Xiaoyan Su
Shanghai Jiao Tong University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Xiaoyan Su.
Risk Analysis | 2015
Xiaoyan Su; Sankaran Mahadevan; Peida Xu; Yong Deng
Dependence assessment among human errors in human reliability analysis (HRA) is an important issue. Many of the dependence assessment methods in HRA rely heavily on the experts opinion, thus are subjective and may sometimes cause inconsistency. In this article, we propose a computational model based on the Dempster-Shafer evidence theory (DSET) and the analytic hierarchy process (AHP) method to handle dependence in HRA. First, dependence influencing factors among human tasks are identified and the weights of the factors are determined by experts using the AHP method. Second, judgment on each factor is given by the analyst referring to anchors and linguistic labels. Third, the judgments are represented as basic belief assignments (BBAs) and are integrated into a fused BBA by weighted average combination in DSET. Finally, the CHEP is calculated based on the fused BBA. The proposed model can deal with ambiguity and the degree of confidence in the judgments, and is able to reduce the subjectivity and improve the consistency in the evaluation process.
Applied Intelligence | 2016
Xiaoyan Su; Sankaran Mahadevan; Wenhua Han; Yong Deng
Dempster’s combination rule can only be applied to independent bodies of evidence. One occurrence of dependence between two bodies of evidence is when they result from a common source. This paper proposes an improved method for combining dependent bodies of evidence which takes the significance of the common information sources into consideration. The method is based on the significance weighting operation and the “decombination” operation. A numerical example is illustrated to show the use and effectiveness of the proposed method.
Knowledge Based Systems | 2013
Peida Xu; Yong Deng; Xiaoyan Su; Sankaran Mahadevan
The Dempster-Shafer evidence theory (D-S theory) is one of the primary tools for knowledge representation and uncertain reasoning, and has been widely used in many information fusion systems. However, how to determine the basic probability assignment (BPA), which is the main and first step in D-S theory, is still an open issue. In this paper, based on the normal distribution, a method to obtain BPA is proposed. The training data are used to build a normal distribution-based model for each attribute of the data. Then, a nested structure BPA function can be constructed, using the relationship between the test data and the normal distribution model. A normality test and normality transformation are integrated into the proposed method to handle non-normal data. The missing attribute values in datasets are addressed as ignorance in the framework of the evidence theory. Several benchmark pattern classification problems are used to demonstrate the proposed method and to compare against existing methods. Experiments provide encouraging results in terms of classification accuracy, and the proposed method is seen to perform well without a large amount of training data.
Journal of intelligent systems | 2015
Xiaoyan Su; Sankaran Mahadevan; Peida Xu; Yong Deng
Dempsters rule of combination can only be used when the bodies of evidence are assumed to be independent. However, such an assumption is often unrealistic. This paper proposes a systematic approach to handle dependence in evidence theory. It includes both the representation of dependence among information sources and the aggregation of the dependent evidence. For the representation of the dependence, the proposed methodology is able to capture both inner dependence (i.e., dependence among features of a system) and outer dependence (i.e., dependence among the evidence sources during the information propagating and evaluating process). We suggest dealing with the inner dependence by applying the analytic network process model, and modeling the outer dependence based on the intersection situations of the identified influencing factors. Then for the combination of dependent evidence, the strategy is to use discounting aggregation where the discounting coefficients are related to the degree of both outer and inner dependence. The discounting operator helps reduce the duplicate calculations in the fusion of dependent evidence and relax the assumption of independence when using Dempsters rule. A case study of transportation project evaluation is used to illustrate the proposed methodology.
Applied Intelligence | 2014
Peida Xu; Xiaoyan Su; Sankaran Mahadevan; Chenzhao Li; Yong Deng
As an important tool for knowledge representation and decision-making under uncertainty, Dempster-Shafer evidence theory (D-S theory) has been used in many fields. The application of D-S theory is critically dependent on the availability of the basic probability assignment (BPA). The determination of BPA is still an open issue. A non-parametric method to obtain BPA is proposed in this paper. This method can handle multi-attribute datasets in classification problems. Each attribute value of the dataset sample is treated as a stochastic quantity. Its non-parametric probability density function (PDF) is calculated using the training data, which can be regarded as the probability model for the corresponding attribute. The BPA function is then constructed based on the relationship between the test sample and the probability models. The missing attribute values in datasets are treated as ignorance in the framework of the evidence theory. This method does not have the assumption of any particular distribution. As a result, it can be flexibly used in many engineering applications. The obtained BPA can avoid high conflict between evidence, which is desired in data fusion. Several benchmark classification problems are used to demonstrate the proposed method and to compare against existing methods. The constructed classifier based on the proposed method compares well to the state-of-the-art algorithms.
Expert Systems With Applications | 2012
Peida Xu; Xiaoyan Su; Jiyi Wu; Xiaohong Sun; Yajuan Zhang; Yong Deng
Ranking fuzzy numbers plays an important role in decision making under uncertain environment. Recently, Chen and Sanguansat (2011) [Chen, S. M. & Sanguansat, K. (2011). Analyzing fuzzy risk based on a new fuzzy ranking method between generalized fuzzy numbers. Expert Systems with Applications, 38(3), (pp. 2163-2171)] proposed a method for ranking generalized fuzzy numbers. It considers the areas on the positive side, the areas on the negative side and the heights of the generalized fuzzy numbers to evaluate ranking scores of the generalized fuzzy numbers. Chen and Sanguansats method (2011) can overcome the drawbacks of some existing methods for ranking generalized fuzzy numbers. However, in the situation when the score is zero, the results of the Chen and Sanguansats ranking method (2011) ranking method are unreasonable. The aim of this short note is to give a modification on Chen and Sanguansats method (2011) to make the method more reasonable.
Reliability Engineering & System Safety | 2014
Xiaoyan Su; Sankaran Mahadevan; Peida Xu; Yong Deng
Abstract Dependence assessment among human errors in human reliability analysis (HRA) is an important issue, which includes the evaluation of the dependence among human tasks and the effect of the dependence on the final human error probability (HEP). This paper represents a computational model to handle dependence in human reliability analysis. The aim of the study is to automatically provide conclusions on the overall degree of dependence and calculate the conditional human error probability (CHEP) once the judgments of the input factors are given. The dependence influencing factors are first identified by the experts and the priorities of these factors are also taken into consideration. Anchors and qualitative labels are provided as guidance for the HRA analyst׳s judgment of the input factors. The overall degree of dependence between human failure events is calculated based on the input values and the weights of the input factors. Finally, the CHEP is obtained according to a computing formula derived from the technique for human error rate prediction (THERP) method. The proposed method is able to quantify the subjective judgment from the experts and improve the transparency in the HEP evaluation process. Two examples are illustrated to show the effectiveness and the flexibility of the proposed method.
Cybernetics and Systems | 2016
Chenwei Zhang; Xiaoyan Su; Yong Hu; Zili Zhang; Yong Deng
ABSTRACT Spam, also known as unsolicited bulk e-mail (UBE), has recently become a serious threat that negatively impacts the usability of legitimate mails. In this article, an evidential spam-filtering framework is proposed. As a useful tool to handle uncertainty, the Dempster–Shafer theory of evidence (D–S theory) is integrated into the proposed approach. Five representative features from an e-mail header are analyzed. With a machine-learning algorithm, e-mail headers with known classifications are used to train the framework. When using the framework for a given e-mail header, its representative features are quantified. Although in classical probability theory, possibilities are forcedly assigned even when information is not adequate, in our approach, for every word in an e-mail subject, basic probability assignments (BPA) are assigned in a more flexible way, thus providing a more reasonable result. Finally, BPAs are combined and transformed into pignistic probabilities for decision-making. Empirical trials on real-world datasets show the efficiency of the proposed framework.
international conference on computer design | 2010
Peida Xu; Yong Deng; Jianling Xu; Xiaoyan Su
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In the proposed method, each individual component of the protection system in the simulated plane is modeled. Then, the threat report of each component according to the specific tactics is determined based on its real environment. Finally, the comprehensive threat distribution is obtained based on through the D-S evidence theory to combine multi-sources information. The proposed method can easily applied to the evaluation of the effectiveness of the protection system. We make the total threat of the protection system lowest through changes of the protection resources allocation. A numerical example is used to illustrate the efficiency of the proposed method.
Engineering Failure Analysis | 2012
Xiaoyan Su; Yong Deng; Sankaran Mahadevan; Qilian Bao