Next Article in Journal
Improving the Process of Early-Warning Detection and Identifying the Most Affected Markets: Evidence from Subprime Mortgage Crisis and COVID-19 Outbreak—Application to American Stock Markets
Previous Article in Journal
Strong Generalized Speech Emotion Recognition Based on Effective Data Augmentation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Networked Method for Multi-Evidence-Based Information Fusion

College of Artificial Intelligence, Nankai University, No. 38 Tongyan Road, Jinnan District, Tianjin 300350, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(1), 69; https://doi.org/10.3390/e25010069
Submission received: 26 October 2022 / Revised: 7 December 2022 / Accepted: 22 December 2022 / Published: 30 December 2022
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
Dempster–Shafer evidence theory is an effective way to solve multi-sensor data fusion problems. After developing many improved combination rules, Dempster–Shafer evidence theory can also yield excellent results when fusing highly conflicting evidence. However, these approaches still have deficiencies if the conflicting evidence is due to sensor malfunction. This work presents a combination method by integrating information interaction graph and Dempster–Shafer evidence theory; thus, the multiple evidence fusion process is expressed as a network. In particular, the credibility of each piece of evidence is obtained by measuring the distance between the evidence first. After that, the credibility of the evidence is evaluated, keeping the unreliable evidence out of the information interaction network. With the fusion of connected evidence, the accuracy of the fusion result is improved. Finally, application results show that the presented method is effective.

1. Introduction

With the advancement of science and technology in recent years, information analysis has gained popularity as a research topic. Applying multi-sensor data fusion techniques will enable the creation of the consolidated view within this process. Therefore, by utilizing multi-sensor data fusion technology in various decision-making applications, such as risk analysis [1,2], fault diagnosis [3,4], health prognosis [5], image processing [6], target tracking [7] and so on, the performance of the system is significantly improved. Meanwhile, researchers have long been troubled by the imprecision and uncertainty brought on by poor weather, old sensors, and lack of energy supply. Therefore, a fusion mechanism must be created in order to reduce this kind of ambiguity and imprecision.
Numerous theories have been put forth up to this point in order to model and handle uncertain and imprecise information, such as rough sets theory [8,9], fuzzy sets theory [10,11,12], evidence theory [13,14,15], Z numbers theory [16,17] and D numbers theory [18,19]. These methods, which have been widely used in a variety of fields depending on their needs, concentrate on various aspects. In particular, because Dempster–Shafer evidence theory (DST) can accept incomplete data and assign evidence to multiple hypotheses, there is less of a need for prior probabilities. Once the fusion result is obtained, the mass of belief can be transferred onto single hypotheses by pignistic transformation [20] or DSmP [21]. It has thus been favored for its adaptability and effectiveness in modeling uncertainty and imprecision.
DST undoubtedly has some drawbacks. Different degrees of conflicts are generated by the sensors due to different types, tasks, and precision. However, it is usually less likely to produce utterly different evidence if the sensor works normally. In most cases, the evidence obtained is relevant to a certain extent and contains complementary information. However, when strongly conflicting information due to malfunction is combined, the results might be unexpected [22]. There are primarily two ways to approach this problem after extensive research over many years. The first kind is to modify Dempster’s combination rule, for example, Yager’s combination rule [23], Dubois and Prade’s disjunctive combination rule [24], Smets’ unnormalized combination rule [25] and Martin and Osswald’s PCR6 rule [26,27]. Numerous studies are inclined to pretreat the body of evidence to handle the conflict evidence fusion problem because it is possible for some strong properties to be destroyed by modifying the combination rule. Specifically, Murphy’s simple average approach of the bodies of evidence [28], Deng et al.’s weighted average of the mass functions based on the evidence distance [29], Yuan et al.’s entropy-based method [30], Yang et al.’s open Deng entropy based method [31], Xiao’s prospect-theory-based method [32] and belief divergence measure based method [33] all focus on the second way. All this research has presented effective solutions for fusing conflicting evidence. Still, if conflicting evidence is due to sensor malfunction, the modification would not work as expected, and the preprocess also fails to remove the influence of fault information.
As a complex combination problem involving multiple sensors, it makes sense to think about a connection between multi-sensor data fusion and multi-agent systems. Artificial intelligence has long been interested in multi-agent systems, which have solved a number of issues that were too complex for a single agent [34]. Communication topology-based information exchange is crucial for a well-coordinated multi-agent system. Therefore, it is worthwhile to try to enhance communication in order to increase the accuracy of data fusion. Multi-agent systems will also be more successful in achieving this goal as the fusion result becomes more accurate [35]. However, different from multi-agent systems, since the reliability of information obtained by each sensor is different when sensing different environments, and where or when the malfunction will happen is unknown, there is a contradiction between presetting topology and obtaining higher information accuracy. That is to say, in order to obtain higher fusion accuracy, switching topology, or how establishing the most effective topology is a problem that must be taken into account. It is thus more reasonable to make a connection based on the reliability of the evidence.
As a result of the discussion above, a networked approach is used in this paper by connecting graph theory and evidence theory. A newly developed credibility test rule is used to weed out implausible evidence based on the credibility degree of the evidence. The effect of fault information is therefore eliminated due to the faulty sensor’s information being cut off from the communication network. It is worth noting that we assume the evidence used for fusion is already output by each sensor, but how the sensor obtains the output is not within the scope of this manuscript.
The main contributions of this study are as follows: (1) A networked information fusion method is proposed to solve the conflict evidence fusion problem. Inspired by the knowledge of graph theory in multi-agent systems, the proposed method takes the information interaction between evidence into account, which makes multi-data fusion problems closer to multi-agent systems. (2) Rather than exclude the evidence with the lowest credibility simply, a credibility degree test rule is defined for the purpose of checking whether the evidence contains enough valid information to participate in the fusion. In this way, accidents where credible evidence is omitted due to the order of credibility are avoided as much as possible. (3) According to the isolated node mechanism of the proposed method, the highly conflicting evidence provided by the faulty sensor can be distinguished as an isolated node. Furthermore, since the isolated node is not involved in the fusion process, the negative impact caused by the fault information can be reduced effectively.
The rest of this paper is organized as follows. Section 2 introduces the preliminaries of this paper briefly. The evidence interaction is explained to point out the direction for the fusion of evidence in Section 3. A graph theory and evidence theory based multi-sensor data fusion method is proposed in Section 4. In Section 5, a numerical example is illustrated to verify the effectiveness of the proposed method. The conclusion is summarized in Section 6.

2. Preliminaries

2.1. Dempster–Shafer Evidence Theory

DST was named by Dempster [13] and Shafer [14], who firstly proposed and developed the theory. To model the uncertainty and aggregate different information, it is necessary to comprehend the following basic concepts in DST.
Definition 1 
((Frame of discernment (FOD)) [33]). Assume U is a set consisting of mutually exclusive and collectively exhaustive events; the set U is called a frame of discernment, which indicted by
U = { E 1 , E 2 , , E N }
2 U indicates the power set of U and contains all propositions, where
2 U = { , { E 1 } , { E 1 , E 2 } , , U }
and ⌀ is an empty set.
Definition 2 
((Mass function) [33]). A FOD U is based on the concept of mass function, which is a mapping m ( · ) from 2 U to [ 0 , 1 ] , satisfying the following condition:
m ( ) = 0 , A 2 U m ( A ) = 1
In DST, mass function is also known as basic belief assignment (BBA). If A 2 U verifies m ( A ) 0 , A will be called as a focal element, and the union of all of focal elements form the core of the mass function.
Definition 3 
((Belief function) [33]). The belief function and plausibility function of a proposition A U is defined as
B e l ( A ) = B A m ( B )
P l ( A ) = 1 B l ( A ¯ ) = B A m ( B )
where A ¯ = U A and B e l ( A ) P l ( A ) are always satisfied.
Definition 4 
((Dempster’s combination rule) [33]). Dempster’s combination rule uses the orthogonal sum of two BBAs. Assume two independent BBAs m 1 ( · ) and m 2 ( · ) are on the FOD U, their combination m ( · ) = m 1 ( · ) m 2 ( · ) is expressed as follows:
m ( A ) = 1 1 K B C = A m 1 ( B ) m 2 ( C ) , A 0 , A =
K = B C = m 1 ( B ) m 2 ( C )
where B and C are also propositions in 2 U , and K represents the conflict between two BBAs.

2.2. Graph Theory

Graphs have been used to model information exchange between agents in cooperative multi-agent systems for years [36,37]. A graph consists of a pair ( N , E ) , where N is a finite nonempty set of nodes, and E N × N is a set of ordered pairs of nodes, which are called edges. The pairs of nodes in an undirected graph are unordered. A directed path is a sequence of ordered edges of the form ( v i , v j ) , where v i , v j N in a digraph. Nodes are connected if there is at least one path between two nodes. On the contrary, isolated nodes are not connected to any other nodes.

2.3. The Distance Measure between Basic Belief Assignments

The measure of similarity between BBAs is a natural consideration. The distance measure between BBAs can tell us whether two pieces of evidence are close or distant. In this regard, Jousselme’s distance [38] is a appropriate approach.
Definition 5 
((Jousselme Distance) [38]). The distance between m i ( · ) and m j ( · ) is defined as:
d i j = 1 2 [ m i ( · ) m j ( · ) ] T D ̲ [ m i ( · ) m j ( · ) ]
where D ̲ is an 2 N × 2 N matrix whose elements are
D ̲ ( A , B ) = | A B | | A B | , A , B 2 U
| A | is the cardinality of A.

3. Evidence Interaction

How to deal with the conflict between evidence in DST has been a problem bothering researchers for a long time. Jousselme’s distance provides an easy and effective way to compare evidence. For instance, a small distance implies the support from other evidence, which means this evidence should play a more important role in fusion. Conversely, a large distance means this evidence is not supported by other evidence, that is to say, an insignificant role should be distributed to this evidence. However, only the similarity measure is still not enough to generate an accurate fusion result.
In order to better utilize the accurate information provided by the evidence, the credibility of the evidence is necessary. Furthermore, the case where the sensor failure happened is unavoidable. How can we know a sensor is malfunctioning or functioning normally? Assuming a sensor does fail, how can we know how badly it has failed? Can the information provided by the faulty sensor still be used for fusion? To answer these questions, the graph theory is leveraged to describe the interaction between the evidence in this section. According to the Jousselme distance, the credibility degree is obtained to measure the relative importance of evidence. What is more, the credibility is utilized to determine whether evidence obtained by a faulty sensor should be involved in the fusion process or not.
Definition 6 
((Divergence Measure) [32]). Through Jousselme’s distance, the divergence measure matrix, denoted as D M M , can be obtained:
D M M = 0 d 1 i d 1 k d i 1 0 d i k d k 1 d k i 0
where d i i = 0 ( 1 i k ) represents the BBA m i is identical to itself.
Definition 7 
((Support Degree) [33]). Let m 1 , m 2 , , m i , , m k be the BBAs on the FOD U, we denote the support degree of BBA m i from other BBAs as S u p i , which is defined as:
S u p i = k 1 j = 1 k d i j , j i
The support degree is the reciprocal of the average distance between m i and the other BBAs.
Definition 8 
((Credibility Degree) [33]). The credibility degree of BBA m i ( 1 i k ) on FOD U, denoted as C r d i , is defined as
C r d i = S u p i j = 1 k S u p j
Definition 9 
(Evidence Connection). Let a fully connected undirected graph G represent the initial topology of BBAs; the element of the initial adjacency matrix A is defined as
a i j = 1 , ( i j ) ; a i j = 0 , ( i = j )
To determine whether BBA m i ( · ) obtained by a faulty sensor is reliable or not, the credibility should be tested. If the following condition holds, m i ( · ) is considered as a unreliable evidence.
C r d ¯ C r d i C r d i 1
Once the BBA m i is considered as unreliable, the connection between m i and other BBAs will be disconnected. Correspondingly, a i j ( j i ) and a j i ( j i ) will be replaced by 0. The modified graph will represent the interaction between evidence, and the last BBAs will be fused following this information flow, which is detailed in the next section.

4. The Proposed Method

The previous descriptions provided sufficient theoretical preparation for the fusion problem considered in this paper. Thus, a new networked method is presented to process the fusion problems in this section, which contains the following procedures. Firstly, the credibility degree of evidence can be measured via Jousselme’s distance. Secondly, by means of the relative significance hidden in the credibility, the transmission relationship between evidence can be generated, in which the impact of faulty information is reduced. Lastly, following the evidence interaction flows, the fusion result can be obtained through Dempster’s combination rules by two rounds. The procedures of the proposed approach are depicted in Figure 1.

4.1. Calculate the Credibility Degree of the Evidence

As mentioned above, it is necessary to take advantage of the signals provided by credibility degree. Hence, the credibility degree of the evidence will be obtained via the following steps.
  • Step 1-1: By mean of Jousselme’s distance, the divergence measure matrix DMM can be constructed as (10).
  • Step 1-2: For m i , the average distance A D i from other evidence can be calculated by
    A D i = j = 1 , j i k d i j k 1 , 1 i k ; 1 j k
  • Step 1-3: The support degree S u p i of m i is defined as
    S u p i = 1 A D i , 1 i k
  • Step 1-4: The credibility degree C r d i of m i is calculated by
    C r d i = S u p i j = 1 k S u p j , 1 i k

4.2. Generate the Evidence Transmission Relationship

Now, we obtained the credibility of the evidence. According to the conception of the proposed method, the transmission relationship between evidence can be established as follows.
  • Step 2-1: For each evidence, the credibility degree is tested by (14).
  • Step 2-2: For evidence m i satisfying (14), replace a i j ( j i ) and a j i ( j i ) in (13) by 0.
  • Step 2-3: In accordance with the modified adjacency matrix A , the interaction graph G between evidence is constructed.

4.3. Fusion along the Flows of Evidence Interaction

The interaction graph between the evidence is now generated; it is time to fuse the evidence and obtain the combination result via the steps below.
  • Step 3-1: For each evidence m i in connected part of the interaction graph G , fuse evidence m i and evidence connected to m i directly via the Dempster’s combination rule (6); the fusion result is represented as process evidence m i ̲ .
  • Step 3-2: All process evidence obtained in the previous step are fused via Dempster’s combination rule (6). Hence, the final combination result is obtained.
As explained above, the proposed method still belongs to the second scheme introduced in Section 1. In the preprocess, credibility is calculated as a standard to measure the relative importance of evidence like many previous works. However, different from the previous weighting operations, the weighting is represented from another perspective in the form of the evidence interaction graph in the proposed method. The reason for utilizing the evidence interaction graph is that we attend to express and process the multi-data fusion problems in the form of networks. Furthermore, the unreliable evidence is weeded out after the credibility test, which prevents the false evidence from adversely affecting the outcome. As described in this section, the proposed method is theoretically feasible. To verify the feasibility of the proposed method in applications, examples are given in the next section.

5. Example Illustration

In order to demonstrate the effectiveness of the proposed method, two application cases from [33,39] are illustrated in this section.

5.1. Case 1

  • Problem statement
Consider a target recognition problem associated with sensor reports collected from five different types of sensors. It should be noted that this is a fictitious example, and target A is supposed as the real target. These sensor reports, which are modeled as the BBAs, are given in Table 1 from [33], where the FOD U that consists of three potential objects is given by U = A , B , C .
  • The fusion approach
  • Step 1-1: Construct the divergence measure matrix D M M = ( d i j ) k × k as follows:
    D M M = 0 0.5386 0.3495 0.3257 0.3311 0.5386 0 0.8142 0.7850 0.7906 0.3495 0.8142 0 0.0300 0.0374 0.3257 0.7850 0.0300 0 0.0354 0.3311 0.7906 0.0374 0.0354 0
  • Step 1-2: Obtain the average evidence distance A D i of m i as:
    A D 1 = 0.3862 A D 2 = 0.7321 A D 3 = 0.3078 A D 4 = 0.2940 A D 5 = 0.2986
  • Step 1-3: Calculate the support degree of m i as:
    S u p 1 = 2.5892 S u p 2 = 1.3659 S u p 3 = 3.2491 S u p 4 = 3.4011 S u p 5 = 3.3490
  • Step 1-4: Compute the credibility degree of m i as:
    C r d 1 = 0.1855 C r d 2 = 0.0979 C r d 3 = 0.2328 C r d 4 = 0.2437 C r d 5 = 0.2400
  • Step 2-1: Calculate the test value T v i of the credibility degree of m i as:
    T v 1 = 0.0782 T v 2 = 1.0429 T v 3 = 0.1409 T v 4 = 0.1793 T v 5 = 0.1667
  • Step 2-2: Modify the adjacency matrix A to A :
    A = 0 0 1 1 1 0 0 0 0 0 1 0 0 1 1 1 0 1 0 1 1 0 1 1 0
  • Step 2-3: Generate the interaction graph G between evidence as Figure 2.
  • Step 3-1: Fuse the connected evidence via the Dempster’s rule of combination; the process evidence m i ̲ is computed. Since the connection graph is modified by a full connected graph, the process evidence generated by the proposed method is also the same. The process evidence m 1 ̲ is shown as follows:
    m 1 ̲ ( A ) = 0.9649 m 1 ̲ ( B ) = 0.0006 m 1 ̲ ( C ) = 0.0344 m 1 ̲ ( A , C ) = 0.0000
  • Step 3-2: Fuse the process evidence via Dempster’s combination rule; the fusion results are shown in Table 2.
The more precise results of the proposed method are exhibited bellow.
m ( A ) = 0.999998 m ( B ) = 1.866277 × 10 13 m ( C ) = 1.623702 × 10 6 m ( A , C ) = 2.134348 × 10 33 m ( A , B , C ) = 4.299348 × 10 17
  • Discussion
From Case 1, we notice that m 2 is the highly conflicting evidence with others. The fusing results obtained by different combination methods are presented in Table 2. As shown in Table 2, except Dempster’s combination rule [13], Dubois and Prade’s method [24], PCR6 method [26], Murphy’s method [28], Deng et al.’s method [29], Yuan et al.’s method [30], Xiao’s method [33] and the proposed method all identify the correct target. Among the results shown in Table 2, after fusion by two rounds, the proposed method has the closest support to 1for target A, which demonstrates the proposed method is effective when conflicting evidence exists. In fact, by excluding the untrustworthy evidence from the connection graph, the adverse effects are greatly eliminated, so that the fusion of reliable evidence is reinforced from the other side.

5.2. Case2

  • The decision-making application
In this subsection, an application case from [39] is considered, which was evaluated through a series of experiments implemented in the Internet of Things (IoT) and smart building projects by the CERIST-ALGERIA research center laboratory. In this scenario, 4 sensors are installed to monitor ambient light to optimize electrical lighting and energy control, and 4 hypotheses are defined as follows. H 1 : The office is occupied and the lighting value exceeds 580 lx; H 2 : The office is idle and the lighting value exceeds 580 lx; H 3 : The office is occupied and the lighting value does not exceed 580 lx; and H 4 : The office is empty and the lighting value does not exceed 580 lx. Ten percent of belief was assigned to θ to estimate the impact of the environment on evidence generation. The BBAs collected by four sensors are shown in Table 3.
  • The fusion approach
  • Step 1-1: Construct the divergence measure matrix D M M = ( d i j ) k × k as follows:
    D M M = 0 0.0973 0.0909 0.0948 0.0973 0 0.1046 0.1217 0.0909 0.1046 0 0.0201 0.0948 0.1217 0.0201 0
  • Step 1-2: Obtain the average evidence distance A D i of m i as:
    A D 1 = 0.0944 A D 2 = 0.1079 A D 3 = 0.0719 A D 4 = 0.0789
  • Step 1-3: Calculate the support degree of m i as:
    S u p 1 = 10.5982 S u p 2 = 9.2687 S u p 3 = 13.9153 S u p 4 = 12.6745
  • Step 1-4: Compute the credibility degree of m i as:
    C r d 1 = 0.2281 C r d 2 = 0.1995 C r d 3 = 0.2995 C r d 4 = 0.2728
  • Step 2-1: Calculate the test value T v i of the credibility degree of m i as:
    T v 1 = 0.0959 T v 2 = 0.2531 T v 3 = 0.1654 T v 4 = 0.0837
  • Step 2-2: Modify the adjacency matrix A to A :
    A = 0 1 1 1 1 0 1 1 1 1 0 1 1 1 1 0
  • Step 2-3: Generate the interaction graph G between evidence as Figure 3.
  • Step 3-1: Fuse the connected evidence via the Dempster’s rule of combination; the process evidence m i ̲ is computed. Since the connection graph is modified by a fully connected graph, the process evidence generated by the proposed method is also the same. The process evidence m 1 ̲ is shown as follows:
    m 1 ̲ ( H 1 ) = 0.9919 m 1 ̲ ( H 2 ) = 0.0026 m 1 ̲ ( H 3 ) = 0.0051 m 1 ̲ ( H 4 ) = 0.0001
  • Step 3-2: Fuse the process evidence via Dempster’s combination rule; the fusion results are shown in Table 4.
The more precise results of the proposed method are exhibited bellow.
m ( H 1 ) = 0.999999 m ( H 2 ) = 6.923081 × 10 11 m ( H 3 ) = 8.412098 × 10 10 m ( H 4 ) = 2.165541 × 10 14 m ( θ ) = 4.952586 × 10 15
  • Discussion
From case 2, we notice that there is low conflict between the evidence. As shown in Table 4, in this usual case without strong conflicts, all methods identify the correct target. Additionally, the proposed method has the highest support for target H 1 .

6. Conclusions

In this paper, a networked method to handle information fusion problems was proposed by taking the evidence interaction graph and DST into account. The original purpose is twofold. One is to reduce the impact of conflicting evidence on fusion, and the other is to realize information fusion in the way of multi-agent systems achieving consensus. However, even if the communication topology is established, the difference between evidence and the relative neighboring error between multi-agents is not the same, and the fusion between evidence and the collaborative control of multi-agent systems cannot be carried out in the same way. As a result, only the first goal was achieved, i.e., the influence of conflicting evidence generated by various reasons on fusion was reduced, but the collaborative method between evidence still needs to be explored. In summary, the proposed fusion method is an attempt to bring information fusion into a part of networked systems, which provides a new inspiration for information fusion and networked systems. However, while the fusion performance is satisfactory, the amount of calculation is also significantly increased. In the future, we intend to develop some new rules for modifying evidence connections. In particular, by reducing the number of connected edges or making the connection weights of the edges more refined, we will try to achieve the purpose of reducing computation.

Author Contributions

Conceptualization, Q.L., Z.L. and Z.C.; methodology, Q.L.; writing—original draft preparation, Q.L.; writing—review and editing, Z.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Tianjin Natural Science Foundation of China (grant no. 20JCYBJC01060), the National Natural Science Foundation of China (grant no. 62103203, grant no. 61973175) and the Fundamental Research Funds for the Central Universities, Nankai University (grant no. 63221218).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Vandecasteele, F.; Merci, B.; Verstockt, S. Reasoning on multi-sensor geographic smoke spread data for fire development and risk analysis. Fire Saf. J. 2016, 86, 65–74. [Google Scholar] [CrossRef]
  2. Zhang, L.; Wu, X.; Zhu, H.; AbouRizk, S.M. Perceiving safety risk of buildings adjacent to tunneling excavation: An information fusion approach. Autom. Constr. 2017, 73, 88–101. [Google Scholar] [CrossRef]
  3. Hang, J.; Zhang, J.; Cheng, M. Fault diagnosis of wind turbine based on multi-sensors information fusion technology. Iet Renew. Power Gener. 2014, 8, 289–298. [Google Scholar] [CrossRef]
  4. Jiang, W.; Xie, C.; Zhuang, M.; Shou, Y.; Tang, Y. Sensor data fusion with z-numbers and its application in fault diagnosis. Sensors 2016, 16, 1509. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Dong, M.; He, D. Hidden semi-Markov model-based methodology for multi-sensor equipment health diagnosis and prognosis. Eur. J. Oper. Res. 2007, 178, 858–878. [Google Scholar] [CrossRef]
  6. Yang, F.; Wei, H. Fusion of infrared polarization and intensity images using support value transform and fuzzy combination rules. Infrared Phys. Technol. 2013, 60, 235–243. [Google Scholar] [CrossRef]
  7. Shen, X.; Varshney, P.K. Sensor selection based on generalized information gain for target tracking in large sensor networks. IEEE Trans. Signal Process. 2013, 62, 363–375. [Google Scholar] [CrossRef] [Green Version]
  8. Walczak, B.; Massart, D. Rough sets theory. Chemom. Intell. Lab. Syst. 1999, 47, 1–16. [Google Scholar] [CrossRef]
  9. Shen, L.; Tay, F.E.; Qu, L.; Shen, Y. Fault diagnosis using rough sets theory. Comput. Ind. 2000, 43, 61–72. [Google Scholar] [CrossRef]
  10. Zadeh, L.A. Fuzzy sets. In Fuzzy Sets, Fuzzy Logic, and Fuzzy Systems: Selected Papers by Lotfi A Zadeh; World Scientific: Singapore, 1996; pp. 394–432. [Google Scholar]
  11. Liu, H.C.; Liu, L.; Lin, Q.L. Fuzzy failure mode and effects analysis using fuzzy evidential reasoning and belief rule-based methodology. IEEE Trans. Reliab. 2013, 62, 23–36. [Google Scholar] [CrossRef]
  12. Jiang, W.; Wei, B. Intuitionistic fuzzy evidential power aggregation operator and its application in multiple criteria decision-making. Int. J. Syst. Sci. 2018, 49, 582–594. [Google Scholar] [CrossRef]
  13. Dempster, A.P. Upper and lower probabilities induced by a multivalued mapping. In Classic Works of the Dempster-Shafer Theory of Belief Functions; Springer: Berlin/Heidelberg, Germany, 2008; pp. 57–72. [Google Scholar]
  14. Shafer, G. A Mathematical Theory of Evidence; Princeton University Press: Princeton, NJ, USA, 1976; Volume 42. [Google Scholar]
  15. Deng, X.; Han, D.; Dezert, J.; Deng, Y.; Shyr, Y. Evidence combination from an evolutionary game theory perspective. IEEE Trans. Cybern. 2015, 46, 2070–2082. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  16. Zadeh, L.A. A note on Z-numbers. Inf. Sci. 2011, 181, 2923–2932. [Google Scholar] [CrossRef]
  17. Kang, B.; Chhipi-Shrestha, G.; Deng, Y.; Hewage, K.; Sadiq, R. Stable strategies analysis based on the utility of Z-number in the evolutionary games. Appl. Math. Comput. 2018, 324, 202–217. [Google Scholar] [CrossRef]
  18. Deng, X.; Hu, Y.; Deng, Y.; Mahadevan, S. Environmental impact assessment based on D numbers. Expert Syst. Appl. 2014, 41, 635–643. [Google Scholar] [CrossRef]
  19. Xiao, F. An intelligent complex event processing with numbers under fuzzy environment. Math. Probl. Eng. 2016, 2016, 1–10. [Google Scholar]
  20. Smets, P. Decision making in the TBM: The necessity of the pignistic transformation. Int. J. Approx. Reason. 2005, 38, 133–147. [Google Scholar] [CrossRef] [Green Version]
  21. Dezert, J.; Smarandache, F. A new probabilistic transformation of belief mass assignment. In Proceedings of the 2008 11th International Conference on Information Fusion, Cologne, Germany, 30 June–3 July 2008; pp. 1–8. [Google Scholar]
  22. Zadeh, L.A. A simple view of the Dempster-Shafer theory of evidence and its implication for the rule of combination. AI Mag. 1986, 7, 85. [Google Scholar]
  23. Yager, R.R. On the Dempster-Shafer framework and new combination rules. Inf. Sci. 1987, 41, 93–137. [Google Scholar] [CrossRef]
  24. Dubois, D.; Prade, H. Representation and combination of uncertainty with belief functions and possibility measures. Comput. Intell. 1988, 4, 244–264. [Google Scholar] [CrossRef]
  25. Smets, P. The combination of evidence in the transferable belief model. IEEE Trans. Pattern Anal. Mach. Intell. 1990, 12, 447–458. [Google Scholar] [CrossRef]
  26. Martin, A.; Osswald, C. A new generalization of the proportional conflict redistribution rule stable in terms of decision. In Advances and Applications of DSmT for Information Fusion: Collected Works Volume 2; American Research Press: New York, NY, USA, 2006; Volume 2, pp. 69–88. [Google Scholar]
  27. Smarandache, F.; Dezert, J. Advances and Applications of DSmT for Information Fusion, Vol. IV: Collected Works; American Research Press: New York, NY, USA, 2015. [Google Scholar]
  28. Murphy, C.K. Combining belief functions when evidence conflicts. Decis. Support Syst. 2000, 29, 1–9. [Google Scholar] [CrossRef]
  29. Yong, D.; WenKang, S.; ZhenFu, Z.; Qi, L. Combining belief functions based on distance of evidence. Decis. Support Syst. 2004, 38, 489–493. [Google Scholar] [CrossRef]
  30. Yuan, K.; Xiao, F.; Fei, L.; Kang, B.; Deng, Y. Conflict management based on belief function entropy in sensor fusion. SpringerPlus 2016, 5, 1–12. [Google Scholar] [CrossRef] [Green Version]
  31. Yang, B.; Gan, D.; Tang, Y.; Lei, Y. Incomplete Information Management Using an Improved Belief Entropy in Dempster-Shafer Evidence Theory. Entropy 2020, 22, 993. [Google Scholar] [CrossRef]
  32. Xiao, F. Evidence combination based on prospect theory for multi-sensor data fusion. ISA Trans. 2020, 106, 253–261. [Google Scholar] [CrossRef]
  33. Xiao, F. Multi-sensor data fusion based on the belief divergence measure of evidences and the belief entropy. Inf. Fusion 2019, 46, 23–32. [Google Scholar] [CrossRef]
  34. Sader, M.; Chen, Z.; Liu, Z.; Deng, C. Distributed robust fault-tolerant consensus control for a class of nonlinear multi-agent systems with intermittent communications. Appl. Math. Comput. 2021, 403, 126166. [Google Scholar] [CrossRef]
  35. Liu, J.; Tang, Y. Conflict data fusion in a multi-agent system premised on the base basic probability assignment and evidence distance. Entropy 2021, 23, 820. [Google Scholar] [CrossRef]
  36. Olfati-Saber, R.; Fax, J.A.; Murray, R.M. Consensus and cooperation in networked multi-agent systems. Proc. IEEE 2007, 95, 215–233. [Google Scholar] [CrossRef] [Green Version]
  37. Ren, W.; Beard, R.W.; Atkins, E.M. A survey of consensus problems in multi-agent coordination. In Proceedings of the 2005 American Control Conference, Portland, OR, USA, 8–10 June 2005; pp. 1859–1864. [Google Scholar]
  38. Jousselme, A.L.; Grenier, D.; Bossé, É. A new distance between two bodies of evidence. Inf. Fusion 2001, 2, 91–101. [Google Scholar] [CrossRef]
  39. Wang, H.; Deng, X.; Jiang, W.; Geng, J. A new belief divergence measure for Dempster–Shafer theory based on belief and plausibility function and its application in multi-source data fusion. Eng. Appl. Artif. Intell. 2021, 97, 104030. [Google Scholar] [CrossRef]
  40. Jiang, W.; Wei, B.; Xie, C.; Zhou, D. An evidential sensor fusion method in fault diagnosis. Adv. Mech. Eng. 2016, 8, 1–7. [Google Scholar] [CrossRef]
Figure 1. The flowchart of the proposed method.
Figure 1. The flowchart of the proposed method.
Entropy 25 00069 g001
Figure 2. The interaction graph generated by the proposed method.
Figure 2. The interaction graph generated by the proposed method.
Entropy 25 00069 g002
Figure 3. The interaction graph generated by the proposed method.
Figure 3. The interaction graph generated by the proposed method.
Entropy 25 00069 g003
Table 1. The basic belief assignments for multi-sensor-based target recognition. (Reprinted from [33] Copyright (2022), with permission from Elsevier).
Table 1. The basic belief assignments for multi-sensor-based target recognition. (Reprinted from [33] Copyright (2022), with permission from Elsevier).
BBA ABC A , C
m 1 0.410.290.300.00
m 2 0.000.900.100.00
m 3 0.580.070.000.35
m 4 0.550.100.000.35
m 5 0.600.100.000.30
Table 2. Combination results of the evidence in terms of different combination rules.
Table 2. Combination results of the evidence in terms of different combination rules.
MethodABC A , C Target
Dempster [13]0.00000.14220.85780.0000C
Dubois and Prade [24]0.75040.01600.01580.0832A
PCR6 [26]0.45180.36240.04380.1420A
Murphy [28]0.96200.02100.01380.0032A
Deng et al. [29]0.98200.00390.01070.0034A
Yuan et al. [30]0.98860.00020.00720.0039A
Xiao [33]0.99050.00020.00610.0043A
Proposed method1.00000.00000.00000.0000A
Table 3. The basic belief assignments for IoT decision making. (Reprinted from [39] Copyright (2022), with permission from Elsevier).
Table 3. The basic belief assignments for IoT decision making. (Reprinted from [39] Copyright (2022), with permission from Elsevier).
BBA H 1 H 2 H 3 H 4 θ
m 1 0.6480.1530.0900.0090.100
m 2 0.6210.0720.1980.0090.100
m 3 0.7290.0540.0990.0180.100
m 4 0.7470.0630.0810.0090.100
Table 4. Combination results of the evidence for case 2.
Table 4. Combination results of the evidence for case 2.
BBA H 1 H 2 H 3 H 4 Target
Dempster [13]0.99180.00270.00510.0001 H 1
Dubious and Prade [24]0.77040.01100.02000.0003 H 1
PCR6 [26]0.91580.02460.04280.0005 H 1
Xiao [33]0.99190.00260.00510.0001 H 1
Jiang et al. [40]0.99080.00300.00580.0001 H 1
Wang et al. [39]0.99210.00250.00500.0001 H 1
Proposed method1.00000.00000.00000.0000 H 1
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liang, Q.; Liu, Z.; Chen, Z. A Networked Method for Multi-Evidence-Based Information Fusion. Entropy 2023, 25, 69. https://doi.org/10.3390/e25010069

AMA Style

Liang Q, Liu Z, Chen Z. A Networked Method for Multi-Evidence-Based Information Fusion. Entropy. 2023; 25(1):69. https://doi.org/10.3390/e25010069

Chicago/Turabian Style

Liang, Qian, Zhongxin Liu, and Zengqiang Chen. 2023. "A Networked Method for Multi-Evidence-Based Information Fusion" Entropy 25, no. 1: 69. https://doi.org/10.3390/e25010069

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop