• No results found

A new model for threat assessment in data fusion based on fuzzy evidence theory

N/A
N/A
Protected

Academic year: 2021

Share "A new model for threat assessment in data fusion based on fuzzy evidence theory"

Copied!
11
0
0

Loading.... (view fulltext now)

Full text

Loading

References

Related documents

E-book usage can be seen as a wicked problem with regards to this and the earlier-described characteristics because there is no consensus on how to reliably

In this paper, we have analysed the performance of MRNs in terms of vehicular penetration loss and path loss for various pathloss models for different height

Experiments were designed with different ecological conditions like prey density, volume of water, container shape, presence of vegetation, predator density and time of

The current report, which is part of the Iranian Cataract Surgery Survey (ICSS), 31 reviewed some effective factors on hospitalization time in cataract surgery with a focus

The study findings indicate that different groups of manufacturers – Do All, Speedy Conformers, Efficient Conformers, and Starters – emphasize different sets of

The proposed indexing that uses Generalized Hash Tree (GHT) expedites projection and selection operations on encrypted medical XML records stored in WORM storage.. We implemented

19% serve a county. Fourteen per cent of the centers provide service for adjoining states in addition to the states in which they are located; usually these adjoining states have

five short films were produced to make “Silly Symphonies.” This project started in 1929, and it concluded in 1939.. “Silly Symphonies” is a remembrance of Walt’s