Dempster-Shafer theory (DST) has attracted widespread attention in many domains owing to its powerful advantages in managing uncertain and imprecise information. Nevertheless, counterintuitive results may be generated once Dempster’s rule faces highly conflicting pieces of evidence. In order to handle this flaw, a new belief logarithmic similarity measure () based on DST is proposed in this paper. Moreover, we further present an enhanced belief logarithmic similarity measure () to consider the internal discrepancy of subsets. In parallel, we prove that satisfies several desirable properties, like bounded, symmetry and non-degeneracy. Finally, a new multi-source data fusion method based on is well devised. Through its best performance in two application cases, specifically those pertaining to fault diagnosis and target recognition respectively, the rationality and effectiveness of the proposed method is sufficiently displayed.
Multi-source data fusion (MSDF) can effectively integrate information from diverse sources, which is conducive to improving the credibility and efficiency of decision-making [1–3]. MSDF, in recent years, has attracted extensive concern in various domains, such as pattern recognition [4, 5], fault diagnosis [6–8], risk analysis [9, 10] and so on [11–14]. Nevertheless, the information gathered from various sources may often be imperfect (i.e., uncertain and imprecise), which is usually attributed to the interference of environmental conditions [15, 16]. How to handle such uncertain and imprecise information is still a challenge. Fortunately, over the past few years, a variety of theories have been devoted to dealing with this problem, including Bayesian theory [17], fuzzy set theory [18], rough set theory [19], Dempster-Shafer theory [20, 21], Z-numbers [22], random permutation set [23], intuitionistic fuzzy sets [24] and complex evidence theory [25–27].
Dempster-Shafer theory (DST), also known as evidence theory or belief functions theory, was initially put forward by Dempster [20] and then developed by Shafer [21]. As an effective mathematical tool for modeling uncertainty and imprecision, DST has several unique advantages. Specifically, DST characterizes imprecision and uncertainty by assigning probabilities to basic belief assignment (BBA) [28]. Additionally, Dempster’s rule of combination follows the associative and commutative laws, making its implementation simple [29]. Despite the benefits mentioned above, DST is limited by dealing with highly conflicting pieces of evidence, as counterintuitive results tend to be generated [30].
As such, a huge number of methods have been put forward to address this issue, which can be mainly divided into two types [31]. One is to modify Dempster’s rule of combination, the other is to preprocess the pieces of evidence. Some researches that devote to the first type include Smets’s unnormalized combination rule [32], Dubois and Prade’s disjunctive combination rule [33], and Yager’s combination rule [34]. However, these rules violate the excellent properties of Dempster’s rule, like associative and commutative laws.
Hence, preprocessing the pieces of evidence becomes the choice of many researchers. To date, various methods have been proposed for this purpose, each with their own strengths and weaknesses. One such method is Murphy’s approach, which takes a simple arithmetic average of the pieces of evidence [35]. While this may be effective in some cases, other researchers, like Deng et al., have opted for a more nuanced approach. They have adopted a weighted average based on the Jousselme distance, which is a measure of the evidence’s similarity and conflict [36]. However, as research progresses, it has become clear that even the Jousselme distance fails in certain situations. Jiang has highlighted this issue and proposed a new correlation coefficient to measure the discrepancies between BBAs [37]. This new approach provides greater accuracy in handling conflicts between different pieces of evidence. Recently, Xiao has presented a novel method that uses a belief divergence measure of evidence, taking into account the information volume of evidence in terms of belief entropy [38]. Unfortunately, this approach neglects the internal discrepancy of subsets and treats multiple-element subsets the same as singleton-element subsets, which also occurs in [39–41]. In a word, managing conflicts in DST is such an essential and challenging task that has remained an open issue so far. While various approaches have been proposed, there is still much room for improvement in MSDF.
In this paper, a new belief logarithmic similarity measure () based on DST is first proposed. To take the internal discrepancy of subsets into consideration, the enhanced belief logarithmic similarity measure () is proposed subsequently. Then, a new MSDF method is designed based on . In general, it comprehensively considers each piece of evidence’s credibility and information volume weight. To further demonstrate the rationality and robustness of the proposed method, several numerical examples and two applications in fault diagnosis and target recognition are illustrated.
The main contributions are summarized below:
(1) A new based on DST is proposed to measure the similarity between the pieces of evidence.
(2) The proposed takes the internal discrepancy of subsets into account so that it is able to distinguish the multiple-element subset from the singleton-element subset.
(3) The proposed has some ideal mathematical properties since it is bounded and has symmetry and non-degeneracy. More noteworthy is that all of these properties have been proved in detail in this paper.
(4) Based on , a new MSDF method is well devised. Additionally, two application cases for fault diagnosis and target recognition are provided to prove the effectiveness and robustness of the proposed method.
The organization of the rest of this paper is as follows. In section 2, DST and belief entropy are briefly reviewed. A new based on DST and are proposed in section 3 with some numerical examples for demonstration of the rationality and effectiveness. After that, a new MSDF method is proposed in section 4. Then the application based on the proposed method is illustrated in section 5. Finally, section 6 makes a conclusion.
Preliminaries
Dempster–Shafer theory
Dempster-Shafer theory (DST), as a generalization of conventional Bayesian theory, is a useful mathematical tool for modeling and solving uncertain and imprecise information, which has been widely used in many fields [42–46]. Here we will briefly review the basic concepts of DST.
Definition 1. [Framework of Discernment] Assume Θ is a set that contains N exhaustive and mutually exclusive elements. Θ is called the frame of discernment (FOD), and it can be defined as:
The power set of Θ, defined as 2
Θ, which are expressed as follows:
Definition 2. [Basic Belief Assignment] A basic belief assignment (BBA), also called mass function, is defined as a mapping m of the power set 2
Θ to [0, 1], which meets:
where m (ϑi) denotes the degree of support to ϑi.
Definition 3. [Dempster’s Rule] Let m1 and m2 are two independent BBAs. Dempster’s rule of combination is defined as:
with
where represents the degree of conflict between m1 and m2, and must be satisfied that . When K = 0, no conflict occurs between m1 and m2. When K = 1, m1 and m2 are completely conflict and Dempster’s rule is not applicable in this case.
Belief entropy
Belief entropy was first proposed by Deng in [47]. As a generation of Shannon entropy, it has superiority in measuring the uncertainty of information.
Definition 4. [Belief Entropy] Let ϑi be a hypothesis of the mass function m, |ϑi| is the cardinality of the set ϑi. Belief entropy Ed of set ϑi is defined as:
In the case of a singleton-element subset, belief entropy degenerates to Shannon entropy in terms of Eq.(7).
It should be noted that the greater the uncertainty of the piece of evidence, the greater the belief entropy.
The proposed similarity measure
In this section, two new belief logarithmic similarity measures will be proposed, respectively. Additionally, some numerical examples will be applied to compare the two similarity measures.
A new belief logarithmic similarity measure
Various existing similarity measures are based on the strategy that calculates some distance between the pieces of evidence. Inspired by these strategies, a new belief logarithmic similarity measure () is defined as follows.
Definition 5. [Belief Logarithmic Similarity Measure]
The similarity between m1 and m2 can be basically measured with the proposed . However, obviously, it is defective as it only takes the external discrepancy of BBAs like many other measures but ignores the internal discrepancy of BBAs, which means the multiple-element subsets will be treated completely the same as the singleton-element subsets. Consequently, an enhanced version that considers the internal discrepancy will be proposed in subsection 3.2.
An enhanced belief logarithmic similarity measure
With regard to the drawbacks of , an enhanced version of , called , is put forward below.
Definition 6. [Enhenced Belief Logarithmic Similarity Measure]
Apparently, the multiple-element subset can be distinguished from the singleton-element subset with as it takes the cardinality of the subset into account. What is more, has several ideal mathematical properties. The introduction and proof are shown as follows.
Property 1. The proposed satisfies the following properties: 1. Bounded: .
2. Symmetry: = .
3. Non-degeneracy: iff m1 = m2.
Proof. 1. For two arbitrary BBAs m1 and m2 in Θ, Let us consider
Namely, reaches the maximum value 2 as m1 = m2 while it reaches the minimum value 1 as the two BBAs are completely contradictory. Since , we thus obtain:
Clearly, we obtain . □ Proof. 2. For two arbitrary BBAs m1 and m2 in Θ, we have:
and
Since , it is easy to obtain = . □ Proof. 3. For two same BBAs m1 and m2 in Θ, i.e. m1 = m2. Thus, we have:
Conversely, assume that , we thus have:
According to Eq. (15), we can conclude ∑
ϑi⊆Θ = 0, which also means that m1 = m2.
□
Numerical examples
In this section, several numerical examples will be applied to illustrate the performance of and further prove its mathematical properties. And some numerical examples will be used to compare with in order to show the rationality and strengths of .
Example 1. Suppose that m1 and m2 are two BBAs in Θ = {ϑ1, ϑ2, ϑ3}.
Where α, β ∈ [0, 1] and α + β ∈ [0, 1]. As seen in Fig 1, when m1 = m2, that is, α = 0.4 and β = 0.6, just reaches 1 which is the maximum value. Meanwhile, it can be observed that the minimum value is 0. These phenomena are in good agreement with the previously mentioned properties that is bounded and has non-degeneracy.
The results of varying with α and β in Example 1.
Example 2. Suppose that m1 and m2 are two BBAs in Θ = {ϑ1, ϑ2}.
Where α, β ∈ [0, 1] and α + β ∈ [0, 1]. It can be seen from Fig 2, with the change of α and β, the values of the two BBAs m1 and m2 change symmetrically, while the values of are equal, which is reasonable because it is consistent with the symmetry of .
The results of varying with α and β in Example 2.
Example 3. Suppose that m1 and m2 are two BBAs defined on FOD, where ΘT indicates the set of variables shown in Table 1 and variable α is between 0 and 1.
Where α ∈ [0, 1] and t ∈ {1, 2, . . . , 20}. The results of varying with α and t is given in Fig 3. When t = 1, which means the ΘT is a singleton set, there is no intersection between {ϑ2} and ΘT. Consequently, the value of becomes smaller. As the element in ΘT increases from 2 to 20, the values of ascend as shown in Fig 3(b). Since the influence of the number of elements is exponential, the greater the number of elements, the greater the uncertainty and the smaller the change of value. With the regard of α, when α = 0.95, which means m1 = m2, the get the maximum value no matter how the t changes. Therefore, this example is reasonable and indicates is effective under the variation of the support of proposition and the number of elements.
The results of varying with α and t in Example 3.
Example 4. Suppose that m1 and m2 are two BBAs defined on FOD Θ = {ϑ1, ϑ2, . . . , ϑ20}, where ΘT indicates the set of variables shown in Table 1 and variable α is between 0 and 1.
Where α ∈ [0, 1] and t ∈ {1, 2, . . . , 20}. As seen in the Fig 4, it is similar to Example 3.3 as a whole. However, since the subset contains multiple elements, the value of will be greater. This example illustrates the effectiveness of when the subsets all contain multiple elements.
The results of varying with α and t in Example 4.
Example 5. Suppose that m1 and m2 are two BBAs defined on FOD, where ΘT is a variable set including t elements shown in Table 1.
Where t ∈ {1, 2, . . . , 20}. As seen in Fig 5, when t = 1, the ΘT becomes a singleton set that has no intersection with {ϑ2}. In the light of Example 3.3, it is easy to figure out the result of in Fig 5 is reasonable. In contrast, the value of keeps invariant no matter how the t changes. That is because treat the multiple-element subset as a singleton-element subset, which ignores the effect of the multiple-element subset. The same phenomenon also manifests in the other three existing measure being compared. To be specific, we have made a comparison of the existing measures in [6, 40] which correspond to SM, BJS, and DSM in Fig 5 respectively. A notable observation is that regardless of how t changes, their values for measuring the similarity or dissimilarity between evidence remain unchanged, indicating their inferiority compared to .
The comparison results of and conventional measures varying with t in Example 5.
A new based MSDF method
In this section, a new MSDF method based on is well devised. As it takes the influence of multiple-element subsets into consideration, it can unfold a more granular map of similarities between two pieces of evidence. Moreover, it also considers the information volume of evidence, which makes it handle the uncertainty reasonably. Next, the procedure of the proposed method will be introduced in detail, and the flowchart is shown in Fig 6.
Flowchart of the proposed MSDF method.
Step 1: Calculate the between mi (i = 1, 2, . . . , n) and mj (j = 1, 2, . . . , n) in the light of Eq.(9). Therefore, the similarities measured matrix is constructed as follow:
Step 2: The support degree of mi is calculated by
Step 3: The credibility weight of mi is calculated by
Step 4: By utilizing belief entropy, the information volume of mi is defined as below:
The greater the belief entropy of mi, the more information it harbors, and hence, the larger the information volume it represents. A considerable information volume for mi signifies its pivotal role in the ultimate synthesis of results. Therefore, the belief entropy Edi of mi (i = 1, 2, . . . , n) is calculated by leveraging Eq.(6).
where N denotes the number of elements in FOD.
Step 5: The information volume weight is then obtained as below:
Step 6: The weight of each piece of evidence gets adjusted based on the information volume and credibility , which is denoted as :
Step 7: The weighted average evidence is obtained in the light of the final weight of mi as follow:
Namely, by means of weighted averaging, merges n distinct BBAs to yield one single BBA.
Step 8: Obtain the combination result through fusing with Dempster’s rule Eq.(4) by n - 1 times if there are n pieces of evidence. The whole process is also given in pseudo-code as seen in Algorithm 1.
Multi-source data fusion method based on
Input: The n pieces of BBAs in Θ which contains N elements
Output: Recognition result τ
1: fori = 1 → ndo
2: forj = 1 → ndo
3: Calculate the between mi and mj in terms of Eq.(9).
4: end for
5: end for
6: The similarities measured matrix is obtained according to Eq. (16)
7: Measure the support degree Sup (mi) of mi by Eq.(17)
8: Obtain the credibility weight of mi by Eq. (18)
9: fori = 1 → ndo
10: forj = 1 → Ndo
11: Calculate the information volume of mi in the light of Eq.(20)
12: end for
13: end for
14: Obtain the information volume weight by Eq.(21)
15: Calculate the adjusted weight in terms of Eq.(22)
16: Obtain the weighted average evidence by Eq.(23)
17: fori = 1 → n - 1 do
18: Combine the weighted average evidence in terms of Dempster’s rule of combination
19: end for
20: return τ
Application
This section will illustrate two application cases involving fault diagnosis and target recognition to compare the proposed method with related methods.
Statement of application I
Suppose a multi-sensor-based fault diagnosis problem is associated with the data collected by five different types of sensors S1, S2, S3, S4 and S5. The data are modeled as the BBAs given in Table 2, where three kinds of faults ϑ1, ϑ2, ϑ3 make up of the FOD Θ = {ϑ1, ϑ2, ϑ3}. And the data from [7] are used to make comparisons with related methods.
BBAs modeled from sensors
{ϑ1}
{ϑ2}
{ϑ3}
Θ
m1
0.7
0.1
0
0.2
m2
0.7
0
0
0.3
m3
0.65
0.15
0
0.2
m4
0.75
0
0.05
0.2
m5
0
0.2
0.8
0
Implementation based on the proposed method
Step 1: Calculate the similarities measured matrix SMM is constructed as follow:
Step 2: Calculate the support degree Sup (mi) of mi.
Step 3: Generate the credibility weight of mi.
Step 4: Measure the information volume IVi of mi.
Step 5: Obtain the information volume weight of mi.
Step 6: Adjust weight with and of mi.
Step 7: Obtain the weighted average evidence:
Step 8: Combine the weighted average evidence in terms of Dempster’s rule four times, and the result is given in Table 4. And all of the intermediate results are presented in Table 3
All of the intermediate results of application I
m1
m2
m3
m4
m5
Sup
0.7734
0.7529
0.7692
0.7388
0.2273
0.2371
0.2308
0.2358
0.2265
0.0697
IV
5.5748
5.56041
6.2989
4.7267
2.0584
0.2298
0.2310
0.2596
0.1948
0.0848
0.2487
0.2434
0.2795
0.2014
0.0270
Discussion
All the results of the above numerical examples are presented in Table 4. From Table 4, it can be seen that even though the first four pieces of evidence support ϑ1, Dempster’s rule of combination eventually generates counterintuitive results under the influence of the last one that supports ϑ3. Therefore, it can not effectively deal with the data fusion problem when the pieces of evidence are highly conflicting. Whereas the other methods all support ϑ1, which is in sync with logic. Additionally, the proposed method is more efficient in handling highly conflicting evidence with the greatest belief (0.9956), as shown in Table 4. That is because the proposed method not only considers the internal and external discrepancies among the subsets of the piece of evidence but also adopts the belief entropy to measure the uncertainty of the piece of evidence, which is helpful in obtaining more reliable weighted average evidence and more ideal result.
Suppose there are three types of aircraft, denoted as ϑ1, ϑ2 and ϑ3, which make up the FOD. The set of radars given by R = {R1, R2, R3, R4, R5} are used to gather the data. In addition, the collected data from five different types of radar are modeled as BBAs shown in Table 5, where the five BBAs m1, m2, m3, m4, m5 are reported from the five radars R1, R2, R3, R4, R5 respectively. And the data from [3] are used to make a comparison with related methods.
BBAs based on five radars
{ϑ1}
{ϑ2}
{ϑ3}
Θ
m1
0.4
0.6
0
0
m2
0
0.7
0.3
0
m3
0.85
0
0
0.15
m4
0.4
0.6
0
0
m5
0.75
0
0
0.25
Implementation based on the proposed method
Step 1: Calculate the similarities measured matrix SMM is constructed as follow:
Step 2: Calculate the support degree Sup (mi) of mi.
Step 3: Generate the credibility weight of mi.
Step 4: Measure the information volume IVi of mi.
Step 5: Obtain the information volume weight of mi. Step 6: Adjust weight with and of mi.
Step 7: Obtain the weighted average evidence:
Step 8: Combine the weighted average evidence in terms of Dempster’s rule four times, and the result is given in Table 7 and Fig 7(a). Especially the mass of belief for ϑ1 of different methods is shown in Fig 7(b). And all of the intermediate results are presented in Table 6.
As seen in Table 5 and Table 7, m2 supports ϑ2, which makes the Dempster’s rule of combination support ϑ2 while the rest of methods support ϑ1. In addition, as for ϑ1, the support degree of Murphy’s method, Deng et.al.’s method, Lin et.al.’s method and Jiang’s method are 0.7273, 0.7261, 0.6901 and 0.7328 respectively, which are lower than those take the information volume of evidence into consideration. And all of them ignore the effect of multiple-element subsets and treat them completely the same as singleton-element subsets. Furthermore, the support degree of Xiao’s method, Gao and Xiao’s method and the proposed method are 0.8393, 0.8504 and 0.8759, respectively, which means the proposed method outperforms the other methods. That is because the proposed method considers the number of elements of the subsets and distinguishes the multiple-element subset from the singleton-element subset. It is worth noting that the proposed method does not consider the intersection and union information between subsets. However, the correlation coefficient proposed by Jiang utilizes the well-known Jaccard coefficient to reflect the intersection and union information among subsets. The result should be further improved if the proposed method also uses this information.
Conclusion
In this paper, a new based on DST is proposed to deal with the highly conflicting pieces of evidence in MSDF. For the sake of utilizing the internal discrepancy of the subsets to facilitate solving the conflict problem, an enhanced version, , that distinguishes the multiple-element subset from the singleton-element subset is subsequently proposed. On top of , a new MSDF method based on is well devised. The proposed method is applied in several numerical examples to validate its rationality and effectiveness. And the results indicate that the proposed method can effectively resolve conflict issues and achieve better results. In order to verify the proposed method further, the proposed method is applied in two cases, including fault diagnosis and target recognition. Compared with the conventional methods, the proposed approach exhibits a clear superiority, attaining its optimal performance in both application cases. All of these results reveal that the proposed method is a promising MSDF method. In the future, we intend to delve deeper into the application of the proposed method across a broader realm of domains.
References
1.
GeQ., WeiZ., LiuM., YuJ. and WenC., Adaptive quantized estimation fusion using strong tracking filtering and variational Bayesian, IEEE Transactions on Systems, Man, and Cybernetics: Systems50(3) (2020), 899–910.
2.
ChenF., YuanZ. and HuangY., Multi-source data fusion for aspect-level sentiment classification, Knowledge-Based Systems187 (2020), 104831.
3.
PanL., GaoX., DengY. and CheongK.H., Enhanced mass Jensen–Shannon divergence for information fusion, Expert Systems with Applications209 (2022), 118065.
4.
GaoX. and XiaoF., An improved belief χ2 divergence for Dempster–Shafer theory and its applications in pattern recognition, Computational and Applied Mathematics41 (2022), 277.
5.
XiaoF., WenJ., PedryczW., Generalized divergence-based decision making method with an application to pattern classification, IEEE Transactions on Knowledge and Data Engineering (2022), doi: 10.1109/TKDE.2022.3177896.
6.
LinY., LiY., YinX. and DouZ., Multisensor fault diagnosis modeling based on the evidence theory, IEEE Transactions on Reliability67(2) (2018), 513–521.
7.
GaoX. and XiaoF., A generalized χ2 divergence for multisource information fusion and its application in fault diagnosis, International Journal of Intelligent Systems37(1) (2021), 5–29.
8.
GaoX., JiangP., XieW., ChenY., ZhouS. and ChenB., Decision fusion method for fault diagnosis based on closeness and Dempster-Shafer theory, Journal of Intelligent & Fuzzy Systems40(6) (2021), 12185–12194.
9.
YuJ., HuM. and WangP., Evaluation and reliability analysis of network security risk factors based on DS evidence theory, Journal of Intelligent & Fuzzy Systems34(2) (2018), 861–869.
10.
PanY., ZhangL., LiZ. and DingL., Improved fuzzy Bayesian network-based risk analysis with interval-valued fuzzy sets and D–S evidence theory, IEEE Transactions on Fuzzy Systems28(9) (2020), 2063–2077.
11.
FuX., FortinoG., PaceP., AloiG. and LiW., Environment-fusion multipath routing protocol for wireless sensor networks, Information Fusion53 (2020), 4–19.
12.
RohmerJ., Uncertainties in conditional probability tables of discrete Bayesian Belief Networks: A comprehensive review, Engineering Applications of Artificial Intelligence88 (2020), 103384.
13.
HuL., TanC. and DengH., An evidence theory based approach for group decision making under uncertainty, Journal of Intelligent & Fuzzy Systems40(6) (2021), 10837–10851.
14.
LiuZ., An effective conflict management method based on similarity measure and entropy of belief functions for multi-sensor data fusion, Artificial Intelligence Review (2023), 1–28. doi: 10.1007/s10462-023-10533-0.
15.
ZhouM., ZhuS., ChenY., WuJ. and Herrera-ViedmaE., A generalized belief entropy with nonspecificity and structural conflict, IEEE Transactions on Systems, Man, and Cybernetics: Systems52(9) (2022), 5532–5545.
16.
XiaoF., CaoZ. and JolfaeiA., A novel conflict measurement in decision-making and its application in fault diagnosis, IEEE Transactions on Fuzzy Systems29(1) (2021), 186–197.
17.
DuboisD. and PradeH., Bayesian conditioning in possibility theory, Fuzzy Sets and Systems92(2) (1997), 223–240.
18.
TianX., MaJ., LiL., XuZ. and TangM., Development of prospect theory in decision making with different types of fuzzy sets: A state-of-the-art literature review, Information Sciences615 (2022), 504–528.
19.
ShabirM., AliM.I. and ShaheenT., Another approach to soft rough sets, Knowledge-Based Systems40 (2013), 72–80.
20.
DempsterA.P., Upper and lower probabilities induced by a multivalued mapping, Annals of Mathematical Statistics38(2) (1967), 325–339.
21.
ShaferG., A mathematical theory of evidence, Princeton University Press, 1976.
22.
JiangW., CaoY. and DengX., A novel Z-network model based on Bayesian network and Z-number, IEEE Transactions on Fuzzy Systems28(8) (2020), 1585–1599.
23.
DengY., Random permutation set, International Journal of Computers, Communications and Control17(1) (2022). doi: 10.15837/ijccc.2022.1.4542.
24.
XiaoF., A distance measure for intuitionistic fuzzy sets and its application to pattern classification problems, IEEE Transactions on Systems, Man, and Cybernetics: Systems51(6) (2021), 3980–3992.
25.
XiaoF., CED: A distance for complex mass functions, IEEE Transactions on Neural Networks and Learning Systems32(4) (2021), 1525–1535.
26.
XiaoF. and PedryczW., Negation of the quantum mass function for multisource quantum information fusion With its application to pattern classification, IEEE Transactions on Pattern Analysis and Machine Intelligence45(2) (2023), 2054–2070.
27.
XiaoF., CaoZ., LinC., A complex weighted discounting multisource information fusion with its application in pattern classification, IEEE Transactions on Knowledge and Data Engineering (2022), doi: 10.1109/TKDE.2022.3206871.
28.
WangH., DengX., JiangW. and GengJ., A new belief divergence measure for Dempster–Shafer theory based on belief and plausibility function and its application in multi-source data fusion, Engineering Applications of Artificial Intelligence97 (2021), 104030.
29.
LiH. and XiaoF., A method for combining conflicting evidences with improved distance function and Tsallis entropy, International Journal of Intelligent Systems35(11) (2020), 1814–1830.
30.
ShangQ., LiH., DengY. and CheongK.H., Compound credibility for conflicting evidence combination: An autoencoder-k-means approach, IEEE Transactions on Systems, Man, and Cybernetics: Systems52(9) (2022), 5602–5610.
31.
LefevreE., ColotO. and VannoorenbergheP., Belief function combination and conflict management, Information Fusion3(2) (2002), 149–162.
32.
SmetsP., The combination of evidence in the transferable belief model, IEEE Transactions on Pattern Analysis and Machine Intelligence12(5) (1990), 447–458.
33.
DuboisD. and PradeH., Representation and combination of uncertainty with belief functions and possibility measures, Computational Intelligence4(3) (1988), 244–264.
34.
YagerR.R., On the Dempster–Shafer framework and new combination rules, Information Sciences41(2) (1987), 93–137.
35.
MurphyC.K., Combining belief functions when evidence conflicts, Decision Support Systems29(1) (2000), 1–9.
36.
DengY., ShiW., ZhuZ. and LiuQ., Combining belief functions based on distance of evidence, Decision Support Systems38(3) (2005), 489–493.
37.
JiangW., A correlation coefficient for belief functions, International Journal of Approximate Reasoning103 (2018), 94–106.
38.
XiaoF., Multi-sensor data fusion based on the belief divergence measure of evidences and the belief entropy, Information Fusion46 (2019), 23–32.
39.
SongY. and DengY., A new method to measure the divergence in evidential sensor data fusion, International Journal of Distributed Sensor Networks15 (2019), 1–8.
40.
ZhaoK., SunR., LiL., HouM., YuanG. and SunR., An improved evidence fusion algorithm in multi-sensor systems, Applied Intelligence51 (2021), 7614–7624.
41.
KaurM., SrivastavaA., A new divergence measure for belief functions and its applications, International Journal of General Systems (2022), doi: 10.1080/03081079.2022.2151006.
42.
XiaoF., Generalized belief function in complex evidence theory, Journal of Intelligent & Fuzzy Systems38(4) (2020), 3665–3673.
43.
MaZ., LiuZ., LuoC. and SongL., Evidential classification of incomplete instance based on k-nearest centroid neighbor, Journal of Intelligent & Fuzzy Systems41(6) (2021), 7101–7115.
44.
BaiS., LiL. and ChenX., Conflicting evidence combination based on belief mover’s distance, Journal of Intelligent & Fuzzy Systems42(3) (2022), 2005–2021.
45.
ZhaoK., LiL., ChenZ., SunR., YuanG. and LiJ., A survey: Optimization and applications of evidence fusion algorithm based on Dempster–Shafer theory, Applied Soft Computing124 (2022), 109075.
46.
ZhouL., CuiH., MiX., ZhangJ. and KangB., A novel conflict management considering the optimal discounting weights using the BWM method in Dempster-Shafer evidence theory, Information Sciences612 (2022), 536–552.
47.
DengY., Deng entropy, Chaos, Solitons & Fractals91 (2016), 549–553.