Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2021 Jan 27;21(3):840. doi: 10.3390/s21030840

Complex Pignistic Transformation-Based Evidential Distance for Multisource Information Fusion of Medical Diagnosis in the IoT

Fuyuan Xiao 1
Editor: Jose Molina López1
PMCID: PMC7865225  PMID: 33513860

Abstract

Multisource information fusion has received much attention in the past few decades, especially for the smart Internet of Things (IoT). Because of the impacts of devices, the external environment, and communication problems, the collected information may be uncertain, imprecise, or even conflicting. How to handle such kinds of uncertainty is still an open issue. Complex evidence theory (CET) is effective at disposing of uncertainty problems in the multisource information fusion of the IoT. In CET, however, how to measure the distance among complex basis belief assignments (CBBAs) to manage conflict is still an open issue, which is a benefit for improving the performance in the fusion process of the IoT. In this paper, therefore, a complex Pignistic transformation function is first proposed to transform the complex mass function; then, a generalized betting commitment-based distance (BCD) is proposed to measure the difference among CBBAs in CET. The proposed BCD is a generalized model to offer more capacity for measuring the difference among CBBAs. Additionally, other properties of the BCD are analyzed, including the non-negativeness, nondegeneracy, symmetry, and triangle inequality. Besides, a basis algorithm and its weighted extension for multi-attribute decision-making are designed based on the newly defined BCD. Finally, these decision-making algorithms are applied to cope with the medical diagnosis problem under the smart IoT environment to reveal their effectiveness.

Keywords: complex evidence theory, Dempster–Shafer evidence theory, distance measure, complex mass function, complex pignistic transformation, betting commitment, multisource information fusion, multi-attribute decision-making, medical diagnosis, Internet of Things (IoT)

1. Introduction

The Internet of Things (IoT) refers to a very large network, which connects various devices for intelligent identification, locating, tracking, monitoring, and management [1,2]. Thanks to the development of information and communication technologies, the IoT is becoming ubiquitous in all kinds of applications. On the other hand, it is well known that clinical medical service is complex, in which the collection, preservation, analysis, and fusion of patient information takes much time and labor many materials [3,4]. Furthermore, traditional medical systems cannot diagnose patients with a high level decision-making due to a single information source, and this affects the quality of clinical medical service. Therefore, the emergence of the IoT becomes a milestone in the field of the digital medical domain. Medical diagnosis under the smart IoT environment can send physiological information and medical signals through communication networks to monitoring systems for analyzing and diagnosing with the aid of artificial intelligence techniques [5,6,7]. Consequently, it is beneficial for improving clinical medical services and lowering management costs, so that it can help to make better lifestyle and disease prevention plans and personalized medical services for patients [8,9]. In particular, in the data processing of the medical IoT, data fusion technology under uncertain environment plays a very important role, which is effective for processing mass data from multiple sources to better support medical decision-making. Hence, in this paper, we focus on improving the performance of the fusion process under an uncertain medical IoT.

As is well known, Dempster–Shafer evidence theory (DSET) [10,11] has several desirable characteristics to deal with the uncertainty problem. To be specific, the mass function (MF), also called basis belief assignment (BBA), in DSET can express uncertainty quantitatively [12]. Additionally, the Dempster rule of combination (DRC) in DSET can fuse multisource information to reduce uncertainty in the fusion process for supporting decision-making well [13,14,15]. Meanwhile, the DRC meets commutative and associative laws [16,17]. Hence, DSET has been extensively researched, including the aspects of D numbers [18,19], evidential reasoning [20], heuristic representation learning [21], entropy [22,23], generation [24,25], dependency [26], the negation [27] of BBAs, etc. [12]. In particular, DSET was recently well exploited by Xiao [28,29] for the complex plane for handling more complex uncertainty problems, called complex evidence theory (CET).

In CET [28,29], the classical MF is extended to the complex mass function, also called complex basis belief assignment (CBBA), to express uncertainty quantitatively, in which the complex mass function is expressed by complex numbers, not just positive real numbers. In addition, the classical DRC is generalized to fuse CBBAs to better support decision-making, which also satisfies commutative and associative laws. Therefore, since CET is complex-value modeled with the aid of the two dimensions of amplitude and phase, it is more capable of representing and handling uncertainty in the fusion process [30]. In particular, when CBBAs reduce to classical BBAs, CET degrades into DSET in the condition that the conflict coefficient is less than one. Consequently, CET affords a more generalized framework compared with the classical DSET.

In the classical DSET, distance plays an important role to measure the differences among BBAs, which is a benefit for conflict management. Many researchers dedicated much effort to address this problem in the past few decades [31,32], especially for the familiar distance of Jousselme et al. [33]. Subsequently, Jousselme and Maupin [34] provided a comprehensive survey on evidential distances. Later on, Bouchard et al. [35] proved a strict distance metric of Jousselme et al.’s distance. On the other hand, some scholars studied the difference measure from other perspectives, such as the correlation coefficient, and other hybrid models. For example, Jiang [36], Xiao [37], and Pan and Deng [38] researched the correlation coefficients among BBAs. Liu [39] analyzed the conflict degree by means of the conflict coefficient and distance among the betting commitments of BBAs. Even if the existing methods can well manage conflict problems in the classical DSET, very few of them have the ability to measure the difference among CBBAs in the complex plane framework of CET, except for the conflict coefficient [28,29] and complex evidential distance [40] of CET.

In this paper, inspired by Liu’s distance among the betting commitments of BBAs [39], a generalized betting commitment-based distance (BCD) is proposed to measure the difference among CBBAs in CET. To be specific, a complex Pignistic transformation is first proposed for not only singletons, but also subsets of CBBAs. Next, a betting commitment function is designed for all subsets of CBBAs on the basis of complex Pignistic transformation. Based on that, the distance among the betting commitments of CBBAs is devised to measure the difference among CBBAs. In particular, when CBBAs reduce to the classical BBAs, the BCD degenerates into Liu’s distance. Therefore, the proposed BCD is a generalized model to offer more capacity for measuring the difference among CBBAs. Additionally, other properties of the BCD are analyzed, including the non-negativeness, nondegeneracy, symmetry, and triangle inequality. It is then proven that the BCD is a strict distance metric because it satisfies distance axioms. Furthermore, BCD is compared with other related well-known methods to show its superiority. Besides, a basis algorithm and its weighted extension for multi-attribute decision-making are designed based on the newly defined BCD. Finally, these decision-making algorithms are applied to cope with the medical diagnosis problem under the smart IoT environment to reveal its effectiveness.

The contributions are summarized as follows:

  • This is the first work to propose the complex pignistic transformation-based evidential betting commitment distance (BCD) for the multisource information fusion of medical diagnosis in the IoT.

  • The BCD is a strict distance metric that satisfies the axioms of the nonnegativity, nondegeneracy, symmetry, and triangle inequality, which is a generalization of the classical evidential distance of Liu.

  • A basis algorithm and its weighted extension for decision-making are designed on the basis of the BCD, which are applied to the medical IoT to demonstrate their effectiveness.

This paper is organized as follows. The preliminaries are introduced in Section 2. A new conflict measure model is proposed in Section 3. Section 4 provides several examples for the comparison and analysis of the proposed distance with other well-known methods. In Section 5, a basis multi-attribute decision-making algorithm and its extension are designed; then, they are applied to address the problem of medical diagnosis. Finally, Section 6 gives the conclusion.

2. Preliminaries

2.1. Medical IoT

A variety of publications have been presented to handle the problems of the medical IoT. The medical IoT technologies are mainly classified into two ares: remote monitoring and big data analysis [41].

For remote monitoring in the medical IoT, remote health checking and real-time location service are the key mechanisms. The sensor-based devices continuously record physiological signals with regard to the patient and then transfer the collected data to a monitoring server. Distant health care checking can be implemented via applications that get physiological data from patients. The collected data will be analyzed and processed according to smart algorithms to better support decision-making. Researchers have studied remote monitoring in the medical IoT from different perspectives. For example, Hossain and Muhammad [42] presented a health IoT-enabled monitoring framework, in which medical data are gathered through mobile devices and sensors and then securely transmitted to the cloud for seamless access by medical professionals. Gómez et al. [43] developed an architecture on the basis of an ontology to monitor health and workout routine recommendations to patients. Abawajy and Hassan [44] presented a pervasive patient health monitoring system infrastructure on the basis of integrated cloud computing and IoT technologies.

For big data analysis in the medical IoT, its purpose is to investigate and offer effective service. Due to accessing patient data both in routine clinical visits and at home, how to manage big data must be considered in accordance with data collection, data computing, analysis, and safety. Many researchers put forward various methods in this area. For instance, He and Zeadally [45] discussed the security requirements of RFID authentication schemes and presented a review of ECC-based RFID authentication schemes in terms of performance and security. Dimitrov [46] studied the medical IoT and big data in healthcare. Lomotey et al. [47] exploited an enhanced Petri nets service model to help for tracing medical data generation, tracking, and detecting data compromises. Zhang [48] devised a medical data fusion algorithm on the basis of the IoT. Dautov et al. [49] studied hierarchical data fusion for smart healthcare.

Through a careful analysis of existing publications, it is found that there is no research studying the data fusion problem of the medical IoT in the framework of complex evidence theory. Therefore, this work provides an alternative promising way to model and fuse medical data by means of complex evidence theory.

2.2. Uncertainty Modeling and Information Fusion

Multisource information fusion has received much attention in the past few years [50,51,52]. Because of the impacts of devices, the external environment, and communication problems, the collected information may be uncertain, imprecise, or even conflicting. How to handle such kinds of uncertainty is still an open issue [53,54]. So far, various theories and their corresponding methods have been exploited, such as the extended fuzzy probability [55], soft sets [56,57,58], interval numbers [59], evidence theory [60], Z numbers [61,62], complex distributions [63,64], complex intuitionistic fuzzy sets [65], quantum-based [66,67], and others [68,69], as well as the consensus measure [70]. These methods were applied in various fields, like medical diagnosis [71] and decision-making [72].

Among them, evidence theory provides a belief function to model uncertainty and Dempster’s rule of combination for the fusion of multisource information, so that it is effective in dealing with uncertain problems in information and has been applied in many areas [73], including classification [74,75], decision-making [76], and evaluation [77,78,79]. Specifically, CET inherits the merits of DSET and has a greater ability to represent and handle uncertainty in the fusion process, which will be introduced in the next section.

2.3. Complex Evidence Theory

The essential concepts of CET are introduced below [28,29].

Definition 1. (Frame of discernment)

Let Φ be a frame of discernment (FOD), which is composed of:

Φ={ϕ1,,ϕj,,ϕn}, (1)

where the elements in Φ are exclusive and collective, but not empty. The power set of Φ is expressed by:

2Φ={,{ϕ1},{ϕ2},,{ϕn},{ϕ1,ϕ2},,{ϕ1,ϕ2,,ϕi},,ϕ}, (2)

in whichis the empty set.

If Ai2Φ, Ai is defined as a hypothesis, also called a proposition.

Definition 2. (Complex mass function)

A complex mass function (CMF), also called a CBBA, denoted as M in Φ, is defined as a mapping from 2Φ to C:

M:2ΦC (3)

satisfying:

M()=0,M(Ai)=m(Ai)eiθ(Ai),AiΦ,Ai2ΦM(Ai)=1, (4)

in which i=1, m(Ai)[0,1] represents the magnitude of M(Ai) and θ(Ai)[π,π] represents a phase term.

In Equation (4), M(Ai) can also be expressed as:

M(Ai)=x+yi,AiΦ (5)

and:

|M(Ai)|=m(Ai)=x2+y2, (6)

in which x2+y2[0,1].

Note that the value of |M(Ai)| or m(Ai) represents the degree to which the evidence supports Ai.

Definition 3. (Focal element)

If |M(Ai)| or m(Ai)>0, Ai is defined as a focal element.

Definition 4. (Complex Dempster’s rule of combination)

Let Mh and Mk be two independent CBBAs in Φ. The complex Dempster’s rule of combination (CDRC) is defined as M=MuMv:

M(Ak)=11KAiAh=AkMu(Ai)Mv(Ah),Ak,0,Ak=, (7)

with:

K=AiAh=Mu(Ai)Mv(Ah), (8)

in which Ai,Ah,Ak2Φ; K is the conflict coefficient between Mu and Mv; |K| is used for the conflict measure between Mu and Mv.

2.4. |K| Versus Conflict

In this section, several numerical examples are provided to study the performance of |K| in CET for measuring the conflict. Specifically, in Examples 1 and 2, explicit explanations are given about how |K| expresses the conflict.

Example 1.

Consider two CBBAs M1 and M2 in FOD Φ={ϕ1,ϕ2,ϕ3,ϕ4}:

M1:M1({ϕ1,ϕ2})=0.9055eiarctan(0.1111),M1({ϕ3})=0.1414eiarctan(1.0000),M1({ϕ4})=0;M2:M2({ϕ1,ϕ2})=0,M2({ϕ3})=0.1414eiarctan(1.0000),M2({ϕ4})=0.9055eiarctan(0.1111).

By using Equation (8), the following is generated:

|K|=1.0002.

From the given CBBAs M1 and M2 in Example 1, it is noticed that M1 and M2 have stronger support degrees of 0.9055 to hypotheses {ϕ1,ϕ2} and {ϕ4}, respectively. Since the two hypotheses {ϕ1,ϕ2} and {ϕ4} are incompatible, meaning that high conflict exists between M1 and M2. Hence, the value 1.0002 of |K| can effectively reflect the conflict between M1 and M2 in this example.

Example 2.

Consider two CBBAs M1 and M2 in FOD Φ={ϕ1,ϕ2,ϕ3}:

M1:M1({ϕ1})=0.4123eiarctan(0.2500),M1({ϕ1,ϕ2})=0.4123eiarctan(0.2500),M1({ϕ1,ϕ2,ϕ3})=0.2;M2:M2({ϕ1})=0.4123eiarctan(0.2500),M2({ϕ1,ϕ2})=0.4123eiarctan(0.2500),M2({ϕ1,ϕ2,ϕ3})=0.2.

By using Equation (8), the following is generated:

|K|=0.

From the given CBBAs M1 and M2 in Example 2, it is noticed that M1 and M2 have support degrees of 0.4123, 0.4123, and 0.2 to hypotheses {ϕ1}, {ϕ1,ϕ2}, and {ϕ1,ϕ2,ϕ3}, respectively. Therefore, the result of |K| with the value of zero reflects nicely that M1 and M2 have completely the same beliefs.

Although |K| reflects the conflict between CBBAs very well in the above-discussed examples, it may not work in some certain situations. Example 3 illustrates such a case.

Example 3.

Consider two CBBAs M1 and M2 in FOD Φ={ϕ1,ϕ2,ϕ3,ϕ4}:

M1:M1({ϕ1})=14,M1({ϕ2})=14,M1({ϕ3})=14,M1({ϕ4})=14;M2:M2({ϕ1})=14,M2({ϕ2})=14,M2({ϕ3})=14,M2({ϕ4})=14.

By using Equation (8), the following is generated:

|K|=0.75.

From the given CBBAs M1 and M2 in Example 3, it can be seen that M1 and M2 have the same support degrees of 14 to hypotheses {ϕ1}, {ϕ2}, {ϕ3}, and {ϕ4}, respectively. This means that M1 and M2 are completely the same as each other, so that the expected value of |K| should be zero. Therefore, the result of |K| with the value of 0.75 is counter-intuitive.

Consequently, this motivates designing a new conflict measure model for CBBAs in CET.

3. A New Conflict Measure Model

In this section, a complex Pignistic transformation is first defined. Based on the complex Pignistic transformation, a betting commitment function is proposed for all subsets of CBBAs. Then, a new distance model is designed by taking advantage of the betting commitment function. Furthermore, several corresponding examples are illustrated in terms of betting the commitment function.

3.1. Complex Pignistic Transformation

As discussed in Section 2.3, a complex mass function in CET is introduced. It is founded that making a decision is difficult on the basis of the complex belief function. Hence, a complex Pignistic transformation function [80] is proposed to transform the complex mass function to address this problem.

Definition 5. (Complex Pignistic transformation for ϕj)

Let M be a complex mass function on FOD Φ and Ai be a hypothesis with AiΦ. The complex Pignistic transformation function for ϕj on Φ is defined by:

CPT(ϕj)=AiΦ,ϕjAiM(Ai)|Ai|,ϕjΦ, (9)

where |Ai| denotes the number of elements in Ai.

In accordance with Definition 5, a complex Pignistic transformation function for Ai on 2Φ is defined below.

Definition 6. (Complex Pignistic transformation for Ai)

A complex Pignistic transformation function for Ai on 2Φ is defined as:

CPT(Ai)=ϕjAiCPT(ϕj). (10)

Corollary 1.

If M is a probability distribution P, then CPT is equal to P.

Then, Equations (9) and (10) can be integrated as in Definition 7.

Definition 7. (Complex Pignistic transformation)

Let MΦ be a complex mass function on FOD Φ. The complex Pignistic transformation function is defined by:

CPT(Ah)=Ai,AhΦM(Ai)|AiAh||Ah|, (11)

where |AiAh| represents the number of elements in the intersection AiAh; |Ah| denotes the number of elements in Ah.

Based on Definition 7, a betting commitment function is defined to Ah (AhΦ).

Definition 8. (Betting commitment)

The betting commitment to Ah on FOD Φ is defined by:

BetC(Ah)=CPT(Ah),AhΦ, (12)

where |·| denotes the absolute value function.

3.2. Betting Commitment-Based Distance Versus Conflict

In the following Examples 4–6, explicit explanations are given about how the betting commitment to express the conflict.

Example 4.

Consider two CBBAs M1 and M2 defined in Example 1.

By using Equation (12), the following is generated:

BetCM1({ϕ1,ϕ2})=0.9055,BetCM1({ϕ3})=0.1414,BetCM1({ϕ4})=0.0000;

and

BetCM2({ϕ1,ϕ2})=0.0000,BetCM2({ϕ3})=0.1414,BetCM2({ϕ4})=0.9055.

Through calculating the absolute value of the difference between BetCM1 and BetCM2 in Example 4, we get:

|BetCM1({ϕ1,ϕ2})BetCM2({ϕ1,ϕ2})|=0.9055,|BetCM1({ϕ3})BetCM2({ϕ3})|=0.0000,|BetCM1({ϕ4})BetCM2({ϕ4})|=0.9055.

On the other hand, by using Equation (8), the following is generated:

|K|=1.0002,

which indicates the significant discrepancy between CBBAs M1 and M2 that satisfies the intuitive result.

In this context, |BetCM1({ϕ1,ϕ2})BetCM2({ϕ1,ϕ2})| and |BetCM1({ϕ4})BetCM2({ϕ4})| have the maximal value of 0.9055, which also reflects the discrepancy between CBBAs M1 and M2 significantly.

Example 5.

Consider two CBBAs M1 and M2 defined in Example 2.

By using Equation (12), the following is generated:

BetCM1({ϕ1,ϕ2})=0.6685,BetCM1({ϕ3})=0.9333,BetCM1({ϕ4})=1.0000;

and

BetCM2({ϕ1,ϕ2})=0.6685,BetCM2({ϕ3})=0.9333,BetCM2({ϕ4})=1.0000.

Through calculating the absolute value of the difference between BetCM1 and BetCM2 in Example 4, we get:

|BetCM1({ϕ1,ϕ2})BetCM2({ϕ1,ϕ2})|=0,|BetCM1({ϕ3})BetCM2({ϕ3})|=0,|BetCM1({ϕ4})BetCM2({ϕ4})|=0.

On the other hand, by using Equation (8), the following is generated:

|K|=0,

which indicates that CBBAs M1 and M2 have completely the same beliefs satisfying the intuitive result.

In this context, |BetCM1({ϕ1,ϕ2})BetCM2({ϕ1,ϕ2})|, |BetCM1({ϕ3})BetCM2({ϕ3})|, and |BetCM1({ϕ4})BetCM2({ϕ4})| have the minimal value of zero, which also reflects well that CBBAs M1 and M2 have completely the same beliefs.

Example 6.

Consider two CBBAs M1 and M2 defined in Example 3.

By using Equation (12), the following is generated:

BetCM1({ϕ1})=0.25,BetCM1({ϕ2})=0.25,BetCM1({ϕ3})=0.25,BetCM1({ϕ4})=0.25;

and:

BetCM2({ϕ1})=0.25,BetCM2({ϕ2})=0.25,BetCM2({ϕ3})=0.25,BetCM2({ϕ4})=0.25.

Through calculating the absolute value of the difference between BetCM1 and BetCM2 in Example 6, we get:

|BetCM1({ϕ1,ϕ2})BetCM2({ϕ1,ϕ2})|=0,|BetCM1({ϕ3})BetCM2({ϕ3})|=0,|BetCM1({ϕ4})BetCM2({ϕ4})|=0.

On the other hand, by using Equation (8), the following is generated:

|K|=0.75,

which indicates the significant discrepancy between CBBAs M1 and M2.

However, as discussed in Section 2.4, this result of |K| in Example 6 is count-intuitive, since all the belief values of the focal elements of M1 and M2 are exactly the same.

Nevertheless, the values of |BetCM1({ϕ1,ϕ2})BetCM2({ϕ1,ϕ2})|, |BetCM1({ϕ3})BetCM2({ϕ3})|, and |BetCM1({ϕ4})BetCM2({ϕ4})| are equal to zero, which reflects that there is no discrepancy between CBBAs M1 and M2. Therefore, this distance measure among the betting commitments of CBBAs satisfies our expectation.

Consequently, from Examples 4–6, it is learned that the distance model based on the betting commitment has a better performance for measuring conflict comparing with the classical |K| in CET. Taking this into consideration, a new distance measure is designed on the basis of the betting commitment function, which is defined below.

Definition 9. (Betting commitment-based distance of CBBAs)

Let Mu and Mv be two CBBAs on FOD Φ and Ai be a hypothesis with AiΦ. The distance between betting commitments of CBBAs, called BCD, is defined by:

dBCD(Mu,Mv)=maxAiΦ|BetCMu(Ai)BetCMv(Ai)|, (13)

where |·| denotes the absolute value function.

In Equation (13), the maximal differences among the betting commitments of CBBAs for all subsets are taken into account. The reason is that considering the conflict measure in Example 4, min or mean functions are not adequate to distinguish the difference among CBBAs compared with the max function.

In particular, when CBBAs Mu and Mv reduce to the classical BBAs mu and mv, Mu=mu and Mv=mv. Since:

dBCD(Mu,Mv)=maxAiΦ|BetCMu(Ai)BetCMv(Ai)|=maxAiΦ||CPTMu(Ai)||CPTMv(Ai)||=maxAiΦAi,AhΦM(Ai)|AiAh||Ah|Ai,AhΦM(Ai)|AiAh||Ah|,

we have:

dBCD(Mu,Mv)=maxAiΦAi,AhΦm(Ai)|AiAh||Ah|Ai,AhΦm(Ai)|AiAh||Ah|=maxAiΦAi,AhΦm(Ai)|AiAh||Ah|Ai,AhΦm(Ai)|AiAh||Ah|. (14)

In this case that Mu=mu and Mv=mv, Equation (14) can be expressed as:

dBCD(Mu,Mv)=maxAiΦ|BetCmu(Ai)BetCmv(Ai)|, (15)

which is obviously the same as Liu’s distance measure difBetP [39]. This means that when the CBBAs become the classical BBAs, the proposed BCD dBCD degenerates into Liu’s distance measure difBetP.

Theorem 1.

The BCD dBCD is a generalized model of the traditional distance measure of Liu’s difBetP [39].

Theorem 2.

The BCD dBCD is a strict distance metric.

Property 1.

Consider three arbitrary CBBAs: Mu, Mv, and Mw. BCD dBCD holds the following properties:

P1.1 Nonnegativity: dBCD(Mu,Mv)0.

P1.2 Nondegeneracy: dBCD(Mu,Mv)=0 if and only if Mu=Mv.

P1.3 Symmetry: dBCD(Mu,Mv) = dBCD(Mv,Mu).

P1.4 Triangle inequality: dBCD(Mu,Mw)dBCD(Mu,Mv)+dBCD(Mv,Mw).

Proof. (1) Consider two arbitrary CBBAs: Mu and Mv. According to Equation (13), it is obvious that dBCD(Mu,Mv)0, because of having the absolute value function.

(2) Consider two arbitrary CBBAs: Mu=Mv; we get:

dBCD(Mu,Mv)=maxAiΦ|BetCMu(Ai)BetCMu(Ai)|=0.

Next, consider dBCD(Mu,Mv)=0, then:

maxAiΦ|BetCMu(Ai)BetCMu(Ai)|=0.

Thus, for AiΦ, we obtain:

Mu(Ai)=Mv(Ai).

Hence, it is proven that dBCD(Mu,Mv)=0Mu=Mv.

(3) Consider two arbitrary CBBAs Mu and Mv; we have dBCD(Mv,Mu):

dBCD(Mu,Mv)=maxAiΦ|BetCMu(Ai)BetCMu(Ai)|

Consider dBCD(Mv,Mu); we have:

dBCD(Mv,Mu)=maxAiΦ|BetCMv(Ai)BetCMu(Ai)|

Thus, we obtain that:

dBCD(Mu,Mv)=dBCD(Mv,Mu),

which proves the property of symmetry.

(4) Consider three arbitrary CBBAs: Mu, Mv, and Mw.

From the triangle inequality for real numbers, we have:

|BetCMu(Ai)BetCMw(Ai)||BetCMu(Ai)BetCMv(Ai)|+|BetCMv(Ai)BetCMw(Ai)|,

Through the nature of the max operation, we obtained that:

|BetCMu(Ai)BetCMv(Ai)|maxAiΦ{|BetCMu(Ai)BetCMv(Ai)|},

and:

|BetCMv(Ai)BetCMw(Ai)|maxAiΦ{|BetCMv(Ai)BetCMw(Ai)|}.

Thus,

|BetCMu(Ai)BetCMv(Ai)|+|BetCMv(Ai)BetCMw(Ai)|maxAiΦ{|BetCMu(Ai)BetCMv(Ai)|}+maxAiΦ{|BetCMv(Ai)BetCMw(Ai)|}.

Therefore,

dBCD(Mu,Mw)dBCD(Mu,Mv)+dBCD(Mv,Mw).

 □

4. Comparisons and Analysis

In this section, the proposed conflict measure BCD is compared with other well-known methods of |K| [28,29], dCBBA [40], and difBetP [39]. In addition, several examples are provided to illustrate their performance in terms of the conflict measure.

Example 7.

Consider two CBBAs: M1 and M2, in Φ={ϕ1,ϕ2,ϕ3,,ϕ20}:

M1:M1({ϕ2,ϕ3,ϕ4})=0.52+α2eiarctan(α0.5),M1({ϕ7})=0.05,M1(Φ)=0.1,M1(Ai)=0.82+α2eiarctan(α0.8);M2:M2({ϕ1,ϕ2,ϕ3,ϕ4,ϕ5})=1.

In Example 7, hypothesis Ai of M1 changes from {ϕ1} to Φ as in Table 1. To be specific, M1 has four focal elements: M1({ϕ2,ϕ3,ϕ4}), M1({ϕ7}), M1(Φ), and M1(Ai). According to Equation (6) in Definition 2, 0.82+α2 must be less than or equal to one. Therefore, α is set as 0, 0.1, 0.3, to 0.5 here, and the values of M1({ϕ2,ϕ3,ϕ4}) and M1(Ai) change with α. M2 has one focal element: M2({A,B,C,D,E})=1. Through utilizing |K|, dCBBA, difBetP, and the proposed dBCD, their corresponding conflict measures between CBBAs M1 and M2 are depicted in Figure 1.

Table 1.

The variation in Ai.

i Ai
1 {ϕ1}
2 {ϕ1,ϕ2}
3 {ϕ1,ϕ2,ϕ3}
4 {ϕ1,ϕ2,ϕ3,ϕ4}
5 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5}
6 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6}
7 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7}
8 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8}
9 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8,ϕ9}
10 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8,ϕ9,ϕ10}
11 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8,ϕ9,ϕ10,ϕ11}
12 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8,ϕ9,ϕ10,ϕ11,ϕ12}
13 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8,ϕ9,ϕ10,ϕ11,ϕ12,ϕ13}
14 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8,ϕ9,ϕ10,ϕ11,ϕ12,ϕ13,ϕ14}
15 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8,ϕ9,ϕ10,ϕ11,ϕ12,ϕ13,ϕ14,ϕ15}
16 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8,ϕ9,ϕ10,ϕ11,ϕ12,ϕ13,ϕ14,ϕ15,ϕ16}
17 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8,ϕ9,ϕ10,ϕ11,ϕ12,ϕ13,ϕ14,ϕ15,ϕ16,ϕ17}
18 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8,ϕ9,ϕ10,ϕ11,ϕ12,ϕ13,ϕ14,ϕ15,ϕ16,ϕ17,ϕ18}
19 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8,ϕ9,ϕ10,ϕ11,ϕ12,ϕ13,ϕ14,ϕ15,ϕ16,ϕ17,ϕ18,ϕ19}
20 {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5,ϕ6,ϕ7,ϕ8,ϕ9,ϕ10,ϕ11,ϕ12,ϕ13,ϕ14,ϕ15,ϕ16,ϕ17,ϕ18,ϕ19,ϕ20}

Figure 1.

Figure 1

The conflict measures in Example 7.

When α=0, this means that CBBA M1 reduces to a classical BBA. From Figure 1a, it is clear that dBCD has exactly the same measure as difBetP; both of them have the same measure trends as dCBBA. In particular, as the hypothesis Ai of M1 increases from {ϕ1} to {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5}, the measure values of dCBBA, difBetP, and dBCD go down. When Ai={ϕ1,ϕ2,ϕ3,ϕ4,ϕ5}, the conflict measures of dCBBA, difBetP, and dBCD achieve their minimal value. Subsequently, as hypothesis Ai adds from {ϕ1,ϕ2,ϕ3,ϕ4,ϕ5} to Φ, the conflict measures of dCBBA, difBetP and dBCD get larger and larger. However, the conflict measure of |K| remains the same regardless of the change of hypothesis Ai.

On the other hand, Figure 1b–d depicts how the conflict measures of different methods change with the variations of α=0.1, α=0.3, and α=0.5, respectively. It is obvious that no matter whether α=0.1, α=0.3, or α=0.5, dCBBA and dBCD can effectively measure the conflict between CBBAs M1 and M2. Note that the conflict value of dCBBA is always larger than that of dBCD. The reason is that dBCD selects the maximal value of the difference between betting commitments to all subsets, but dCBBA is a kind of accumulating distance measure. Nevertheless, difBetP cannot measure the conflict among CBBAs, while the conflict measure of |K| also remains the same despite the change of Ai.

It can then be concluded that the methods of dCBBA and dBCD have better performance to measure the conflict among CBBAs than the difBetP and |K| methods.

Example 8.

Consider two CBBAs M1 and M2 in FOD Φ={ϕ1,ϕ2,ϕ3,ϕ4,ϕ5}:

Case1:M1C1:M1C1({ϕ1,ϕ2})=0.8062eiarctan(0.1250),M1C1({ϕ3})=0.1414eiarctan(1.0000),M1C1({ϕ4})=0.1;M2C1:M2C1({ϕ1,ϕ2})=0.1,M2C1({ϕ3})=0.1414eiarctan(1.0000),M2C1({ϕ4})=0.8062eiarctan(0.1250).Case2:M1C2:M1C2({ϕ1,ϕ2,ϕ4})=0.8062eiarctan(0.1250),M1C2({ϕ3})=0.1414eiarctan(1.0000),M1C2({ϕ4})=0.1;M2C2:M2C2({ϕ1,ϕ2})=0.1,M2C2({ϕ3})=0.1414eiarctan(1.0000),M2C2({ϕ4})=0.8062eiarctan(0.1250).Case3:M1C3:M1C3({ϕ1})=0.8062eiarctan(0.1250),M1C3({ϕ2,ϕ3,ϕ4,ϕ5})=0.2236eiarctan(0.5000);M2C3:M2C3(Φ)=1.

In Example 8, comparing the CBBAs of Case 1 with the CBBAs of Case 2 and Case 3, it is noticed that M1C1 and M2C1 are more conflicting with regard to their corresponding belief values than M1C2 and M2C1, or M1C3 and M2C3. This is because M1C1 has a stronger belief value of 0.8062 to support {ϕ1,ϕ2}, but M2C1 has a stronger belief value of 0.8062 to support {ϕ4}. Since {ϕ1,ϕ2} and {ϕ4} are incompatible, in accordance with our expectation, the conflict measure between M1C1 and M2C1 is supposed to be larger than that of M1C2 and M2C2, or M1C3 and M2C3.

By utilizing |K|, dCBBA, and dBCD, the three cases corresponding to the conflict measures among CBBAs: M1C1 and M2C1, M1C2 and M2C2, and M1C3 and M2C3 are measured as described in Table 2, respectively. Through careful analysis, the following interesting results are found:

  • R 1:

    For |K|, it can be seen that it can measure well the conflict between CBBAs in Case 1 and Case 2 with values of 0.84 and 0.264, respectively. However, |K| cannot distinguish the difference among the CBBAs in Case 3 with a measure value of zero.

  • R 2:

    For dCBBA, it is obvious that dCBBA can measure the conflicts among the CBBAs in Case 1, Case 2, and Case 3 with values of 0.7071, 0.5802, and 0.7242, respectively. Comparing the conflict value of 0.7071 between M1C1 and M2C1 and 0.7242 between M1C3 and M2C3, it is noticed that the result of dCBBA(M1C3,M2C3)>dCBBA(M1C1,M2C1) is not up to our expectations.

  • R 3:

    For dBCD, it is easy to see that dBCD can well measure the conflicts among the CBBAs in all three cases with values of 0.7062, 0.4380, and 0.6062, respectively. Comparing the conflict value of 0.7062 of dBCD(M1C1,M2C1) with 0.6062 of dBCD(M1C3,M2C3), it is obtained that dBCD(M1C3,M2C3)<dBCD(M1C1,M2C1). This result satisfies our expectation.

  • R 4:

    It is concluded that the BCD dBCD is a better conflict measure compared with the methods of |K| and dCBBA to judge the contradiction among CBBAs.

Table 2.

Comparison of |K|, dCBBA, and dBCD in terms of the three cases of the complex basis belief assignments (CBBAs) in Example 8.

Methods Conflict Measures
Case 1: (M1C1,M2C1) Case 2: (M1C2,M2C2) Case 3: (M1C3,M2C3)
|K| 0.8400 0.2640 0.0000
dCBBA 0.7071 0.5802 0.7242
dBCD 0.7062 0.4380 0.6062

5. Algorithm and Application

Multi-attribute decision-making has received much attention [81,82,83]. Because of the complexity of various applications, it is still an open issue to handle uncertainty in this field. In this section, a basis algorithm for multi-attribute decision-making is first designed based on the newly defined BCD. After that, the proposed basis algorithm is applied to deal with a medical diagnosis decision-making problem to show its feasibility. Furthermore, this basis algorithm is extended to a weighted scheme to better fit real applications by taking into consideration different weights with regard to multiple attributes. Finally, both the basis and weighted algorithms are compared with well-known related methods to demonstrate their effectiveness.

5.1. Algorithm for Decision-Making

Problem statement: Let X be a set of attributes: {a1,,aκ,,aη} and P be a set of patterns: {p1,,pj,,pg} modeled by CBBA pj={aκ,Mpjaκ({y}), Mpjaκ({n}),Mpjaκ({y,n})|aκX}. Consider a set of samples: S={s1,,sh,,sl} modeled by CBBA sh={aκ,Mshaκ({y}),Mshaκ({n}),Mshaκ({y,n})|aκX}. This algorithm for multi-attribute decision-making sorts the samples according to the given patterns.

  • Step 1:
    The BCD dBCD is used to calculate the distance between sh and pj:
    dBCD(Msh,Mpj)=1ηκ=1ηdBCD(Mshaκ,Mpjaκ)=1ηκ=1ηmaxAiΦBetCMshaκ(Ai)BetCMpjaκ(Ai). (16)
  • Step 2:
    The minimal distance between Msh and Mpj is elected:
    dBCD(Msh,Mpθ)=min1jgdBCD(Msh,Mpj). (17)
  • Step 3:
    sh is sorted into pattern pθ by:
    θ=argmin1jm{dBCD(Msh,Mpj)},shpθ. (18)

The corresponding pseudo-code of multi-attribute decision-making is described in Algorithm 1.

Algorithm 1: Multi-attribute decision-making.
graphic file with name sensors-21-00840-i001.jpg

5.2. Application in Medical Diagnosis Under the Smart IoT Environment

Background: Consider a medical diagnosis decision-making problem under the smart IoT environment with three disease types, each of which has three attributes. Specifically, the given disease types P={p1,p2,p3} and to be determined s1 in S in terms of three attributes {x1,x2,x3} are modeled by the CBBAs from the sensor data under the smart IoT environment, shown in Table 3 and Table 4, respectively. Then, we need to figure out which disease s1 is most likely to suffer from {p1,p2,p3}.

Table 3.

The given patterns with multiple attributes modeled as CBBAs in the application.

P X CBBAs
M({y}) M({n}) M({y,n})
p1 a1 0.9901eiarctan(0.0101) 0 0.0141eiarctan(1.0000)
a2 0.8062eiarctan(0.1250) 0 0.2236eiarctan(0.5000)
a3 0.7071eiarctan(0.1429) 0.1118eiarctan(0.5000) 0.2062eiarctan(0.2500)
p2 a1 0.9055eiarctan(0.1111) 0.1414eiarctan(1.0000) 0
a2 0.9901eiarctan(0.0101) 0 0.0141eiarctan(1.0000)
a3 0.9055eiarctan(0.1111) 0 0.1414eiarctan(1.0000)
p3 a1 0.6083eiarctan(0.1667) 0.2062eiarctan(0.2500) 0.2062eiarctan(0.2500)
a2 0.8062eiarctan(0.1250) 0 0.2236eiarctan(0.5000)
a3 0.9901eiarctan(0.0101) 0 0.0141eiarctan(1.0000)

Table 4.

To be determined sample with multiple attributes modeled as CBBAs in the application.

S X CBBAs
M({y}) M({n}) M({y,n})
s1 a1 0.5099eiarctan(0.2000) 0.3041eiarctan(0.1667) 0.2062eiarctan(0.2500)
a2 0.6083eiarctan(0.1667) 0.2062eiarctan(0.2500) 0.2062eiarctan(0.2500)
a3 0.8062eiarctan(0.1250) 0.1118eiarctan(0.5000) 0.1118eiarctan(0.5000)

The implementation of Algorithm 1 is illustrated as follows:

  • Step 1:
    The BCDs between s1 and p1, s1 and p2, and s1 and p3 are calculated:
    dBCD(Ms1,Mp1)=0.2157,dBCD(Ms1,Mp2)=0.2337,dBCD(Ms1,Mp3)=0.1525.
  • Step 2:
    The minimal BCD is dBCD(Ms1,Mp3):
    dBCD(Ms1,Mp3)=0.1525.
  • Step 3:
    s1 is determined to be the most likely to suffer from the disease type of p3:
    θ=3;s1p3.

The distance measure through the proposed method is shown in Table 5 and Figure 2, which has the ranking: dBCD(Ms1,Mp3)<dBCD(Ms1,Mp1)<dBCD(Ms1,Mp2). Hence, sample s1 is sorted into pattern p3, which indicates that s1 is most likely to suffer from the disease type of p3.

Table 5.

The measures generated by different methods in the application.

Methods Measures
(Ms1,Mp1) (Ms1,Mp2) (Ms1,Mp3)
dBCD 0.2157 0.2337 0.1525
dBCDw 0.2065 0.2303 0.1551
dCBBA 0.2256 0.2436 0.1526
dCBBAw 0.2165 0.2400 0.1553
K^1 0.0907 0.0539 0.0249
K^2 0.2458 0.2941 0.1838
K^3 0.0869 0.0531 0.0255
K^4 0.2317 0.2906 0.1872

Figure 2.

Figure 2

Comparison of different methods in the application.

5.3. Extension and Comparison

In Section 5.2, a medical diagnosis decision-making algorithm on the basis of the uniform scheme of the BCD is studied. In this section, taking into account that various attributes may have different weights in accordance with specific applications, the basis algorithm is extended, denoted as dBCDw:

dBCDw(MSk,MPj)=i=1nwidBCD(Mshaκ,Mpjaκ)=i=1nwimaxAiΦBetCMshaκ(Ai)BetCMpjaκ(Ai), (19)

where i=1nwi=1.

It is worth noting that in Equation (19), wi can be determined according to specific applications, such as subjective weights provided by experts and objective weights calculated based on data-driven methods.

In order to validate the effectiveness of the proposed methods dBCD and dBCDw, both of them are compared with dCBBA and dCBBAw of Xiao’s method [28,29] and K^1=1K1, K^2=1K2, K^3=1K3, and K^4=1K4 of Garg and Rani’s method [30]. In this application, the weight wi is set as [0.3,0.35,0.35,0.35] according to [30]. By implementing dBCD, dBCDw, dCBBA, dCBBAw, K^1, K^2, K^3, and K^4, the results are described in Table 5 and Table 6 and Figure 2.

Table 6.

The ranking and sorting obtained through different methods in the application.

Methods Rankings Sort
dBCD dBCD(Ms1,Mp3)<dBCD(Ms1,Mp1)<dBCD(Ms1,Mp2) p3
dBCDw dBCDw(Ms1,Mp3)<dBCDw(Ms1,Mp1)<dBCDw(Ms1,Mp2) p3
dCBBA dCBBA(Ms1,Mp3)<dCBBA(Ms1,Mp1)<dCBBA(Ms1,Mp2) p3
dCBBAw dCBBAw(Ms1,Mp3)<dCBBAw(Ms1,Mp1)<dCBBAw(Ms1,Mp2) p3
K^1 K^1(Ms1,Mp3)<K^1(Ms1,Mp2)<K^1(Ms1,Mp1) p3
K^2 K^2(Ms1,Mp3)<K^2(Ms1,Mp1)<K^2(Ms1,Mp2) p3
K^3 K^3(Ms1,Mp3)<K^3(Ms1,Mp2)<K^3(Ms1,Mp1) p3
K^4 K^4(Ms1,Mp3)<K^4(Ms1,Mp1)<K^4(Ms1,Mp2) p3

To be specific, for dBCDw, Table 5 and Table 6 show that dBCDw(MS,MP1)=0.2065, dBCDw(MS,MP2)=0.2303, and dBCDw(MS,MP3)=0.1551, such that dBCDw(MS,MP3)<dBCDw(MS,MP1)<dBCDw(MS,MP2). This result also means that s1 is sorted into pattern p3, and it is most likely to suffer from the disease type of p3.

On the other hand, for dCBBA and dCBBAw, it can be seen that dCBBA(MS,MP3)=0.1526<dCBBA(MS,MP1)=0.2256<dCBBA(MS,MP2)=0.2436; dCBBAw(MS,MP3)=0.1553<dCBBAw(MS,MP1)=0.2165<dCBBAw(MS,MP2)=0.2400. Hence, it is learned that both of the methods dCBBA and dCBBAw sort s1 as pattern p3. Besides, for K^1, K^2, K^3, and K^4, it is obvious that K^1(MS,MP3)=0.0249<K^1(MS,MP2)=0.0539<K^1(MS,MP1)=0.0907; K^2(MS,MP3)=0.1838<K^2(MS,MP1)=0.2458<K^2(MS,MP2)=0.2941; K^3(MS,MP3)=0.0255<K^3(MS,MP2)=0.0531<K^3(MS,MP1)=0.0869; K^4(MS,MP3)=0.1872<K^4(MS,MP1)=0.2317<K^4(MS,MP2)=0.2906. Although K^2 has a different ranking in terms of (MS,MP1), (MS,MP2), and (MS,MP3) with other methods, its minimal measure is also regarded as K^2(MS,MP3). Therefore, the methods of K^1, K^2, K^3, and K^4 also sort s1 as pattern p3.

In summary, the proposed dBCD- and dBCDw-based medical diagnosis decision-making algorithms are as effective as Xiao’s [28,29] and Garg and Rani’s methods [30] to address the medical diagnosis decision-making problem.

On the other hand, in this section, it simply adopts the weight from [30]. As discussed before, the weight can be generated with regard to specific applications: experts’ subjective weights and objective weights calculated based on collected data. For instance, for a kind of disease, it may have multiple attributes, each of which may have different weights. In this scenario, this weighted scheme provides a better applicability.

6. Conclusions

In this paper, a generalized betting commitment-based distance (BCD) is proposed to measure the difference among CBBAs in the complex plane framework of CET. Additionally, the defined BCD is analyzed, which has the properties of the nonnegativity, nondegeneracy, symmetry, and triangle inequality. We then prove that the BCD meets the distance axioms to be a strict distance metric. After that, the superiority of BCD is demonstrated through a comparison with other well-known methods. Besides, a basis and its extensional BCD-based multi-attribute decision-making algorithms are designed and then adopted to address a medical diagnosis problem under the smart IoT environment to reveal their effectiveness.

In summary, this is the first work to study a betting commitment-based distance between CBBAs in CET. Furthermore, the BCD is a generalized model of the traditional distance among the betting commitments of BBAs. In particular, when CBBAs reduce to the classical BBAs, the BCD degenerates into Liu’s distance among the betting commitments of BBAs. Therefore, the BCD offers a promising way to measure differences among CBBAs in CET, as well as handling medical diagnosis problems under the smart IoT environment.

Acknowledgments

The author greatly appreciates the reviewers’ suggestions and the editor’s encouragement.

Funding

This research is supported by the National Natural Science Foundation of China (Nos. 62003280 and 61902189).

Conflicts of Interest

The author declares no conflict of interest.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Qi J., Yang P., Newcombe L., Peng X., Yang Y., Zhao Z. An overview of data fusion techniques for Internet of Things enabled physical activity recognition and measure. Inf. Fusion. 2020;55:269–280. doi: 10.1016/j.inffus.2019.09.002. [DOI] [Google Scholar]
  • 2.Huang K., Zhang Q., Zhou C., Xiong N., Qin Y. An efficient intrusion detection approach for visual sensor networks based on traffic pattern learning. IEEE Trans. Syst. Man Cybern. Syst. 2017;47:2704–2713. doi: 10.1109/TSMC.2017.2698457. [DOI] [Google Scholar]
  • 3.Alabdulkarim A., Al-Rodhaan M., Ma T., Tian Y. PPSDT: A novel privacy-preserving single decision tree algorithm for clinical decision-support systems using IoT devices. Sensors. 2019;19:142. doi: 10.3390/s19010142. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 4.Roy M., Chowdhury C., Aslam N. Designing transmission strategies for enhancing communications in medical IoT using Markov decision process. Sensors. 2018;18:4450. doi: 10.3390/s18124450. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 5.Souza L.F.D.F., Silva I.C.L., Marques A.G., Silva F.H.D.S., Nunes V.X., Hassan M.M., Albuquerque V.H.C.D. Internet of Medical Things: An Effective and Fully Automatic IoT Approach Using Deep Learning and Fine-Tuning to Lung CT Segmentation. Sensors. 2020;20:6711. doi: 10.3390/s20236711. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 6.Celesti A., Ruggeri A., Fazio M., Galletta A., Villari M., Romano A. Blockchain-Based Healthcare Workflow for Tele-Medical Laboratory in Federated Hospital IoT Clouds. Sensors. 2020;20:2590. doi: 10.3390/s20092590. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 7.Takabayashi K., Tanaka H., Sakakibara K. Integrated Performance Evaluation of the Smart Body Area Networks Physical Layer for Future Medical and Healthcare IoT. Sensors. 2019;19:30. doi: 10.3390/s19010030. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 8.Mavrogiorgou A., Kiourtis A., Perakis K., Pitsios S., Kyriazis D. IoT in healthcare: Achieving interoperability of high-quality data acquired by IoT medical devices. Sensors. 2019;19:1978. doi: 10.3390/s19091978. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 9.Depari A., Fernandes Carvalho D., Bellagente P., Ferrari P., Sisinni E., Flammini A., Padovani A. An IoT based architecture for enhancing the effectiveness of prototype medical instruments applied to neurodegenerative disease diagnosis. Sensors. 2019;19:1564. doi: 10.3390/s19071564. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 10.Dempster A.P. Upper and Lower Probabilities Induced by a Multivalued Mapping. Ann. Math. Stat. 1967;38:325–339. doi: 10.1214/aoms/1177698950. [DOI] [Google Scholar]
  • 11.Shafer G. A Mathematical Theory of Evidence. Volume 1 Princeton University Press; Princeton, NJ, USA: 1976. [Google Scholar]
  • 12.Deng Y. Information volume of mass function. Int. J. Comput. Commun. Control. 2020;15:3983. doi: 10.15837/ijccc.2020.6.3983. [DOI] [Google Scholar]
  • 13.Xiao F. EFMCDM: Evidential fuzzy multicriteria decision making based on belief entropy. IEEE Trans. Fuzzy Syst. 2020;28:1477–1491. doi: 10.1109/TFUZZ.2019.2936368. [DOI] [Google Scholar]
  • 14.Zhou M., Liu X.B., Chen Y.W., Yang J.B. Evidential reasoning rule for MADM with both weights and reliabilities in group decision making. Knowl.-Based Syst. 2018;143:142–161. doi: 10.1016/j.knosys.2017.12.013. [DOI] [Google Scholar]
  • 15.Pan L., Deng Y. Probability transform based on the ordered weighted averaging and entropy difference. Int. J. Comput. Commun. Control. 2020;15:3743. doi: 10.15837/ijccc.2020.4.3743. [DOI] [Google Scholar]
  • 16.Yager R.R. Generalized Dempster–Shafer Structures. IEEE Trans. Fuzzy Syst. 2019;27:428–435. doi: 10.1109/TFUZZ.2018.2859899. [DOI] [Google Scholar]
  • 17.Song Y., Zhu J., Lei L., Wang X. A Self-adaptive combination method for temporal evidence based on negotiation strategy. SCIENCE CHINA Inf. Sci. 2020;63:210204. doi: 10.1007/s11432-020-3045-5. [DOI] [Google Scholar]
  • 18.Deng X., Jiang W. Evaluating green supply chain management practices under fuzzy environment: A novel method based on D number theory. Int. J. Fuzzy Syst. 2019;21:1389–1402. doi: 10.1007/s40815-019-00639-5. [DOI] [Google Scholar]
  • 19.Deng X., Jiang W. A total uncertainty measure for D numbers based on belief intervals. Int. J. Intell. Syst. 2019;34:3302–3316. doi: 10.1002/int.22195. [DOI] [Google Scholar]
  • 20.Yang J.B., Xu D.L. Evidential reasoning rule for evidence combination. Artif. Intell. 2013;205:1–29. doi: 10.1016/j.artint.2013.09.003. [DOI] [Google Scholar]
  • 21.Fujita H., Ko Y.C. A heuristic representation learning based on evidential memberships: Case study of UCI-SPECTF. Int. J. Approx. Reason. 2020;120:125–137. doi: 10.1016/j.ijar.2020.02.002. [DOI] [Google Scholar]
  • 22.Deng Y. Uncertainty measure in evidence theory. Sci. China Inf. Sci. 2020;63:210201. doi: 10.1007/s11432-020-3006-9. [DOI] [Google Scholar]
  • 23.Deng Y. Deng entropy measure of quantum entanglement. chinaXiv. 2021 [Google Scholar]
  • 24.Fan L., Deng Y. Determine the number of unknown targets in Open World based on Elbow method. IEEE Trans. Fuzzy Syst. 2020:1. doi: 10.1109/TFUZZ.2020.2966182. [DOI] [Google Scholar]
  • 25.Li Y.X., Pelusi D., Deng Y. Generate two dimensional belief function based on an improved similarity measure of trapezoidal fuzzy numbers. Comput. Appl. Math. 2020;39:1–20. doi: 10.1007/s40314-020-01371-9. [DOI] [Google Scholar]
  • 26.Mao S., Han Y., Deng Y., Pelusi D. A hybrid DEMATEL-FRACTAL method of handling dependent evidences. Eng. Appl. Artif. Intell. 2020;91:103543. doi: 10.1016/j.engappai.2020.103543. [DOI] [Google Scholar]
  • 27.Luo Z., Deng Y. A matrix method of basic belief assignment’s negation in Dempster–Shafer theory. IEEE Trans. Fuzzy Syst. 2020;28:2270–2276. doi: 10.1109/TFUZZ.2019.2930027. [DOI] [Google Scholar]
  • 28.Xiao F. Generalization of Dempster–Shafer theory: A complex mass function. Appl. Intell. 2020;50:3266–3275. doi: 10.1007/s10489-019-01617-y. [DOI] [Google Scholar]
  • 29.Xiao F. Generalized belief function in complex evidence theory. J. Intell. Fuzzy Syst. 2020;38:3665–3673. doi: 10.3233/JIFS-179589. [DOI] [Google Scholar]
  • 30.Garg H., Rani D. A robust correlation coefficient measure of complex intuitionistic fuzzy sets and their applications in decision-making. Appl. Intell. 2019;49:496–512. doi: 10.1007/s10489-018-1290-3. [DOI] [Google Scholar]
  • 31.Han D., Dezert J., Yang Y. Belief interval-based distance measures in the theory of belief functions. IEEE Trans. Syst. Man Cybern. Syst. 2016;48:833–850. doi: 10.1109/TSMC.2016.2628879. [DOI] [Google Scholar]
  • 32.Yang Y., Han D. A new distance-based total uncertainty measure in the theory of belief functions. Knowl.-Based Syst. 2016;94:114–123. doi: 10.1016/j.knosys.2015.11.014. [DOI] [Google Scholar]
  • 33.Jousselme A.L., Grenier D., Bossé É. A new distance between two bodies of evidence. Inf. Fusion. 2001;2:91–101. doi: 10.1016/S1566-2535(01)00026-4. [DOI] [Google Scholar]
  • 34.Jousselme A.L., Maupin P. Distances in evidence theory: Comprehensive survey and generalizations. Int. J. Approx. Reason. 2012;53:118–145. doi: 10.1016/j.ijar.2011.07.006. [DOI] [Google Scholar]
  • 35.Bouchard M., Jousselme A.L., Doré P.E. A proof for the positive definiteness of the Jaccard index matrix. Int. J. Approx. Reason. 2013;54:615–626. doi: 10.1016/j.ijar.2013.01.006. [DOI] [Google Scholar]
  • 36.Jiang W., Huang C., Deng X. A new probability transformation method based on a correlation coefficient of belief functions. Int. J. Intell. Syst. 2019;34:1337–1347. doi: 10.1002/int.22098. [DOI] [Google Scholar]
  • 37.Xiao F., Cao Z., Jolfaei A. A novel conflict measurement in decision making and its application in fault diagnosis. IEEE Trans. Fuzzy Syst. 2020;29:186–197. doi: 10.1109/TFUZZ.2020.3002431. [DOI] [Google Scholar]
  • 38.Pan L., Deng Y. An association coefficient of belief function and its application in target recognition system. Int. J. Intell. Syst. 2020;35:85–104. doi: 10.1002/int.22200. [DOI] [Google Scholar]
  • 39.Liu W. Analyzing the degree of conflict among belief functions. Artif. Intell. 2006;170:909–924. doi: 10.1016/j.artint.2006.05.002. [DOI] [Google Scholar]
  • 40.Xiao F. CED: A distance for complex mass functions. IEEE Trans. Neural Netw. Learn. Syst. 2020:1. doi: 10.1109/TNNLS.2020.2984918. [DOI] [PubMed] [Google Scholar]
  • 41.Huang J., Wu X., Huang W., Wu X., Wang S. Internet of things in health management systems: A review. Int. J. Commun. Syst. 2020:e4683. doi: 10.1002/dac.4683. [DOI] [Google Scholar]
  • 42.Hossain M.S., Muhammad G. Cloud-assisted industrial Internet of Things (IIoT)–enabled framework for health monitoring. Comput. Netw. 2016;101:192–202. doi: 10.1016/j.comnet.2016.01.009. [DOI] [Google Scholar]
  • 43.Gómez J., Oviedo B., Zhuma E. Patient monitoring system based on Internet of Things. Procedia Comput. Sci. 2016;83:90–97. doi: 10.1016/j.procs.2016.04.103. [DOI] [Google Scholar]
  • 44.Abawajy J.H., Hassan M.M. Federated internet of things and cloud computing pervasive patient health monitoring system. IEEE Commun. Mag. 2017;55:48–53. doi: 10.1109/MCOM.2017.1600374CM. [DOI] [Google Scholar]
  • 45.He D., Zeadally S. An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J. 2014;2:72–83. doi: 10.1109/JIOT.2014.2360121. [DOI] [Google Scholar]
  • 46.Dimitrov D.V. Medical internet of things and big data in healthcare. Healthc. Inform. Res. 2016;22:156–163. doi: 10.4258/hir.2016.22.3.156. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 47.Lomotey R.K., Pry J., Sriramoju S. Wearable IoT data stream traceability in a distributed health information system. Pervasive Mob. Comput. 2017;40:692–707. doi: 10.1016/j.pmcj.2017.06.020. [DOI] [Google Scholar]
  • 48.Zhang W., Yang J., Su H., Kumar M., Mao Y. Medical data fusion algorithm based on Internet of Things. Pers. Ubiquitous Comput. 2018;22:895–902. doi: 10.1007/s00779-018-1173-y. [DOI] [Google Scholar]
  • 49.Dautov R., Distefano S., Buyya R. Hierarchical data fusion for Smart Healthcare. J. Big Data. 2019;6:19. doi: 10.1186/s40537-019-0183-6. [DOI] [Google Scholar]
  • 50.Xiao F. Evidence combination based on prospect theory for multi-sensor data fusion. ISA Trans. 2020;106:253–261. doi: 10.1016/j.isatra.2020.06.024. [DOI] [PubMed] [Google Scholar]
  • 51.Meng D., Liu M., Yang S., Zhang H., Ding R. A fluid–structure analysis approach and its application in the uncertainty-based multidisciplinary design and optimization for blades. Adv. Mech. Eng. 2018;10 doi: 10.1177/1687814018783410. [DOI] [Google Scholar]
  • 52.Liu Z., Li G., Mercier G., He Y., Pan Q. Change detection in heterogenous remote sensing images via homogeneous pixel transformation. IEEE Trans. Image Process. 2017;27:1822–1834. doi: 10.1109/TIP.2017.2784560. [DOI] [PubMed] [Google Scholar]
  • 53.Yager R.R. On Using the Shapley Value to Approximate the Choquet Integral in Cases of Uncertain Arguments. IEEE Trans. Fuzzy Syst. 2018;26:1303–1310. doi: 10.1109/TFUZZ.2017.2718966. [DOI] [Google Scholar]
  • 54.Gao X., Deng Y. The pseudo-pascal triangle of maximum Deng entropy. Int. J. Comput. Commun. Control. 2020;15:1006. doi: 10.15837/ijccc.2020.1.3735. [DOI] [Google Scholar]
  • 55.Li Y.F., Huang H.Z., Mi J., Peng W., Han X. Reliability analysis of multi-state systems with common cause failures based on Bayesian network and fuzzy probability. Ann. Oper. Res. 2019:1–15. doi: 10.1007/s10479-019-03247-6. [DOI] [Google Scholar]
  • 56.Feng F., Cho J., Pedrycz W., Fujita H., Herawan T. Soft set based association rule mining. Knowl.-Based Syst. 2016;111:268–282. doi: 10.1016/j.knosys.2016.08.020. [DOI] [Google Scholar]
  • 57.Witarsyah D., Fudzee M.F.M., Salamat M.A., Yanto I.T.R., Abawajy J. Soft Set Theory Based Decision Support System for Mining Electronic Government Dataset. Int. J. Data Warehous. Min. (IJDWM) 2020;16:39–62. doi: 10.4018/IJDWM.2020010103. [DOI] [Google Scholar]
  • 58.Haruna K., Ismail M.A., Suyanto M., Gabralla L.A., Bichi A.B., Danjuma S., Kakudi H.A., Haruna M.S., Zerdoumi S., Abawajy J.H., et al. A soft set approach for handling conflict situation on movie selection. IEEE Access. 2019;7:116179–116194. doi: 10.1109/ACCESS.2019.2892778. [DOI] [Google Scholar]
  • 59.Yang J., Li S., Xu Z., Liu H., Yao W. An understandable way to extend the ordinary linear order on real numbers to a linear order on interval numbers. IEEE Trans. Fuzzy Syst. 2020;1 doi: 10.1109/TFUZZ.2020.3006557. [DOI] [Google Scholar]
  • 60.Fei L., Feng Y., Liu L. Evidence combination using OWA-based soft likelihood functions. Int. J. Intell. Syst. 2019;34:2269–2290. doi: 10.1002/int.22166. [DOI] [Google Scholar]
  • 61.Jiang W., Cao Y., Deng X. A novel Z-network model based on Bayesian network and Z-number. IEEE Trans. Fuzzy Syst. 2020;28:1585–1599. doi: 10.1109/TFUZZ.2019.2918999. [DOI] [Google Scholar]
  • 62.Tian Y., Liu L., Mi X., Kang B. ZSLF: A new soft likelihood function based on Z-numbers and its application in expert decision system. IEEE Trans. Fuzzy Syst. 2020:1–11. doi: 10.1109/TFUZZ.2020.2997328. [DOI] [Google Scholar]
  • 63.Xiao F. On the maximum entropy negation of a complex-valued distribution. IEEE Trans. Fuzzy Syst. 2020:1–11. doi: 10.1109/TFUZZ.2020.3016723. [DOI] [Google Scholar]
  • 64.Xiao F. GIQ: A generalized intelligent quality-based approach for fusing multi-source information. IEEE Trans. Fuzzy Syst. 2020:1–11. doi: 10.1109/TFUZZ.2020.2991296. [DOI] [Google Scholar]
  • 65.Garg H., Rani D. Some results on information measures for complex intuitionistic fuzzy sets. Int. J. Intell. Syst. 2019;34:2319–2363. doi: 10.1002/int.22127. [DOI] [Google Scholar]
  • 66.Lai J.W., Cheong K.H. Parrondo’s paradox from classical to quantum: A review. Nonlinear Dyn. 2020;100:1–13. doi: 10.1007/s11071-020-05738-9. [DOI] [Google Scholar]
  • 67.Gao X., Deng Y. Quantum model of mass function. Int. J. Intell. Syst. 2020;35:267–282. doi: 10.1002/int.22208. [DOI] [Google Scholar]
  • 68.Jiang W., Huang K., Geng J., Deng X. Multi-Scale Metric Learning for Few-Shot Learning. IEEE Trans. Circuits Syst. Video Technol. 2020:1. doi: 10.1109/TCSVT.2020.2995754. [DOI] [Google Scholar]
  • 69.Deng J., Deng Y. Information volume of fuzzy membership function. Int. J. Comput. Commun. Control. 2021;16:4106. doi: 10.15837/ijccc.2021.1.4106. [DOI] [Google Scholar]
  • 70.Tang M., Liao H., Herrera-Viedma E., Chen C.P., Pedrycz W. A Dynamic Adaptive Subgroup-to-Subgroup Compatibility-Based Conflict Detection and Resolution Model for Multicriteria Large-Scale Group Decision Making. IEEE Trans. Cybern. 2020:1–12. doi: 10.1109/TCYB.2020.2974924. [DOI] [PubMed] [Google Scholar]
  • 71.Cao Z., Chuang C.H., King J.K., Lin C.T. Multi-channel EEG recordings during a sustained-attention driving task. Sci. Data. 2019;6:1–8. doi: 10.1038/s41597-019-0027-4. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 72.Liu P., Zhang X. A new hesitant fuzzy linguistic approach for multiple attribute decision making based on Dempster–Shafer evidence theory. Appl. Soft Comput. 2020;86:105897. doi: 10.1016/j.asoc.2019.105897. [DOI] [Google Scholar]
  • 73.Liu Q., Tian Y., Kang B. Derive knowledge of Z-number from the perspective of Dempster–Shafer evidence theory. Eng. Appl. Artif. Intell. 2019;85:754–764. doi: 10.1016/j.engappai.2019.08.005. [DOI] [Google Scholar]
  • 74.Xu X., Zheng J., Yang J.b., Xu D.l., Chen Y.w. Data classification using evidence reasoning rule. Knowl.-Based Syst. 2017;116:144–151. doi: 10.1016/j.knosys.2016.11.001. [DOI] [Google Scholar]
  • 75.Pan Y., Zhang L., Wu X., Skibniewski M.J. Multi-classifier information fusion in risk analysis. Inf. Fusion. 2020;60:121–136. doi: 10.1016/j.inffus.2020.02.003. [DOI] [Google Scholar]
  • 76.Fu C., Chang W., Yang S. Multiple criteria group decision making based on group satisfaction. Inf. Sci. 2020;518:309–329. doi: 10.1016/j.ins.2020.01.021. [DOI] [Google Scholar]
  • 77.Fei L., Lu J., Feng Y. An extended best-worst multi-criteria decision-making method by belief functions and its applications in hospital service evaluation. Comput. Ind. Eng. 2020;142:106355. doi: 10.1016/j.cie.2020.106355. [DOI] [Google Scholar]
  • 78.Kang B., Zhang P., Gao Z., Chhipi-Shrestha G., Hewage K., Sadiq R. Environmental assessment under uncertainty using Dempster–Shafer theory and Z-numbers. J. Ambient Intell. Humaniz. Comput. 2020;11:2041–2060. doi: 10.1007/s12652-019-01228-y. [DOI] [Google Scholar]
  • 79.Liu Z., Pan Q., Dezert J., Han J.W., He Y. Classifier fusion with contextual reliability evaluation. IEEE Trans. Cybern. 2018;48:1605–1618. doi: 10.1109/TCYB.2017.2710205. [DOI] [PubMed] [Google Scholar]
  • 80.Xiao F. CEQD: A complex mass function to predict interference effects. IEEE Trans. Cybern. 2020:1–13. doi: 10.1109/TCYB.2020.3040770. [DOI] [PubMed] [Google Scholar]
  • 81.Xiao F. A distance measure for intuitionistic fuzzy sets and its application to pattern classification problems. IEEE Trans. Syst. Man Cybern. Syst. 2019:1–13. doi: 10.1109/TSMC.2019.2958635. [DOI] [Google Scholar]
  • 82.Fei L., Feng Y., Liu L. On Pythagorean fuzzy decision making using soft likelihood functions. Int. J. Intell. Syst. 2019;34:3317–3335. doi: 10.1002/int.22199. [DOI] [Google Scholar]
  • 83.Xue Y., Deng Y., Garg H. Uncertain database retrieval with measure-based belief function attribute values under intuitionistic fuzzy set. Inf. Sci. 2020;546:436–447. doi: 10.1016/j.ins.2020.08.096. [DOI] [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES