Next Article in Journal
MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks
Next Article in Special Issue
Online Denoising Based on the Second-Order Adaptive Statistics Model
Previous Article in Journal
Multiport Circular Polarized RFID-Tag Antenna for UHF Sensor Applications
Previous Article in Special Issue
Multisensor Parallel Largest Ellipsoid Distributed Data Fusion with Unknown Cross-Covariances
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Reliability-Based Method to Sensor Data Fusion

School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(7), 1575; https://doi.org/10.3390/s17071575
Submission received: 21 May 2017 / Revised: 1 July 2017 / Accepted: 3 July 2017 / Published: 5 July 2017

Abstract

:
Multi-sensor data fusion technology based on Dempster–Shafer evidence theory is widely applied in many fields. However, how to determine basic belief assignment (BBA) is still an open issue. The existing BBA methods pay more attention to the uncertainty of information, but do not simultaneously consider the reliability of information sources. Real-world information is not only uncertain, but also partially reliable. Thus, uncertainty and partial reliability are strongly associated with each other. To take into account this fact, a new method to represent BBAs along with their associated reliabilities is proposed in this paper, which is named reliability-based BBA. Several examples are carried out to show the validity of the proposed method.

Graphical Abstract

1. Introduction

In practical applications, there are various interferences in the working environment. Sensor data fusion technology can combine the related information from multiple sensors to enhance the robustness and safety of a system [1,2]. Hence, this technique has received significant attention in many fields, such as target tracking and recognition [3,4], complex network [5,6,7] and image processing [8,9,10]. Besides, information gathered from sensors is usually uncertain due to the change of the environment. It can degrade the performance of the information fusion system. Thus, how to handle uncertain information is a vital issue in the sensor fusion system. To solve this problem, many theories are presented by domestic and foreign scholars. Fuzzy sets theory was first introduced by Zadeh [11] in 1965 as an extension of the classical notion of set. It can be used in a wide range of domains in which information is incomplete or imprecise [12,13,14]. Dempster–Shafer evidence theory (evidence theory) acts as the pioneer in data fusion algorithms, which was proposed by Dempster [15] and extended by Shafer [16] subsequently. It is capable of managing epistemic and aleatoric uncertainty due to its framework. Possibility theory was introduced in 1978 by Zadeh [17]. It describes reasonably the meaning of information, especially the meaning of incomplete information within a possibilistic framework [18,19,20,21], which could be seen as the theory interconnecting fuzzy sets and evidence theory.
Within these theories, evidence theory has a good performance to process the uncertain information without the prior probability, which contributes to its wide application [22,23]. However, counter-intuitive results may be obtained when dealing with highly conflicting evidence. A famous example was illustrated by Zadeh [24]. Since then, many methods have been proposed to address this issue [25,26,27]. Martin et al. [28] proposed a conflict measures of a group of experts based on the distance of basic belief assignments. Smarandache et al. [29] presented a new normalization of a measure called contradiction to characterize the degree of discord or conflict inside a body of evidence. Martin [30] defined a conflict measure to quantify how the focal elements of two mass functions are included together. Deng et al. [31] considered a biological and evolutionary perspective to study the combination of evidences. Another open issue in evidence theory is how to determine the basic belief assignment (BBA). So far, many methods to generate BBA have been put forward. Denoeux [32] determined BBA by minimizing the mean squared differences between the classifier outputs and target values. Xu et al. [33] calculated an interval BBA from this matching degree by the modified Latin hypercube sampling Monte Carlo technique. Tabassian et al. [34] determined BBA in which the class memberships of training data are subject to ambiguity. A BBA method based on probability families encoded by possibility distributions and belief functions is presented by Baudrit and Dubois [35]. Mönks et al. [36,37] defined a fuzzy basic belief assignment ( μ BBA) based on α -cut of fuzzy membership.
Comparing with the μ BBA, the idea of the proposed BBA determination method is similar to the μ BBA method to some extent. We both use the fuzzy membership function to obtain the degree of membership to the respective propositions, and the degree of membership is applied as BBA. However, the proposed method is still very different from the μ BBA method in some aspects. First, the BBA of the μ BBA method is defined in the real line. Namely, the determination of BBA is the determination of the possibility of sensor signal belonging to each interval proposition, which is the determination of value ranges. The BBA of the proposed method is defined in categorical data. Namely, the determination of the sensor signal is the determination of the category. Besides, in the proposed method, the fuzzy membership function is used to model the feature of each category proposition. However, in the μ BBA method, the fuzzy membership function is used to represent the knowledge of possibility, and the proposition is modeled by an interval. Hence, the proposed method and the μ BBA method are different. They are applicable to the different application backgrounds.
In reality, information is often not just uncertain, but also partially reliable. If we only consider one of them, then the whole complexity of real-world information cannot completely be covered, which may cause the incorrect fusion results. Hence, reliability evaluation is indispensable in practical applications [38,39]. Guo et al. [40] presented a new framework for sensor reliability evaluation in classification problems based on evidence theory. Yuan et al. [41] took the static reliability and dynamic reliability into consideration to handle the conflicting evidence. However, the reliability of these methods is measured from the support degree (consistency) among BBA. Namely, the reliability is obtained based on the given BBA, rather than from the information sources, which may lose part of the source information. Glock et al. [42] used the concepts of majority observation and consistency to monitor the sensor reliability based on the possibilistic framework. Ehlenbröker et al. [43] proposed a method to generate a consistency-based reliability assessment for sensors, which is utilized to detect sensor defects based on groups of sensors instead combining all sensors at once. In the two reliability methods, the whole measure of reliability is time dependent. Besides, the static reliability is a prior reliability based on expert knowledge, and the dynamic reliability considers its former reliability and the consistency of observations. Comparing with that, the measure of reliability is not time dependent in this paper. The reliability is obtained based on the measure of sensor capability to distinguish the different targets. The capability to discriminate the difference classes is large under a certain attribute, and the reliability of the generated BBA is larger under this attribute.
The existing BBA methods pay more attention to the uncertainty of information, but do not simultaneously consider the reliability of information sources. In fuzzy sets theory, Zadeh [44] proposed the concept of the Z-number in 2011, which is an ordered pair of fuzzy numbers denoted by Z = ( A , B ) . The first component A is a fuzzy measurement of the uncertainty. The second component B is a measurement of the reliability of A. The Z-number can simultaneously describe the reliability of information sources. Originating from the idea of the Z-number, a new method to represent BBAs along with their associated reliability is proposed in this paper, which is named reliability-based BBA. Reliability-based BBA ( B B A , R ) is an ordered pair; its first component B B A is a mass function, and the second component R is a measurement of the reliability of the first component B B A .
The rest of this paper is organized as follows. The relevant concepts of evidence theory and pignistic probability are briefly recalled in Section 2. In Section 3, a reliability-based BBA is proposed. In Section 4, this method is compared with other methods by several examples. The conclusion is presented in Section 5.

2. Preliminaries

In this section, the relevant concepts of evidence theory and pignistic probability are briefly recalled.

2.1. Dempster–Shafer Evidence Theory

Evidence theory was introduced by Dempster [15] and then developed by Shafer [16]. It includes the following concepts: frame of discernment, mass function and Dempster’s combination rule, etc. These concepts contribute to its good performance in handling the uncertainty information [45,46,47].

2.1.1. Frame of Discernment

Let Θ be a set of N mutually-exclusive and collectively-exhaustive hypotheses, defined as:
Θ = { θ 1 , θ 2 , , θ i , , θ N }
where Θ is called a frame of discernment. The power set of Θ is composed with 2 Θ , namely:
2 Θ = { , { θ 1 } , { θ N } , { θ 1 , θ 2 } , , { θ 1 , θ 2 , θ i } , , Θ }
where ∅ is denoted as the empty set. The N subsets containing only one element each are called the singleton subset proposition; the subsets containing more than one element each are called the compound subset proposition.

2.1.2. Mass Function

A mass function m is a mapping from 2 Θ to [ 0 , 1 ] , formally defined as:
m : 2 Θ [ 0 , 1 ] ,
which satisfies the following conditions [16]:
A 2 Θ m ( A ) = 1 m ( ) = 0 .
The mass function m is also called the BBA function. Any subset A of 2 Θ , such that m ( A ) > 0 , is called a focal element.

2.1.3. Dempster’s Combination Rule

Suppose m 1 and m 2 are two mass functions in the same frame of discernment. Dempster’s combination rule, which is denoted as m = m 1 m 2 , is defined as follows [15]:
m ( A ) = B C = A m 1 ( B ) m 2 ( C ) 1 - k , A 0 , A =
where:
k = B C = m 1 ( B ) m 2 ( C ) .
Here, k is regarded as a measure of conflict between m 1 and m 2 . The value of k is larger, and the conflict between the evidence is larger.

2.1.4. Discounting

Assuming that a BBA has a support degree of α , where 0 α 1 , then this BBA is discounted by the following discounting rule [16]:
m α ( A ) = α × m ( A ) A 2 Θ m α ( Θ ) = α × m ( Θ ) + ( 1 - α )
where A is any subset of the power set of the frame of discernment Θ .

2.2. Pignistic Probability

The pignistic probability function is introduced by Smets and Kennes [48] for decision making. Its procedure corresponds to the insufficient reason principle: if you need to build a probability distribution on n elements, given a lack of information, give a probability 1 / n to each element. This procedure is repeated for each mass m. Let BetP be the pignistic probability distribution so derived. For all propositions A Θ ,
B e t P ( A ) = A B 2 Θ 1 | B | · m ( B ) 1 - m ( )
where ∅ is denoted as the empty set. B is the proposition in mass function m, and | B | is the cardinality of B.

3. The Proposed Method

In this section, the method of generating reliability-based BBA is given in detail. As shown in Figure 1, the method is expounded from five parts. In the first part, the models of training samples are built using the Gaussian membership functions. In the second part, according to the matching degree between the test sample and the attribute model, the first component B B A is generated, which is based on a previous work in the literature [49]. In the third part, the second component R (reliability of BBA) is measured, where both the similarity among classes under a certain attribute (static state) and the distance between the test sample and the models (dynamic state) are taken into account. The main contribution of this paper focuses on this part. Then, a reliability-based BBA ( B B A , R ) is obtained. Each ( B B A , R ) is discounted by the obtained reliability. Finally, these reliability-based BBAs are fused based on Dempster’s combination rule. At the stage of modeling of sensor information, the uncertainty and the reliability of the information source are simultaneously considered in the proposed method, which can obtain a more adequate construction for the description of real-world information.

3.1. The Modeling of Each Attribute

Due to the change of environment, the sensor data have usually a certain degree of fuzziness. In this case, the membership function can be used to represent the sample feature. Besides, there are some interruptions in the working process of the sensor, such as the mechanical noise and electromagnetic waves. In this case, the probability density function of the measured value of the same physical quantity is generally regarded as a form of Gaussian distribution. The Gaussian distribution possesses the following advantages [50]: first, if the error can be seen as the superposition of many independent random variables, then the error is supposed to have the form of the Gaussian distribution based on the central limit theorem. Second, many of the probability distributions of random variables in production and scientific experiments can be approximately described by the Gaussian distribution. Hence, the modeling of the training samples is built based on the Gaussian membership function in this paper.
Assuming that X is a sample space of the training set, then the Gaussian membership function of each attribute is defined as follows:
μ ( x ) : X [ 0 , 1 ] , x X .
μ ( x ) can be gained by the following steps:
  • Suppose that there are n classes, namely the frame of discernment Θ = { θ 1 , θ 2 , , θ n } . Each class θ i ( i = 1 , 2 , , n ) has k attributes.
  • For the training samples of class θ i in the j-th attribute, the mean value X ¯ i j and the standard deviation σ i j are calculated respectively as follows:
    X ¯ i j = 1 N l = 1 N x i j l , σ i j = 1 N - 1 l = 1 N ( x i j l - X ¯ i j ) 2 ,
    where i = 1 , 2 , , n and j = 1 , 2 , , k . N is the training sample size of class θ i . x i j l is the attribute value of the j-th attribute from the l-th training sample in class θ i .
  • The Gaussian membership function of the j-th attribute of class θ i is generated as follows:
    μ i j ( x ) = e x p [ - ( x - X ¯ i j ) 2 2 σ i j 2 ]
    where - 3 σ i j x 3 σ i j , i = 1 , 2 , , n and j = 1 , 2 , , k .

3.2. Reliability-Based BBA Generation Method

In this section, a reliability-based BBA is introduced from two parts: one is the determination of BBA; another is the reliability measurement of BBA.

3.2.1. The Determination of BBA

In this section, a nested structure BBA function is introduced. As described in Figure 2, a singleton subset proposition is modeled by a Gaussian membership function. For example, the singleton subset proposition { A } is produced by the membership function μ A ( x ) . The proposition with two elements is represented by the intersection of two singleton subset propositions. For instance, the compound subset proposition with two elements { A B } can be constructed as follows:
μ A B ( x ) = m i n ( μ A ( x ) , μ B ( x ) ) .
Namely, { A B } is defined by the intersection μ A B ( x ) of { A } with { B } . Further, a compound subset proposition with three elements can be constructed by the intersection among three singleton subset propositions. For example, { A B C } can be constructed as follows:
μ A B C ( x ) = m i n ( μ A ( x ) , μ B ( x ) , μ C ( x ) ) .
Suppose that G ( G 2 Θ ) is a proposition and t is the feature information of a test sample under a certain attribute. The matching degree between t and G implies the plausibility of this test sample belonging to this proposition, which is defined as follows:
P l ( G | t ) = μ G ( x ) x = t
where G can be a singleton subset proposition or a compound subset proposition. Equation (13) indicates that the plausibility is determined by the intersection between functions μ G ( x ) and x = t .
That is, the plausibility of a test sample belonging to these propositions { A } , { A B } and { A B C } is denoted respectively as follows:
P l ( A | t ) = μ A ( x ) x = t , P l ( A B | t ) = μ A B ( x ) x = t , P l ( A B C | t ) = μ A B C ( x ) x = t .
Then, the plausibility function, which measures the matching degree between the test sample and class proposition, is used to determinate BBA in this paper. Note that when the plausibility of a singleton subset proposition is equal to the plausibility of a compound subset proposition, this plausibility is only assigned to the compound subset proposition as its BBA. For example, as shown in Figure 3, for the test sample x, the plausibility of this test sample belonging to each proposition can be given as:
P l ( B | t ) = μ B ( x ) x = 7 = p 2 , P l ( C | t ) = μ C ( x ) x = 7 = p 1 , P l ( B C | t ) = μ B C ( x ) x = 7 = p 2 , P l ( A | t ) = P l ( A B | t ) = P l ( A C | t ) = P l ( A B C | t ) = 0
Then, the BBA of each proposition is obtained as follows:
m ( C ) = P l ( C | t ) = p 1 , m ( B C ) = P l ( B C | t ) = p 2 , m ( A ) = m ( B ) = m ( A B ) = m ( A C ) = m ( A B C ) = 0
where since P l ( B | t ) = P l ( B C | t ) = p 2 , the plausibility p 2 is assigned to the compound subset proposition B C , namely m ( B C ) = p 2 , but m ( B ) = 0 .
Considering that the cumulative sum of the above gained BBAs may not be equal to one, the following rules are given to normalize BBAs: if the total sum is greater than one, these BBAs are normalized; if the total sum is less than one, the redundancy belief value 1 - B B A is assigned to the universal set Θ , namely that is assigned to the unknown.

3.2.2. The Measurement of the Reliability of BBA

As shown in Figure 4, there exist two kinds of potential possibility of false classification: one is that class A is incorrectly recognized as class B, which is defined as P ( B A ) ; the other is that class B is incorrectly recognized as class A, which is defined as P ( A B ) . The potential possibility leads to the generated BBA being not wholly reliable. This issue is not considered in the existing BBA methods. To address this issue, a method of measuring the BBA reliability is proposed in this paper.
1. The static reliability index based on the attribute model:
Assume there are two kinds of class A and B; from Figure 4, we can know that if a test sample comes from class A and its value locates in the range from c to d, the possibility of the false BBA P ( B A ) = c d μ A ( x ) d x / a d μ A ( x ) d x . If a test sample comes from class B and its value locates in the range from b to c, the possibility of the false BBA P ( A B ) = b c μ B ( x ) d x / b e μ B ( x ) d x . Hence, the total error rate of BBA is P = P ( B A ) + P ( A B ) . Namely, under a certain model ( a d μ A ( x ) d x and b e μ B ( x ) d x are invariable), if the overlapping area c d μ A ( x ) d x or b c μ B ( x ) d x is larger, the similarity among classes is larger, then the possibility of generating the false BBA is larger, and vice versa. As analyzed above, a method of measuring the reliability of BBA is proposed based on the similarity among the attribute model, which is detailed as follows.
In the attribute j ( j = 1 , 2 , , k ) , the similarity between Classes 1 and 2 is defined as:
s i m 12 j = s i m ( μ 1 j ( x ) , μ 2 j ( x ) ) = μ 12 j ( x ) d x μ 1 j ( x ) d x + μ 2 j ( x ) d x - μ 12 j ( x ) d x
where μ 1 j ( x ) and μ 2 j ( x ) are the membership functions of the j-th attribute of Class 1 and Class 2, respectively. μ 12 j ( x ) is the j-th attribute’s membership function of the overlapping area between Class 1 and Class 2, namely the membership function of the compound subset { 12 } .
Then, a similarity matrix of the j-th attribute, S M j , is obtained as follows:
S M j = μ 1 j x μ 2 j x μ n j x μ 1 j x μ 2 j x μ n j x 1 s i m 12 j s i m 1 n j s i m 21 j 1 s i m 2 n j s i m n 1 j s i m n 2 j 1
where s i m i l j ( i , l = 1 , 2 , , n ) is the similarity between class i and class l in the j-th attribute.
Finally, based on the static model of the j-th attribute, the reliability of BBA generated from the j-th attribute is denoted as follows:
R j s = i < l ( 1 - s i m i l j )
where j = 1 , 2 , , k and s i m i l j ( i , l = 1 , 2 , , n ) is the similarity between class i and class l in the j-th attribute. Obviously, R j s implies that the larger the similarity, the lower the reliability of BBA generated from this attribute model.
2. The dynamic reliability index based on the test samples:
The static reliability index shows that the overlapping area among classes is larger, the similarity is larger, the possibility of generating the false BBA is larger, then the reliability of the generated BBA is smaller. This index can reflect that the reliability of BBA is affected by some static factors, such as the similarity among classes. However, the reliability of BBA is also affected by the test samples. For example, as shown in Figure 5a, although classes B and C have a large overlapping area, it is almost impossible that the test sample x 1 from class A is incorrectly classified as class B or C. In this case, the overlap degree between class B and C has little negative influence on the reliability of the generated BBA; whereas, in Figure 5b, the test sample x 2 from class C is easily incorrectly classified as class B. In this case, the overlap degree between classes B and C has a large negative influence on the reliability of the generated BBA. As analyzed above, the reliability of BBA is related to the test samples. To reflect this influence, a risk distance d is introduced in this section. It is denoted as the distance between the test sample and the overlapping area among attribute models. If the distance is larger, the influence of the overlapping area is smaller, the risk of the incorrect classification is smaller, then the reliability of the generated BBA is larger, and vice versa. The risk distance is produced as follows.
In the attribute j ( j = 1 , 2 , , k ) , p 12 j is the maximum of the intersection between Class 1 and Class 2, namely the vertex of the overlapping area between Class 1 and Class 2. In this section, p 12 j is taken as the reference point of this overlapping area. Hence, the distance between the test sample x j and the reference point p 12 j can be calculated to represent the risk distance. This reference point is defined as:
p 12 j = s u p m i n ( μ 1 ( x ) j , μ 2 ( x ) j ) .
where μ 1 ( x ) j and μ 2 ( x ) j are the Gaussian membership functions of Class 1 and Class 2 in the j-th attribute, respectively. Then, a vector P j containing all reference points of the overlapping area among class i ( i = 1 , 2 , , n ) in the j-th attribute is obtained as follows:
P j = p 12 j p 1 n j p 23 j p 2 n j p ( n - 1 ) n j
In the j-th attribute, the risk distance between the test sample x j and the reference points p ( n - 1 ) n j of the overlapping area between the classes μ n - 1 j ( x ) and μ n j ( x ) is formulated as:
d ( n - 1 ) n j = d ( x j , p ( n - 1 ) n j ) = | x j - p ( n - 1 ) n j | D j
where D j represents the maximal interval comprised by all classes. Then, distance vector D j * of the j-th attribute is given as follows:
D j * = d 12 j d 1 n j d 23 j d 2 n j d ( n - 1 ) n j
Finally, the dynamic reliability index based on the test samples of the j-th attribute is denoted as follows:
R j d = e l = 2 n d ( l - 1 ) l j
where d ( l - 1 ) l j is the distance between the test sample x j and the reference points p ( l - 1 ) l j of the overlapping area between class μ l - 1 j ( x ) and μ l j ( x ) in the j-th attribute. Obviously, R j d implies that the larger the risk distance, the larger the reliability of BBA generated from this attribute.
3. Comprehensive reliability measure:
Based on the above analysis, a method of measuring the BBA reliability is proposed. This method, which considers the comprehensive reliability based on the attribute model and the test samples, is more reasonable and effective. It is denoted as follows:
R j = R j s × R j d
where R j s and R j d are separately the static reliability index and the dynamic reliability index in the j-th attribute, which can be gained using Equations (17) and (22), respectively.
Suppose that there are K attributes of each class, the reliability of the generated BBA in the j-th attribute are normalized as:
R j * = R j m a x ( R k )
where k = 1 , 2 , , K .
According to Section 3.2.1 and Section 3.2.2, both the first component B B A and the second component R of reliability-based BBA can be acquired. Finally, the proposed reliability-based BBA ( B B A , R ) is obtained.

3.3. Sensor Data Fusion

In this paper, the reliability-based BBA is first translated into the classical BBA based on the discounting method [16]. After that, Dempster’s combination rule can be used to fuse these BBAs.
Assuming that in the frame of discernment Θ = { θ 1 , θ 2 , , θ n } , there are k reliability-based BBAs ( B B A j , R j ) , ( j = 1 , 2 , , k ) . Based on the discounting method, the BBAs generated from sensors are discounted as follows:
m j R ( A ) = R j × m j ( A ) A 2 Θ m j R ( Θ ) = R j × m j ( Θ ) + ( 1 - R j )
where R j is the reliability of B B A j of the j-th attribute.
Eventually, these reliability-based BBAs are fused using Dempster’s combination rule. The maximum pignistic probability is taken as the decision-making criterion in this paper. Hence, the final mass function is transformed to pignistic probability, and the final decision-making can be done.

4. Numerical Example

To evaluate the validity of the reliability-based BBA, several experiments of two datasets and a fault diagnosis are performed in this section.

4.1. Experiments on Two Datasets: Five-Fold Cross-Validation

In this section, two kinds of datasets, including Iris and Wine, are selected from the UCI databases (UCI Machine Learning Repository: http://archive.ics.uci.edu/ml/datasets.html.) to evaluate the proposed method. Within these, the Iris dataset contains three classes of 50 samples each, and each class has four attributes, which is the well-known database in pattern recognition. The Wine dataset contains three classes, and each class has 13 attributes. First of all, the proposed method is compared with the method, which uses the same BBA method, but does not consider the reliability of BBA. The comparison results of five-fold cross-validation are shown in Figure 6.
The above results show that after considering the reliability of BBA, the recognition rates of two datasets are all increased to some extent. Namely, the proposed method that measures the reliability of BBA is valid and reasonable.
To further evaluate this method, a comparison experiment between our method and other classifiers is carried out. Here, we consider the following three kinds of classifiers: support vector machine with radial basis function (SVM-RBF), decision tree (REPTree) and naive Bayesian (NB). Within these, SVM and NB are both the top ten data-mining algorithms [51]. REPTree is also a well-known machine-learning algorithm. The comparison results of five-fold cross-validation are shown in Figure 7.
From the above experimental results, it can be found that: in the Iris dataset, the recognition rates of the proposed method and the classical classifiers are greater than 90%, namely they are all effective in this dataset. In the Wine dataset, the recognition rate of our method is 95.66%; NB is 85.27%; REPTree is 90.36%; and SVM-RBF is 37.18%. This shows that the proposed method has competitive performances contrasting with these selected classifiers. What is more, the reliability of BBA is measured at the stage of BBA generation, which is more reasonable.

4.2. An Application Example of Fault Diagnosis

To evaluate the validity of this method in engineering applications, a case study of the fault diagnosis of motor rotor is executed. There are three kinds of fault: F 1 = { R o t o r u n b a l a n c e } , F 2 = { R o t o r m i s a l i g n m e n t } and F 3 = { P e d e s t a l l o o s e n e s s } . Three vibration acceleration sensors and a vibration displacement sensor are placed in different installation positions to collect the vibration signal. Vibration displacement and acceleration vibration frequency amplitudes at the frequencies of 1×, 2× and 3× are taken as the fault feature variables. The relevant data are acquired from the literature [52], which is cited in the Appendix. The method is compared with the method that does not consider the reliability of BBA and other classifiers, respectively. The comparison results of five-fold cross-validation are shown in Table 1.
The above experiments can evaluate the rationality and the effectiveness of the presented method well. The advantages of our method are concluded as follows:
  • Based on the idea of the Z-number, an ordered pair ( B B A , R ) is proposed to represent BBA along with its associated reliability. The first component B B A is a mass function; the second component R is a measurement of the reliability of the first component. According to this ordered pair, the reliability of BBA can be measured well at the stage of BBA generation.
  • In the process of measuring the reliability of BBA, the information about two things is taken into account. One is the similarity among classes (static information). Another is the risk distance between the test samples and the overlapping area among classes (dynamic information). This makes the results truer and more credible.
  • The proposed method is based on a feasible method of measuring the reliability of BBA, which can be replaced with other measure methods for different applications. Namely, this method is flexible and easy to extend in many applications.

5. Conclusions

In the multi-sensors data fusion based on evidence theory, how to determine BBA is an open issue. In this paper, a novel method named the reliability-based BBA is proposed. Within this method, first, the models of training samples are built using the Gaussian membership functions. Second, the BBA of every test sample is generated based on the matching degree between the test sample and the attribute model. Then, the reliability of BBA is measured according to both the similarity among classes and the risk distance between the test samples and the overlapping area among classes. Finally, a reliability-based BBA can be generated. Several performed experiments verify that the proposed method is effective. In the future, we will try to apply the proposed method to more practical applications and research a new combination rule for reliability-based BBA.

Acknowledgments

The work is partially supported by the National Natural Science Foundation of China (Grant No. 61671384), the Natural Science Basic Research Plan in Shaanxi Province of China (Program No. 2016JM6018), the Aviation Science Foundation (Program No. 20165553036), the Fundamental Research Funds for the Central Universities (Program No. 3102017OQD020) and the Seed Foundation of Innovation and Creation for Graduate Students in Northwestern Polytechnical University (Program No. Z2017142).

Author Contributions

Wen Jiang and Miaoyan Zhuang designed the research. Wen Jiang performed the experiments. Chunhe Xie analyzed the data. Miaoyan Zhuang wrote the manuscript. All authors read and approved the final manuscript.

Conflicts of Interest

The authors declare that they have no competing interests.

Appendix A. Experimental Data of Fault Diagnosis

There are three kinds of faults in a motor rotor: F = { X , Y , Z } = { R o t o r u n b a l a n c e , R o t o r m i s a l i g n m e n t , P e d e s t a l l o o s e n e s s } , which has four fault feature variables. At the same time interval, each fault feature of each fault is continuously observed 40 times, which is taken as a group of observations. A total of five groups is measured in each fault feature of each fault. Hence, i = 1 , 2 , 3 , 4 respectively represent four fault feature variables: displacement, acceleration frequency of 1×, 2× and 3×. j = 1 , 2 , 3 , 4 , 5 respectively represent the group numbers of the measured data. Five groups of observations of each feature variables of each fault are shown in Table A1.
Table A1. Experimental data of fault diagnosis [52].
Table A1. Experimental data of fault diagnosis [52].
GroupsObservations
X110.16630.15900.15680.14850.17230.20060.19030.19080.19860.1843
0.17850.16100.15790.15110.15320.16470.16280.16460.16340.1642
0.16480.16400.16740.06610.16590.16500.16330.16320.16040.1542
0.15550.15620.15400.15640.15570.15420.15460.15710.15370.1536
X120.1540.15180.15370.15480.15420.15380.15450.15370.15710.1560
0.15840.15520.15860.15740.15690.15650.15510.15850.15850.1593
0.15480.15580.15470.15930.15320.16320.15750.1590.15940.1541
0.1650.16740.16510.16040.17870.18180.18200.16560.16580.1644
X130.16470.16470.16540.16510.16560.16530.16520.16520.16480.1649
0.16530.16500.16500.16520.16530.16520.16480.16470.16460.1645
0.16510.16520.16520.16490.16500.16430.16400.16390.16410.1633
0.16320.16290.16300.16300.16340.16310.16340.16290.16320.1629
X140.16300.16290.16270.16260.16220.16240.16270.16180.16140.1617
0.16210.16150.16180.16110.16140.16100.16120.16110.16160.1612
0.16120.16130.16230.16160.16210.16130.16110.16100.16100.1613
0.16150.16160.16180.16160.16140.16120.16060.16140.16190.1614
X150.16090.16100.16120.16150.16090.16060.16040.16060.16050.1601
0.16040.16080.16100.16030.15990.16010.16020.15990.15980.1598
0.15980.15960.15950.15930.15940.15980.15960.15970.15950.1593
0.15980.15960.15970.15950.15930.15770.15800.15760.15770.1579
X210.16120.16200.16120.16100.13850.12220.14750.13060.12100.1501
0.15480.15770.16220.16180.16210.16650.16390.16520.16250.1637
0.16450.16450.16500.16490.16500.16300.14930.15330.14740.1460
0.14890.14990.14950.14910.14890.15030.15070.15050.14770.1496
X220.15170.14960.15040.14980.15280.15190.15340.15160.15550.1520
0.15120.15460.15380.15510.15630.15360.15430.15190.15140.1520
0.15010.15140.14830.14990.15020.15500.15370.15070.15570.1537
0.15560.15450.15290.15000.13800.13430.13460.15440.14580.1424
X230.14640.14600.14460.14480.14760.14640.14340.14320.14500.1420
0.14480.14520.14560.14620.14640.14640.14440.14400.14220.1442
0.14700.14780.14680.14820.14720.14620.14780.14940.14880.1496
0.14800.14760.15020.14960.14880.14880.14840.15340.14900.1486
X240.14660.14600.14380.14580.14880.14660.14940.15020.14860.1488
0.15120.14900.14700.14780.14840.14900.14740.14560.14640.1446
0.34680.14840.14780.14860.14700.14480.14600.14580.14580.1456
0.14520.14700.14700.14580.14500.14560.14620.14420.14640.1468
X250.14840.14740.14880.14600.14620.14640.14520.14500.14380.1434
0.14380.14380.14360.14360.14320.14120.14280.14180.14220.1422
0.14320.14060.14200.14020.14100.14180.14320.14500.14180.1424
0.14120.14080.14120.13900.14120.13980.14060.13940.13920.1382
X310.12210.12190.12070.12150.12220.12960.12350.12950.12800.1233
0.12180.11590.11630.11950.11900.12710.12470.12320.12330.1237
0.12100.12270.12330.12220.12520.12300.10490.10330.08990.1003
0.10440.10600.10640.10420.10720.10710.10700.10700.10410.1049
X320.10680.10630.10690.10570.10910.10610.10940.10670.11090.1111
0.11120.10960.10740.10850.11090.11160.11100.11130.11060.1110
0.10910.10800.10440.10980.10840.11020.10780.10870.11110.1116
0.11240.11280.11100.10780.11010.11150.11310.11080.11110.1079
X330.11050.10920.10740.10960.10550.10760.10030.10310.10400.1046
0.10410.10210.10410.10530.10570.10380.10290.10370.10120.0997
0.10200.10200.09900.10490.10660.10650.10980.11020.10760.1116
0.10970.11500.11200.10780.11060.10750.10610.10900.10980.1105
X340.11050.10810.10750.10590.10970.11050.10860.10850.10950.1084
0.10930.11130.11220.11390.11400.11290.11190.11070.11190.1137
0.11280.11220.11040.11290.11300.11430.11320.11320.11150.1111
0.11230.11240.11170.11200.11300.11270.11580.11450.11380.1144
X350.11600.11370.11590.11640.11580.11650.11670.11600.11550.1175
0.11700.11750.11680.11910.11900.11910.11900.12110.11960.1187
0.11910.12020.12000.12050.11940.11930.11950.11800.11900.1194
0.11970.11940.11730.11870.11690.11790.11840.11970.11940.1196
X414.40904.37804.34304.29504.28904.28904.27404.18404.18204.2020
4.21304.22404.22204.22504.21604.22204.22104.24104.22004.2180
4.22604.24304.23904.23704.22704.23004.22104.22004.24304.6660
4.45404.43704.43804.44104.44004.43504.43304.44304.44604.4420
X424.44804.43804.44204.43204.42704.43204.42204.43204.42404.4270
4.45904.42404.46504.41804.42004.41804.41904.42304.42004.4460
4.42104.40404.41204.40004.41004.41504.40704.41204.39204.4020
4.39304.39204.38604.38904.38204.37904.41204.37504.37404.3790
X434.36804.38404.38004.36904.38404.38304.38304.38204.38304.3850
4.38004.38004.37104.37204.37404.38904.37204.36704.37504.3650
4.36004.35704.36404.35704.35500.35704.34804.34704.34704.3400
4.34604.33604.31904.33004.34804.35004.35004.34604.35004.3500
X444.40004.34404.34104.34204.35104.34504.33704.33704.33404.3330
4.33304.32104.32504.31804.33004.31004.31904.31604.31604.3150
4.30904.30404.30604.30504.30104.30004.29604.29404.28604.2860
4.28904.29404.29004.30704.28904.28004.28204.28804.28104.2980
X454.30004.29304.29804.33034.29904.28704.30304.29104.29504.3050
4.30204.31204.32504.30904.32404.32104.32404.32304.32704.3290
4.32304.32904.32904.33504.32104.32404.32704.46204.41204.3740
4.39604.37304.35504.35404.35004.34304.34704.35504.33804.3310
Y110.16660.16660.16700.16960.16650.16710.16520.16630.16560.1656
0.16590.16550.16400.16340.16310.16180.16170.16150.15970.1592
0.15840.15850.15750.15780.15730.15670.18340.18250.18270.1822
0.18280.18170.18200.18230.18080.18180.18140.18160.18080.1807
Y120.18090.17940.17990.17990.17880.17950.17850.17850.17800.1777
0.17780.17770.17660.17670.17610.17700.17570.17650.17550.1755
0.17460.17570.17410.17430.17410.17320.17360.17230.17300.1708
0.17080.17020.16910.16860.16830.16760.16680.16700.16490.1644
Y130.16370.16390.16550.16410.16430.16410.16250.20380.20370.2033
0.20140.20280.20220.20260.20140.20130.20070.20120.19990.2012
0.19980.19990.19880.19920.19880.19850.19770.19760.19790.1981
0.19660.19730.19790.19840.19730.19690.19630.19600.19530.1941
Y140.19580.19520.19540.19380.19400.19560.19450.19370.19540.1947
0.19500.19550.19470.19560.19450.19320.19420.19250.19240.1934
0.19040.19050.19090.19060.19890.18980.18910.18920.18860.1880
0.18840.18900.18740.18720.18800.18550.18620.18660.18490.1841
Y150.18570.18440.18370.18310.18350.18260.18280.18340.18330.1837
0.18220.18290.18230.18070.18330.18350.18320.18280.18160.1820
0.18050.18080.18030.17950.17850.17940.17950.17880.17860.1781
0.17710.17750.17740.17690.17800.17780.17580.17400.17360.1738
Y210.31110.31240.32050.32680.32250.32680.33050.32450.32470.3245
0.33000.32790.32650.32210.32090.32270.31960.31500.31930.3182
0.31480.31220.31330.31070.31310.30710.34120.34010.33570.3466
0.34220.33900.33720.33640.33980.33920.33840.33830.33440.3394
Y220.33860.33420.33640.33380.33810.33880.33470.33480.33210.3367
0.33670.33220.33000.33090.33460.33410.33350.33030.33200.3317
0.32950.32650.32990.32670.32710.32530.32970.32470.32430.3269
0.32290.32110.31710.32020.31700.31250.31440.31650.30790.3087
Y230.31170.30950.31520.32220.31710.31690.31570.34800.34980.3469
0.34470.34760.35070.34700.34030.33590.34120.33990.34590.3449
0.34790.34220.34460.34710.34670.34610.34210.34130.34160.3457
0.34230.34390.34230.34650.34050.33990.33720.33870.33330.3349
Y240.34190.34360.35100.33920.33540.33500.35000.33540.33580.3349
0.33850.34140.33510.33940.33710.33740.33700.33650.33420.3389
0.33860.33940.33740.33550.33570.33120.32740.33530.33510.3325
0.33050.33140.33040.32380.33150.32590.32530.33080.32150.3233
Y250.32820.32080.32110.31380.31440.31990.31820.31960.32050.3180
0.31660.31700.31810.31390.32120.32540.32380.31930.32040.3168
0.31480.32040.31460.31320.31910.31640.31410.31650.31370.3160
0.31350.31370.31880.31770.31930.32390.31580.32360.32910.3262
Y310.25170.26340.25900.28080.28690.28270.29130.29090.28930.2903
0.29990.29610.29300.30400.29710.31250.29680.29790.29980.3003
0.30230.29860.30080.30220.30170.32180.23380.24140.25100.2498
0.24240.24510.24770.24730.24940.25230.25230.24960.25570.2591
Y320.24850.25340.26360.26700.26610.26410.25810.26370.27330.2735
0.26440.26220.26690.27130.26630.27200.27530.27580.27220.2755
0.27100.28700.28200.27700.27270.27610.28120.27770.28800.2919
0.28820.27840.27880.27920.27990.27310.27170.28510.26060.2696
Y330.27860.27740.29210.29910.29820.29740.29800.20150.18720.1865
0.20160.19800.19820.20220.20710.20200.18820.18770.20650.2057
0.20520.21430.21350.22610.21100.20770.20890.21340.21610.2119
0.21090.21300.21800.20960.21020.21520.21370.21100.21130.2126
Y340.21700.21300.21900.21920.21120.22140.21660.21370.21090.2024
0.21170.21020.20870.20500.21490.21340.20670.21400.22390.2153
0.21440.21030.21450.21900.22500.21370.20600.21530.21320.2160
0.20790.20470.21300.20580.21740.21380.21420.21380.20220.2169
Y350.22060.21330.21410.20310.20730.20990.20660.20520.21720.2131
0.21400.21840.21520.20990.22580.22640.22730.23220.22040.2248
0.22420.22510.22220.23170.21930.22620.22550.23320.22990.2289
0.23050.23980.24010.23060.23650.23980.24390.25950.25290.2557
Y415.39205.32605.30805.26205.28005.24605.19505.22805.18405.1820
5.15905.13105.09804.98405.01904.93404.92604.95004.96904.8960
4.79904.83304.82204.74504.78404.82604.89604.89204.91204.8390
4.82304.79604.80004.81804.82404.83104.83704.87204.84104.8410
Y424.86104.82204.68904.72504.70704.73004.69804.68104.66204.7610
4.74604.68704.71204.70804.69104.51304.46704.51204.54104.3910
4.42204.51304.59504.58104.54204.54004.51604.52204.51804.5660
4.53804.54504.45104.45704.48104.48604.49404.46904.41804.4170
Y434.37004.40004.39504.38404.37404.38004.33104.32304.31404.2870
4.23004.24404.25004.22004.21504.25404.21004.19804.25504.2210
4.21104.20004.18104.17904.18404.15704.14404.16004.11504.0940
4.12304.12805.23405.23205.21105.22105.22805.20605.18005.1890
Y445.15105.12405.12305.12205.08305.06005.09305.07505.04905.0520
5.01505.02505.07505.01504.90104.93004.90804.88604.87804.9040
4.89804.88304.85104.85104.83704.93408.89604.81604.76404.7940
4.80104.76704.74504.75404.77104.75604.75404.73604.67804.6650
Y454.67704.66104.65004.62804.64404.63204.61204.46204.67704.6580
4.62904.62204.63004.61404.62604.61304.58504.56904.58204.5500
4.53304.55204.50404.47604.56604.52804.55504.52304.51904.5390
4.52204.52104.50904.48704.52704.47304.47104.49004.45704.4510
Z110.32070.32130.32130.32350.33220.34190.34340.34400.34540.3461
0.34740.34760.34320.34680.34390.34230.34400.34300.34360.3420
0.34160.34020.33730.34030.34140.34230.34200.34230.34250.3379
0.33790.33910.33860.33550.33520.33610.33330.33330.33150.3347
Z120.33470.33200.33230.33270.33290.32870.33040.33120.32850.3287
0.33090.32700.32740.32850.32830.33050.32740.32610.32640.3251
0.32710.32520.32750.32750.32870.32700.32690.32970.32660.3308
0.32930.33040.33230.33050.33050.33300.33390.33420.33120.3315
Z130.33120.33010.33150.33070.33150.33200.33110.33270.32920.3301
0.33150.32890.32460.32670.32950.32700.32380.32640.32510.3264
0.32600.32470.32240.32350.32490.32300.32320.32730.32490.3270
0.32180.32440.30060.30300.30410.31740.32200.31960.32410.3251
Z140.32630.32660.32820.32700.32900.31980.32370.32290.32610.3238
0.32590.32210.33090.32710.32420.32350.32400.32610.32940.3287
0.32670.32770.32630.32620.32780.32760.32710.32670.32890.3270
0.32660.32990.30680.31480.33220.33230.33200.33360.33260.3322
Z150.33260.33170.33010.33160.33360.32800.32920.32970.32830.3283
0.32640.32790.32750.32940.32450.32680.32610.32620.32530.3272
0.32700.32520.32840.32530.32650.32770.32910.32870.32560.3239
0.32480.32610.32520.32490.32540.32900.32750.32740.32740.3251
Z210.28930.28630.28010.28470.32710.34480.34090.33460.32490.3425
0.33600.33680.33610.34110.34340.34590.34600.34810.35180.3495
0.34780.34770.35060.34700.34700.35010.34770.35610.34890.3529
0.35390.35440.35250.35150.35600.35960.35670.36160.36020.3589
Z220.35410.35610.36070.36360.36140.35950.35860.35750.35740.3563
0.36010.36190.36470.35990.36210.36470.35570.34570.35580.3509
0.35250.35270.34840.34520.34740.34380.35000.34470.34290.3508
0.33970.33750.35030.34210.34210.33620.33280.34090.33910.3364
Z230.32870.33230.33130.34160.33150.33520.33960.33490.34020.3406
0.34720.35260.34390.34620.34270.34920.35070.35500.34560.3522
0.34800.33970.34740.34990.35030.33650.34500.35160.35060.3528
0.34930.35460.29950.30940.29500.34790.33610.33940.34840.3441
Z240.34690.33800.33560.33780.33850.33380.33960.33450.33630.3426
0.33330.32980.33350.33390.33970.33490.33570.33610.34010.3382
0.33790.33560.33090.33330.33280.33300.34120.33340.32640.3297
0.33020.33180.29610.31430.36160.35060.34630.34460.34120.3393
Z250.34540.33960.34530.34550.35170.34260.35900.35160.34810.3502
0.34400.34280.34550.34040.35180.35170.33890.34810.33820.3530
0.34710.35660.35540.35390.35760.35360.34800.35680.35670.3524
0.35870.35780.35350.36020.35650.34900.35320.35410.35070.3467
Z310.18100.18640.18030.18290.16050.14410.14360.14120.14140.1476
0.15020.14770.15070.14690.14900.15120.14610.14970.15110.1488
0.14860.14800.14930.14510.15200.15370.14980.14780.14710.1496
0.14670.14430.14460.14200.14540.13650.13470.13730.13800.1446
Z320.14340.13800.14130.14120.14520.14440.13960.13640.14000.1424
0.14080.14190.14150.13930.14720.14520.13870.13830.12670.1326
0.13260.13980.12830.12910.12960.12820.13140.12350.12830.1179
0.12060.12850.13650.12900.12900.13450.11910.12750.12900.1187
Z330.12520.12100.12680.13390.13330.13590.13090.13620.13150.1399
0.13870.13690.13260.13810.13080.13010.13220.13020.12600.1241
0.12660.12100.12980.12640.12320.12500.13130.12840.12570.1281
0.13210.13500.16650.16950.16920.13860.13520.14220.14090.1332
Z340.13870.13430.13490.13350.12890.13000.12820.12630.12580.1331
0.12680.12910.13530.12950.13040.12790.13450.13290.13290.1294
0.13980.13860.13180.12780.13710.13170.13570.13610.13700.1416
0.12910.13500.13680.15350.13400.13040.13120.13310.12760.1302
Z350.12320.13400.13160.12990.13750.12380.13440.12290.13310.1324
0.12970.12970.12330.12860.13140.13340.12590.13620.11510.1279
0.12560.12870.13230.12160.12630.12960.12410.12740.12520.1310
0.12760.13140.13280.12840.12840.13390.13460.13600.13560.1359
Z419.79209.80909.80909.81309.81909.87309.78509.82209.78809.7530
9.81709.75309.70609.74809.78409.72109.73309.79109.90909.9510
9.96709.93409.87609.90709.94709.87809.91509.92009.90909.9220
9.84409.87409.80009.87009.89709.86709.87609.88309.93709.9330
Z429.90709.85309.85109.86909.82509.86309.86109.84409.85009.7980
9.83009.82509.83709.88909.83509.80309.75509.79609.77609.7730
9.72709.62609.64309.66209.69209.68009.69909.38509.70209.7160
9.74209.65309.73909.78309.70309.74609.73609.80009.74909.7840
Z439.70609.75409.78309.75009.72909.79009.77909.73709.76409.6970
9.68509.72609.68309.68809.72309.73609.69309.75609.75009.7880
9.70509.76609.77109.82409.86109.82909.80209.85509.76009.8230
9.86109.82009.84209.83709.83409.87509.90409.85709.80009.8650
Z449.81909.84009.83509.77569.85209.89009.92309.88109.95809.9290
9.93209.65009.96809.92209.85809.94609.87609.94009.83709.7400
9.89909.94409.957010.03609.89609.955010.023010.01709.99509.7420
9.62209.73209.72809.978010.112010.03509.99309.67109.57209.6780
Z459.75309.75709.75109.83309.77309.79809.84609.84409.87509.8690
9.83009.69509.69309.69909.65409.68809.57909.66109.92509.8580
9.62409.68309.85409.63009.58909.64509.79909.82609.94209.9150
9.91509.79809.92409.89709.88209.80909.79909.81509.85809.8380

References

  1. Hall, D.L.; Llinas, J. An introduction to multisensor data fusion. IEEE Proc. 1997, 85, 6–23. [Google Scholar] [CrossRef]
  2. Deng, X.; Jiang, W.; Zhang, J. Zero-sum matrix game with payoffs of Dempster–Shafer belief structures and its applications on sensors. Sensors 2017, 17, 922. [Google Scholar] [CrossRef] [PubMed]
  3. Jin, X.; Du, J.; Bao, J. Maneuvering target tracking by adaptive statistics model. J. China Univ. Posts Telecommun. 2013, 20, 108–114. [Google Scholar] [CrossRef]
  4. Sun, S.; Tian, T.; Lin, H. Optimal Linear Estimators for Systems with Finite-Step Correlated Noises and Packet Dropout Compensations. IEEE Trans. Signal Process. 2016, 64, 5672–5681. [Google Scholar] [CrossRef]
  5. Jiang, W.; Wei, B.; Zhan, J.; Xie, C.; Zhou, D. A visibility graph power averaging aggregation operator: A methodology based on network analysis. Comput. Ind. Eng. 2016, 101, 260–268. [Google Scholar] [CrossRef]
  6. Sun, S.; Wang, G. Modeling and estimation for networked systems with multiple random transmission delays and packet losses. Syst. Control Lett. 2014, 73, 6–16. [Google Scholar] [CrossRef]
  7. Zhang, X.; Deng, Y.; Chan, F.T.S.; Adamatzky, A.; Mahadevan, S. Supplier selection based on evidence theory and analytic network process. Proc. Inst. Mech. Eng Part B J. Eng. Manuf. 2016, 230, 562–573. [Google Scholar] [CrossRef]
  8. Yang, F.; Ji, L.E.; Liu, S.; Feng, P. A fast and high accuracy registration method for multi-source images. Optik 2015, 126, 3061–3065. [Google Scholar] [CrossRef]
  9. Wu, F.; Wei, H.; Wang, X. Correction of image radial distortion based on division model. Opt. Eng. 2017, 56, 013108. [Google Scholar] [CrossRef]
  10. Yang, F.; Wei, H. Fusion of infrared polarization and intensity images using support value transform and fuzzy combination rules. Infrared Phys. Technol. 2013, 60, 235–243. [Google Scholar] [CrossRef]
  11. Zadeh, L.A. Fuzzy sets. Inf. Control 1965, 8, 338–353. [Google Scholar] [CrossRef]
  12. Jiang, W.; Xie, C.; Luo, Y.; Tang, Y. Ranking Z-numbers with an improved ranking method for generalized fuzzy numbers. J. Intell. Fuzzy Syst. 2017, 32, 1931–1943. [Google Scholar] [CrossRef]
  13. Bai, Y.; Zhang, B.; Wang, X.; Jin, X.; Xu, J.; Su, T.; Wang, Z. A novel group decision-making method based on sensor data and fuzzy information. Sensors 2016, 16, 1799. [Google Scholar] [CrossRef] [PubMed]
  14. Tang, Y.; Zhou, D.; Jiang, W. A new fuzzy-evidential controller for stabilization of the planar inverted pendulum system. PLoS ONE 2016, 11, e0160416. [Google Scholar] [CrossRef] [PubMed]
  15. Dempster, A.P. Upper and Lower Probabilities Induced by a Multi-valued Mapping. Ann. Math. Stat. 1967, 38, 325–339. [Google Scholar] [CrossRef]
  16. Shafer, G. A Mathematical Theory of Evidence; Princeton University Press: Princeton, NJ, USA, 1976; Volume 24. [Google Scholar]
  17. Zadeh, L. Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets Syst. 1978, 1, 3–28. [Google Scholar] [CrossRef]
  18. Dubois, D.; Prade, H. Possibility Theory: An Approach to Computerized Processing of Uncertainty, Softcover Reprint of the Original, 1st ed.; Plenum Press: New York, NY, USA, 1988. [Google Scholar]
  19. Dubois, D.; Prade, H. Fuzzy sets and probability: Misunderstandings, bridges and gaps. In Proceedings of the 2nd IEEE International Conference on Fuzzy Systems, San Francisco, CA, USA, 28 March–1 April 1993; Volume 2, pp. 1059–1068. [Google Scholar]
  20. Klir, G.J.; Yuan, B. Fuzzy Sets and Fuzzy Logic: Theory and Applications; Prentice Hall: Upper Saddle River, NJ, USA, 1995. [Google Scholar]
  21. Dubois, D.; Prade, H. Possibility theory in information fusion. In Proceedings of the Third International Conference on Information Fusion, Paris, France, 10–13 July 2000; Volume 1, pp. PS6–PS19. [Google Scholar]
  22. Jiang, W.; Zhan, J. A modified combination rule in generalized evidence theory. Appl. Intell. 2017, 46, 630–640. [Google Scholar] [CrossRef]
  23. Song, M.; Jiang, W.; Xie, C.; Zhou, D. A new interval numbers power average operator in multiple attribute decision making. Int. J. Intell. Syst. 2017, 32, 631–644. [Google Scholar] [CrossRef]
  24. Zadeh, L.A. A simple view of the Dempster–Shafer theory of evidence and its implication for the rule of combination. AI Mag. 1986, 7, 85–90. [Google Scholar]
  25. Wang, J.; Xiao, F.; Deng, X.; Fei, L.; Deng, Y. Weighted evidence combination based on distance of evidence and entropy function. Int. J. Distrib. Sens. Netw. 2016, 12, 3218784. [Google Scholar] [CrossRef]
  26. Jiang, W.; Wang, S.; Liu, X.; Zheng, H.; Wei, B. Evidence conflict measure based on OWA operator in open world. PLoS ONE 2017, 12, e0177828. [Google Scholar] [CrossRef] [PubMed]
  27. Mo, H.; Lu, X.; Deng, Y. A generalized evidence distance. J. Syst. Eng. Electron. 2016, 27, 470–476. [Google Scholar] [CrossRef]
  28. Martin, A.; Jousselme, A.L.; Osswald, C. Conflict measure for the discounting operation on belief functions. In Proceedings of the 11th International Conference on Information Fusion, Cologne, Germany, 30 June–3 July 2008; pp. 1–8. [Google Scholar]
  29. Smarandache, F.; Han, D.; Martin, A. Comparative study of contradiction measures in the theory of belief functions. In Proceedings of the 15th International Conference on Information Fusion, Singapore, 9–12 July 2012; pp. 271–277. [Google Scholar]
  30. Martin, A. About conflict in the theory of belief functions. In Belief Functions: Theory and Applications; Springer: Berlin/Heidelberg, Germany, 2012; pp. 161–168. [Google Scholar]
  31. Deng, X.; Han, D.; Dezert, J.; Deng, Y.; Shyr, Y. Evidence combination from an evolutionary game theory perspective. IEEE Trans. Cybern. 2016, 46, 2070–2082. [Google Scholar] [CrossRef] [PubMed]
  32. Denoeux, T. A neural network classifier based on Dempster–Shafer theory. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 2000, 30, 131–150. [Google Scholar] [CrossRef]
  33. Xiaobin, X.; Haishan, F.; Zhi, W.; Chenglin, W. An information fusion method of fault diagnosis based on interval basic probability assignment. Chin. J. Electron. 2011, 20, 255–260. [Google Scholar]
  34. Tabassian, M.; Ghaderi, R.; Ebrahimpour, R. Combination of multiple diverse classifiers using belief functions for handling data with imperfect labels. Expert Syst. Appl. 2012, 39, 1698–1707. [Google Scholar] [CrossRef]
  35. Baudrit, C.; Dubois, D. Practical representations of incomplete probabilistic knowledge. Comput. Stat. Data Anal. 2006, 51, 86–108. [Google Scholar] [CrossRef]
  36. Mönks, U.; Dörksen, H.; Lohweg, V.; Hübner, M. Information fusion of conflicting input data. Sensors 2016, 16, 1798. [Google Scholar] [CrossRef] [PubMed]
  37. Mönks, U. Information Fusion under Consideration of Conflicting Input Signals; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
  38. Zhang, X.; Mahadevan, S.; Deng, X. Reliability analysis with linguistic data: An evidential network approach. Reliab. Eng. Syst. Saf. 2017, 162, 111–121. [Google Scholar] [CrossRef]
  39. Jiang, W.; Xie, C.; Zhuang, M.; Shou, Y.; Tang, Y. Sensor Data Fusion with Z-Numbers and Its Application in Fault Diagnosis. Sensors 2016, 16, 1509. [Google Scholar] [CrossRef] [PubMed]
  40. Guo, H.; Shi, W.; Deng, Y. Evaluating sensor reliability in classification problems based on evidence theory. IEEE Trans. Syst. Man Cybern. Part B Cybern. 2006, 36, 970–981. [Google Scholar] [CrossRef]
  41. Yuan, K.; Xiao, F.; Fei, L.; Kang, B.; Deng, Y. Modeling sensor reliability in fault diagnosis based on evidence theory. Sensors 2016, 16, 113. [Google Scholar] [CrossRef] [PubMed]
  42. Glock, S.; Voth, K.; Schaede, J.; Lohweg, V. A framework for fossibilistic multi-source data fusion with monitoring of sensor reliability. In Proceedings of the World Conference on Soft Computing, San Francisco, CA, USA, 23–26 May 2011. [Google Scholar]
  43. Ehlenbröker, J.F.; Mönks, U.; Lohweg, V. Sensor defect detection in multisensor information fusion. J. Sens. Sens. Syst. 2016, 5, 337–353. [Google Scholar] [CrossRef]
  44. Zadeh, L.A. A Note on Z-numbers. Inf. Sci. 2011, 181, 2923–2932. [Google Scholar] [CrossRef]
  45. Deng, X.; Xiao, F.; Deng, Y. An improved distance-based total uncertainty measure in belief function theory. Appl. Intell. 2017, 46, 898–915. [Google Scholar] [CrossRef]
  46. Fu, C.; Yang, J.; Yang, S. A group evidential reasoning approach based on expert reliability. Eur. J. Oper. Res. 2015, 246, 886–893. [Google Scholar] [CrossRef]
  47. Jiang, W.; Xie, C.; Zhuang, M.; Tang, Y. Failure mode and effects analysis based on a novel fuzzy evidential method. Appl. Soft Comput. 2017, 57, 672–683. [Google Scholar] [CrossRef]
  48. Smets, P.; Kennes, R. The transferable belief model. Artif. Intell. 1994, 66, 191–234. [Google Scholar] [CrossRef]
  49. Jiang, W.; Zhuang, M.; Xie, C.; Wu, J. Sensing attribute weights: A novel basic belief assignment method. Sensors 2017, 17, 721. [Google Scholar] [CrossRef] [PubMed]
  50. Casella, G.; Berger, R. Statistical Inference; Duxbury Press: Pacific Grove, CA, USA, 2001. [Google Scholar]
  51. Wu, X.; Kumar, V.; Quinlan, J.R.; Ghosh, J.; Yang, Q.; Motoda, H.; McLachlan, G.J.; Ng, A.; Liu, B.; Yu, P.S.; et al. Top 10 algorithms in data mining. Knowl. Inf. Syst. 2008, 14, 1–37. [Google Scholar] [CrossRef]
  52. Wen, C.; Xu, X. Theories and Applications in Multi-Source Uncertain Information Fusion—Fault Diagnosis and Reliability Evaluation; Beijing Science Press: Beijing, China, 2012. [Google Scholar]
Figure 1. Flowchart of the proposed method.
Figure 1. Flowchart of the proposed method.
Sensors 17 01575 g001
Figure 2. The modeling of the singleton subset and compound subset.
Figure 2. The modeling of the singleton subset and compound subset.
Sensors 17 01575 g002
Figure 3. The determination of BBA.
Figure 3. The determination of BBA.
Sensors 17 01575 g003
Figure 4. The overlapping area of the static attribute model.
Figure 4. The overlapping area of the static attribute model.
Sensors 17 01575 g004
Figure 5. Reliability measure based on the dynamic test samples.
Figure 5. Reliability measure based on the dynamic test samples.
Sensors 17 01575 g005
Figure 6. The comparison of considering the reliability or not.
Figure 6. The comparison of considering the reliability or not.
Sensors 17 01575 g006
Figure 7. The comparing results between our method and other classifiers.
Figure 7. The comparing results between our method and other classifiers.
Sensors 17 01575 g007
Table 1. The comparing the results of fault diagnosis.
Table 1. The comparing the results of fault diagnosis.
MethodsClassesOverall Average
F 1 F 2 F 3
Not considering reliability99.00%95.50%100%98.17%
Support vector machine94.15%92.86%100%95.67%
Decision tree99.05%98.68%99.78%99.17%
Naive Bayesian98.05%96.94%100%98.33%
The proposed method100%100%100%100%

Share and Cite

MDPI and ACS Style

Jiang, W.; Zhuang, M.; Xie, C. A Reliability-Based Method to Sensor Data Fusion. Sensors 2017, 17, 1575. https://doi.org/10.3390/s17071575

AMA Style

Jiang W, Zhuang M, Xie C. A Reliability-Based Method to Sensor Data Fusion. Sensors. 2017; 17(7):1575. https://doi.org/10.3390/s17071575

Chicago/Turabian Style

Jiang, Wen, Miaoyan Zhuang, and Chunhe Xie. 2017. "A Reliability-Based Method to Sensor Data Fusion" Sensors 17, no. 7: 1575. https://doi.org/10.3390/s17071575

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop