Next Article in Journal
A Radiometric Technique for Monitoring the Desulfurization Process of Blister Copper
Next Article in Special Issue
Classification of Skin Disease Using Deep Learning Neural Networks with MobileNet V2 and LSTM
Previous Article in Journal
Non-Communication Decentralized Multi-Robot Collision Avoidance in Grid Map Workspace with Double Deep Q-Network
Previous Article in Special Issue
An Energy-Efficient and Secure Data Inference Framework for Internet of Health Things: A Pilot Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Complex Pignistic Transformation-Based Evidential Distance for Multisource Information Fusion of Medical Diagnosis in the IoT

School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
Sensors 2021, 21(3), 840; https://doi.org/10.3390/s21030840
Submission received: 28 December 2020 / Revised: 18 January 2021 / Accepted: 18 January 2021 / Published: 27 January 2021

Abstract

:
Multisource information fusion has received much attention in the past few decades, especially for the smart Internet of Things (IoT). Because of the impacts of devices, the external environment, and communication problems, the collected information may be uncertain, imprecise, or even conflicting. How to handle such kinds of uncertainty is still an open issue. Complex evidence theory (CET) is effective at disposing of uncertainty problems in the multisource information fusion of the IoT. In CET, however, how to measure the distance among complex basis belief assignments (CBBAs) to manage conflict is still an open issue, which is a benefit for improving the performance in the fusion process of the IoT. In this paper, therefore, a complex Pignistic transformation function is first proposed to transform the complex mass function; then, a generalized betting commitment-based distance (BCD) is proposed to measure the difference among CBBAs in CET. The proposed BCD is a generalized model to offer more capacity for measuring the difference among CBBAs. Additionally, other properties of the BCD are analyzed, including the non-negativeness, nondegeneracy, symmetry, and triangle inequality. Besides, a basis algorithm and its weighted extension for multi-attribute decision-making are designed based on the newly defined BCD. Finally, these decision-making algorithms are applied to cope with the medical diagnosis problem under the smart IoT environment to reveal their effectiveness.

1. Introduction

The Internet of Things (IoT) refers to a very large network, which connects various devices for intelligent identification, locating, tracking, monitoring, and management [1,2]. Thanks to the development of information and communication technologies, the IoT is becoming ubiquitous in all kinds of applications. On the other hand, it is well known that clinical medical service is complex, in which the collection, preservation, analysis, and fusion of patient information takes much time and labor many materials [3,4]. Furthermore, traditional medical systems cannot diagnose patients with a high level decision-making due to a single information source, and this affects the quality of clinical medical service. Therefore, the emergence of the IoT becomes a milestone in the field of the digital medical domain. Medical diagnosis under the smart IoT environment can send physiological information and medical signals through communication networks to monitoring systems for analyzing and diagnosing with the aid of artificial intelligence techniques [5,6,7]. Consequently, it is beneficial for improving clinical medical services and lowering management costs, so that it can help to make better lifestyle and disease prevention plans and personalized medical services for patients [8,9]. In particular, in the data processing of the medical IoT, data fusion technology under uncertain environment plays a very important role, which is effective for processing mass data from multiple sources to better support medical decision-making. Hence, in this paper, we focus on improving the performance of the fusion process under an uncertain medical IoT.
As is well known, Dempster–Shafer evidence theory (DSET) [10,11] has several desirable characteristics to deal with the uncertainty problem. To be specific, the mass function (MF), also called basis belief assignment (BBA), in DSET can express uncertainty quantitatively [12]. Additionally, the Dempster rule of combination (DRC) in DSET can fuse multisource information to reduce uncertainty in the fusion process for supporting decision-making well [13,14,15]. Meanwhile, the DRC meets commutative and associative laws [16,17]. Hence, DSET has been extensively researched, including the aspects of D numbers [18,19], evidential reasoning [20], heuristic representation learning [21], entropy [22,23], generation [24,25], dependency [26], the negation [27] of BBAs, etc. [12]. In particular, DSET was recently well exploited by Xiao [28,29] for the complex plane for handling more complex uncertainty problems, called complex evidence theory (CET).
In CET [28,29], the classical MF is extended to the complex mass function, also called complex basis belief assignment (CBBA), to express uncertainty quantitatively, in which the complex mass function is expressed by complex numbers, not just positive real numbers. In addition, the classical DRC is generalized to fuse CBBAs to better support decision-making, which also satisfies commutative and associative laws. Therefore, since CET is complex-value modeled with the aid of the two dimensions of amplitude and phase, it is more capable of representing and handling uncertainty in the fusion process [30]. In particular, when CBBAs reduce to classical BBAs, CET degrades into DSET in the condition that the conflict coefficient is less than one. Consequently, CET affords a more generalized framework compared with the classical DSET.
In the classical DSET, distance plays an important role to measure the differences among BBAs, which is a benefit for conflict management. Many researchers dedicated much effort to address this problem in the past few decades [31,32], especially for the familiar distance of Jousselme et al. [33]. Subsequently, Jousselme and Maupin [34] provided a comprehensive survey on evidential distances. Later on, Bouchard et al. [35] proved a strict distance metric of Jousselme et al.’s distance. On the other hand, some scholars studied the difference measure from other perspectives, such as the correlation coefficient, and other hybrid models. For example, Jiang [36], Xiao [37], and Pan and Deng [38] researched the correlation coefficients among BBAs. Liu [39] analyzed the conflict degree by means of the conflict coefficient and distance among the betting commitments of BBAs. Even if the existing methods can well manage conflict problems in the classical DSET, very few of them have the ability to measure the difference among CBBAs in the complex plane framework of CET, except for the conflict coefficient [28,29] and complex evidential distance [40] of CET.
In this paper, inspired by Liu’s distance among the betting commitments of BBAs [39], a generalized betting commitment-based distance (BCD) is proposed to measure the difference among CBBAs in CET. To be specific, a complex Pignistic transformation is first proposed for not only singletons, but also subsets of CBBAs. Next, a betting commitment function is designed for all subsets of CBBAs on the basis of complex Pignistic transformation. Based on that, the distance among the betting commitments of CBBAs is devised to measure the difference among CBBAs. In particular, when CBBAs reduce to the classical BBAs, the BCD degenerates into Liu’s distance. Therefore, the proposed BCD is a generalized model to offer more capacity for measuring the difference among CBBAs. Additionally, other properties of the BCD are analyzed, including the non-negativeness, nondegeneracy, symmetry, and triangle inequality. It is then proven that the BCD is a strict distance metric because it satisfies distance axioms. Furthermore, BCD is compared with other related well-known methods to show its superiority. Besides, a basis algorithm and its weighted extension for multi-attribute decision-making are designed based on the newly defined BCD. Finally, these decision-making algorithms are applied to cope with the medical diagnosis problem under the smart IoT environment to reveal its effectiveness.
The contributions are summarized as follows:
  • This is the first work to propose the complex pignistic transformation-based evidential betting commitment distance (BCD) for the multisource information fusion of medical diagnosis in the IoT.
  • The BCD is a strict distance metric that satisfies the axioms of the nonnegativity, nondegeneracy, symmetry, and triangle inequality, which is a generalization of the classical evidential distance of Liu.
  • A basis algorithm and its weighted extension for decision-making are designed on the basis of the BCD, which are applied to the medical IoT to demonstrate their effectiveness.
This paper is organized as follows. The preliminaries are introduced in Section 2. A new conflict measure model is proposed in Section 3. Section 4 provides several examples for the comparison and analysis of the proposed distance with other well-known methods. In Section 5, a basis multi-attribute decision-making algorithm and its extension are designed; then, they are applied to address the problem of medical diagnosis. Finally, Section 6 gives the conclusion.

2. Preliminaries

2.1. Medical IoT

A variety of publications have been presented to handle the problems of the medical IoT. The medical IoT technologies are mainly classified into two ares: remote monitoring and big data analysis [41].
For remote monitoring in the medical IoT, remote health checking and real-time location service are the key mechanisms. The sensor-based devices continuously record physiological signals with regard to the patient and then transfer the collected data to a monitoring server. Distant health care checking can be implemented via applications that get physiological data from patients. The collected data will be analyzed and processed according to smart algorithms to better support decision-making. Researchers have studied remote monitoring in the medical IoT from different perspectives. For example, Hossain and Muhammad [42] presented a health IoT-enabled monitoring framework, in which medical data are gathered through mobile devices and sensors and then securely transmitted to the cloud for seamless access by medical professionals. Gómez et al. [43] developed an architecture on the basis of an ontology to monitor health and workout routine recommendations to patients. Abawajy and Hassan [44] presented a pervasive patient health monitoring system infrastructure on the basis of integrated cloud computing and IoT technologies.
For big data analysis in the medical IoT, its purpose is to investigate and offer effective service. Due to accessing patient data both in routine clinical visits and at home, how to manage big data must be considered in accordance with data collection, data computing, analysis, and safety. Many researchers put forward various methods in this area. For instance, He and Zeadally [45] discussed the security requirements of RFID authentication schemes and presented a review of ECC-based RFID authentication schemes in terms of performance and security. Dimitrov [46] studied the medical IoT and big data in healthcare. Lomotey et al. [47] exploited an enhanced Petri nets service model to help for tracing medical data generation, tracking, and detecting data compromises. Zhang [48] devised a medical data fusion algorithm on the basis of the IoT. Dautov et al. [49] studied hierarchical data fusion for smart healthcare.
Through a careful analysis of existing publications, it is found that there is no research studying the data fusion problem of the medical IoT in the framework of complex evidence theory. Therefore, this work provides an alternative promising way to model and fuse medical data by means of complex evidence theory.

2.2. Uncertainty Modeling and Information Fusion

Multisource information fusion has received much attention in the past few years [50,51,52]. Because of the impacts of devices, the external environment, and communication problems, the collected information may be uncertain, imprecise, or even conflicting. How to handle such kinds of uncertainty is still an open issue [53,54]. So far, various theories and their corresponding methods have been exploited, such as the extended fuzzy probability [55], soft sets [56,57,58], interval numbers [59], evidence theory [60], Z numbers [61,62], complex distributions [63,64], complex intuitionistic fuzzy sets [65], quantum-based [66,67], and others [68,69], as well as the consensus measure [70]. These methods were applied in various fields, like medical diagnosis [71] and decision-making [72].
Among them, evidence theory provides a belief function to model uncertainty and Dempster’s rule of combination for the fusion of multisource information, so that it is effective in dealing with uncertain problems in information and has been applied in many areas [73], including classification [74,75], decision-making [76], and evaluation [77,78,79]. Specifically, CET inherits the merits of DSET and has a greater ability to represent and handle uncertainty in the fusion process, which will be introduced in the next section.

2.3. Complex Evidence Theory

The essential concepts of CET are introduced below [28,29].
Definition 1. (Frame of discernment)
Let Φ be a frame of discernment (FOD), which is composed of:
Φ = { ϕ 1 , , ϕ j , , ϕ n } ,
where the elements in Φ are exclusive and collective, but not empty. The power set of Φ is expressed by:
2 Φ = { , { ϕ 1 } , { ϕ 2 } , , { ϕ n } , { ϕ 1 , ϕ 2 } , , { ϕ 1 , ϕ 2 , , ϕ i } , , ϕ } ,
in whichis the empty set.
If A i 2 Φ , A i is defined as a hypothesis, also called a proposition.
Definition 2. (Complex mass function)
A complex mass function (CMF), also called a CBBA, denoted as M in Φ, is defined as a mapping from 2 Φ to C :
M : 2 Φ C
satisfying:
M ( ) = 0 , M ( A i ) = m ( A i ) e i θ ( A i ) , A i Φ , A i 2 Φ M ( A i ) = 1 ,
in which i = 1 , m ( A i ) [ 0 , 1 ] represents the magnitude of M ( A i ) and θ ( A i ) [ π , π ] represents a phase term.
In Equation (4), M ( A i ) can also be expressed as:
M ( A i ) = x + y i , A i Φ
and:
| M ( A i ) | = m ( A i ) = x 2 + y 2 ,
in which x 2 + y 2 [ 0 , 1 ] .
Note that the value of | M ( A i ) | or m ( A i ) represents the degree to which the evidence supports A i .
Definition 3. (Focal element)
If | M ( A i ) | or m ( A i ) > 0 , A i is defined as a focal element.
Definition 4. (Complex Dempster’s rule of combination)
Let M h and M k be two independent CBBAs in Φ. The complex Dempster’s rule of combination (CDRC) is defined as M = M u M v :
M ( A k ) = 1 1 K A i A h = A k M u ( A i ) M v ( A h ) , A k , 0 , A k = ,
with:
K = A i A h = M u ( A i ) M v ( A h ) ,
in which A i , A h , A k 2 Φ ; K is the conflict coefficient between M u and M v ; | K | is used for the conflict measure between M u and M v .

2.4. | K | Versus Conflict

In this section, several numerical examples are provided to study the performance of | K | in CET for measuring the conflict. Specifically, in Examples 1 and 2, explicit explanations are given about how | K | expresses the conflict.
Example 1.
Consider two CBBAs M 1 and M 2 in FOD Φ = { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 } :
M 1 : M 1 ( { ϕ 1 , ϕ 2 } ) = 0.9055 e i arctan ( 0.1111 ) , M 1 ( { ϕ 3 } ) = 0.1414 e i arctan ( 1.0000 ) , M 1 ( { ϕ 4 } ) = 0 ; M 2 : M 2 ( { ϕ 1 , ϕ 2 } ) = 0 , M 2 ( { ϕ 3 } ) = 0.1414 e i arctan ( 1.0000 ) , M 2 ( { ϕ 4 } ) = 0.9055 e i arctan ( 0.1111 ) .
By using Equation (8), the following is generated:
| K | = 1.0002 .
From the given CBBAs M 1 and M 2 in Example 1, it is noticed that M 1 and M 2 have stronger support degrees of 0.9055 to hypotheses { ϕ 1 , ϕ 2 } and { ϕ 4 } , respectively. Since the two hypotheses { ϕ 1 , ϕ 2 } and { ϕ 4 } are incompatible, meaning that high conflict exists between M 1 and M 2 . Hence, the value 1.0002 of | K | can effectively reflect the conflict between M 1 and M 2 in this example.
Example 2.
Consider two CBBAs M 1 and M 2 in FOD Φ = { ϕ 1 , ϕ 2 , ϕ 3 } :
M 1 : M 1 ( { ϕ 1 } ) = 0.4123 e i arctan ( 0.2500 ) , M 1 ( { ϕ 1 , ϕ 2 } ) = 0.4123 e i arctan ( 0.2500 ) , M 1 ( { ϕ 1 , ϕ 2 , ϕ 3 } ) = 0.2 ; M 2 : M 2 ( { ϕ 1 } ) = 0.4123 e i arctan ( 0.2500 ) , M 2 ( { ϕ 1 , ϕ 2 } ) = 0.4123 e i arctan ( 0.2500 ) , M 2 ( { ϕ 1 , ϕ 2 , ϕ 3 } ) = 0.2 .
By using Equation (8), the following is generated:
| K | = 0 .
From the given CBBAs M 1 and M 2 in Example 2, it is noticed that M 1 and M 2 have support degrees of 0.4123 , 0.4123 , and 0.2 to hypotheses { ϕ 1 } , { ϕ 1 , ϕ 2 } , and { ϕ 1 , ϕ 2 , ϕ 3 } , respectively. Therefore, the result of | K | with the value of zero reflects nicely that M 1 and M 2 have completely the same beliefs.
Although | K | reflects the conflict between CBBAs very well in the above-discussed examples, it may not work in some certain situations. Example 3 illustrates such a case.
Example 3.
Consider two CBBAs M 1 and M 2 in FOD Φ = { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 } :
M 1 : M 1 ( { ϕ 1 } ) = 1 4 , M 1 ( { ϕ 2 } ) = 1 4 , M 1 ( { ϕ 3 } ) = 1 4 , M 1 ( { ϕ 4 } ) = 1 4 ; M 2 : M 2 ( { ϕ 1 } ) = 1 4 , M 2 ( { ϕ 2 } ) = 1 4 , M 2 ( { ϕ 3 } ) = 1 4 , M 2 ( { ϕ 4 } ) = 1 4 .
By using Equation (8), the following is generated:
| K | = 0.75 .
From the given CBBAs M 1 and M 2 in Example 3, it can be seen that M 1 and M 2 have the same support degrees of 1 4 to hypotheses { ϕ 1 } , { ϕ 2 } , { ϕ 3 } , and { ϕ 4 } , respectively. This means that M 1 and M 2 are completely the same as each other, so that the expected value of | K | should be zero. Therefore, the result of | K | with the value of 0.75 is counter-intuitive.
Consequently, this motivates designing a new conflict measure model for CBBAs in CET.

3. A New Conflict Measure Model

In this section, a complex Pignistic transformation is first defined. Based on the complex Pignistic transformation, a betting commitment function is proposed for all subsets of CBBAs. Then, a new distance model is designed by taking advantage of the betting commitment function. Furthermore, several corresponding examples are illustrated in terms of betting the commitment function.

3.1. Complex Pignistic Transformation

As discussed in Section 2.3, a complex mass function in CET is introduced. It is founded that making a decision is difficult on the basis of the complex belief function. Hence, a complex Pignistic transformation function [80] is proposed to transform the complex mass function to address this problem.
Definition 5. (Complex Pignistic transformation for ϕ j )
Let M be a complex mass function on FOD Φ and A i be a hypothesis with A i Φ . The complex Pignistic transformation function for ϕ j on Φ is defined by:
C P T ( ϕ j ) = A i Φ , ϕ j A i M ( A i ) | A i | , ϕ j Φ ,
where | A i | denotes the number of elements in A i .
In accordance with Definition 5, a complex Pignistic transformation function for A i on 2 Φ is defined below.
Definition 6. (Complex Pignistic transformation for A i )
A complex Pignistic transformation function for A i on 2 Φ is defined as:
C P T ( A i ) = ϕ j A i C P T ( ϕ j ) .
Corollary 1.
If M is a probability distribution P, then C P T is equal to P.
Then, Equations (9) and (10) can be integrated as in Definition 7.
Definition 7. (Complex Pignistic transformation)
Let M Φ be a complex mass function on FOD Φ. The complex Pignistic transformation function is defined by:
C P T ( A h ) = A i , A h Φ M ( A i ) | A i A h | | A h | ,
where | A i A h | represents the number of elements in the intersection A i A h ; | A h | denotes the number of elements in A h .
Based on Definition 7, a betting commitment function is defined to A h ( A h Φ ).
Definition 8. (Betting commitment)
The betting commitment to A h on FOD Φ is defined by:
B e t C ( A h ) = C P T ( A h ) , A h Φ ,
where | · | denotes the absolute value function.

3.2. Betting Commitment-Based Distance Versus Conflict

In the following Examples 4–6, explicit explanations are given about how the betting commitment to express the conflict.
Example 4.
Consider two CBBAs M 1 and M 2 defined in Example 1.
By using Equation (12), the following is generated:
B e t C M 1 ( { ϕ 1 , ϕ 2 } ) = 0.9055 , B e t C M 1 ( { ϕ 3 } ) = 0.1414 , B e t C M 1 ( { ϕ 4 } ) = 0.0000 ;
and
B e t C M 2 ( { ϕ 1 , ϕ 2 } ) = 0.0000 , B e t C M 2 ( { ϕ 3 } ) = 0.1414 , B e t C M 2 ( { ϕ 4 } ) = 0.9055 .
Through calculating the absolute value of the difference between B e t C M 1 and B e t C M 2 in Example 4, we get:
| B e t C M 1 ( { ϕ 1 , ϕ 2 } ) B e t C M 2 ( { ϕ 1 , ϕ 2 } ) | = 0.9055 , | B e t C M 1 ( { ϕ 3 } ) B e t C M 2 ( { ϕ 3 } ) | = 0.0000 , | B e t C M 1 ( { ϕ 4 } ) B e t C M 2 ( { ϕ 4 } ) | = 0.9055 .
On the other hand, by using Equation (8), the following is generated:
| K | = 1.0002 ,
which indicates the significant discrepancy between CBBAs M 1 and M 2 that satisfies the intuitive result.
In this context, | B e t C M 1 ( { ϕ 1 , ϕ 2 } ) B e t C M 2 ( { ϕ 1 , ϕ 2 } ) | and | B e t C M 1 ( { ϕ 4 } ) B e t C M 2 ( { ϕ 4 } ) | have the maximal value of 0.9055, which also reflects the discrepancy between CBBAs M 1 and M 2 significantly.
Example 5.
Consider two CBBAs M 1 and M 2 defined in Example 2.
By using Equation (12), the following is generated:
B e t C M 1 ( { ϕ 1 , ϕ 2 } ) = 0.6685 , B e t C M 1 ( { ϕ 3 } ) = 0.9333 , B e t C M 1 ( { ϕ 4 } ) = 1.0000 ;
and
B e t C M 2 ( { ϕ 1 , ϕ 2 } ) = 0.6685 , B e t C M 2 ( { ϕ 3 } ) = 0.9333 , B e t C M 2 ( { ϕ 4 } ) = 1.0000 .
Through calculating the absolute value of the difference between B e t C M 1 and B e t C M 2 in Example 4, we get:
| B e t C M 1 ( { ϕ 1 , ϕ 2 } ) B e t C M 2 ( { ϕ 1 , ϕ 2 } ) | = 0 , | B e t C M 1 ( { ϕ 3 } ) B e t C M 2 ( { ϕ 3 } ) | = 0 , | B e t C M 1 ( { ϕ 4 } ) B e t C M 2 ( { ϕ 4 } ) | = 0 .
On the other hand, by using Equation (8), the following is generated:
| K | = 0 ,
which indicates that CBBAs M 1 and M 2 have completely the same beliefs satisfying the intuitive result.
In this context, | B e t C M 1 ( { ϕ 1 , ϕ 2 } ) B e t C M 2 ( { ϕ 1 , ϕ 2 } ) | , | B e t C M 1 ( { ϕ 3 } ) B e t C M 2 ( { ϕ 3 } ) | , and | B e t C M 1 ( { ϕ 4 } ) B e t C M 2 ( { ϕ 4 } ) | have the minimal value of zero, which also reflects well that CBBAs M 1 and M 2 have completely the same beliefs.
Example 6.
Consider two CBBAs M 1 and M 2 defined in Example 3.
By using Equation (12), the following is generated:
B e t C M 1 ( { ϕ 1 } ) = 0.25 , B e t C M 1 ( { ϕ 2 } ) = 0.25 , B e t C M 1 ( { ϕ 3 } ) = 0.25 , B e t C M 1 ( { ϕ 4 } ) = 0.25 ;
and:
B e t C M 2 ( { ϕ 1 } ) = 0.25 , B e t C M 2 ( { ϕ 2 } ) = 0.25 , B e t C M 2 ( { ϕ 3 } ) = 0.25 , B e t C M 2 ( { ϕ 4 } ) = 0.25 .
Through calculating the absolute value of the difference between B e t C M 1 and B e t C M 2 in Example 6, we get:
| B e t C M 1 ( { ϕ 1 , ϕ 2 } ) B e t C M 2 ( { ϕ 1 , ϕ 2 } ) | = 0 , | B e t C M 1 ( { ϕ 3 } ) B e t C M 2 ( { ϕ 3 } ) | = 0 , | B e t C M 1 ( { ϕ 4 } ) B e t C M 2 ( { ϕ 4 } ) | = 0 .
On the other hand, by using Equation (8), the following is generated:
| K | = 0.75 ,
which indicates the significant discrepancy between CBBAs M 1 and M 2 .
However, as discussed in Section 2.4, this result of | K | in Example 6 is count-intuitive, since all the belief values of the focal elements of M 1 and M 2 are exactly the same.
Nevertheless, the values of | B e t C M 1 ( { ϕ 1 , ϕ 2 } ) B e t C M 2 ( { ϕ 1 , ϕ 2 } ) | , | B e t C M 1 ( { ϕ 3 } ) B e t C M 2 ( { ϕ 3 } ) | , and | B e t C M 1 ( { ϕ 4 } ) B e t C M 2 ( { ϕ 4 } ) | are equal to zero, which reflects that there is no discrepancy between CBBAs M 1 and M 2 . Therefore, this distance measure among the betting commitments of CBBAs satisfies our expectation.
Consequently, from Examples 4–6, it is learned that the distance model based on the betting commitment has a better performance for measuring conflict comparing with the classical | K | in CET. Taking this into consideration, a new distance measure is designed on the basis of the betting commitment function, which is defined below.
Definition 9. (Betting commitment-based distance of CBBAs)
Let M u and M v be two CBBAs on FOD Φ and A i be a hypothesis with A i Φ . The distance between betting commitments of CBBAs, called BCD, is defined by:
d B C D ( M u , M v ) = max A i Φ | B e t C M u ( A i ) B e t C M v ( A i ) | ,
where | · | denotes the absolute value function.
In Equation (13), the maximal differences among the betting commitments of CBBAs for all subsets are taken into account. The reason is that considering the conflict measure in Example 4, min or mean functions are not adequate to distinguish the difference among CBBAs compared with the max function.
In particular, when CBBAs M u and M v reduce to the classical BBAs m u and m v , M u = m u and M v = m v . Since:
d B C D ( M u , M v ) = max A i Φ | B e t C M u ( A i ) B e t C M v ( A i ) | = max A i Φ | | C P T M u ( A i ) | | C P T M v ( A i ) | | = max A i Φ A i , A h Φ M ( A i ) | A i A h | | A h | A i , A h Φ M ( A i ) | A i A h | | A h | ,
we have:
d B C D ( M u , M v ) = max A i Φ A i , A h Φ m ( A i ) | A i A h | | A h | A i , A h Φ m ( A i ) | A i A h | | A h | = max A i Φ A i , A h Φ m ( A i ) | A i A h | | A h | A i , A h Φ m ( A i ) | A i A h | | A h | .
In this case that M u = m u and M v = m v , Equation (14) can be expressed as:
d B C D ( M u , M v ) = max A i Φ | B e t C m u ( A i ) B e t C m v ( A i ) | ,
which is obviously the same as Liu’s distance measure d i f B e t P [39]. This means that when the CBBAs become the classical BBAs, the proposed BCD d B C D degenerates into Liu’s distance measure d i f B e t P .
Theorem 1.
The BCD d B C D is a generalized model of the traditional distance measure of Liu’s d i f B e t P [39].
Theorem 2.
The BCD d B C D is a strict distance metric.
Property 1.
Consider three arbitrary CBBAs: M u , M v , and M w . BCD d B C D holds the following properties:
P1.1 Nonnegativity: d B C D ( M u , M v ) 0 .
P1.2 Nondegeneracy: d B C D ( M u , M v ) = 0 if and only if M u = M v .
P1.3 Symmetry: d B C D ( M u , M v ) = d B C D ( M v , M u ) .
P1.4 Triangle inequality: d B C D ( M u , M w ) d B C D ( M u , M v ) + d B C D ( M v , M w ) .
Proof. (1) Consider two arbitrary CBBAs: M u and M v . According to Equation (13), it is obvious that d B C D ( M u , M v ) 0 , because of having the absolute value function.
(2) Consider two arbitrary CBBAs: M u = M v ; we get:
d B C D ( M u , M v ) = max A i Φ | B e t C M u ( A i ) B e t C M u ( A i ) | = 0 .
Next, consider d B C D ( M u , M v ) = 0 , then:
max A i Φ | B e t C M u ( A i ) B e t C M u ( A i ) | = 0 .
Thus, for A i Φ , we obtain:
M u ( A i ) = M v ( A i ) .
Hence, it is proven that d B C D ( M u , M v ) = 0 M u = M v .
(3) Consider two arbitrary CBBAs M u and M v ; we have d B C D ( M v , M u ) :
d B C D ( M u , M v ) = max A i Φ | B e t C M u ( A i ) B e t C M u ( A i ) |
Consider d B C D ( M v , M u ) ; we have:
d B C D ( M v , M u ) = max A i Φ | B e t C M v ( A i ) B e t C M u ( A i ) |
Thus, we obtain that:
d B C D ( M u , M v ) = d B C D ( M v , M u ) ,
which proves the property of symmetry.
(4) Consider three arbitrary CBBAs: M u , M v , and M w .
From the triangle inequality for real numbers, we have:
| B e t C M u ( A i ) B e t C M w ( A i ) | | B e t C M u ( A i ) B e t C M v ( A i ) | + | B e t C M v ( A i ) B e t C M w ( A i ) | ,
Through the nature of the max operation, we obtained that:
| B e t C M u ( A i ) B e t C M v ( A i ) | max A i Φ { | B e t C M u ( A i ) B e t C M v ( A i ) | } ,
and:
| B e t C M v ( A i ) B e t C M w ( A i ) | max A i Φ { | B e t C M v ( A i ) B e t C M w ( A i ) | } .
Thus,
| B e t C M u ( A i ) B e t C M v ( A i ) | + | B e t C M v ( A i ) B e t C M w ( A i ) | max A i Φ { | B e t C M u ( A i ) B e t C M v ( A i ) | } + max A i Φ { | B e t C M v ( A i ) B e t C M w ( A i ) | } .
Therefore,
d B C D ( M u , M w ) d B C D ( M u , M v ) + d B C D ( M v , M w ) .
 □

4. Comparisons and Analysis

In this section, the proposed conflict measure BCD is compared with other well-known methods of | K | [28,29], d C B B A [40], and d i f B e t P [39]. In addition, several examples are provided to illustrate their performance in terms of the conflict measure.
Example 7.
Consider two CBBAs: M 1 and M 2 , in Φ = { ϕ 1 , ϕ 2 , ϕ 3 , , ϕ 20 } :
M 1 : M 1 ( { ϕ 2 , ϕ 3 , ϕ 4 } ) = 0.5 2 + α 2 e i arctan ( α 0.5 ) , M 1 ( { ϕ 7 } ) = 0.05 , M 1 ( Φ ) = 0.1 , M 1 ( A i ) = 0.8 2 + α 2 e i arctan ( α 0.8 ) ; M 2 : M 2 ( { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 } ) = 1 .
In Example 7, hypothesis A i of M 1 changes from { ϕ 1 } to Φ as in Table 1. To be specific, M 1 has four focal elements: M 1 ( { ϕ 2 , ϕ 3 , ϕ 4 } ) , M 1 ( { ϕ 7 } ) , M 1 ( Φ ) , and M 1 ( A i ) . According to Equation (6) in Definition 2, 0 . 8 2 + α 2 must be less than or equal to one. Therefore, α is set as 0, 0.1, 0.3, to 0.5 here, and the values of M 1 ( { ϕ 2 , ϕ 3 , ϕ 4 } ) and M 1 ( A i ) change with α . M 2 has one focal element: M 2 ( { A , B , C , D , E } ) = 1 . Through utilizing | K | , d C B B A , d i f B e t P , and the proposed d B C D , their corresponding conflict measures between CBBAs M 1 and M 2 are depicted in Figure 1.
When α = 0 , this means that CBBA M 1 reduces to a classical BBA. From Figure 1a, it is clear that d B C D has exactly the same measure as d i f B e t P ; both of them have the same measure trends as d C B B A . In particular, as the hypothesis A i of M 1 increases from { ϕ 1 } to { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 } , the measure values of d C B B A , d i f B e t P , and d B C D go down. When A i = { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 } , the conflict measures of d C B B A , d i f B e t P , and d B C D achieve their minimal value. Subsequently, as hypothesis A i adds from { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 } to Φ , the conflict measures of d C B B A , d i f B e t P and d B C D get larger and larger. However, the conflict measure of | K | remains the same regardless of the change of hypothesis A i .
On the other hand, Figure 1b–d depicts how the conflict measures of different methods change with the variations of α = 0.1 , α = 0.3 , and α = 0.5 , respectively. It is obvious that no matter whether α = 0.1 , α = 0.3 , or α = 0.5 , d C B B A and d B C D can effectively measure the conflict between CBBAs M 1 and M 2 . Note that the conflict value of d C B B A is always larger than that of d B C D . The reason is that d B C D selects the maximal value of the difference between betting commitments to all subsets, but d C B B A is a kind of accumulating distance measure. Nevertheless, d i f B e t P cannot measure the conflict among CBBAs, while the conflict measure of | K | also remains the same despite the change of A i .
It can then be concluded that the methods of d C B B A and d B C D have better performance to measure the conflict among CBBAs than the d i f B e t P and | K | methods.
Example 8.
Consider two CBBAs M 1 and M 2 in FOD Φ = { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 } :
Case 1 : M 1 C 1 : M 1 C 1 ( { ϕ 1 , ϕ 2 } ) = 0.8062 e i arctan ( 0.1250 ) , M 1 C 1 ( { ϕ 3 } ) = 0.1414 e i arctan ( 1.0000 ) , M 1 C 1 ( { ϕ 4 } ) = 0.1 ; M 2 C 1 : M 2 C 1 ( { ϕ 1 , ϕ 2 } ) = 0.1 , M 2 C 1 ( { ϕ 3 } ) = 0.1414 e i arctan ( 1.0000 ) , M 2 C 1 ( { ϕ 4 } ) = 0.8062 e i arctan ( 0.1250 ) . Case 2 : M 1 C 2 : M 1 C 2 ( { ϕ 1 , ϕ 2 , ϕ 4 } ) = 0.8062 e i arctan ( 0.1250 ) , M 1 C 2 ( { ϕ 3 } ) = 0.1414 e i arctan ( 1.0000 ) , M 1 C 2 ( { ϕ 4 } ) = 0.1 ; M 2 C 2 : M 2 C 2 ( { ϕ 1 , ϕ 2 } ) = 0.1 , M 2 C 2 ( { ϕ 3 } ) = 0.1414 e i arctan ( 1.0000 ) , M 2 C 2 ( { ϕ 4 } ) = 0.8062 e i arctan ( 0.1250 ) . Case 3 : M 1 C 3 : M 1 C 3 ( { ϕ 1 } ) = 0.8062 e i arctan ( 0.1250 ) , M 1 C 3 ( { ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 } ) = 0.2236 e i arctan ( 0.5000 ) ; M 2 C 3 : M 2 C 3 ( Φ ) = 1 .
In Example 8, comparing the CBBAs of Case 1 with the CBBAs of Case 2 and Case 3, it is noticed that M 1 C 1 and M 2 C 1 are more conflicting with regard to their corresponding belief values than M 1 C 2 and M 2 C 1 , or M 1 C 3 and M 2 C 3 . This is because M 1 C 1 has a stronger belief value of 0.8062 to support { ϕ 1 , ϕ 2 } , but M 2 C 1 has a stronger belief value of 0.8062 to support { ϕ 4 } . Since { ϕ 1 , ϕ 2 } and { ϕ 4 } are incompatible, in accordance with our expectation, the conflict measure between M 1 C 1 and M 2 C 1 is supposed to be larger than that of M 1 C 2 and M 2 C 2 , or M 1 C 3 and M 2 C 3 .
By utilizing | K | , d C B B A , and d B C D , the three cases corresponding to the conflict measures among CBBAs: M 1 C 1 and M 2 C 1 , M 1 C 2 and M 2 C 2 , and M 1 C 3 and M 2 C 3 are measured as described in Table 2, respectively. Through careful analysis, the following interesting results are found:
R 1:
For | K | , it can be seen that it can measure well the conflict between CBBAs in Case 1 and Case 2 with values of 0.84 and 0.264, respectively. However, | K | cannot distinguish the difference among the CBBAs in Case 3 with a measure value of zero.
R 2:
For d C B B A , it is obvious that d C B B A can measure the conflicts among the CBBAs in Case 1, Case 2, and Case 3 with values of 0.7071, 0.5802, and 0.7242, respectively. Comparing the conflict value of 0.7071 between M 1 C 1 and M 2 C 1 and 0.7242 between M 1 C 3 and M 2 C 3 , it is noticed that the result of d C B B A ( M 1 C 3 , M 2 C 3 ) > d C B B A ( M 1 C 1 , M 2 C 1 ) is not up to our expectations.
R 3:
For d B C D , it is easy to see that d B C D can well measure the conflicts among the CBBAs in all three cases with values of 0.7062, 0.4380, and 0.6062, respectively. Comparing the conflict value of 0.7062 of d B C D ( M 1 C 1 , M 2 C 1 ) with 0.6062 of d B C D ( M 1 C 3 , M 2 C 3 ) , it is obtained that d B C D ( M 1 C 3 , M 2 C 3 ) < d B C D ( M 1 C 1 , M 2 C 1 ) . This result satisfies our expectation.
R 4:
It is concluded that the BCD d B C D is a better conflict measure compared with the methods of | K | and d C B B A to judge the contradiction among CBBAs.

5. Algorithm and Application

Multi-attribute decision-making has received much attention [81,82,83]. Because of the complexity of various applications, it is still an open issue to handle uncertainty in this field. In this section, a basis algorithm for multi-attribute decision-making is first designed based on the newly defined BCD. After that, the proposed basis algorithm is applied to deal with a medical diagnosis decision-making problem to show its feasibility. Furthermore, this basis algorithm is extended to a weighted scheme to better fit real applications by taking into consideration different weights with regard to multiple attributes. Finally, both the basis and weighted algorithms are compared with well-known related methods to demonstrate their effectiveness.

5.1. Algorithm for Decision-Making

Problem statement: Let X be a set of attributes: { a 1 , , a κ , , a η } and P be a set of patterns: { p 1 , , p j , , p g } modeled by CBBA p j = { a κ , M p j a κ ( { y } ) , M p j a κ ( { n } ) , M p j a κ ( { y , n } ) | a κ X } . Consider a set of samples: S = { s 1 , , s h , , s l } modeled by CBBA s h = { a κ , M s h a κ ( { y } ) , M s h a κ ( { n } ) , M s h a κ ( { y , n } ) | a κ X } . This algorithm for multi-attribute decision-making sorts the samples according to the given patterns.
Step 1:
The BCD d B C D is used to calculate the distance between s h and p j :
d B C D ( M s h , M p j ) = 1 η κ = 1 η d B C D ( M s h a κ , M p j a κ ) = 1 η κ = 1 η max A i Φ B e t C M s h a κ ( A i ) B e t C M p j a κ ( A i ) .
Step 2:
The minimal distance between M s h and M p j is elected:
d B C D ( M s h , M p θ ) = min 1 j g d B C D ( M s h , M p j ) .
Step 3:
s h is sorted into pattern p θ by:
θ = arg min 1 j m { d B C D ( M s h , M p j ) } , s h p θ .
The corresponding pseudo-code of multi-attribute decision-making is described in Algorithm 1.
Algorithm 1: Multi-attribute decision-making.
Sensors 21 00840 i001

5.2. Application in Medical Diagnosis Under the Smart IoT Environment

Background: Consider a medical diagnosis decision-making problem under the smart IoT environment with three disease types, each of which has three attributes. Specifically, the given disease types P = { p 1 , p 2 , p 3 } and to be determined s 1 in S in terms of three attributes { x 1 , x 2 , x 3 } are modeled by the CBBAs from the sensor data under the smart IoT environment, shown in Table 3 and Table 4, respectively. Then, we need to figure out which disease s 1 is most likely to suffer from { p 1 , p 2 , p 3 } .
The implementation of Algorithm 1 is illustrated as follows:
Step 1:
The BCDs between s 1 and p 1 , s 1 and p 2 , and s 1 and p 3 are calculated:
d B C D ( M s 1 , M p 1 ) = 0.2157 , d B C D ( M s 1 , M p 2 ) = 0.2337 , d B C D ( M s 1 , M p 3 ) = 0.1525 .
Step 2:
The minimal BCD is d B C D ( M s 1 , M p 3 ) :
d B C D ( M s 1 , M p 3 ) = 0.1525 .
Step 3:
s 1 is determined to be the most likely to suffer from the disease type of p 3 :
θ = 3 ; s 1 p 3 .
The distance measure through the proposed method is shown in Table 5 and Figure 2, which has the ranking: d B C D ( M s 1 , M p 3 ) < d B C D ( M s 1 , M p 1 ) < d B C D ( M s 1 , M p 2 ) . Hence, sample s 1 is sorted into pattern p 3 , which indicates that s 1 is most likely to suffer from the disease type of p 3 .

5.3. Extension and Comparison

In Section 5.2, a medical diagnosis decision-making algorithm on the basis of the uniform scheme of the BCD is studied. In this section, taking into account that various attributes may have different weights in accordance with specific applications, the basis algorithm is extended, denoted as d B C D w :
d B C D w ( M S k , M P j ) = i = 1 n w i d B C D ( M s h a κ , M p j a κ ) = i = 1 n w i max A i Φ B e t C M s h a κ ( A i ) B e t C M p j a κ ( A i ) ,
where i = 1 n w i = 1 .
It is worth noting that in Equation (19), w i can be determined according to specific applications, such as subjective weights provided by experts and objective weights calculated based on data-driven methods.
In order to validate the effectiveness of the proposed methods d B C D and d B C D w , both of them are compared with d C B B A and d C B B A w of Xiao’s method [28,29] and K ^ 1 = 1 K 1 , K ^ 2 = 1 K 2 , K ^ 3 = 1 K 3 , and K ^ 4 = 1 K 4 of Garg and Rani’s method [30]. In this application, the weight w i is set as [ 0.3 , 0.35 , 0.35 , 0.35 ] according to [30]. By implementing d B C D , d B C D w , d C B B A , d C B B A w , K ^ 1 , K ^ 2 , K ^ 3 , and K ^ 4 , the results are described in Table 5 and Table 6 and Figure 2.
To be specific, for d B C D w , Table 5 and Table 6 show that d B C D w ( M S , M P 1 ) = 0.2065 , d B C D w ( M S , M P 2 ) = 0.2303 , and d B C D w ( M S , M P 3 ) = 0.1551 , such that d B C D w ( M S , M P 3 ) < d B C D w ( M S , M P 1 ) < d B C D w ( M S , M P 2 ) . This result also means that s 1 is sorted into pattern p 3 , and it is most likely to suffer from the disease type of p 3 .
On the other hand, for d C B B A and d C B B A w , it can be seen that d C B B A ( M S , M P 3 ) = 0.1526 < d C B B A ( M S , M P 1 ) = 0.2256 < d C B B A ( M S , M P 2 ) = 0.2436 ; d C B B A w ( M S , M P 3 ) = 0.1553 < d C B B A w ( M S , M P 1 ) = 0.2165 < d C B B A w ( M S , M P 2 ) = 0.2400 . Hence, it is learned that both of the methods d C B B A and d C B B A w sort s 1 as pattern p 3 . Besides, for K ^ 1 , K ^ 2 , K ^ 3 , and K ^ 4 , it is obvious that K ^ 1 ( M S , M P 3 ) = 0.0249 < K ^ 1 ( M S , M P 2 ) = 0.0539 < K ^ 1 ( M S , M P 1 ) = 0.0907 ; K ^ 2 ( M S , M P 3 ) = 0.1838 < K ^ 2 ( M S , M P 1 ) = 0.2458 < K ^ 2 ( M S , M P 2 ) = 0.2941 ; K ^ 3 ( M S , M P 3 ) = 0.0255 < K ^ 3 ( M S , M P 2 ) = 0.0531 < K ^ 3 ( M S , M P 1 ) = 0.0869 ; K ^ 4 ( M S , M P 3 ) = 0.1872 < K ^ 4 ( M S , M P 1 ) = 0.2317 < K ^ 4 ( M S , M P 2 ) = 0.2906 . Although K ^ 2 has a different ranking in terms of ( M S , M P 1 ) , ( M S , M P 2 ) , and ( M S , M P 3 ) with other methods, its minimal measure is also regarded as K ^ 2 ( M S , M P 3 ) . Therefore, the methods of K ^ 1 , K ^ 2 , K ^ 3 , and K ^ 4 also sort s 1 as pattern p 3 .
In summary, the proposed d B C D - and d B C D w -based medical diagnosis decision-making algorithms are as effective as Xiao’s [28,29] and Garg and Rani’s methods [30] to address the medical diagnosis decision-making problem.
On the other hand, in this section, it simply adopts the weight from [30]. As discussed before, the weight can be generated with regard to specific applications: experts’ subjective weights and objective weights calculated based on collected data. For instance, for a kind of disease, it may have multiple attributes, each of which may have different weights. In this scenario, this weighted scheme provides a better applicability.

6. Conclusions

In this paper, a generalized betting commitment-based distance (BCD) is proposed to measure the difference among CBBAs in the complex plane framework of CET. Additionally, the defined BCD is analyzed, which has the properties of the nonnegativity, nondegeneracy, symmetry, and triangle inequality. We then prove that the BCD meets the distance axioms to be a strict distance metric. After that, the superiority of BCD is demonstrated through a comparison with other well-known methods. Besides, a basis and its extensional BCD-based multi-attribute decision-making algorithms are designed and then adopted to address a medical diagnosis problem under the smart IoT environment to reveal their effectiveness.
In summary, this is the first work to study a betting commitment-based distance between CBBAs in CET. Furthermore, the BCD is a generalized model of the traditional distance among the betting commitments of BBAs. In particular, when CBBAs reduce to the classical BBAs, the BCD degenerates into Liu’s distance among the betting commitments of BBAs. Therefore, the BCD offers a promising way to measure differences among CBBAs in CET, as well as handling medical diagnosis problems under the smart IoT environment.

Funding

This research is supported by the National Natural Science Foundation of China (Nos. 62003280 and 61902189).

Acknowledgments

The author greatly appreciates the reviewers’ suggestions and the editor’s encouragement.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Qi, J.; Yang, P.; Newcombe, L.; Peng, X.; Yang, Y.; Zhao, Z. An overview of data fusion techniques for Internet of Things enabled physical activity recognition and measure. Inf. Fusion 2020, 55, 269–280. [Google Scholar] [CrossRef]
  2. Huang, K.; Zhang, Q.; Zhou, C.; Xiong, N.; Qin, Y. An efficient intrusion detection approach for visual sensor networks based on traffic pattern learning. IEEE Trans. Syst. Man Cybern. Syst. 2017, 47, 2704–2713. [Google Scholar] [CrossRef]
  3. Alabdulkarim, A.; Al-Rodhaan, M.; Ma, T.; Tian, Y. PPSDT: A novel privacy-preserving single decision tree algorithm for clinical decision-support systems using IoT devices. Sensors 2019, 19, 142. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Roy, M.; Chowdhury, C.; Aslam, N. Designing transmission strategies for enhancing communications in medical IoT using Markov decision process. Sensors 2018, 18, 4450. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  5. Souza, L.F.D.F.; Silva, I.C.L.; Marques, A.G.; Silva, F.H.D.S.; Nunes, V.X.; Hassan, M.M.; Albuquerque, V.H.C.D. Internet of Medical Things: An Effective and Fully Automatic IoT Approach Using Deep Learning and Fine-Tuning to Lung CT Segmentation. Sensors 2020, 20, 6711. [Google Scholar] [CrossRef] [PubMed]
  6. Celesti, A.; Ruggeri, A.; Fazio, M.; Galletta, A.; Villari, M.; Romano, A. Blockchain-Based Healthcare Workflow for Tele-Medical Laboratory in Federated Hospital IoT Clouds. Sensors 2020, 20, 2590. [Google Scholar] [CrossRef] [PubMed]
  7. Takabayashi, K.; Tanaka, H.; Sakakibara, K. Integrated Performance Evaluation of the Smart Body Area Networks Physical Layer for Future Medical and Healthcare IoT. Sensors 2019, 19, 30. [Google Scholar] [CrossRef] [Green Version]
  8. Mavrogiorgou, A.; Kiourtis, A.; Perakis, K.; Pitsios, S.; Kyriazis, D. IoT in healthcare: Achieving interoperability of high-quality data acquired by IoT medical devices. Sensors 2019, 19, 1978. [Google Scholar] [CrossRef] [Green Version]
  9. Depari, A.; Fernandes Carvalho, D.; Bellagente, P.; Ferrari, P.; Sisinni, E.; Flammini, A.; Padovani, A. An IoT based architecture for enhancing the effectiveness of prototype medical instruments applied to neurodegenerative disease diagnosis. Sensors 2019, 19, 1564. [Google Scholar] [CrossRef] [Green Version]
  10. Dempster, A.P. Upper and Lower Probabilities Induced by a Multivalued Mapping. Ann. Math. Stat. 1967, 38, 325–339. [Google Scholar] [CrossRef]
  11. Shafer, G. A Mathematical Theory of Evidence; Princeton University Press: Princeton, NJ, USA, 1976; Volume 1. [Google Scholar]
  12. Deng, Y. Information volume of mass function. Int. J. Comput. Commun. Control 2020, 15, 3983. [Google Scholar] [CrossRef]
  13. Xiao, F. EFMCDM: Evidential fuzzy multicriteria decision making based on belief entropy. IEEE Trans. Fuzzy Syst. 2020, 28, 1477–1491. [Google Scholar] [CrossRef]
  14. Zhou, M.; Liu, X.B.; Chen, Y.W.; Yang, J.B. Evidential reasoning rule for MADM with both weights and reliabilities in group decision making. Knowl.-Based Syst. 2018, 143, 142–161. [Google Scholar] [CrossRef]
  15. Pan, L.; Deng, Y. Probability transform based on the ordered weighted averaging and entropy difference. Int. J. Comput. Commun. Control 2020, 15, 3743. [Google Scholar] [CrossRef]
  16. Yager, R.R. Generalized Dempster–Shafer Structures. IEEE Trans. Fuzzy Syst. 2019, 27, 428–435. [Google Scholar] [CrossRef]
  17. Song, Y.; Zhu, J.; Lei, L.; Wang, X. A Self-adaptive combination method for temporal evidence based on negotiation strategy. SCIENCE CHINA Inf. Sci. 2020, 63, 210204. [Google Scholar] [CrossRef]
  18. Deng, X.; Jiang, W. Evaluating green supply chain management practices under fuzzy environment: A novel method based on D number theory. Int. J. Fuzzy Syst. 2019, 21, 1389–1402. [Google Scholar] [CrossRef]
  19. Deng, X.; Jiang, W. A total uncertainty measure for D numbers based on belief intervals. Int. J. Intell. Syst. 2019, 34, 3302–3316. [Google Scholar] [CrossRef] [Green Version]
  20. Yang, J.B.; Xu, D.L. Evidential reasoning rule for evidence combination. Artif. Intell. 2013, 205, 1–29. [Google Scholar] [CrossRef]
  21. Fujita, H.; Ko, Y.C. A heuristic representation learning based on evidential memberships: Case study of UCI-SPECTF. Int. J. Approx. Reason. 2020, 120, 125–137. [Google Scholar] [CrossRef]
  22. Deng, Y. Uncertainty measure in evidence theory. Sci. China Inf. Sci. 2020, 63, 210201. [Google Scholar] [CrossRef]
  23. Deng, Y. Deng entropy measure of quantum entanglement. chinaXiv 2021. [Google Scholar]
  24. Fan, L.; Deng, Y. Determine the number of unknown targets in Open World based on Elbow method. IEEE Trans. Fuzzy Syst. 2020, 1. [Google Scholar] [CrossRef]
  25. Li, Y.X.; Pelusi, D.; Deng, Y. Generate two dimensional belief function based on an improved similarity measure of trapezoidal fuzzy numbers. Comput. Appl. Math. 2020, 39, 1–20. [Google Scholar] [CrossRef]
  26. Mao, S.; Han, Y.; Deng, Y.; Pelusi, D. A hybrid DEMATEL-FRACTAL method of handling dependent evidences. Eng. Appl. Artif. Intell. 2020, 91, 103543. [Google Scholar] [CrossRef]
  27. Luo, Z.; Deng, Y. A matrix method of basic belief assignment’s negation in Dempster–Shafer theory. IEEE Trans. Fuzzy Syst. 2020, 28, 2270–2276. [Google Scholar] [CrossRef]
  28. Xiao, F. Generalization of Dempster–Shafer theory: A complex mass function. Appl. Intell. 2020, 50, 3266–3275. [Google Scholar] [CrossRef]
  29. Xiao, F. Generalized belief function in complex evidence theory. J. Intell. Fuzzy Syst. 2020, 38, 3665–3673. [Google Scholar] [CrossRef]
  30. Garg, H.; Rani, D. A robust correlation coefficient measure of complex intuitionistic fuzzy sets and their applications in decision-making. Appl. Intell. 2019, 49, 496–512. [Google Scholar] [CrossRef]
  31. Han, D.; Dezert, J.; Yang, Y. Belief interval-based distance measures in the theory of belief functions. IEEE Trans. Syst. Man Cybern. Syst. 2016, 48, 833–850. [Google Scholar] [CrossRef] [Green Version]
  32. Yang, Y.; Han, D. A new distance-based total uncertainty measure in the theory of belief functions. Knowl.-Based Syst. 2016, 94, 114–123. [Google Scholar] [CrossRef]
  33. Jousselme, A.L.; Grenier, D.; Bossé, É. A new distance between two bodies of evidence. Inf. Fusion 2001, 2, 91–101. [Google Scholar] [CrossRef]
  34. Jousselme, A.L.; Maupin, P. Distances in evidence theory: Comprehensive survey and generalizations. Int. J. Approx. Reason. 2012, 53, 118–145. [Google Scholar] [CrossRef] [Green Version]
  35. Bouchard, M.; Jousselme, A.L.; Doré, P.E. A proof for the positive definiteness of the Jaccard index matrix. Int. J. Approx. Reason. 2013, 54, 615–626. [Google Scholar] [CrossRef]
  36. Jiang, W.; Huang, C.; Deng, X. A new probability transformation method based on a correlation coefficient of belief functions. Int. J. Intell. Syst. 2019, 34, 1337–1347. [Google Scholar] [CrossRef]
  37. Xiao, F.; Cao, Z.; Jolfaei, A. A novel conflict measurement in decision making and its application in fault diagnosis. IEEE Trans. Fuzzy Syst. 2020, 29, 186–197. [Google Scholar] [CrossRef]
  38. Pan, L.; Deng, Y. An association coefficient of belief function and its application in target recognition system. Int. J. Intell. Syst. 2020, 35, 85–104. [Google Scholar] [CrossRef]
  39. Liu, W. Analyzing the degree of conflict among belief functions. Artif. Intell. 2006, 170, 909–924. [Google Scholar] [CrossRef] [Green Version]
  40. Xiao, F. CED: A distance for complex mass functions. IEEE Trans. Neural Netw. Learn. Syst. 2020, 1. [Google Scholar] [CrossRef]
  41. Huang, J.; Wu, X.; Huang, W.; Wu, X.; Wang, S. Internet of things in health management systems: A review. Int. J. Commun. Syst. 2020, e4683. [Google Scholar] [CrossRef]
  42. Hossain, M.S.; Muhammad, G. Cloud-assisted industrial Internet of Things (IIoT)–enabled framework for health monitoring. Comput. Netw. 2016, 101, 192–202. [Google Scholar] [CrossRef]
  43. Gómez, J.; Oviedo, B.; Zhuma, E. Patient monitoring system based on Internet of Things. Procedia Comput. Sci. 2016, 83, 90–97. [Google Scholar] [CrossRef] [Green Version]
  44. Abawajy, J.H.; Hassan, M.M. Federated internet of things and cloud computing pervasive patient health monitoring system. IEEE Commun. Mag. 2017, 55, 48–53. [Google Scholar] [CrossRef]
  45. He, D.; Zeadally, S. An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J. 2014, 2, 72–83. [Google Scholar] [CrossRef]
  46. Dimitrov, D.V. Medical internet of things and big data in healthcare. Healthc. Inform. Res. 2016, 22, 156–163. [Google Scholar] [CrossRef]
  47. Lomotey, R.K.; Pry, J.; Sriramoju, S. Wearable IoT data stream traceability in a distributed health information system. Pervasive Mob. Comput. 2017, 40, 692–707. [Google Scholar] [CrossRef]
  48. Zhang, W.; Yang, J.; Su, H.; Kumar, M.; Mao, Y. Medical data fusion algorithm based on Internet of Things. Pers. Ubiquitous Comput. 2018, 22, 895–902. [Google Scholar] [CrossRef]
  49. Dautov, R.; Distefano, S.; Buyya, R. Hierarchical data fusion for Smart Healthcare. J. Big Data 2019, 6, 19. [Google Scholar] [CrossRef] [Green Version]
  50. Xiao, F. Evidence combination based on prospect theory for multi-sensor data fusion. ISA Trans. 2020, 106, 253–261. [Google Scholar] [CrossRef]
  51. Meng, D.; Liu, M.; Yang, S.; Zhang, H.; Ding, R. A fluid–structure analysis approach and its application in the uncertainty-based multidisciplinary design and optimization for blades. Adv. Mech. Eng. 2018, 10. [Google Scholar] [CrossRef] [Green Version]
  52. Liu, Z.; Li, G.; Mercier, G.; He, Y.; Pan, Q. Change detection in heterogenous remote sensing images via homogeneous pixel transformation. IEEE Trans. Image Process. 2017, 27, 1822–1834. [Google Scholar] [CrossRef] [PubMed]
  53. Yager, R.R. On Using the Shapley Value to Approximate the Choquet Integral in Cases of Uncertain Arguments. IEEE Trans. Fuzzy Syst. 2018, 26, 1303–1310. [Google Scholar] [CrossRef]
  54. Gao, X.; Deng, Y. The pseudo-pascal triangle of maximum Deng entropy. Int. J. Comput. Commun. Control 2020, 15, 1006. [Google Scholar] [CrossRef] [Green Version]
  55. Li, Y.F.; Huang, H.Z.; Mi, J.; Peng, W.; Han, X. Reliability analysis of multi-state systems with common cause failures based on Bayesian network and fuzzy probability. Ann. Oper. Res. 2019, 1–15. [Google Scholar] [CrossRef]
  56. Feng, F.; Cho, J.; Pedrycz, W.; Fujita, H.; Herawan, T. Soft set based association rule mining. Knowl.-Based Syst. 2016, 111, 268–282. [Google Scholar] [CrossRef]
  57. Witarsyah, D.; Fudzee, M.F.M.; Salamat, M.A.; Yanto, I.T.R.; Abawajy, J. Soft Set Theory Based Decision Support System for Mining Electronic Government Dataset. Int. J. Data Warehous. Min. (IJDWM) 2020, 16, 39–62. [Google Scholar] [CrossRef]
  58. Haruna, K.; Ismail, M.A.; Suyanto, M.; Gabralla, L.A.; Bichi, A.B.; Danjuma, S.; Kakudi, H.A.; Haruna, M.S.; Zerdoumi, S.; Abawajy, J.H.; et al. A soft set approach for handling conflict situation on movie selection. IEEE Access 2019, 7, 116179–116194. [Google Scholar] [CrossRef]
  59. Yang, J.; Li, S.; Xu, Z.; Liu, H.; Yao, W. An understandable way to extend the ordinary linear order on real numbers to a linear order on interval numbers. IEEE Trans. Fuzzy Syst. 2020, 1. [Google Scholar] [CrossRef]
  60. Fei, L.; Feng, Y.; Liu, L. Evidence combination using OWA-based soft likelihood functions. Int. J. Intell. Syst. 2019, 34, 2269–2290. [Google Scholar] [CrossRef]
  61. Jiang, W.; Cao, Y.; Deng, X. A novel Z-network model based on Bayesian network and Z-number. IEEE Trans. Fuzzy Syst. 2020, 28, 1585–1599. [Google Scholar] [CrossRef]
  62. Tian, Y.; Liu, L.; Mi, X.; Kang, B. ZSLF: A new soft likelihood function based on Z-numbers and its application in expert decision system. IEEE Trans. Fuzzy Syst. 2020, 1–11. [Google Scholar] [CrossRef]
  63. Xiao, F. On the maximum entropy negation of a complex-valued distribution. IEEE Trans. Fuzzy Syst. 2020, 1–11. [Google Scholar] [CrossRef]
  64. Xiao, F. GIQ: A generalized intelligent quality-based approach for fusing multi-source information. IEEE Trans. Fuzzy Syst. 2020, 1–11. [Google Scholar] [CrossRef]
  65. Garg, H.; Rani, D. Some results on information measures for complex intuitionistic fuzzy sets. Int. J. Intell. Syst. 2019, 34, 2319–2363. [Google Scholar] [CrossRef]
  66. Lai, J.W.; Cheong, K.H. Parrondo’s paradox from classical to quantum: A review. Nonlinear Dyn. 2020, 100, 1–13. [Google Scholar] [CrossRef]
  67. Gao, X.; Deng, Y. Quantum model of mass function. Int. J. Intell. Syst. 2020, 35, 267–282. [Google Scholar] [CrossRef]
  68. Jiang, W.; Huang, K.; Geng, J.; Deng, X. Multi-Scale Metric Learning for Few-Shot Learning. IEEE Trans. Circuits Syst. Video Technol. 2020, 1. [Google Scholar] [CrossRef]
  69. Deng, J.; Deng, Y. Information volume of fuzzy membership function. Int. J. Comput. Commun. Control 2021, 16, 4106. [Google Scholar] [CrossRef]
  70. Tang, M.; Liao, H.; Herrera-Viedma, E.; Chen, C.P.; Pedrycz, W. A Dynamic Adaptive Subgroup-to-Subgroup Compatibility-Based Conflict Detection and Resolution Model for Multicriteria Large-Scale Group Decision Making. IEEE Trans. Cybern. 2020, 1–12. [Google Scholar] [CrossRef]
  71. Cao, Z.; Chuang, C.H.; King, J.K.; Lin, C.T. Multi-channel EEG recordings during a sustained-attention driving task. Sci. Data 2019, 6, 1–8. [Google Scholar] [CrossRef] [Green Version]
  72. Liu, P.; Zhang, X. A new hesitant fuzzy linguistic approach for multiple attribute decision making based on Dempster–Shafer evidence theory. Appl. Soft Comput. 2020, 86, 105897. [Google Scholar] [CrossRef]
  73. Liu, Q.; Tian, Y.; Kang, B. Derive knowledge of Z-number from the perspective of Dempster–Shafer evidence theory. Eng. Appl. Artif. Intell. 2019, 85, 754–764. [Google Scholar] [CrossRef]
  74. Xu, X.; Zheng, J.; Yang, J.b.; Xu, D.l.; Chen, Y.w. Data classification using evidence reasoning rule. Knowl.-Based Syst. 2017, 116, 144–151. [Google Scholar] [CrossRef] [Green Version]
  75. Pan, Y.; Zhang, L.; Wu, X.; Skibniewski, M.J. Multi-classifier information fusion in risk analysis. Inf. Fusion 2020, 60, 121–136. [Google Scholar] [CrossRef]
  76. Fu, C.; Chang, W.; Yang, S. Multiple criteria group decision making based on group satisfaction. Inf. Sci. 2020, 518, 309–329. [Google Scholar] [CrossRef]
  77. Fei, L.; Lu, J.; Feng, Y. An extended best-worst multi-criteria decision-making method by belief functions and its applications in hospital service evaluation. Comput. Ind. Eng. 2020, 142, 106355. [Google Scholar] [CrossRef]
  78. Kang, B.; Zhang, P.; Gao, Z.; Chhipi-Shrestha, G.; Hewage, K.; Sadiq, R. Environmental assessment under uncertainty using Dempster–Shafer theory and Z-numbers. J. Ambient Intell. Humaniz. Comput. 2020, 11, 2041–2060. [Google Scholar] [CrossRef]
  79. Liu, Z.; Pan, Q.; Dezert, J.; Han, J.W.; He, Y. Classifier fusion with contextual reliability evaluation. IEEE Trans. Cybern. 2018, 48, 1605–1618. [Google Scholar] [CrossRef]
  80. Xiao, F. CEQD: A complex mass function to predict interference effects. IEEE Trans. Cybern. 2020, 1–13. [Google Scholar] [CrossRef]
  81. Xiao, F. A distance measure for intuitionistic fuzzy sets and its application to pattern classification problems. IEEE Trans. Syst. Man Cybern. Syst. 2019, 1–13. [Google Scholar] [CrossRef]
  82. Fei, L.; Feng, Y.; Liu, L. On Pythagorean fuzzy decision making using soft likelihood functions. Int. J. Intell. Syst. 2019, 34, 3317–3335. [Google Scholar] [CrossRef]
  83. Xue, Y.; Deng, Y.; Garg, H. Uncertain database retrieval with measure-based belief function attribute values under intuitionistic fuzzy set. Inf. Sci. 2020, 546, 436–447. [Google Scholar] [CrossRef]
Figure 1. The conflict measures in Example 7.
Figure 1. The conflict measures in Example 7.
Sensors 21 00840 g001
Figure 2. Comparison of different methods in the application.
Figure 2. Comparison of different methods in the application.
Sensors 21 00840 g002
Table 1. The variation in A i .
Table 1. The variation in A i .
i A i
1 { ϕ 1 }
2 { ϕ 1 , ϕ 2 }
3 { ϕ 1 , ϕ 2 , ϕ 3 }
4 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 }
5 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 }
6 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 }
7 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 }
8 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 }
9 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 , ϕ 9 }
10 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 , ϕ 9 , ϕ 10 }
11 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 , ϕ 9 , ϕ 10 , ϕ 11 }
12 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 , ϕ 9 , ϕ 10 , ϕ 11 , ϕ 12 }
13 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 , ϕ 9 , ϕ 10 , ϕ 11 , ϕ 12 , ϕ 13 }
14 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 , ϕ 9 , ϕ 10 , ϕ 11 , ϕ 12 , ϕ 13 , ϕ 14 }
15 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 , ϕ 9 , ϕ 10 , ϕ 11 , ϕ 12 , ϕ 13 , ϕ 14 , ϕ 15 }
16 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 , ϕ 9 , ϕ 10 , ϕ 11 , ϕ 12 , ϕ 13 , ϕ 14 , ϕ 15 , ϕ 16 }
17 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 , ϕ 9 , ϕ 10 , ϕ 11 , ϕ 12 , ϕ 13 , ϕ 14 , ϕ 15 , ϕ 16 , ϕ 17 }
18 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 , ϕ 9 , ϕ 10 , ϕ 11 , ϕ 12 , ϕ 13 , ϕ 14 , ϕ 15 , ϕ 16 , ϕ 17 , ϕ 18 }
19 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 , ϕ 9 , ϕ 10 , ϕ 11 , ϕ 12 , ϕ 13 , ϕ 14 , ϕ 15 , ϕ 16 , ϕ 17 , ϕ 18 , ϕ 19 }
20 { ϕ 1 , ϕ 2 , ϕ 3 , ϕ 4 , ϕ 5 , ϕ 6 , ϕ 7 , ϕ 8 , ϕ 9 , ϕ 10 , ϕ 11 , ϕ 12 , ϕ 13 , ϕ 14 , ϕ 15 , ϕ 16 , ϕ 17 , ϕ 18 , ϕ 19 , ϕ 20 }
Table 2. Comparison of | K | , d C B B A , and  d B C D in terms of the three cases of the complex basis belief assignments (CBBAs) in Example 8.
Table 2. Comparison of | K | , d C B B A , and  d B C D in terms of the three cases of the complex basis belief assignments (CBBAs) in Example 8.
MethodsConflict Measures
Case 1: ( M 1 C 1 , M 2 C 1 ) Case 2: ( M 1 C 2 , M 2 C 2 ) Case 3: ( M 1 C 3 , M 2 C 3 )
| K | 0.84000.26400.0000
d C B B A 0.70710.58020.7242
d B C D 0.70620.43800.6062
Table 3. The given patterns with multiple attributes modeled as CBBAs in the application.
Table 3. The given patterns with multiple attributes modeled as CBBAs in the application.
P X CBBAs
M ( { y } ) M ( { n } ) M ( { y , n } )
p 1 a 1 0.9901 e i arctan ( 0.0101 ) 0 0.0141 e i arctan ( 1.0000 )
a 2 0.8062 e i arctan ( 0.1250 ) 0 0.2236 e i arctan ( 0.5000 )
a 3 0.7071 e i arctan ( 0.1429 ) 0.1118 e i arctan ( 0.5000 ) 0.2062 e i arctan ( 0.2500 )
p 2 a 1 0.9055 e i arctan ( 0.1111 ) 0.1414 e i arctan ( 1.0000 ) 0
a 2 0.9901 e i arctan ( 0.0101 ) 0 0.0141 e i arctan ( 1.0000 )
a 3 0.9055 e i arctan ( 0.1111 ) 0 0.1414 e i arctan ( 1.0000 )
p 3 a 1 0.6083 e i arctan ( 0.1667 ) 0.2062 e i arctan ( 0.2500 ) 0.2062 e i arctan ( 0.2500 )
a 2 0.8062 e i arctan ( 0.1250 ) 0 0.2236 e i arctan ( 0.5000 )
a 3 0.9901 e i arctan ( 0.0101 ) 0 0.0141 e i arctan ( 1.0000 )
Table 4. To be determined sample with multiple attributes modeled as CBBAs in the application.
Table 4. To be determined sample with multiple attributes modeled as CBBAs in the application.
S X CBBAs
M ( { y } ) M ( { n } ) M ( { y , n } )
s 1 a 1 0.5099 e i arctan ( 0.2000 ) 0.3041 e i arctan ( 0.1667 ) 0.2062 e i arctan ( 0.2500 )
a 2 0.6083 e i arctan ( 0.1667 ) 0.2062 e i arctan ( 0.2500 ) 0.2062 e i arctan ( 0.2500 )
a 3 0.8062 e i arctan ( 0.1250 ) 0.1118 e i arctan ( 0.5000 ) 0.1118 e i arctan ( 0.5000 )
Table 5. The measures generated by different methods in the application.
Table 5. The measures generated by different methods in the application.
MethodsMeasures
( M s 1 , M p 1 ) ( M s 1 , M p 2 ) ( M s 1 , M p 3 )
d B C D 0.21570.23370.1525
d B C D w 0.20650.23030.1551
d C B B A 0.22560.24360.1526
d C B B A w 0.21650.24000.1553
K ^ 1 0.09070.05390.0249
K ^ 2 0.24580.29410.1838
K ^ 3 0.08690.05310.0255
K ^ 4 0.23170.29060.1872
Table 6. The ranking and sorting obtained through different methods in the application.
Table 6. The ranking and sorting obtained through different methods in the application.
MethodsRankingsSort
d B C D d B C D ( M s 1 , M p 3 ) < d B C D ( M s 1 , M p 1 ) < d B C D ( M s 1 , M p 2 ) p 3
d B C D w d B C D w ( M s 1 , M p 3 ) < d B C D w ( M s 1 , M p 1 ) < d B C D w ( M s 1 , M p 2 ) p 3
d C B B A d C B B A ( M s 1 , M p 3 ) < d C B B A ( M s 1 , M p 1 ) < d C B B A ( M s 1 , M p 2 ) p 3
d C B B A w d C B B A w ( M s 1 , M p 3 ) < d C B B A w ( M s 1 , M p 1 ) < d C B B A w ( M s 1 , M p 2 ) p 3
K ^ 1 K ^ 1 ( M s 1 , M p 3 ) < K ^ 1 ( M s 1 , M p 2 ) < K ^ 1 ( M s 1 , M p 1 ) p 3
K ^ 2 K ^ 2 ( M s 1 , M p 3 ) < K ^ 2 ( M s 1 , M p 1 ) < K ^ 2 ( M s 1 , M p 2 ) p 3
K ^ 3 K ^ 3 ( M s 1 , M p 3 ) < K ^ 3 ( M s 1 , M p 2 ) < K ^ 3 ( M s 1 , M p 1 ) p 3
K ^ 4 K ^ 4 ( M s 1 , M p 3 ) < K ^ 4 ( M s 1 , M p 1 ) < K ^ 4 ( M s 1 , M p 2 ) p 3
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Xiao, F. Complex Pignistic Transformation-Based Evidential Distance for Multisource Information Fusion of Medical Diagnosis in the IoT. Sensors 2021, 21, 840. https://doi.org/10.3390/s21030840

AMA Style

Xiao F. Complex Pignistic Transformation-Based Evidential Distance for Multisource Information Fusion of Medical Diagnosis in the IoT. Sensors. 2021; 21(3):840. https://doi.org/10.3390/s21030840

Chicago/Turabian Style

Xiao, Fuyuan. 2021. "Complex Pignistic Transformation-Based Evidential Distance for Multisource Information Fusion of Medical Diagnosis in the IoT" Sensors 21, no. 3: 840. https://doi.org/10.3390/s21030840

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop