Next Article in Journal
Tri-SIFT: A Triangulation-Based Detection and Matching Algorithm for Fish-Eye Images
Previous Article in Journal
Semantic Modelling and Publishing of Traditional Data Collection Questionnaires and Answers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Evaluating Evidence Reliability on the Basis of Intuitionistic Fuzzy Sets

1
Test Training Base of Information and Communication College, National University of Defense Technology, Xi’an 710106, China
2
College of Air and Missile Defense, Air Force Engineering University, Xi’an 710051, China
*
Author to whom correspondence should be addressed.
Information 2018, 9(12), 298; https://doi.org/10.3390/info9120298
Submission received: 12 October 2018 / Revised: 20 November 2018 / Accepted: 21 November 2018 / Published: 25 November 2018
(This article belongs to the Section Information Processes)

Abstract

:
The evaluation of evidence reliability is still an open topic, when prior knowledge is unavailable. In this paper, we propose a new method for evaluating evidence reliability, in the framework of intuitionistic fuzzy sets. The reliability of evidence was evaluated, based on the supporting degree between basic probability assignments (BPAs). The BPAs were first transformed to intuitionistic fuzzy sets (IFSs). By the similarity degree between the IFSs, we can get the supporting degree between the BPAs. Thus, the reliability of evidence can be evaluated, based on its connection with supporting degree. Based on the new evidence reliability, we developed a new method for combining evidence sources with different reliability degrades. Comparison with other methods was carried out to illustrate the effectiveness of the new method.

1. Introduction

Multi-sensor data fusion has been applied in many fields, such as pattern recognition, target identification [1,2,3,4], decision making [5,6], and so on. When fusing information from multiple sensors, the information provided by different sensors may be uncertain, imprecise, or even contradictory with each other. Many theories including the probability theory, fuzzy theory, and evidence theory, have been applied in data fusion [7,8,9,10,11]. The theory of intuitionistic fuzzy sets, as an important tool to model uncertainty, have attracted much attention from researchers [12,13,14,15,16,17,18]. Research on intuitionistic fuzzy set, mainly focus on the intuitionistic fuzzy measures [12,13,14,15,16,17,18,19], its mathematical properties [20,21,22], its application in decision-making [23,24], optimization [25,26], and so on. In all theories that deal with uncertainty, the evidence theory is usually regarded as an extension of the probability theory. In the evidence theory, we can assign belief degree to all subsets of the set of the discernment frame. Moreover, Dempster’s combination rule for basic probability assignments (BPAs) can provide an easy way to fuse the uncertain information, from different sensors. So evidence theory can be used to handle more kinds of uncertainty and has been widely used in the application of data fusion [27,28,29].
However, the classical combination rule may lead to counter-intuitive results, when the BPAs are in high conflict. If the BPAs are in complete conflict, the classical combination rule may be inefficient. To solve the problems in the application of evidence theory, researchers have proposed many modified methods for combining BPAs. Some of them are developed by improving the combination rule, which may lose the good properties of the classical Dempster’s combination rule. Others are proposed by modifying the original BPA, before combining them by Dempster’s combination rule. These two kinds of methods are different from each other, since their focus on the source of counter-intuitive results are different. Researchers have proposed that the first kind of this method implies that the counter-intuitive results are caused by the process of normalization in Dempster’s combination rule, and the second type of methods hold the perspective that unreliable evidence sources lead to unreasonable results. We hold that unreliable evidence sources cause the problem in the application of evidence theory. So we must evaluate the reliability of all BPAs, before combining them. Then we can use the discounting operation to modify the original BPAs. Hence, the evaluation of evidence is important for the combination of BPAs.
Some methods have been proposed to evaluate the reliability of evidence sources, but most of these methods are developed to evaluate evidence reliability when prior knowledge is available. The method proposed by Elouedi et al. [30] assessed the reliability of an evidence source, in the model of transferable belief, which is developed from evidence theory. In this method, reliability is obtained by an optimization model. The goal function of the optimization model is the square error between the modified BPAs and the actual identification of the data. So, the information about the real identification of data should be known. The evaluation method proposed by Elouedi et al. was extended in two aspects, by Guo et al. [31]. The evaluation method introduced in Reference [30] was first developed into a new method called the static evaluation, which is also implemented on the basis of supervised training. Another evaluation method is the dynamic evaluation of evidence reliability. The dynamic reliability can be obtained by adaptive learning and regulation, in real-time situations, which depends on the contexts of sensor readings and dynamic performance.
When assessing evidence reliability, the crucial difficulty is the absence of prior knowledge. In such cases, the principle of majority [32] is usually used to facilitate evaluation. The conflict measure, similarity measure, and distance measure can be applied to depict the relation between BPAs. For example, Klein and Colot [32] used Jousselme’s [33] distance measure to propose the dissent degree. The dissent degree between a BPA and the averaged BPA is used to estimate the evidence reliability. Liu et al. [34] combined the distance measure and divergence degree to define a new dissimilarity measure, based on which the reliability of evidence sources can be evaluated.
We can see that the definition of similarity or dissimilarity measures for BPAs can help the evaluation of evidence reliability. So, we proposed a new method for evaluating the evidence reliability based on the new similarity measure of BPAs. Motivated by the rich kinds of intuitionistic fuzzy similarity measures and the relation between BPA and intuitionistic fuzzy set (IFS), we have calculated the similarity degree between BPAs, in the framework of intuitionistic fuzzy sets. Based on the new reliability evaluation method and evidence discounting operation, we proposed a new evidence combination method. Numerical examples were used to validate the performance of the proposed method.
The rest of this paper unfolds as follows. Basic knowledge on the evidence theory is presented in Section 2. A new method of reliability evaluation is developed, based on intuitionistic fuzzy sets, in Section 3, where a new combination method is also proposed, based on evidence discounting and Dempster’s combination rule. Numerical examples and comparative analysis are presented in Section 4 to show the performance of the new combination method. This paper is concluded in Section 5.

2. Brief Review on Evidence Theory

2.1. Basic Concepts

The evidence theory, initiated by Dempster and developed by Shafer, was modeled based on the frame of discernment denoted by Θ, which is a finite set with mutually exclusive elements. The power set of Θ, denoted by 2 Θ , contains all the possible unions of the sets in Θ including Θ itself. Singleton sets in a frame of discernment Θ are called atomic sets because they do not contain nonempty subsets. The following terminologies are central in the Dempster-Shafer theory [35,36].
Let Θ = {θ1, θ2, …, θn} be the frame of discernment. A basic probability assignment (BPA) is a function m: 2Θ → [0, 1], satisfying the two following conditions:
m ( ) = 0
A Θ m ( A ) = 1  
where is the empty set, and A denotes the subset of Θ. A BPA is also called as a belief structure. For A Θ , the value assigned by the BPA on A is the basic probability mass of A, expressed by m ( A ) .
For A Θ , if m ( A ) > 0 , A is the focal element of m . The set of all focal elements is expressed by { A | A Θ , m ( A ) > 0 } . If the focal elements of a BPA m are all atomic sets with only one element, the BPA is called Bayesian belief structure (BBS). The BPA with the following form: m ( A ) = 1 , A Θ and m ( B ) = 0 , B Θ , B A , is called as a categorical belief structure. The BPA with m ( Θ ) = 1 and m ( A ) = 0 , A Θ , is called as a vacuous BPA.
Given a BPA m defined on Θ, its belief function and plausibility function can be, respectively, defined as:
B e l ( A ) = B A m ( B )  
P l ( A ) = B A m ( B ) = 1 B A = m ( B )  
B e l ( A ) quantifies all basic probability masses exactly assigned to A and its subsets. P l ( A ) measures all possible basic probability masses that could be assigned to A and its subsets. In such sense, B e l ( A ) and P l ( A ) can be regarded as the lower bound and upper bound of the probability to which A is supported. So, the belief degree of A can be considered as an interval number B I ( A ) = [ B e l ( A ) , P l ( A ) ] .
The pignistic transformation [37] is defined to transform a belief structure m to the so-called pignistic probability function, which is helpful for decision making. For a BPA m defined on Θ = { θ 1 , θ 2 , , θ n } , the pignistic transformation is expressed by
B e t P ( A ) = B Θ | A B | | B | m ( B ) 1 m ( ) , A Θ  
where | A | is the number of elements in set A, which is also called as the cardinality of set A .
Particularly, given m ( ) = 0 and θ Θ , we have
B e t P ( { θ } ) = θ B m ( B ) | B | , θ = θ 1 , , θ n , B Θ  

2.2. Dempster’s Combination Rule

Given two BPAs m 1 and m 2 defined on Θ , the BPA that results from their combination, denoted as m 1 m 2 , or m 12 for short, can be obtained by Dempster’s combination rule [35], shown as:
m 12 ( A ) = { B C = A m 1 ( B ) m 2 ( C ) 1 B C = m 1 ( B ) m 2 ( C ) , A Θ , A 0    , A =  
For more than two BPAs to be combined, the combination results of all BPAs can be obtained as:
m ( A ) = { A i = A i = 1 n m i ( A i ) 1 A i = i = 1 n m i ( A i ) , A Θ , A 0    , A =
Here, n is the number of evidence pieces in the process of combination, i denotes the i th piece of evidence, and m i ( A i ) is the BPA of hypothesis A i supported by BPA i . The amount of conflict among n mutually independent pieces of evidence is equal to the mass of the empty set after the conjunctive combination and before the normalization step. It represents contradictory evidence. It is calculated as:
k = A i = i = 1 n m i ( A i )  
The case of k = 0 indicates that there is no conflict among BPAs, while k = 1 indicates that all BPAs are in complete conflict.
Dempster’s rule has many good properties, such as commutativity and associativity. So, it has been widely applied in many areas. However, when the BPAs to be combined are completely contradictory, i.e., k = 1 , the combination rule cannot be performed. When they are in high conflict, i.e., k→1, we may get counter-intuitive combination results, which do not coincide with the actual situation. This can be demonstrated by the following example [38].
Example 1.
Two BPAs m 1 and m 2 , defined on the frame of discernment Θ = { θ 1 , θ 2 , θ 3 } , are to be considered. These two BPAs are given as following:
m 1 : m 1 ( { θ 1 } ) = 0.9 , m 1 ( { θ 2 } ) = 0.1
m 2 : m 2 ( { θ 2 } ) = 0.1 , m 2 ( { θ 3 } ) = 0.9  
Using Dempster’s rule to combine these BPAs, we can get m ( { θ 1 } ) = m ( { θ 3 } ) = 0 , m ( { θ 2 } ) = 1 . It is shown that m 1 and m 2 assigned a low support degree to θ 2 , but the final result completely support θ 2 . On the other hand, we can see that m 1 support θ 1 in a high degree, and m 2 supports θ 3 in a high degree, but neither θ 1 nor θ 3 is supported in the combination result. This is counter-intuitive and unreasonable. This indicates that Dempster’s rule cannot be used to combine evidence bodies in high conflict.
When the evidence source is not reliable, and its reliability degree is assigned as λ with λ [ 0 , 1 ] , we can use the discounting operation introduced by Shafer [36] to modify the original BPA. Based on Shafer‘s discounting operation, the BPA m λ obtained by discounting is expressed as:
{ m λ ( A ) = λ m ( A ) , A Θ m λ ( Θ ) = 1 λ + λ m ( Θ )
We note that if the evidence source is totally reliable, i.e., λ = 1 , then the BPA m λ is identical to the original BPA m. If the evidence source is completely unreliable, i.e., λ = 0 , we can get m λ ( Θ ) = 1 , which means that the discounted BPA is a vacuous one providing no information.

3. Evaluating the Evidence Reliability

3.1. The Relation between BPA and IFS

The intuitionistic fuzzy set was developed from Zadeh’s fuzzy set. Zadeh’s fuzzy set can be descripted as follows.
Definition 1 [39].
Let X = { x 1 , x 2 , , x n } be the universe of discourse. A fuzzy set A , defined in X , is expressed as:
A = { x , μ A ( x ) | x X }  
where μ A ( x ) : X [ 0 , 1 ] is the membership degree.
Definition 2 [40].
An intuitionistic fuzzy set A in X can be written as:
A = { x , μ A ( x ) , v A ( x ) | x X }  
where μ A ( x ) : X [ 0 , 1 ] is the membership degree, and v A ( x ) : X [ 0 , 1 ] is the non-membership degree. They are constrained by the condition:
0 μ A ( x ) + v A ( x ) 1  
The hesitancy degree is expressed as:
π A ( x ) = 1 μ A ( x ) v A ( x )
Obviously, we have π A ( x ) [ 0 , 1 ] , x X . Greater π A ( x ) implies more vagueness on x with respect to A. Particularly, when π A ( x ) = 0 , x X , the IFS A degenerates into Zadeh’s fuzzy set.
In the sequel, I F S s ( X ) denotes the set of all IFSs in X . If | X | = 1 , i.e., there is only one element x in X , the IFS A in X can be expressed by A = μ A , v A for short, which is also named as an intuitionistic fuzzy value (IFV).
Definition 3 [40].
For A I F S s ( X ) and B I F S s ( X ) , some relations between them are defined as:
(R1)
A B iff x X μ A ( x ) μ B ( x ) , v A ( x ) v B ( x ) ;
(R2)
A = B iff x X μ A ( x ) = μ B ( x ) , v A ( x ) = v B ( x ) ;
(R3)
A C = { x , v A ( x ) , μ A ( x ) | x X } , where A C is the complement of A .
Definition 4 [40].
Let A = { x , μ A ( x ) , v A ( x ) | x X } , B = { x , μ B ( x ) , v B ( x ) | x X } be two IFSs in X , then the following operations can be defined:
A B = { x , min ( μ A ( x ) , μ B ( x ) ) , max ( v A ( x ) , v B ( x ) ) | x X } ,
A B = { x , max ( μ A ( x ) , μ B ( x ) ) , min ( v A ( x ) , v B ( x ) ) | x X } ,
A B = { x , μ A ( x ) + μ B ( x ) μ A ( x ) μ B ( x ) , v A ( x ) v B ( x ) | x X } ,
A B = { x , μ A ( x ) μ B ( x ) , v A ( x ) + v B ( x ) v A ( x ) v B ( x ) | x X } ,
γ A = { x , 1 ( 1 μ A ( x ) ) γ , ( γ A ( x ) ) γ | x X } ,
A γ = { x , ( μ A ( x ) ) γ , 1 ( 1 v A ( x ) ) γ | x X } .
As discussed earlier, for a BPA m, [ B e l ( θ ) , P l ( θ ) ] can be regarded as the confidence interval of θ . We can use [ B e l ( θ ) , P l ( θ ) ] to represent the lower bound and upper bound of the belief on θ . Here, B e l ( θ ) and P l ( θ ) are the lower probability and the upper probability, respectively. Hence, the probability P ( θ ) lies in an interval [ B e l ( θ ) , P l ( θ ) ] . If m is regarded as an IFS A defined in Θ = { θ 1 , θ 2 , , θ n } , B e l ( θ ) is the degree of membership, while 1 P l ( θ ) is the degree of non-membership. Based on these analysis, the BPA m , defined on the discernment frame Θ = { θ 1 , θ 2 , , θ n } , can be expressed as an IFS A defined on Θ = { θ 1 , θ 2 , , θ n } . The IFS A is written as:
A = { θ , μ A ( θ ) , v A ( θ ) | θ Θ } = { θ 1 , B e l ( θ 1 ) , 1 P l ( θ 1 ) , θ 2 , B e l ( θ 2 ) , 1 P l ( θ 2 ) , , θ n , B e l ( θ n ) , 1 P l ( θ n ) }  
The relation between BPA and IFS has its physical interpretation from the viewpoint of target identification. Let the discernment frame be Θ = { θ 1 , θ 2 , θ 3 } , i.e., all possible classes of the target are contained in the set Θ = { θ 1 , θ 2 , θ 3 } . The output of the sensor expressed by a BPA m indicates that the target is identified as an IFS A with A = { θ 1 , B e l ( θ 1 ) , 1 P l ( θ 1 ) , θ 2 , B e l ( θ 2 ) , 1 P l ( θ 2 ) , θ 3 , B e l ( θ 3 ) , 1 P l ( θ 3 ) } .
Specially, if a sensor identifies the target as a singleton subset of Θ , taking { θ 1 } as an example, the BPA can be written as: m ( { θ 1 } ) = 1 , m ( { θ 2 } ) = 0 , m ( { θ 3 } ) = 0 .
Then the corresponding IFS is A = { θ 1 , 1 , 0 , θ 2 , 0 , 1 , θ 3 , 0 , 1 } , which is same as the set { θ 1 } .
If the target is totally unknown by the sensor, i.e., the sensor provides no helpful knowledge about the target, the BPA m is a vacuous one with m ( Θ ) = 1 . Thus, we have: B e l ( θ 1 ) = B e l ( θ 2 ) = B e l ( θ 3 ) = 0 , P l ( θ 1 ) = P l ( θ 2 ) = P l ( θ 3 ) = 1 .
So the IFS can be written as A = { θ 1 , 0 , 0 , θ 2 , 0 , 0 , θ 3 , 0 , 0 } , which indicates total ignorance.

3.2. Supporting Degree of BPAs

Supporting degree of BPAs has been introduced to develop the modified combination rules [34,41]. Generally, the supporting degree is calculated on the basis of the similarity or distance measures between BPAs. If we use Sup to express the supporting degree, we have Sup(m1, m2) = Sup(m2, m1). Taking Sim and Dis as the similarity and distance measures between BPAs, respectively, we can get the following relations:
S u p ( m 1 , m 2 ) S i m ( m 1 , m 2 ) ,   S u p ( m 1 , m 2 ) 1 D i s ( m 1 , m 2 )  
In other words, the higher similarity degree between the two BPAs indicates the higher supporting degree between them. The lower distance between the two BPAs also indicates higher supporting degree between the BPAs. For clarity, the supporting degree between BPAs can be usually considered as consistent to the similarity degree between BPAs.
The relation between BPA and IFS allow us to calculate the supporting degree of BPAs in the framework of IFS. Thus, the supporting degree S u p ( m 1 , m 2 ) can be obtained by calculating the supporting degree between IFSs A 1 and A 2 , where A 1 and A 2 are IFSs derived from m 1 and m 2 , respectively. So we have:
S u p ( m 1 , m 2 ) = S u p ( A 1 , A 2 ) = S i m ( A 1 , A 2 )  
In recent years, a lot of similarity measures of IFSs have been proposed [12,13,14,15,16,17,18]. This provide us much convenience in calculating the supporting degree of BPAs. In the following, we use the Euclidian-distance-based similarity measure of IFSs [16]. The Euclidian-distance-based similarity measure is defined as following:
Let A = { x , μ A ( x ) , v A ( x ) | x X } and B = { x , μ B ( x ) , v B ( x ) | x X } be two IFSs defined in X = { x 1 , x 2 , , x n } . The similarity degree between A and B are calculated by:
S E ( A , B ) = 1 1 n i = 1 n ( μ A ( x i ) μ B ( x i ) ) 2 + ( v A ( x i ) v B ( x i ) ) 2 2  
It has been proved that the similarity measure S E ( A , B ) satisfies all axiomatic properties of intuitionistic fuzzy similarity measure [16].
Based on the above analysis, we can obtain the supporting degree between two BPAs m 1 and m 2 , by the following steps:
Step 1. From Equations (3) and (4), we can get the values of the belief function and plausibility function of all singleton subsets, corresponding to the BPAs m 1 and m 2 .
Step 2. From Equation (15), we can get the two IFSs A 1 and A 2 , according to m 1 and m 2 .
Step 3. Following Equation (17), we can calculate the similarity degrees S E ( A 1 , A 2 ) .
Finally, we can get the degree to which m 1 supports m 2 is S u p ( m 1 , m 2 ) = S E ( A 1 , A 2 ) , the degree of m 2 supporting m 1 S u p ( m 2 , m 1 ) = S u p ( m 1 , m 2 ) = S E ( A 1 , A 2 ) .
Based on the axiomatic properties of S E ( A , B ) , we have m 1 = m 2 S u p ( m 1 , m 2 ) = S u p ( m 2 , m 1 ) = 1 .

3.3. Evidence Reliability

Suppose that there are N BPAs expressed as m1, m2, , mN. Based on the supporting degree between any two BPAs, we can construct the supporting degree matrix (SDM) as:
SDM = ( S u p ( m 1 , m 1 ) S u p ( m 1 , m 2 ) S u p ( m 1 , m N ) S u p ( m 2 , m 1 ) S u p ( m 2 , m 2 ) S u p ( m 2 , m N ) S u p ( m N , m 1 ) S u p ( m N , m 2 ) S u p ( m N , m N ) )  
We can see that the elements in the ith row represent the degree to which mi is supported by other BPAs. So the total supporting degree of mi can be calculates as:
T o t a l _ S u p ( m i ) = j = 1 j i N S u p ( m i , m j )  
Generally, the larger support degree of a BPA indicates that this BPA is more reliable. Otherwise, the BPA is less reliable. So the reliability of each BPA can be calculated by its total support degree. In application, the reliability should be normalized. If we consider the relative reliability of all BPAs, they can be normalized to the reliability of mi as:
R ( m i ) = T o t a l _ S u p ( m i ) j = 1 N T o t a l _ S u p ( m j )  
If the reliability of the most reliable BPA is set as 1, the absolute dynamic reliability of mi can be can be obtained as:
R ( m i ) = T o t a l _ S u p ( m i ) max j = 1 , 2 , , N { T o t a l _ S u p ( m j ) }  

3.4. A New Method for Evidence Combination

Once the reliability of all BPAs are obtained, we can use evidence reliability to modify the original BPAs by the discounting operation. Then we can combine the discounted BPAs using Dempster’s combination rule. So we can propose a new method for evidence combination. Suppose that there are N BPAs m1, m2, , mN to be combined, they can be combined as the following steps:
Step 1. Calculate the supporting degree of each BPA.
From Equations (3) and (4), we can get the value of the belief function and the plausibility function, for all singleton subsets with respect to mi, i = 1 , 2 , , N .
From Equation (15), we can get IFSs corresponding to all BPAs.
Following Equation (17), we can calculate the similarity degrees S E ( A i , A k ) , i = 1 , 2 , , N .
Finally, we get the supporting degree between m i and m j , shown as:
S u p ( m i , m j ) = S u p ( m j , m i ) = S E ( A i , A j ) = S E ( A j , A i )  
Step 2. Calculate the reliability of each BPA.
From the supporting degree between every two BPAs, the support degree matrix can be constructed as Equation (18). Then the reliability of each BPA can be obtained based on Equation (19).
Step 3. Modify the original BPAs.
Using the evidence reliability and evidence discounting operation shown in Equation (10), we can modify the original BPAs m1, m2, , mN. The discounted BPAs are denoted by m 1 R , m 2 R , , m N R .
Step 4. Evidence combination by Dempster’s combination rule.
By Dempster’s combination rule, the discounted BPAs m 1 R , m 2 R , , m N R can be combined to an integrated BPA.

4. Illustrative Examples and Discussion

In this section, the proposed combination method will be applied to deal with the application of data fusion to validate its effectiveness and rationality.
First, we will use a numerical example to show the implementation of the proposed evidence combination, based on evidence reliability evaluation.
Example 2.
In a target identification system based on multiple sensors, three sensors S 1 , S 2 , S 3 are employed to recognize the identification of a target. Three possible types of the target are denoted by θ1, θ2, and θ3. So the frame of discernment can be expressed as Θ = { θ 1 , θ 2 , θ 3 } . The outputs of three sensors are expressed by three BBAs. They are listed as the following:
m 1 ( { θ 1 } ) = 0.6 , m 1 ( { θ 2 } ) = 0.1 , m 1 ( { θ 3 } ) = 0.2 , m 1 ( Θ ) = 0.1  
m 2 ( { θ 1 } ) = 0.2 , m 2 ( { θ 2 } ) = 0.5 , m 2 ( { θ 3 } ) = 0.1 , m 2 ( Θ ) = 0.2  
m 3 ( { θ 1 } ) = 0.4 , m 3 ( { θ 2 } ) = 0.1 ,   m 3 ( { θ 3 } ) = 0.2 , m 3 ( { Θ } ) = 0.3
Three IFSs in Θ = { θ 1 , θ 2 , θ 3 } can be generated from these BPAs. They are expressed as:
A 1 = { θ 1 , 0.6 , 0.3 , θ 2 , 0.1 , 0.8 , θ 3 , 0.2 , 0.7 }  
A 2 = { θ 1 , 0.2 , 0.6 , θ 2 , 0.5 , 0.3 , θ 3 , 0.1 , 0.7 }  
A 3 = { θ 1 , 0.4 , 0.3 , θ 2 , 0.1 , 0.6 , θ 3 , 0.2 , 0.5 }  
The supporting degree matrix (SDM) for the three BPAs is:
S D M = ( 1 S E ( A 1 , A 2 ) S E ( A 1 , A 3 ) S E ( A 2 , A 1 ) 1 S E ( A 2 , A 3 ) S E ( A 3 , A 1 ) S E ( A 3 , A 2 ) 1 ) = ( 1 0.7058 0.8492 0.7058 1 0.7445 0.8492 0.7445 1 )
Based on Equation (19), the total supporting degree of the BPA can be calculated:
T o t a l _ S u p ( m 1 ) = 1.5550 ,   T o t a l _ S u p ( m 2 ) = 1.4503 ,   T o t a l _ S u p ( m 1 ) = 1.5936 .
Finally the absolute reliability of each BPA can be yielded according to Equation (21):
R ( S 1 ) = 0.9758 ,   R ( S 2 ) = 0.9101 ,   R ( S 3 ) = 1 .
Based on the reliability factor, we can modify three original BPAs by the discounting operation. We can get the discounted BPAs as:
m 1 R ( { θ 1 } ) = 0.5855 , m 1 R ( { θ 2 } ) = 0.0976 , m 1 R ( { θ 3 } ) = 0.1952 , m 1 R ( Θ ) = 0.1218  
m 2 R ( { θ 1 } ) = 0.1820 , m 2 R ( { θ 2 } ) = 0.4550 , m 2 R ( { θ 3 } ) = 0.0910 , m 2 R ( Θ ) = 0.2719  
m 3 R ( { θ 1 } ) = 0.4 , m 3 R ( { θ 2 } ) = 0.1 , m 3 R ( { θ 3 } ) = 0.2 , m 3 R ( Θ ) = 0.3  
Combining these discounted BPAs by using Dempster’s rule, we can get the final result:
m ( { θ 1 } ) = 0.6585 , m ( { θ 2 } ) = 0.1601 , m ( { θ 3 } ) = 0.1459 , m ( Θ ) = 0.0305  
Based on the final fusion result, a comprehensive recognition on the target can be obtained. As shown in the result, the unknown target is identified as θ 1 , according to the outputs of three sensors.
This example demonstrates that the proposed method provides an alternative way to combine uncertain evidence sources with different reliability, when a priori knowledge is not available. In this example, it can be noted that the m 2 is quite different from m1 and m3. So m2 should be assigned to a low reliability. The proposed reliability evaluation method is sensitive to the BPA with low reliability. The reliability of m2, obtained by the proposed evaluation method, is the lowest one, which is consistent with intuitive analysis. Using the reliability factor of each BPA, we can discount them by the discounting operation. Then the influence of unreliability BPA on the final fusion can be reduced, which is helpful for making a sound decision. It is indicated by this example that the proposed combination method can well deal with unreliable information and conflict in evidence sources.
Another example will be used to illustrate the performance of the new combination method, based on the comparison with other methods.
Example 3.
In the information fusion system, based on multiple sensors, five sensors S1, S2, S3, S4, and S5 are applied to identify a target. The outputs of the five sensors are expressed by five BPAs in Θ = { θ 1 , θ 2 , θ 3 } , as shown in Table 1.
From Table 1, we can see that the BPAs m1, m2, m4, and m5 prefer θ1, by assigning the most basic probability masses to θ1, but m3 assigns most belief to θ2, which is quite different from other four BPAs. Based on the principle of majority, m3 should get the least supporting degree from other BPAs. The reliability of m3 should be the least one in all five BPAs.
Using the proposed evidence reliability evaluation method, we can get the reliability of five BPAs, as follows:
R ( m 1 ) = 0.8684 ,   R ( m 2 ) = 0.9844 ,   R ( m 3 ) = 0.6645 ,   R ( m 4 ) = 0.9711 ,   R ( m 5 ) = 1 .
It is shown that the reliability degree of m3 is 0.6645, which is the least one in all reliability factors. This coincides with the intuitive analysis. The information provided by S3 will be modified in a great degree in the combination.
Using the discounting operation to modify all BPAs, and combining all modified BPAs by Dempster’s combination rule, we can achieve the fusion results as:
m ( { θ 1 } ) = 0.6923 , m ( { θ 2 } ) = 0.2823 , m ( { θ 3 } ) = 0.0100 , m ( { θ 1 , θ 2 } ) = 0.0142 , m ( Θ ) = 0.0002  
The fusion result assigns most belief to { θ 1 } . So the target is recognized as θ 1 by the fusion result. We can see that m3 was assigned to the least reliability and its influence on the final result is reduced greatly.
For comparison, we combine these BPAs by adding the BPA, one by one, based on other different methods. The results are presented in Table 2, where m 1 n ( 2 n 5 ) means the combination of m1 to mn. We can see that if we use the classical Dempster’s combination rule, the addition of m3 causes the basic probability assigned to { θ 1 } is 0. The addition of other BPAs supporting { θ 1 } cannot change such a situation. These results are unreasonable, since most of the BPAs support { θ 1 } , but the final result opposes { θ 1 } .
When the reliability of evidence sources is taken into consideration, m3 will be discounted, based on its evaluated reliability. If we use evidential distance measure dJ [41] and dissimilarity measure DismP [34] to evaluate evidence reliability, m3 will be assigned to a low-reliability degree. Thus, the information got from m3 slightly affects the final fusion result. This rapid discounting process may cause great loss of information, which will also brings much risk to decision-making.
In our proposed method, the addition of m3 will decrease the basic probability assigned to { θ 1 } , which is reasonable, as they were used in References [34,41]. With the addition of m4 and m5, the basic probability on { θ 1 } increases and the basic probability on { θ 2 } decreases. In the proposed method, this process is slower. This is helpful for making a cautious decision.

5. Conclusions

In this paper, a new method was proposed to evaluate the reliability of evidence sources. The concept of supporting degree was introduced, based on the similarity degree of BPAs. Based on the relation between the BPAs and the IFSs, the supporting degree between BPAs can be obtained with the help of intuitionistic fuzzy similarity measures. Then the reliability of evidence sources can be evaluated by normalizing the total supporting degree of each BPA. To cope with the combination of conflicting information, we developed a new combination method. In the new combination method, the original BPAs were modified, based on the reliability of evidence sources and the discounting operation. The modified BPAs were combined by Dempster’s combination rule. Illustrative examples have been presented to validate the proposed evaluation method and combination method. It has been shown that the evaluation of evidence reliability can assign a low reliability to the BPA that is different from others. By the evidence discounting based on evidence reliability, the influence of unreliable BPAs on the final result will be reduced. Comparison with other methods indicates that the proposed method can deal well with the conflicting information in information fusion. Moreover, the proposed method is more cautious, which is helpful for decision making.
This paper proposed an attempt to evaluate evidence reliability in the framework of IFSs. More investigation on the relation between BPAs and IFSs, the search of a more effective and reasonable supporting degree for the BPAs, and the modification of classical combination rules could be the focus of future research.

Author Contributions

Conceptualization, W.W. and Y.S.; methodology, Y.S.; validation, W.W., W.Z. and Y.S.; writing—original draft preparation, W.W.; writing—review and editing, Y.S.; funding acquisition, Y.S.

Funding

This research was funded by National Natural Science Foundation of China under Grants No. 61703426, No. 61273275, No. 61806219, No. 61876189 and No. 61503407.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chen, S.; Wang, Y.; Shi, H.; Zhang, M.; Lin, Y. Evidential reasoning with discrete belief structures. Inf. Fusion 2018, 41, 91–104. [Google Scholar] [CrossRef]
  2. Friedberg, I.; Hong, X.; Mclaughlin, K.; Smith, P.; Miller, P.C. Evidential Network Modeling for Cyber-Physical System State Inference. IEEE Access 2017, 5, 17149–17164. [Google Scholar] [CrossRef]
  3. Liu, Y.-T.; Pal, N.R.; Marathe, A.R.; Lin, C.-T. Weighted Fuzzy Dempster–Shafer Framework for Multimodal Information Integration. IEEE Trans. Fuzzy Syst. 2018, 26, 338–352. [Google Scholar] [CrossRef] [Green Version]
  4. Liu, Z.; Pan, Q.; Dezert, J.; Han, J.; He, Y. Classifier fusion with contextual reliability evaluation. IEEE Trans. Cybern. 2018, 48, 1605–1618. [Google Scholar] [CrossRef] [PubMed]
  5. Li, G.; Zhou, Z.; Hu, C.; Chang, L.; Zhou, Z.; Zhao, F. A new safety assessment model for complex system based on the conditional generalized minimum variance and the belief rule base. Saf. Sci. 2017, 93, 108–120. [Google Scholar] [CrossRef]
  6. Zhou, Z.; Chang, L.; Hu, C.; Han, X.; Zhou, Z. A new BRB-ER-based model for assessing the lives of products using both failure data and expert knowledge. IEEE Trans. Syst. Man Cybern. Syst. 2016, 46, 1529–1543. [Google Scholar] [CrossRef]
  7. Sotirov, S.; Sotirova, E.; Atanassova, V.; Atanassov, K.; Castillo, O.; Melin, P.; Petkov, T.; Surchev, S. A Hybrid Approach for Modular Neural Network Design Using Intercriteria Analysis and Intuitionistic Fuzzy Logic. Complexity 2018, 2018, 3927951. [Google Scholar] [CrossRef]
  8. Sotirov, S.; Sotirova, E.; Melin, P.; Castilo, O.; Atanassov, K. Modular Neural Network Preprocessing Procedure with Intuitionistic Fuzzy Intercriteria Analysis Method. In Proceedings of the 11th International Conference on Flexible Query Answering Systems (FQAS), Cracow, Poland, 26–28 October 2015. [Google Scholar]
  9. Castillo, O.; Melin, P.; Tsvetkov, R.; Atanassov, K.T. Short Remark on Fuzzy Sets, Interval Type-2 Fuzzy Sets, General Type-2 Fuzzy Sets and Intuitionistic Fuzzy Sets. In Proceedings of the 7th IEEE International Conference on Intelligent Systems (IEEE IS), Warsaw, Poland, 24–26 September 2014. [Google Scholar]
  10. Garg, H.; Kumar, K. Improved possibility degree method for ranking intuitionistic fuzzy numbers and their application in multiattribute decision making. Granul. Comput. 2018, 1–11. [Google Scholar] [CrossRef]
  11. Niwas, R.; Garg, H. An approach for analyzing the reliability and profit of an industrial system based on the cost free warranty policy. J. Braz. Soc. Mech. Sci. Eng. 2018, 40, 265. [Google Scholar] [CrossRef]
  12. Song, Y.; Wang, X.; Quan, W.; Huang, W. A new approach to construct similarity measure for intuitionistic fuzzy sets. Soft Comput. 2017, 1–14. [Google Scholar] [CrossRef]
  13. Ngan, R.T.; Cuong, B.C.; Ali, M. H-max distance measure of intuitionistic fuzzy sets in decision making. Appl. Soft Comput. 2018, 69, 393–425. [Google Scholar] [CrossRef]
  14. Hwang, C.M.; Yang, M.S.; Hung, W.L. New similarity measures of intuitionistic fuzzy sets based on the Jaccard index with its application to clustering. Int. J. Intell. Syst. 2018, 33, 1672–1688. [Google Scholar] [CrossRef]
  15. Garg, H.; Kumar, K. An advanced study on the similarity measures of intuitionistic fuzzy sets based on the set pair analysis theory and their application in decision making. Soft Comput. 2018, 22, 4959–4970. [Google Scholar] [CrossRef]
  16. Song, Y.; Wang, X.; Lei, L.; Quan, W.; Huang, W. An evidential view of similarity measure for Atanassov’s intuitionistic fuzzy sets. J. Intell. Fuzzy Syst. 2016, 31, 1653–1668. [Google Scholar] [CrossRef]
  17. Garg, H.; Kumar, K. Distance measures for connection number sets based on set pair analysis and its applications to decision-making process. Appl. Intell. 2018, 48, 3346–3359. [Google Scholar] [CrossRef]
  18. Garg, H.; Arora, R. Distance and similarity measures for dual hesitant fuzzy soft sets and their applications in multi-criteria decision making problem. Int. J. Uncertain. Quantif. 2017, 7, 229–248. [Google Scholar] [CrossRef]
  19. Garg, H. A new generalized improved score function of interval-valued intuitionistic fuzzy sets and applications in expert systems. Appl. Soft Comput. 2016, 38, 989–999. [Google Scholar] [CrossRef]
  20. Fan, C.; Song, Y.; Fu, Q.; Lei, L.; Wang, X. New operators for aggregating intuitionistic fuzzy information with their application in decision making. IEEE Access 2018, 6, 27214–27238. [Google Scholar] [CrossRef]
  21. Garg, H.; Singh, S. A novel triangular interval type-2 intuitionistic fuzzy set and their aggregation operators. Iran. J. Fuzzy Syst. 2018, 15, 69–93. [Google Scholar] [CrossRef]
  22. Jamkhaneh, E.B.; Garg, H. Some new operations over the generalized intuitionistic fuzzy sets and their application to decision-making process. Granul. Comput. 2018, 3, 111–122. [Google Scholar] [CrossRef]
  23. Garg, H. Performance analysis of an industrial systems using soft computing based hybridized technique. J. Braz. Soc. Mech. Sci. Eng. 2017, 39, 1441–1451. [Google Scholar] [CrossRef]
  24. Garg, H. An approach for analyzing the reliability of industrial system using fuzzy Kolmogorov’s differential equations. Arab. J. Sci. Eng. 2015, 40, 975–987. [Google Scholar] [CrossRef]
  25. Garg, H.; Rani, M.; Sharma, S.P.; Vishwakarma, Y. Intuitionistic fuzzy optimization technique for solving multi-objective reliability optimization problems in interval environment. Expert Syst. Appl. 2014, 41, 3157–3167. [Google Scholar] [CrossRef]
  26. Islam, S.; Kundu, T. A Generalized Intuitionistic Fuzzy Optimization Approach on Entropy based Multi-Objective Reliability Optimization Model. Fuzzy Syst. 2018, 10, 92–98. [Google Scholar]
  27. Wang, X.; Song, Y. Uncertainty measure in evidence theory with its applications. Appl. Intell. 2018, 48, 1672–1688. [Google Scholar] [CrossRef]
  28. Fan, C.; Song, Y.; Lei, L.; Wang, X.; Bai, S. Evidence reasoning for temporal uncertain information based on relative reliability evaluation. Exp. Syst. Appl. 2018, 113, 264–276. [Google Scholar] [CrossRef]
  29. Song, Y.; Wang, X.; Zhu, J.; Lei, L. Sensor dynamic reliability evaluation based on evidence and intuitionistic fuzzy sets. Appl. Intell. 2018, 48, 3950–3962. [Google Scholar] [CrossRef]
  30. Elouedi, Z.; Mellouli, K.; Smets, P. Assessing Sensor Reliability for Multisensor Data Fusion Within the Transferable Belief Model. IEEE Trans. Syst. Manand Cybern. Part B Cybern. 2004, 34, 782–787. [Google Scholar] [CrossRef]
  31. Guo, H.; Shi, W.; Deng, Y. Evaluating Sensor Reliability in Classification Problems Based on Evidence Theory. IEEE Trans. Syst. Manand Cybern. Part B Cybern. 2006, 36, 970–981. [Google Scholar] [CrossRef]
  32. Klein, J.; Colot, O. Automatic discounting rate computation using a dissent criterion. In Proceedings of the Workshop on the Theory of Belief Functions, Brest, France, 31 March 2010; pp. 1–6. [Google Scholar]
  33. Jousselme, A.-L.; Grenier, D.; Bosse, E. A new distance between two bodies of evidence. Inf. Fusion 2001, 2, 91–101. [Google Scholar] [CrossRef]
  34. Liu, Z.; Dezert, J.; Pan, Q.; Mercier, G. Combination of sources of evidence with different discounting factors based on a new dissimilarity measure. Decis. Support Syst. 2011, 52, 133–141. [Google Scholar] [CrossRef]
  35. Dempster, A.P. Upper and lower probabilities induced by a multiple valued mapping. Ann. Math. Stat. 1967, 38, 325–339. [Google Scholar] [CrossRef]
  36. Shafer, G. A Mathematical Theory of Evidence; Princeton University Press: Princeton, NJ, USA, 1976. [Google Scholar]
  37. Smets, P. Data fusion in the transferable belief model. In Proceedings of the 3rd International Conference on Information Fusion, Paris, France, 10 July 2000; pp. PS21–PS33. [Google Scholar]
  38. Zadeh, L.A. A simple view of the Dempster-Shafer theory of evidence and its implication for the rule of combination. AI Mag. 1986, 2, 85–90. [Google Scholar]
  39. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef] [Green Version]
  40. Atanassov, K.T. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  41. Deng, Y.G.; Shi, W.K.; Zhu, Z.F.; Liu, Q. Combining belief functions based on distance of evidence. Decis. Support Syst. 2004, 38, 489–493. [Google Scholar]
Table 1. Five BPAs corresponding to five sensors.
Table 1. Five BPAs corresponding to five sensors.
m1m2m3m4m5
{θ1}0.80.400.30.45
{θ2}0.10.20.950.20.1
{θ3}00.10.050.250
{θ1, θ2}00.300.20
{θ2, θ3}00000.15
Θ0.1000.050.3
Table 2. Combination results of different evidence bodies.
Table 2. Combination results of different evidence bodies.
m 1 2 m 1 3 m 1 4 m 1 5
Classical Dempster’s rulem({θ1}) = 0.8451
m({θ2}) = 0.0986
m({θ3}) = 0.0140
m({θ1,θ2}) = 0.0423
m({θ1}) = 0
m({θ2}) = 0.9948
m({θ3}) = 0.0052
m({θ1}) = 0
m({θ2}) = 0.9965
m({θ3}) = 0.0035
m({θ1}) = 0
m({θ2}) = 0.9971
m({θ3}) = 0.0029
dJ & Dempster’s rule [41]m({θ1}) = 0.7659
m({θ2}) = 0.1166
m({θ3}) = 0.0294
m({θ1,θ2}) = 0.0881
m({θ1}) = 0.6239
m({θ2}) = 0.2791
m({θ3}) = 0.0252
m({θ1,θ2}) = 0.0718
m({θ1}) = 0.6858
m({θ2}) = 0.2645
m({θ3}) = 0.0146
m({θ1,θ2}) = 0.0351
m({θ1}) = 0.7528
m({θ2}) = 0.2217
m({θ3}) = 0.0096
m({θ1,θ2}) = 0.0159
Liu’s method in [34]m({θ1}) = 0.7503
m({θ2}) = 0.1196
m({θ3}) = 0.0319
m({θ1,θ2}) = 0.0957
m(Θ) = 0.0025
m({θ1}) = 0.7157
m({θ2}) = 0.1598
m({θ3}) = 0.0308
m({θ1,θ2}) = 0.0913
m(Θ) = 0.0024
m({θ1}) = 0.7670
m({θ2}) = 0.11655
m({θ3}) = 0.0194
m({θ1,θ2}) = 0.0477
m(Θ) = 0.0004
m({θ1}) = 0.8254
m({θ2}) = 0.1424
m({θ3}) = 0.0120
m({θ1,θ2}) = 0.0198
m({θ2,θ3}) = 0.0002
m(Θ) = 0.0002
Proposed methodm({θ1}) = 0.8451
m({θ2}) = 0.0986
m({θ3}) = 0.0141
m({θ1,θ2}) = 0.0423
m(Θ) = 0.0011
m({θ1}) = 0.5317
m({θ2}) = 0.4070
m({θ3}) = 0.0170
m({θ1,θ2}) = 0.0443
m({θ1}) = 0.5969
m({θ2}) = 0.3596
m({θ3}) = 0.0137
m({θ1,θ2}) = 0.0296
m(Θ) = 0.0002
m({θ1}) = 0.6923
m({θ2}) = 0.2832
m({θ3}) = 0.0100
m({θ1,θ2}) = 0.0142
m(Θ) = 0.0002

Share and Cite

MDPI and ACS Style

Wu, W.; Song, Y.; Zhao, W. Evaluating Evidence Reliability on the Basis of Intuitionistic Fuzzy Sets. Information 2018, 9, 298. https://doi.org/10.3390/info9120298

AMA Style

Wu W, Song Y, Zhao W. Evaluating Evidence Reliability on the Basis of Intuitionistic Fuzzy Sets. Information. 2018; 9(12):298. https://doi.org/10.3390/info9120298

Chicago/Turabian Style

Wu, Wenhua, Yafei Song, and Weiwei Zhao. 2018. "Evaluating Evidence Reliability on the Basis of Intuitionistic Fuzzy Sets" Information 9, no. 12: 298. https://doi.org/10.3390/info9120298

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop