期刊文献+

基于证据理论的船舶应急脆弱性评估 被引量:3

Vulnerability Assessment of Ship Emergency Response Based on Evidence Theory
下载PDF
导出
摘要 为解决船舶应急能力脆弱性的定量评估问题,建立基于证据理论的船舶应急脆弱性评估模型。该模型包括:建立船舶应急脆弱性评估指标体系,该体系考虑指标的完备性和可量化性,为模型的计算奠定基础;选取证据理论作为模型的评估方法,最终建立具体的船舶应急脆弱性评估模型;进行应急子系统的二次评估,进一步对子系统的敏感性和暴露性进行计算,并定量评估每个指标的脆弱度。对该模型进行实例验证,结果表明:所提出的基于改进证据理论的船舶应急脆弱性评估模型具有较高的科学性和实用性,可在同类问题中加以应用。 To quantitatively evaluate the vulnerability of a water transportation system in ship emergency management is very difficult.The evidence theory into constructing of the vulnerability assessment model for ship emergency management is introduced.The index system for ship emergency vulnerability assessment is built,and the quantitativity of the indices and the completeness of the index system are checked.The Ship Emergency Vulnerability Assessment(SEVA) model is constructed based on the index system and the evidence theory.The sensitivity and exposure of each index are defined and the level of vulnerability concerning each index is calculated.The vulnerability for a ship emergency situation is evaluated with the proposed model for verification.The result indicates that the proposed model is of high accuracy and application value,and can be used in similar fields.
出处 《中国航海》 CSCD 北大核心 2016年第2期35-39,共5页 Navigation of China
基金 国家自然科学基金(51279099) 交通运输部应用基础研究项目(2013329810300) 上海市科学技术委员会基金(12ZR1412500) 上海市教委科研创新基金资助重点项目(13ZZ124) 上海市教育委员会和上海市教育发展基金会"曙光计划"基金(12SG40)
关键词 脆弱性 船舶应急 证据理论 评估体系 合成规则 vulnerability ship emergency evidence theory evaluation system combination rule
  • 相关文献

参考文献13

  • 1TIMMERMAN P. Vulnerability, Resilience and the Col- lapse of Society: A Review of Models and Possible Cli- matic Applications [ D ]. Toronto: Institute for Environ- mental Studies, 1981. 被引量:1
  • 2IPCC. Climate Change 2001 : hnpacts, Adaptation and Vulnerability [ M]. Cambridge: Cambridge University Prass, 2001: 89-91. 被引量:1
  • 3邢栩嘉,林闯,蒋屹新.计算机系统脆弱性评估研究[J].计算机学报,2004,27(1):1-11. 被引量:84
  • 4杨超,涂颖菲,陈小鸿.交通网络需求脆弱性分析及应用[J].同济大学学报(自然科学版),2012,40(9):1329-1332. 被引量:3
  • 5江建华.船舶海上应急评价初探[J].中国安全生产科学技术,2012,8(1):187-192. 被引量:7
  • 6陈伟炯.海事预控的安全科学新理论探讨[J].中国安全科学学报,1998,8(6):5-9. 被引量:20
  • 7DEMPSTER A P. Upper and Lower Probabilities In- duced by a Multivalued Mapping [ J 1- Annals of Mathe- matical Statistics, 1967, 38(2) : 325-339. 被引量:1
  • 8SUO B, CHENG Y S, ZENG C, et al. Computational Intelligence Approach for Uncertainty Quantification U- sing Evidence Theory'[ J ]. Journal of Systems Engineer- ing and Electrunics, 2013, 24 (2) :250-260. 被引量:1
  • 9ZADEH L A. Review of Sharer' s Mathematical Theory of Evidence[J].AI Magazine, 1984, 5 : 81-83. 被引量:1
  • 10LEFEVRE E, COLOT O, VANNOORENBERGHE P. Belief Function Combination and Conflict Management [J]. Information Fusion, 2002, 3(2): 149-162. 被引量:1

二级参考文献55

  • 1秦现生,李盘靖,刘继颖,李民.产品开发过程建模方法模糊综合评判[J].机械科学与技术,2004,23(8):966-968. 被引量:3
  • 2Bishop M. , Bailey D.. A critical analysis of vulnerability taxonomies. Department of Computer Science, University of California at Davis: Technical Report CSE-96-11, 1996 被引量:1
  • 3Longley D. , Shain M. , Caelli W.. Information Security: Dictionary of Concepts, Standards and Terms. New York: Macmillan, 1992 被引量:1
  • 4Beizer B.. Software Testing Techniques. 2nd edition. International Thomson Computer Press, 1990 被引量:1
  • 5Farmer D. , Spafford E. H.. The COPS security checker system. Purdue University, West Lafayette: Technical Report,Coast TR 94-01, CSD-TR-993, 1990 被引量:1
  • 6Baldwin R. W.. Kuang: Rule-based security checking. Programming Systems Research Group, Lab for Computer Science, MIT, Massachusetts: Technical Report, 1994 被引量:1
  • 7Zerkle D. , Levitt K. , NetKuang: A multi-host configuration vulnerability checker. In: Proceedings of the 6th USENIX Security Symposium, San Jose, CA, 1996 被引量:1
  • 8Porras P. A. , Kemmerer R. A.. Penetration state transition analysis: A rule-based intrusion detection approach. In: Proceedings of the Eighth Annual Computer Security Applications Conference, 1992, 220~229 被引量:1
  • 9Ilgun K.. USTAT: A real-time intrusion detection system for UNIX. In: Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 1993, 16 被引量:1
  • 10Jensen K.. Colored petri nets: Basic concepts, analysis methods and practical use. vol. 1. 2nd edition. Berlin, Germany:Springer-Verlag, 1997 被引量:1

共引文献110

同被引文献33

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部