An Evidence Combination Rule Based on the Support Degree of Focal Element

Author(s):  
He Luo ◽  
Shanlin Yang ◽  
Chao Fu ◽  
Xiaojian Hu
2019 ◽  
Vol 15 (1) ◽  
pp. 155014771882399 ◽  
Author(s):  
Lei Chen ◽  
Ling Diao ◽  
Jun Sang

Managing conflict in Dempster–Shafer theory is a popular topic. In this article, we propose a novel weighted evidence combination rule based on improved entropy function. This newly proposed approach can be mainly divided into two steps. First, the initial weight will be determined on the basis of the distance of evidence. Then, this initial weight will be modified using improved entropy function. This new method converges faster when handling high conflicting evidences and greatly reduces uncertainty of decisions, which can be demonstrated by a numerical example where the belief degree is raised up to 0.9939 when five evidences are in conflict, an application in faulty diagnosis where belief degree is increased hugely from 0.8899 to 0.9416 when compared with our previous works, and a real-life medical diagnosis application where the uncertainty of decision is reduced to nearly 0 and the belief degree is raised up to 0.9989.


2018 ◽  
Vol 2018 ◽  
pp. 1-10 ◽  
Author(s):  
Lei Chen ◽  
Ling Diao ◽  
Jun Sang

Conflict management in Dempster-Shafer theory (D-S theory) is a hot topic in information fusion. In this paper, a novel weighted evidence combination rule based on evidence distance and uncertainty measure is proposed. The proposed approach consists of two steps. First, the weight is determined based on the evidence distance. Then, the weight value obtained in first step is modified by taking advantage of uncertainty. Our proposed method can efficiently handle high conflicting evidences with better performance of convergence. A numerical example and an application based on sensor fusion in fault diagnosis are given to demonstrate the efficiency of our proposed method.


2018 ◽  
Author(s):  
Gabriel Awogbami ◽  
Norbert Agana ◽  
Shabnam Nazmi ◽  
Abdollah Homaifar

2018 ◽  
Vol 14 (10) ◽  
pp. 155014771879462 ◽  
Author(s):  
Jian Wang ◽  
Kuoyuan Qiao ◽  
Zhiyong Zhang

Trust is an important criterion for access control in the field of online social networks privacy preservation. In the present methods, the subjectivity and individualization of the trust is ignored and a fixed model is built for all the users. In fact, different users probably take different trust features into their considerations when making trust decisions. Besides, in the present schemes, only users’ static features are mapped into trust values, without the risk of privacy leakage. In this article, the features that each user cares about when making trust decisions are mined by machine learning to be User-Will. The privacy leakage risk of the evaluated user is estimated through information flow predicting. Then the User-Will and the privacy leakage risk are all mapped into trust evidence to be combined by an improved evidence combination rule of the evidence theory. In the end, several typical methods and the proposed scheme are implemented to compare the performance on dataset Epinions. Our scheme is verified to be more advanced than the others by comparing the F-Score and the Mean Error of the trust evaluation results.


Sign in / Sign up

Export Citation Format

Share Document