Ying-Jin Lu, Jun He. Dempster-Shafer Evidence Theory and Study of Some Key Problems[J]. Journal of Electronic Science and Technology, 2017, 15(1): 106-112. DOI: 10.11989/JEST.1674-862X.5030211
Citation: Ying-Jin Lu, Jun He. Dempster-Shafer Evidence Theory and Study of Some Key Problems[J]. Journal of Electronic Science and Technology, 2017, 15(1): 106-112. DOI: 10.11989/JEST.1674-862X.5030211

Dempster-Shafer Evidence Theory and Study of Some Key Problems

doi: 10.11989/JEST.1674-862X.5030211
Funds: 

This work was supported by the Special Project in Humanities and Social Sciences by the Ministry of Education of China (Cultivation of Engineering and Technological Talents) under Grant No. 13JDGC002

More Information
  • Author Bio:

    Ying-Jin Lu. His research interests include logistics and supply chain management, system complexity, and business network privacy protection,e-mail:luyingjin@uestc.edu.cn;
    Jun He. Her research interests include logistics and supply chain management, system complexity, and business network privacy protection,e-mail:sc_hejun@139.com

    Ying-Jin Lu. His research interests include logistics and supply chain management, system complexity, and business network privacy protection,e-mail:luyingjin@uestc.edu.cn;
    Jun He. Her research interests include logistics and supply chain management, system complexity, and business network privacy protection,e-mail:sc_hejun@139.com

  • Received Date: 2015-03-01
  • Rev Recd Date: 2016-02-28
  • Publish Date: 2017-03-24
  • As one of the most important mathematical methods, the Dempster-Shafer (D-S) evidence theory has been widely used in date fusion, risk assessment, target identification, knowledge reasoning, and other fields. This paper summarized the development and recent studies of the explanations of D-S model, evidence combination algorithms, and the improvement of the conflict during evidence combination, and also compared all explanation models, algorithms, improvements, and their applicable conditions. We are trying to provide a reference for future research and applications through this summarization.
  • [1]
    A. P. Dempster, Upper and lower probabilities induced by a multivalued mapping, Studies in Fuzziness and Soft Computing, vol. 219, no. 2, pp. 57-72, 2008.
    [1]
    A. P. Dempster, A generalization of Bayesian inference, Journal of the Royal Statistical Society, vol. 30, no. 30, pp. 73-104, 2008.
    [2]
    G. Shafer, A Mathematical Theory of Evidence, Princeton:Princeton University Press, 1976.
    [3]
    J. Kohlas and P. A. Monney, A Mathematical Theory of Hints:An Approach to the Dempster-Shafer Theory of Evidence, Springer-Verlag, 1995.
    [4]
    T. Denoeux, A neural network classifier based on Dempster-Shafer theory, IEEE Trans. on Systems, Man and Cybernetics, vol. 30, no. 2, pp. 131-150, 2000.
    [5]
    F. Dong, S. M. Shartz, and H.-P. Xu, Reasoning under uncertainty for shill detection in online auctions using Dempster-Shafer theory, Intl. Journal of Software Engineering and Knowledge Engineering, vol. 20, no. 20, pp. 943-973, 2012.
    [6]
    R. P. Srivastava, T. J. Mock, and L. Gao, The Dempster-Shafer theory:An introduction and fraud risk assessment illustration Australian accounting review, Australian Accounting Review, vol. 21, no. 3, pp. 282-291, 2011.
    [7]
    E. Nusrat and K. Yamada, A descriptive decision-making model under uncertainty:Combination of Dempster-Shafer theory and prospect theory, Intl. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 21, no. 1, pp. 79-102, 2012.
    [8]
    R. Fagin and J. Y. Halpern, A new approach to updating beliefs, in Proc. of Conf. on Uncertainty in Artificial Intelligence, 1990, pp. 347-374.
    [9]
    J. Y. Halpern and R. Fagin, Two views of belief:Belief as generalized probability and belief as evidence, Artificial Intelligence, vol. 54, no. 3, pp. 275-317, 1992.
    [10]
    W. Xiong, Dempster-Shafer evidence theory and explanation, Journal of South China Normal University, vol. 3. pp. 15-21, Jun. 2000.
    [11]
    G. Shafer and A. Tversky, Language and designs for probability judgment, Cognitive Science, vol. 9, no. 3, pp. 309-339, 1985.
    [12]
    I. Levi. Consonance, dissonance and evidentiary methanisms. Philosophy. 1993.[Online]. Available:https://philpapers.org/rec/LEVCDA
    [13]
    P. Smets, The transferable belief model and other interoretations of Dempster-Shafer's model, in Uncertainly in Artificial Intelligence, D.-Y. Li and Y. Du, Ed. Beijing:National Defence Indastry Press, 1991, pp. 375-383.
    [14]
    P. Smets and R. Kennes, The transferable belief model, Artificial Intelligence, vol. 66, no. 2, pp. 91-96, 1994.
    [15]
    G. Shafer and J. Pearl, Readings in Uncertain Reasoning Morgan Kaufmann, Bartington:Morgan Kaufmann Publishers Inc., 1990, pp. 298-312.
    [16]
    G. Shafer and R. Srivastava, The Bayesian and belief-funetion foronalisms:A general perspective for audifing, in Reading in Uncertain Reasoning, G. Shafer and J. Pearl, Ed. Burlington:Morgan kaufmann Publishers Inc., 1990, pp. 482-521.
    [17]
    C.-F. Xu, W.-D. Geng, and Y.-H. Pan, Review of theory and applications of Dempster-Shafer evidential reasoning method, Pattern Recognition and Artificial Intelligence, vol. 12, no. 4, pp. 424-430, 1999.
    [18]
    V. Frans, On the justification of Dempster's rule of combination, Artificial Intelligence, vol. 48, no. 2, pp. 171-197, 1991.
    [19]
    L. A. Zadeh, On the validity of Dempster's rule of combination of evidence, in Proc. of Intl. Symposium on Memory Management, 1979, pp. 479-524.
    [20]
    D. Dubois and H. Prade, Default reasoning and possobility theory, Artificial Intelligence, vol. 35, no. 2, pp. 243-257, 1988.
    [21]
    Z. Pawlak, Rough sets, Intl. Journal of Computer and Information Sciences, vol. 11, no. 5, pp. 341-356, 1982.
    [22]
    J. A. Barnett, Computational methods for a mathematical theory of evidence, Studies in Fuzziness and Soft Computing, vol. 219, pp. 868-875, 2008.
    [23]
    J. Gordon and E. H. Shortliffe, A method for managing evidential reasoning in a hierarchical hypothesis space, Artificial Intelligence, vol. 26, no. 3, pp. 323-357, 1985.
    [24]
    J. Pearl, On evidential reasoning in a hierarchy of hypothesis, Artificial Intelligence, vol. 28, no. 1, pp. 9-15, 1986.
    [25]
    G. Shafer and R. Logan, Implementing Dempster's rule for hierarchical evidence, Springer Berlin Heidelberg, vol. 33, no. 3, pp. 271-298, 2008.
    [26]
    F. Voorbraak, A computationally efficient approximation of Dempster-Shafer theory, Intl. Man-Machine Studies, vol. 30, no. 5, pp. 525-536, 1989.
    [27]
    B. Tessem, Approximations for efficient computation in the theory of evidence, Artificial Intelligence, vol. 61, no. 2, pp. 315-329, 1993.
    [28]
    M. A. Simard, J. Couture, and E. Bosse, Data fusion of multiple sensors attribute information for target identity estimation using a Dempster-Shafer evidential combination algorithm, in Proc. of SPIE-Intl. Society for Optical Engineering, 1996, pp. 577-588.
    [29]
    T. Burger and F. Cuzzolin, The barycenters of the k-additive dominating belief functions and the Pignistic k-additive belief functions, in Proc. of Workshop on the Theory of Belief Functions, 2010, pp. 1-6.
    [30]
    T. Denoeux, Inner and outer approximation of belief structures using a hierarchical clustering approach, Intl. Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems, vol. 9, no. 4, pp. 437-460, 2001.
    [31]
    J. Dezert, D.-Q. Han, and Z.-G. Liu, Hierarchical DSMP transformation for decision-making under uncertainty, in Proc. of the 15th Intl. Conf. on Information Fusion, 2012, pp. 294-301.
    [32]
    D.-Q. Han, J. Dezert, and C.-Z. Han, New basic belief assignment approximations based on optimization, in Proc. of the 15th Intl. Conf. on Information Fusion, 2012, pp. 286-293.
    [33]
    Y. Yang, D.-Q. Han, and C.-Z. Han, Discounted combination of unreliable evidence using degree of disagreement, Intl. Journal of Approximate Reasoning, vol. 54, no. 8, pp. 1197-1216, 2013.
    [34]
    R. R. Yager, On the Dempster-Shafer framework and new combination rules, Information Sciences, vol. 41, no. 2, pp. 93-137, 1987.
    [35]
    E. Lefevre, O. Colot, and P. Vannoorenberghe, Belief functions combination and conflict management, Information Fusion, vol. 3, no. 2, pp. 149-162, 2002.
    [36]
    D. Dubois and H. Prade, Representation and combination of uncertainty with belief functions and possibility measures, Computational Intelligence, vol. 4, pp. 244-264, Sept. 1998.
    [37]
    P. Smets, Data fusion in the transferable belief model, in Proc. of Intl. Conf. on Information Fusion, 2000, pp. 359-364.
    [38]
    Q. Sun, X.-Q. Ye, and W.-K. Gu, A new combination rule of evidence theory, Acta Electronica Sinica, vol. 28, no. 8, pp. 117-119, 2000.
    [39]
    A. Martin and C. Osswald, Toward a combination rule to deal with partial conflict and specificity in belief functions theory, Computer Science, vol. 9, no. 8, pp. 1-8, 2008.
    [40]
    F. Smarandache and J. Dezert, Applications and advances of DSMT for information fusion, Instrument Standardization Metrology, vol. 368, no.2, pp. 137-160, 2006.
    [41]
    Y. Deng, W.-K. Shi, and Z.-F. Zhu, Efficient combination approach of conflict evidence, Journal of Infrared Millimeter Wave, vol. 23, no. 1, pp. 27-32, 2004.
    [42]
    S.-Y. Zhang, Q. Pan, and H.-C. Zhang, Conflict problem of Dempster-Shafer evidence theory, Acta Aeronautica et Astronautica Sinica, vol. 22, no. 4, pp. 369-372, 2001.
    [43]
    R. Haenni, Are alternatives to Dempster's rule of combination real alternatives:Comments on about the belief function combination and the conflict management problem, Information Fusion, vol. 3, no. 3, pp. 237-239, 2002.
    [44]
    C. K. Murphy, Combining belief functions when evidence conflicts, Decision Support Systems, vol. 29, no. 1, pp. 1-9, 2000.
    [45]
    L.-Y. Xu, G.-C. Yin, Y.-S. Gong, and H. Zhao, Combination rules of various credibility evidences and application, Journal of North Eastern University, vol. 23, no. 2, pp. 123-125, 2002.
    [46]
    C.-Y. Liang, Z.-M. Chen, Y.-Q. Huang, and J.-J. Tong, A method of dispelling the absurdities of Dempste-Shafer's rule of combination, Systems Engineering-Theory and Practice, vol. 25, pp. 7-12, Aug. 2005.
    [47]
    Y.-J. Ding, S.-L. Wang, and X.-D. Zhao, An improved method of D-S evidence reasoning, in Proc. of IEEE Intl. Conf. on Communications Technology and Applications, 2009, pp. 761-765.
    [48]
    W.-L. Li and K.-H. Guo, Combination rules of D-S evidence theory and conflict problem, System Engineering Theory and Practice, vol. 30, no. 8, pp. 1423-1432, 2010.
    [49]
    L.-M. Jiang, J.-L. He, and H. Zhang, New fusion approach for conflicting evidence in D-S theory of evidence, Computer Science, vol. 38, no. 4, pp. 236-238, 2011.
    [50]
    J.-L. Bai and Y. Wang, Efficient combination approach to conflict evidence for D-S theory, System Engineering Theory and Practice, vol. 31, no. 9, pp. 2106-2109, 2009.
    [51]
    L. Wang, J. Bai, and Y.-R. Zhang, A new method for conflict evidence processing in D-S theory, Science Technology and Engineering, vol. 13, no. 28, pp. 8497-8501, 2013.
    [52]
    J. Cao and X. Meng, Efficient combination of conflict evidence for D-S theory, Application Research of Computers, vol. 29, no. 5, pp. 1815-1817, 2012.
    [53]
    N.-X. Xie, G.-Q. Wen, and Z.-W. Li, A method for fuzzy soft sets in decision making based on grey relational analysis and D-S theory of evidence:Application to medical diagnosis, Artificial Intelligence in Medicine, vol. 64, no. 3, pp. 161-171, 2005.
    [54]
    T.-M. Liu, Surface target recognition based on evidence theory, fuzzy inference and multisensory information fusion, Pattern Recognition Artificial Intelligence, vol. 12, no. 1, pp. 25-31, 1999.
    [55]
    B.-G. Gong, Methods based on Dempster-Shafer theory for multi-attribute decision making with incomplete information, M.S. thesis, School of Management, University of Science and Technology of China, Chengdu, China, 2007.
    [56]
    M. Khazaee, H. Ahmadi, M. Omid, and M. Khazaee, Vibration condition monitoring of planetary gears based on decision level data fusion using Dempster-Shafer theory of evidence, Journal of Vibroengineering, vol. 14, no. 2, pp. 838-851, 2012.
    [57]
    A. Moosavian, M. Khazaee, G. Najafi, M. Kettner, and R. Mamat, Spark plug fault recognition based on sensor fusion and classifier combination using Dempster-Shafer evidence theory, Applied Acoustics, vol. 93, no. 2, pp. 120-129, 2015.
    [58]
    X.-F. Fan and M.-J. Zuo, Fault diagnosis of machines based on D-S evidence theory. Part 2:Application of the improved D-S evidence theory in gearbox fault diagnosis, Pattern Recognition Letters, vol. 27, no. 5, pp. 377-385, 2006.
    [59]
    X.-P. Wang, B. Qu, and Y.-N. Wen, Fault diagnosis for complex fault based on the parallel algorithm of evidence theory synthesizer, Fluid Machinery, vol. 42, no. 4, pp. 32-36, 2014.
    [60]
    Y.-J. Zhang, The motivation model of post-80s knowledge-worker for private enterprise of Kun Ming, M.S. thesis, School of Management, Kun Ming University of Science and Engineering, Kunming, China, 2013.
    [61]
    C.-B. Li, G.-F. Qing, P. Li, and T.-T. Yin, Operational risk assessment of distribution network equipment based on rough set and D-S evidence theory, Journal of Applied Mathematics, vol. 2013, pp. 1-7, Nov. 2013.
    [62]
    J.-P. Yang, H.-Z. Huang, L.-P. He, S.-P. Zhua, and D.-W. Wen, Risk evaluation in failure mode and effects analysis of aircraft turbine rotor blades using Dempster-Shafer evidence theory under uncertainty, Engineering Failure Analysis, vol. 18, no. 8, pp. 2084-2092, 2011.
    [63]
    Y.-J. Guo, C. Wu, and T.-J. Yu, An assessment algorithm of credit risk based on BP neural network group and D-S evidential theory, Journal of Hefei University of Technology, vol. 23, no. 5, pp. 42-45, 2009.
    [64]
    V. N. Huynh, Y. Nakamori, T. B. Ho, and T. Murai, Multiple attribute decision making under uncertainty:The evidential reasoning approach revisited, IEEE Trans. on Systems, Man Cybernetics:Part A, vol. 36, no. 4, pp. 804-822, 2006.
  • Related Articles

    [1]Zhi-Yang Wu, Xian Guo, Zhi-Hui Wu. Investigation on Active and Reactive Combined Spot Price Integrated with Wind Farm[J]. Journal of Electronic Science and Technology, 2013, 11(1): 84-88. DOI: 10.3969/j.issn.1674-862X.2013.01.015
    [2]Hui Dong, Le-Tian Huang, Jun-Shi Wang, Terrence Mak. Combining Task Scheduling in Power Adaptive Dynamic Reconfigurable System[J]. Journal of Electronic Science and Technology, 2012, 10(4): 296-301. DOI: 10.3969/j.issn.1674-862X.2012.04.003
    [3]Da-Tong Liu, Yu Peng, Xi-Yuan Peng. Online Fault Prediction Based on Combined AOSVR and ARMA Models[J]. Journal of Electronic Science and Technology, 2009, 7(4): 303-307.
    [4]An-Tao Chen, Xu Lei, Yong-Xiu Lai, De-Zhong Yao. Effect of Level of Processing Prior to Response on Cognitive Control: Evidence from ERP[J]. Journal of Electronic Science and Technology, 2009, 7(1): 82-87.
    [5]MUNIER Francis. Technological Intensity of Sectors, Size of the Firms and Competencies of Network Evidence from French Industrial Firms[J]. Journal of Electronic Science and Technology, 2006, 4(4): 385-392.
    [6]CHEN Xiang-dong, LIU Xiao-qing. Technology Convergence and Divergence in China's Electronic Industries: Evidence from Patents[J]. Journal of Electronic Science and Technology, 2006, 4(4): 307-311.
    [7]DENG Lin, RAO Ni-ni, WANG Gang. Active Shape Model of Combining Pca and Ica: Application to Facial Feature Extraction[J]. Journal of Electronic Science and Technology, 2006, 4(2): 114-117.
    [8]SUN Xin, LIU Bing, LIU Ben-yong. Face Recognition Combining Eigen Features with a Parzen Classifier[J]. Journal of Electronic Science and Technology, 2005, 3(1): 18-21.
    [9]CHEN Jian, HUANG He. Study on the Winning Probability for a Bid in Procurement Combinational Auction with Tree Structure[J]. Journal of Electronic Science and Technology, 2004, 2(3): 18-21,46.
    [10]WANG Fei, LI Zai-ming. Recognition of Characters by Adaptive Combination of Classifiers[J]. Journal of Electronic Science and Technology, 2004, 2(2): 7-9.
  • Cited by

    Periodical cited type(6)

    1. Batista, A.D.S., Dos Santos, A.L. A Survey on Resilience in Information Sharing on Networks: Taxonomy and Applied Techniques. ACM Computing Surveys, 2024, 56(12): 302. DOI:10.1145/3659944
    2. Hoseini, R., Farzaneh, N. Confronting DDoS Attacks in Software-Defined Wireless Sensor Networks based on Evidence Theory. Journal of Information Systems and Telecommunication, 2021, 9(33): 25-36. DOI:10.52547/jist.9.33.25
    3. Dunham, J., Johnson, E., Feron, E. et al. Application of Dempster–Shafer Networks to a Real-Time Unmanned Systems Risk Analysis Framework. Journal of Aerospace Information Systems, 2021, 18(9): 616-631. DOI:10.2514/1.I010924
    4. Dunham, J., Johnson, E., Feron, E. et al. Unmanned systems health analysis through evidential reasoning networks. AIAA/IEEE Digital Avionics Systems Conference - Proceedings, 2020. DOI:10.1109/DASC50938.2020.9256593
    5. Dunham, J., Johnson, E., Feron, E. et al. Automatic updates of transition potential matrices in dempster-shafer networks based on evidence inputs. Sensors (Switzerland), 2020, 20(13): 1-37. DOI:10.3390/s20133727
    6. Weiwei, M., Lei, W., Haiyang, W. et al. Fault Processing Algorithm of Power backbone Communication networks Based on Artificial Intelligence and State Perception. 2019. DOI:10.1109/ISGT-Asia.2019.8881180

    Other cited types(0)

  • Catalog

      Article Metrics

      Article views (511) PDF downloads (122) Cited by(6)
      Related
      Proportional views

      /

      DownLoad:  Full-Size Img  PowerPoint
      Return
      Return