724 - 17 November 2023

    Abstract For high-reliability systems in military, aerospace, and railway fields, the challenges of reliability analysis lie in dealing with unclear failure mechanisms, complex fault relationships, lack of fault data, and uncertainty of fault states. To overcome these problems, this paper proposes a reliability analysis method based on T-S fault tree analysis (T-S FTA) and Hyper-ellipsoidal Bayesian network (HE-BN). The method describes the connection between the various system fault events by T-S fuzzy gates and translates them into a Bayesian network (BN) model. Combining the advantages of T-S fault tree modeling with the advantages of Bayesian network… More >

  • Open Access

    ARTICLE

    Structural Interval Reliability Algorithm Based on Bernstein Polynomials and Evidence Theory

    Xu Zhang1, Jianchao Ni2, Juxi Hu3,*, Weisi Chen4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1947-1960, 2023, DOI:10.32604/csse.2023.035118 - 09 February 2023

    Abstract Structural reliability is an important method to measure the safety performance of structures under the influence of uncertain factors. Traditional structural reliability analysis methods often convert the limit state function to the polynomial form to measure whether the structure is invalid. The uncertain parameters mainly exist in the form of intervals. This method requires a lot of calculation and is often difficult to achieve efficiently. In order to solve this problem, this paper proposes an interval variable multivariate polynomial algorithm based on Bernstein polynomials and evidence theory to solve the structural reliability problem with cognitive… More >

  • Open Access

    ARTICLE

    Handling Uncertainty in Human Cognitive Reliability Method for Safety Assessment Based on DSET

    Yujun Su1, Xianghao Gao2, Hong Qian2, Xiaoyan Su2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 201-214, 2022, DOI:10.32604/cmes.2022.020541 - 02 June 2022

    Abstract Human Reliability Analysis (HRA) is an important part in safety assessment of a large complex system. Human Cognitive Reliability (HCR) model is a method of evaluating the probability that operators fail to complete during diagnostic decision making within a limited time, which is widely used in HRA. In the application of this method, cognitive patterns of humans are required to be considered and classified, and this process often relies on the evaluation opinions of experts which is highly subjective and uncertain. How to effectively express and process this uncertain and subjective information plays a critical… More >

  • Open Access

    ARTICLE

    A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security

    Changting Shi1, *

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 635-652, 2018, DOI:10.32604/cmc.2018.03754

    Abstract In the last decade, IoT has been widely used in smart cities, autonomous driving and Industry 4.0, which lead to improve efficiency, reliability, security and economic benefits. However, with the rapid development of new technologies, such as cognitive communication, cloud computing, quantum computing and big data, the IoT security is being confronted with a series of new threats and challenges. IoT device identification via Radio Frequency Fingerprinting (RFF) extracting from radio signals is a physical-layer method for IoT security. In physical-layer, RFF is a unique characteristic of IoT device themselves, which can difficultly be tampered. More >

  • Open Access

    ARTICLE

    An Evidence Combination Method based on DBSCAN Clustering

    Kehua Yang1,2,*, Tian Tan1, Wei Zhang1

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 269-281, 2018, DOI:10.32604/cmc.2018.03696

    Abstract Dempster-Shafer (D-S) evidence theory is a key technology for integrating uncertain information from multiple sources. However, the combination rules can be paradoxical when the evidence seriously conflict with each other. In the paper, we propose a novel combination algorithm based on unsupervised Density-Based Spatial Clustering of Applications with Noise (DBSCAN) density clustering. In the proposed mechanism, firstly, the original evidence sets are preprocessed by DBSCAN density clustering, and a successfully focal element similarity criteria is used to mine the potential information between the evidence, and make a correct measure of the conflict evidence. Then, two More >

Displaying 1-10 on page 1 of 8. Per Page