2008
DOI: 10.1111/j.1539-6924.2008.01158.x
|View full text |Cite
|
Sign up to set email alerts
|

Use of Fuzzy Evidential Reasoning in Maritime Security Assessment

Abstract: Over the last few years, there has been a growing international recognition that the security performance of the maritime industry needs to be reviewed on an urgent basis. A large number of optional maritime security control measures have been proposed through various regulations and publications in the post-9/11 era. There is a strong need for a sound and generic methodology, which is capable of taking into account multiple selection criteria such as the cost effectiveness of the measures based on reasonable … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
129
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 169 publications
(131 citation statements)
references
References 20 publications
1
129
0
1
Order By: Relevance
“…The belief degrees can be assigned by averaging domain experts' judgments. The rule is developed to convert the lower level qualitative criteria into the upper level criteria with subsequent quantification of the belief degrees so that the following mapping and aggregating process can be achieved (Liu et al, 2005;Yang et al, 2009). …”
Section: Fuzzy Rule Basementioning
confidence: 99%
“…The belief degrees can be assigned by averaging domain experts' judgments. The rule is developed to convert the lower level qualitative criteria into the upper level criteria with subsequent quantification of the belief degrees so that the following mapping and aggregating process can be achieved (Liu et al, 2005;Yang et al, 2009). …”
Section: Fuzzy Rule Basementioning
confidence: 99%
“…There are different methods in the literature to detect the validity of the model [21]. According to one method that is used commonly to acknowledge the validity of the model, the network structure must verify the following three axioms [21], [22], [27], [28], [11], [29]. This approach was utilized in the current study for the validity of the network structure.…”
Section: Methodsmentioning
confidence: 99%
“…It may be especially important and desirable when subjective elements are involved in the methodology generated [38]. There are several well-accepted validation methods available before the methodology can be broadly accepted for use in practice.…”
mentioning
confidence: 99%