9
A new linguistic MCDM method based on multiple-criterion data fusion Yong Deng a,c,,1 , Felix T.S. Chan b,,1 , Ying Wu a , Dong Wang a a School of Electronics and Information Technology, Shanghai Jiao Tong University, Shanghai 200030, China b Department of Industrial and Systems Engineering, The Hong Kong Polytechnic University, Hung Hom, Hong Kong c College of Computer and Information Sciences, Southwest University, Chongqing 400715, China article info Keywords: MCDM Dempster–Shafer evidence theory Fuzzy sets theory abstract Multiple-criteria decision-making (MCDM) is concerned with the ranking of decision alternatives based on preference judgements made on decision alternatives over a number of criteria. First, taking advantage of data fusion technology to comprehensively consider each criterion data is a reasonable idea to solve the MCDM problem. Second, in order to efficiently handle uncertain information in the process of deci- sion making, some well developed mathematical tools, such as fuzzy sets theory and Dempster Shafer theory of evidence, are used to deal with MCDM. Based on the two main reasons above, a new fuzzy evi- dential MCDM method under uncertain environments is proposed. The rating of the criteria and the importance weight of the criteria are given by experts’ judgments, represented by triangular fuzzy num- bers. Then, the weights are transformed into discounting coefficients and the ratings are transformed into basic probability assignments. The final results can be obtained through the Dempster rule of combina- tion in a simple and straight way. A numerical example to select plant location is used to illustrate the efficiency of the proposed method. Ó 2010 Elsevier Ltd. All rights reserved. 1. Introduction Multi-criteria decision-making (MCDM) is one of the most widely used decision methodologies in science, business, and engi- neering worlds. MCDM methods aim at improving the quality of decisions by making the process more explicit, rational, and effi- cient. Due to the uncertain information in the process of decision making, fuzzy sets theory (FST) is extensively used to deal with MCDM problems. On the other hand, it is well known that there al- ways exits conflicts between criteria in MCDM. For example, in the case of plant location selection, if we pay more attention about its expansion possibility, we have to increase the investment cost. Thus, taking advantage of data fusion technology to comprehen- sively consider each criterion data is a reasonable idea to solve MCDM problem. Recently, many researches are inspired by the application of Dempster–Shafer evidence of theory (DSeT), one of the widely used mathematical tools in data fusion, to handle the MCDM problem (Bauer, 1997; Beynon, 2002, 2005a, 2005b; Beynon, Curry, and Morgan, 2000; Beynon, Cosker, and Marshall, 2001; Yang and Sen, 1997; Yang and Xu, 2002) and risk analysis (Beynon, 2005a, 2005b; Demotier, Schon, and Denoeux, 2006; Kangas and Kangas, 2004; Sadiq, Kleiner, and Rajani, 2006; Sadiq, Kleiner, and Rajani, 2007; Sun, Srivastava, and Mock, 2006; Sii, Ruxton, and Wang, 2002). In general, a multiple criteria decision-making (MCDM) prob- lem can be concisely expressed in matrix format as ð1Þ where A 1 , A 2 , ... , A m are possible alternative, C 1 , C 2 , ... , C n are criteria with which performance of alternatives are measured, x ij is the rat- ing of alternative A i with respect to criteria C j . Due to the uncer- tainty, the decision maker prefers to give his opinions in linguistic items. Hence, the rating r ij of alternative A i and the weights of the criteria are assessed in linguistic terms represented as triangular fuzzy numbers. In this paper, we proposed a fuzzy evidential model to deal with the MCDM problem. The main idea is that the performance of each criterion can be fused to get a comprehensive evaluation. The new methodology is taking advantage of two desirable properties. First, the present model can efficiently represent experts’ opinions through fuzzy sets theory (FST). For example, the rating r ij of 0957-4174/$ - see front matter Ó 2010 Elsevier Ltd. All rights reserved. doi:10.1016/j.eswa.2010.12.016 Corresponding authors. Address: School of Electronics and Information Tech- nology, Shanghai Jiao Tong University, Shanghai 200030, China (Y. Deng). E-mail addresses: [email protected], [email protected] (Y. Deng), mffcha- [email protected] (F.T.S. Chan). 1 These authors contributed equally to this work. Expert Systems with Applications 38 (2011) 6985–6993 Contents lists available at ScienceDirect Expert Systems with Applications journal homepage: www.elsevier.com/locate/eswa

A new linguistic MCDM method based on multiple-criterion data fusion

Embed Size (px)

Citation preview

Page 1: A new linguistic MCDM method based on multiple-criterion data fusion

Expert Systems with Applications 38 (2011) 6985–6993

Contents lists available at ScienceDirect

Expert Systems with Applications

journal homepage: www.elsevier .com/locate /eswa

A new linguistic MCDM method based on multiple-criterion data fusion

Yong Deng a,c,⇑,1, Felix T.S. Chan b,⇑,1, Ying Wu a, Dong Wang a

a School of Electronics and Information Technology, Shanghai Jiao Tong University, Shanghai 200030, Chinab Department of Industrial and Systems Engineering, The Hong Kong Polytechnic University, Hung Hom, Hong Kongc College of Computer and Information Sciences, Southwest University, Chongqing 400715, China

a r t i c l e i n f o

Keywords:MCDMDempster–Shafer evidence theoryFuzzy sets theory

0957-4174/$ - see front matter � 2010 Elsevier Ltd. Adoi:10.1016/j.eswa.2010.12.016

⇑ Corresponding authors. Address: School of Electrnology, Shanghai Jiao Tong University, Shanghai 2000

E-mail addresses: [email protected], ydeng@[email protected] (F.T.S. Chan).

1 These authors contributed equally to this work.

a b s t r a c t

Multiple-criteria decision-making (MCDM) is concerned with the ranking of decision alternatives basedon preference judgements made on decision alternatives over a number of criteria. First, taking advantageof data fusion technology to comprehensively consider each criterion data is a reasonable idea to solvethe MCDM problem. Second, in order to efficiently handle uncertain information in the process of deci-sion making, some well developed mathematical tools, such as fuzzy sets theory and Dempster Shafertheory of evidence, are used to deal with MCDM. Based on the two main reasons above, a new fuzzy evi-dential MCDM method under uncertain environments is proposed. The rating of the criteria and theimportance weight of the criteria are given by experts’ judgments, represented by triangular fuzzy num-bers. Then, the weights are transformed into discounting coefficients and the ratings are transformed intobasic probability assignments. The final results can be obtained through the Dempster rule of combina-tion in a simple and straight way. A numerical example to select plant location is used to illustrate theefficiency of the proposed method.

� 2010 Elsevier Ltd. All rights reserved.

1. Introduction

Multi-criteria decision-making (MCDM) is one of the mostwidely used decision methodologies in science, business, and engi-neering worlds. MCDM methods aim at improving the quality ofdecisions by making the process more explicit, rational, and effi-cient. Due to the uncertain information in the process of decisionmaking, fuzzy sets theory (FST) is extensively used to deal withMCDM problems. On the other hand, it is well known that there al-ways exits conflicts between criteria in MCDM. For example, in thecase of plant location selection, if we pay more attention about itsexpansion possibility, we have to increase the investment cost.Thus, taking advantage of data fusion technology to comprehen-sively consider each criterion data is a reasonable idea to solveMCDM problem. Recently, many researches are inspired by theapplication of Dempster–Shafer evidence of theory (DSeT), one ofthe widely used mathematical tools in data fusion, to handle theMCDM problem (Bauer, 1997; Beynon, 2002, 2005a, 2005b;Beynon, Curry, and Morgan, 2000; Beynon, Cosker, and Marshall,2001; Yang and Sen, 1997; Yang and Xu, 2002) and risk analysis

ll rights reserved.

onics and Information Tech-30, China (Y. Deng).wu.edu.cn (Y. Deng), mffcha-

(Beynon, 2005a, 2005b; Demotier, Schon, and Denoeux, 2006;Kangas and Kangas, 2004; Sadiq, Kleiner, and Rajani, 2006; Sadiq,Kleiner, and Rajani, 2007; Sun, Srivastava, and Mock, 2006; Sii,Ruxton, and Wang, 2002).

In general, a multiple criteria decision-making (MCDM) prob-lem can be concisely expressed in matrix format as

ð1Þ

where A1,A2, . . . ,Am are possible alternative, C1,C2, . . . ,Cn are criteriawith which performance of alternatives are measured, xij is the rat-ing of alternative Ai with respect to criteria Cj. Due to the uncer-tainty, the decision maker prefers to give his opinions in linguisticitems. Hence, the rating rij of alternative Ai and the weights of thecriteria are assessed in linguistic terms represented as triangularfuzzy numbers.

In this paper, we proposed a fuzzy evidential model to deal withthe MCDM problem. The main idea is that the performance of eachcriterion can be fused to get a comprehensive evaluation. The newmethodology is taking advantage of two desirable properties. First,the present model can efficiently represent experts’ opinionsthrough fuzzy sets theory (FST). For example, the rating rij of

Page 2: A new linguistic MCDM method based on multiple-criterion data fusion

1.0

0.1 0.2 0.3 0.4

A

6986 Y. Deng et al. / Expert Systems with Applications 38 (2011) 6985–6993

alternative Ai and the weights of the criteria are assessed in linguis-tic terms given by the decision maker. Second, the performance ofthe criterion given by domain experts can be fused through DSeT inour proposed model. Hence, the final decision result takes theconsideration of all the criteria in MCDM in a comprehensive way.

This paper is arranged into five sections. First, in Section 2 webriefly introduce some preliminaries including FSS and DSeT. Theintent of the Section 3 is to propose our fuzzy evidential method.A numerical example on the evaluation of main battle tanks is usedto illustrate the feasibility of the proposed method in Section 4.Finally, a conclusion is made in Section 5.

A=(0.1 0.2 0.3 0.4)

Fig. 1. A normal fuzzy number.

2. Preliminaries

In this section, we introduce some background of mathematicstools – fuzzy sets theory (FST) and Dempster–Shafer theory of evi-dence (DSeT) – that are used in the proposed method.

2.1. Fuzzy set theory

2.1.1. Basic definition

Definition 2.1 (Fuzzy set). Let X be a universe of discourse, eA is afuzzy subset of X if for all x 2 X, there is a number leAðxÞ 2 ½0;1�assigned to represent the membership of x to eA, and leAðxÞ is calledthe membership of eA (Zimmermann, 1991).

Definition 2.2 (Fuzzy number). A fuzzy number eA is a normal andconvex fuzzy subset of X. Here, the ‘‘Normality’’ implies that(Zimmermann, 1991)

9x 2 R; _xleAðxÞ ¼ 1

and ‘‘Convex’’ means that

8x1 2 X; x2 2 X; 8a 2 ½0;1�;leAðax1 þ ð1� aÞx2ÞP minðleAðx1Þ;leAðx2ÞÞ:

1.0

w

0.1 0.2 0.3 0.4

B=(0.1 0.2 0.3 0.4 w)

B

Fig. 2. A generalized fuzzy number.

Definition 2.3 (Generalized fuzzy number). A generalized fuzzynumber eA ¼ ða; b; c; d; wÞ is described as any fuzzy subset of thereal line R with membership function feA which has the followingproperties (Chen and Chen, 2003):

(a) feA is a continuous mapping from R to the closed interval[0,w], 0 6 w 6 1;

(b) feAðxÞ ¼ 0 for all x 2 (�1,a];(c) feA is strictly increasing on [a,b];(d) feAðxÞ ¼ w, for all x 2 [b,c], where w is a constant and

0 6 w 6 1;(e) feA is strictly decreasing on [c,d](f) feAðxÞ ¼ 0 for all x 2 (�1,a];

where 0 6 w 6 1, a, b, c and d are real numbers. A generalizedtrapezoidal fuzzy number can be defined as eA ¼ ða; b; c; d; wÞ,wherea 6 b 6 c 6 d, 0 6 w 6 1, and its membership function isdefined by

lAðxÞ ¼ feAðxÞ ¼0 x < aðx�aÞb�a a 6 x 6 b

w b 6 x 6 cðx�cÞd�c c 6 x 6 d

0 x > d

8>>>>>><>>>>>>:

ð2Þ

The generalized trapezoidal fuzzy number eA is plotted in Fig. 1. Ifw = 1, the generalized trapezoidal fuzzy number eA is called a normaltrapezoidal fuzzy number and often can be abbreviated aseA ¼ ða; b; c;dÞ, plotted in Fig. 2. If a = b andc = d, then eA is called acrisp or simple interval. Similarly, ifb = c, then eA is called a normaltriangular fuzzy number and if a = b = c = d, then eA becomes a realnumber. The membership function of the normal trapezoidal fuzzynumber eA ¼ ða; b; c;dÞ is defined by

lAðxÞ ¼ feAðxÞ ¼0 x < aðx�aÞb�a a 6 x 6 b

1 b 6 x 6 cðx�cÞd�c c 6 x 6 d

0 x > d

8>>>>>><>>>>>>:

ð3Þ

For example, Fig. 1 shows the normal fuzzy number A and Fig. 2shows the generalized fuzzy number B.

2.1.2. Linguistic variableThe concept of linguistic variable is very useful in dealing with

situations that are too complex or ill-defined to be reasonablydescribed in conventional quantitative expressions. Linguistic vari-ables are represented in words or sentences or artificial languages,where each linguistic value can be modeled by a fuzzy set (Zim-mermann, 1991). In this paper, the importance weights of variouscriteria and the ratings of qualitative criteria are considered as lin-guistic variables. For example, these linguistic variables can be ex-pressed in positive trapezoidal fuzzy numbers. Table 1 shows thelinguistic variables of the importance weight. Table 2 shows lin-guistic variables of the rating of criterion. It should be noticed thatthere are many different methods to represent linguistic items. Thekind of representing method used depends on the real applicationsystems and the domain experts’ opinions. Fig. 3 illustrate the se-ven trapezoidal fuzzy numbers of the ratings listed in Table 2.

Page 3: A new linguistic MCDM method based on multiple-criterion data fusion

Table 1Linguistic variables of the importance weight.

Linguistic variables for importance weights Fuzzy numbers

Very low (VL) (0,0,0.1,0.2)Low (L) (0.1,0.2,0.2,0.3)Medium low (ML) (0.2,0.3,0.4,0.5)Medium (M) (0.4,0.5,0.5,0.6)Medium high (MH) (0.5,0.6,0.7,0.8)High (H) (0.7,0.8,0.8,0.9)Very high (VH) (0.8,0.9,1,1)

Table 2Linguistic variables of the ratings.

Linguistic variables of the ratings Fuzzy numbers

Very poor (VP) (0,0,1,2)Poor (P) (1,2,2,3)Medium poor (MP) (2,3,4,5)Medium (M) (4,5,5,6)Medium good (MG) (5,6,7,8)Good (G) (7,8,8,9)Very good (VG) (8,9,10,10)

Fig. 3. A seven granular linguistic set about rating.

1

X

Fig. 4. Two overlapping fuzzy numbers.

Fig. 5. Two fuzzy numbers without overlapping area.

Y. Deng et al. / Expert Systems with Applications 38 (2011) 6985–6993 6987

2.1.3. Defuzzification of fuzzy numbersIn this paper, the mean value of fuzzy numbers is used as a

defuzzified value. For detailed information, please refer Zimmer-mann (1991).

Definition 2.4. Given trapezoidal fuzzy numbers eA ¼ ða1; a2; a3;

a4Þ, the mean value of the trapezoidal fuzzy numbers eA is definedas (Zimmermann, 1991)

PðeAÞ ¼ ða1 þ a2 þ a3 þ a4Þ4

: ð4Þ

For example, by applying Eq. (4), the mean value of linguistic itemof importance ‘‘Medium high’’ (MH) is

PðMHÞ ¼ ða1 þ a2 þ a3 þ a4Þ4

¼ ð0:5þ 0:6þ 0:7þ 0:8Þ4

¼ 6:5:

2.1.4. Similarity measure between fuzzy numbers

Similarity measure is an important concept, widely used in pat-tern recognition (Christopher, 2006). The similarity measure be-tween fuzzy numbers means the match degree between twofuzzy numbers. In our method, the BPA (The definition of BPAcan be seen in the following Section 2.2.) in Dempster–Shafer the-ory of evidence is determined by the similarity measure betweenfuzzy numbers. Hence, a good similarity measure is needed. Many

methods have been proposed to calculate the degree of similaritybetween fuzzy numbers (Chen, 1998; Chen & Chen, 2003; Deng,Shi, & Liu, 2004; Hsu & Chen, 1996; Liu, Xiong, & Deng, 2008).

Assume that there are two trapezoidal fuzzy numbers, whereeA ¼ ða1; a2; a3; a4Þ and eB ¼ ðb1; b2; b3; b4Þ, then the degree of simi-larity SðeA; eBÞ between the trapezoidal fuzzy numbers eA and eB canbe calculated as follows (Hsu & Chen, 1996):

SðeA; eBÞ ¼R

xðminfleAðxÞ;leBðxÞgÞdxRxðmaxfleAðxÞ;leBðxÞgÞdx

: ð5Þ

From Fig. 4, it can be seen that the more the interaction area of thetwo fuzzy numbers, the larger the value of SðeA; eBÞ. Several authorsargue about the limitation of area method (Chen & Chen, 2003;Deng et al., 2004; Liu et al., 2008). For example, as shown inFig. 5, the similarity measure between fuzzy numbers is 0. It maynot be suitable to some real situations. To overcome the drawbacksof the area method, center-of-gravity (CoG) method (Chen & Chen,2003) and radius-of-gravity (ROG) method (Deng et al., 2004) areproposed. How to select the reasonable similarity measure betweenfuzzy numbers is an open problem. In our opinion, the selection ofthe similarity measure depends on the real application environ-ments. For example, the area method to obtain similarity measureis more desirable than the other alternatives to get the basic prob-ability assignment (which is very important in the application ofDSeT) in our method. The reason is detailed in Section 2.2.

2.2. Dempster–Shafer theory of evidence

2.2.1. Basic definitionThe DSeT can be regarded as a general extension of the Bayesian

theory that can robustly deal with incomplete data. In addition tothis, DSeT offers a number of advantages, including the opportunityto assign measures of probability to focal elements, and allowingfor the attachment of probability to the frame of discernment. Inthis section, we briefly review the basic concepts of evidencetheory.

Page 4: A new linguistic MCDM method based on multiple-criterion data fusion

6988 Y. Deng et al. / Expert Systems with Applications 38 (2011) 6985–6993

The DSeT first defines a set of hypotheses H called frame of dis-cernment H = {H1,H2, . . . ,HN}. It is composed of N exhaustive andmutually exclusive hypotheses. The power set P(H) is composedof 2N propositions:

PðHÞ ¼ f;; fH1g; fH2g; . . . ; fHNg; fH1 [ H2g; fH1 [ H3g . . . ;Hg ð6Þ

where ; denotes an empty set. The subsets containing only oneelement are called singletons. A key concept in DST is the basicprobability assignment (BPA). The BPA for an element of H is sim-ilar to probability, but differs by the fact that the unit mass isdistributed among the elements of P(H), that is to say not onlyon the singletons in HN in H but also on composite hypothesestoo.

Definition 2.5 (Basic Probability Assignment, BPA). Given the frameof discernment H = {H1,H2, . . . ,HN}, A BPA function is defined by:

m : PðHÞ ! ½0;1� ð7Þ

and which satisfies the following conditions:

PA2PðHÞ

mðAÞ ¼ 1

mð;Þ ¼ 0ð8Þ

Definition 2.6 (Belief Function, Bel). Given the frame of discernmentH = {H1,H2, . . . ,HN} and the BPA defined in Definition 2.5, the belieffunction is defined by

BelðBÞ ¼Xn

i¼1

mðAiÞ; Ai # B ð9Þ

Definition 2.7 (Pluasibility Function, Pl). Given the frame of discern-ment H = {H1,H2, . . . ,HN} and the BPA defined in Definition 2.5, theplausibility function is defined by

BelðBÞ ¼Xn

i¼1

mðAiÞ; Ai \ B – ; ð10Þ

It can be seen that Bel and Pl some times can act as interval proba-bility (shown in Fig. 6). The Bel is the low probability and the Pl isthe up probability. The next example show the efficiency to dealwith uncertain information based on DSeT.

Example 2.1. Suppose that there are two types of balls in twoboxes. One type of ball is red and the other type of ball is green.All the balls in box A are red balls. However, box B contains bothred balls and green balls. In addition, we do not know the exactnumber of red balls and green balls. What’s more, we do not knowthe ratio of red balls and green balls in box B. What we know is thatthe probability of Box A being selected is 0.7 and the probability ofBox B being selected is 0.3. The question is that if we select a ball,what’s the probability of that ball being red?

Fig. 6. Interval probability of hypothesis A.

If we use the probability, the process may be complex to somedegree. However, if we use DSeT, we can easily obtain the followingresults:

M(red) = 0.7; M(red,green) = 0.3.Hence, Bel(red) = 0.7, Pl(red) = 0.7 + 0.3 = 1.

The final result can be shown that the probability is an interval[0.7,1].

Example 2.2. Suppose the frame of discernment is {a,b,c} and BPAis as follows M(a) = 0.7; M(b) = 0.2; M(c) = 0.1.

Then, the Bel and Pl can be calculated as follows:

Bel(a) = Pl(a) = M(a) = 0.7;Bel(b) = Pl(b) = M(b) = 0.2;

Bel(c) = Pl(c) = M(c) = 0.1;

As can be seen from above, if the BPA is assigned in singletons,the low probability is equal to up probability. In this situation,the interval probability is shortened as a point and the BPA isdegenerated as probability measure.

2.2.2. Dempster rule of combinationIn the case of imperfect data (uncertain, imprecise and incom-

plete), fusion is an interesting solution to obtain more relevantinformation. Evidence theory offers appropriate aggregation tools.From the basic belief assignment denoted by mi obtained for eachinformation source Si, it is possible to use a combination rule in or-der to provide combined masses synthesizing the knowledge of thedifferent sources. Dempster rule of combination (also calledorthogonal sum), denoted bym = m1 �m2, is the most commoncombination rule for two BPAs m1 and m2 to yield a new BPA:

mðAÞ ¼P

B\C¼Am1ðBÞm2ðCÞ1� k

ð11Þ

with

k ¼X

B\C¼;m1ðBÞm2ðCÞ ð12Þ

where k is a normalization constant, called conflict because it mea-sures the degree f conflict between m1 and m2, k = 0 corresponds tothe absence of conflict between m1 and m2, whereas k = 1 implies acomplete contradiction between m1 and m2. The belief functionresulting from the combination of J information sources SJ definedas

m ¼ m1 �m2 � � � �mj � � � �mJ ð13Þ

Example 2.3. Suppose the frame of discernment is H = {a,b} in atarget recognition system. There are two sensors to observe thetarget in the application systems. One sensor report is: M1{a} = 0.6;M1{H} = 0.4; the other sensor report is: M2{a} = 0.7; M2{H} = 0.3.

Using the Dempster rule of combination, the result can be listedas follows:

Mfag ¼ 0:88; M1fHg ¼ 0:12

Some interesting things should be pointed out from the above re-sult. On the one hand, the final result is that the target whoseBPA is 0.88, is greater than both two sensor reports. On the otherhand, the BPA of Unknown {a,b} (means that we just know it is a

Page 5: A new linguistic MCDM method based on multiple-criterion data fusion

Y. Deng et al. / Expert Systems with Applications 38 (2011) 6985–6993 6989

target, but we don’t know any more) decreases to 0.12, which islower than both two sensor reports. In other words, the uncertainmeasure decreases after the information fusion process based onDSeT.

Example 2.4. Suppose the frame of discernment is H = {a,b} in tar-get recognition systems. There are two sensors to observe the tar-get in the application systems. One sensor report is: M1{a} = 0.6;M1{b} = 0.4; the other sensor report is: M2{a} = 0.7; M2{b} = 0.3.

Using the Dempster rule of combination, the result can be listedas follows:

MðaÞ ¼ M1ðaÞ �M2ðaÞ1� ðM1ðaÞ �M2ðbÞ þM2ðaÞ �M1ðbÞÞ

¼ 0:6� 0:70:54

¼ 79

MðbÞ ¼ M1ðbÞ �M2ðbÞ1� ðM1ðaÞ �M2ðbÞ þM2ðaÞ �M1ðbÞÞ

¼ 0:4� 0:30:54

¼ 29

If we think of the first BPA as prior information, the prior informa-tion can be represented through prior distribution. Hence, usingBayesian method, the prior distribution can be updated as follows:

PðaÞ ¼ 0:6� 0:70:6� 0:7þ 0:4� 0:3

¼ 79

PðbÞ ¼ 0:4� 0:30:6� 0:7þ 0:4� 0:3

¼ 29

We can see that both methods have the same result. That is, if theBPA are assigned at singletons, the BAP can be degenerated as prob-ability function. In addition, the Dempster rule of combination isdegenerated as Bayesian updating method.

2.2.3. Discounted combinationIt should be noted that when evidence highly conflicts with

each other, the classical Dempster rule of combination is not effi-cient. For example, the famous numerical example is given by Za-deh (1986).

Example 2.5. Consider a situation in which we have two BPAs m1

and m2 as follows:

m1ðaÞ ¼ 0:99; m1ðbÞ ¼ 0:01m2ðbÞ ¼ 0:01; m2ðcÞ ¼ 0:99

Application of the Dempster rule yields

mðbÞ ¼ 0:00011� k

¼ 0:00011� 0:9999

¼ 1

Thus it can be seen that while m1 and m2 affords little support to b,the results afford complete support to b. This appears somewhatcounterintuitive. For the illogical aspects mentioned above, conflictmanagement in belief functions is a very important problem andhas been already studied in the past. Many methods are proposedto deal with the conflict evidence combination problem (Denget al., 2004; Guo, Shi, & Deng, 2006; Lefevre, 2002; Murphy,2000). One of the efficient methods is the use of discounting coeffi-cient. Discounting coefficient can be seen as reliability coefficients.It means the reliability of the information source. Given reliabilitycoefficients a, the next step is to incorporate them into the fusionprocess. To handle conflict between information sources, a dis-counting rule has been introduced in DSeT given as follows:

maðHÞ ¼ a�mðHÞ þ ð1� aÞ

maðAÞ ¼ a�mðAÞ; 8A � H and A – /: ð14Þ

Example 2.6. Consider a situation in which we have two BPAs m1

and m2 as follows:

m1ðaÞ ¼ 0:99; m1ðbÞ ¼ 0:01m2ðbÞ ¼ 0:01; m2ðcÞ ¼ 0:99

The discounting coefficient is 0.9 and 0.2, respectively.Application of the discounting coefficient equation in (14), the

discounted BPA can be shown as follows:

m0:91 ðaÞ ¼ 0:9� 0:99 ¼ 0:891

m0:91 ðbÞ ¼ 0:9� 0:01 ¼ 0:009

m0:91 ðHÞ ¼ 0� 0þ ð1� 0:9Þ ¼ 0:1

m0:12 ðbÞ ¼ 0:1� 0:01 ¼ 0:001

m0:12 ðcÞ ¼ 0:1� 0:99 ¼ 0:099

m0:12 ðHÞ ¼ 0� 0þ ð1� 0:1Þ ¼ 0:9

The final combination result is

mðaÞ ¼ 0:8812mðbÞ ¼ 0:0090mðcÞ ¼ 0:0109mðHÞ ¼ 0:0989

From this example, we can see that the result supports the hypoth-esis A. The main reason is that although the evidence highly con-flicts with each other, the result is more affected by the reliabilitysensor reports.From these examples listed above, we can see theflexibility and efficiency of DSeT. Generally speaking, comparedwith classical probability theory, DSeT can represent uncertaininformation in a more generalized manner. What’s more, the datacan be fused by the Dempster rule of combination without priorinformation, which is more preferable to Bayesian method in someuncertain environments. Finally, the reliability of each data sourcecan be evaluated by the discounting coefficient. In our paper, weproposed a fuzzy evidential method to analyze systems risk. Thepresented method is detailed in the following section.

2.2.4. Pignistic probability transformation (PPT)Beliefs manifest themselves at two levels – the credal level

(from credibility) where belief is entertained, and the pignistic levelwhere beliefs are used to make decisions. The term ‘‘pignistic’’ wasproposed by Smets (2000) and originates from the word pignus,meaning ‘bet’ in Latin. Pignistic probability is used for decision-making and uses Principle of Insufficient Reason to derive fromBPA. It represents a point estimate in a belief interval and can bedetermined as

betðAiÞ ¼X

Ai # Ak

mðAkÞjAkj

ð15Þ

Example 2.7. Consider a BPA as follows:

mðaÞ ¼ 0:2; mða; bÞ ¼ 0:2; mðb; cÞ ¼ 0:3; mða; b; cÞ ¼ 0:3

Then the result of PPT is

BelðaÞ ¼ mðaÞ þ 12

mða; bÞ þ 13

mða; b; cÞ ¼ 0:4

BelðbÞ ¼ 12

mða; bÞ þ 12

mðb; cÞ þ 13

mða; b; cÞ ¼ 0:35

BelðcÞ ¼ 12

mðb; cÞ þ 13

mða; b; cÞ ¼ 0:25

2.2.5. Determination of basic probability assignment

When data fusion is applied by the DSeT, one of the most impor-tant things is to determine the BPA. In this section, we propose a

Page 6: A new linguistic MCDM method based on multiple-criterion data fusion

6990 Y. Deng et al. / Expert Systems with Applications 38 (2011) 6985–6993

new method to generate BPA, which is suitable in the linguisticdecision making environment.

Suppose in a decision making environment, the linguistic itemsare given in Table 2 and illustrated in Fig. 7.

If the expert’s opinion is ‘‘Low’’, how can we transform it intoBPA?

Hence, using Eq. (5), the following similarity measures can beobtained:

SimLowfVery lowg ¼ 0:0233SimLowfLowg ¼ 1SimLowfFairly lowg ¼ 0:0577SimLowfLow;Very lowg ¼ 0:0303SimLowfLow; Fairly lowg ¼ 0:1333

SimLow{Very low} = 0.0233 means that the linguistic term ‘‘low’’which is represented as the trapezoid ‘‘low’’ has the little similaritymeasure to the linguistic term ‘‘very low’’. It should be pointedthat the hypothesis {Low,Very low}, the intersection parts between‘‘Low’’ and ‘‘Very low’’ can be represented as a generalized fuzzynumber.

Normalize the similarity measure to get the BPA of linguisticitem ‘‘LOW’’ as follows:

mLowfVery lowg ¼ 0:0187mLowfLowg ¼ 0:8035mLowfFairly lowg ¼ 0:0464mLowfLow;Very lowg ¼ 0:0243mLowfLow; Fairly lowg ¼ 0:1071

ð16Þ

Fig. 7. Generating BPA from the linguistic term low.

The Bes

Battle

Attack

Capability

Mobility

Capability

Challen

(UK

M1A1

(USA)

Fig. 8. The hierarchical structure of evalua

Here we should give some explanation about the reason whywe negative the ROG method but chose the area method to deter-mine similarity measure. As can be seen from Fig. 7, if the expertgive his opinion ‘‘LOW’’, the BPA assigned at {Very low}, {Low},{Fairly low}, {Low,Very low} and {Low,Fairly low} is acceptable.However, we cannot accept to assign BPA to {Very high}, {Veryhigh,high} if his opinion is ‘‘LOW’’. The main reason is that the lin-guistic items given in Table 1 have provided enough soft. If the ex-pert’s opinion is ‘‘LOW’’, he himself cannot agree that ‘‘High’’ isacceptable, otherwise he may use ‘‘Fairly high’’, which has someinteraction area with ‘‘High’’. As a result, though the linguisticitems themselves are not clear in their boundary, the degree iscrisp to some extend. It means that the BPA cannot assign to‘‘Good’’ given the linguistic item ‘‘Poor’’.

3. The proposed method

In this section, we use a main tank evaluation model to developour fuzzy evidential method step by step.

Step 1. Construct the decision hierarchy model.As can be shown in Eq. (1), the decision maker should constructa hierarchy model at the first step of decision making. The hier-archy model can be constructed according to the domainexperts’ knowledge. For example, when ranking the main battletanks, the decision hierarchy model can be shown in Fig. 8.In the above decision hierarchy model, the alternatives are inthe bottom. For example, three main battle tanks, namelyM1A1, Challenger 2 and Leopard 2 are evaluated in this situa-tion. The four criteria given by the domain experts are attackcapability, mobility capability, self-defense capability as wellas communication and command. The top of the decision hier-archy model is the decision result, namely the best main battletank in the evaluation.Step 2.According to the real data, whether quantitative or qualitative,the experts will give their opinions on the weight of each crite-rion and the rating of each criterion. Their opinions are repre-sented by the form of a linguistic item in Tables 2 and 3,respectively.The real data of three main battle tanks are shown in Table 3.Then, according to Table 3, the experts will use the linguisticvalues in Table 2 to give his rating of each criterion, shown inTable 4.

t Main

Tank

Self-defense

Capability Communication

and command

ger 2

)

Leopard 2

(Germany)

ting three types of main battle tanks.

Page 7: A new linguistic MCDM method based on multiple-criterion data fusion

Table 3Basic performance data for three types of main battle tank.

Item Type

M1A1 (USA) Challenger (UK) Leopard 2(Germany)

Armament 1 � 120 mmgun

1 � 120 mm L30gun 1 � 120 mmgun

2 � 7.62 mmMG

2 � 7.62 mm MG 2 � 7.62 mmMG3

1 � 12.7 mmMG

Ammunition 40 Up to 50 projectilestowage

42

1000 Positions (7.62 mm)4000

4750

11,400Smoke grenade

dischargers2 � 6 2 � 5 2 � 8

Power to weight ratio(hp/t)

27 10.2 25.12

Max. road speed 72 km 56 km/h 72 kmMax. range (km) 498 450 500Fording (m) 1.219 1.07 1Gradient (%) 60 60 60Vertical obstacles (m) 1.244 0.9 1.1Trench 2.743 2.43 3.00Armour protection Good Excellent FairAcclimatization Good Fair GoodCommunication Fair Fair FairScout Medium Medium Medium

TabThe

C

A

M

S

C

Y. Deng et al. / Expert Systems with Applications 38 (2011) 6985–6993 6991

Similarly, the importance of each criterion can also be givenusing the linguistic items in Table 1. The expert will give hisopinions listed in Table 5.Step 3. Aggregate the weights of the criterion and transformthem into a discounting coefficient.For each criteria, using the fuzzy mathematic operator to obtainthe average weights of the criterion. Let wjt = (ajt,bjt,cjt),j = 1,2, . . . ,n, t = 1,2, . . . ,k be the weight assigned by the deci-sion-maker Dk to criterion Cj. First, obtain the graded mean inte-gration representation of fuzzy numbers wjt = (ajt,bjt,cjt). Then,the aggregated importance weight Wj of criterion Cj assessedby the committee of k decision-makers can be evaluated as

Wj ¼Pk

t¼1wjt

kð17Þ

For example, according to the data in Table 5, three experts givetheir opinions about the importance of criterion ‘‘Attack’’ as Veryhigh (VH), High (H), and High (H), respectively. From Table 1, VH

le 4ratings of attribute performance for three types of main battle tanks and the correspondi

riteria Item Type

M1A1 (U

ttack Armament MGAmmunition VGSmoke grenade dischargers GMean (6.66,7.6

obility Power to weight ratio GMax. road speed GMax. range GPassing trench/ obstacle GMean (7.00,8.0

elf-defense Armour protection MGAcclimatization MGMean (5.00,6.0

ommunication and command Communication GScout MGMean (6.00,7.0

is (0.8,0.9,1.0,1.0) and H is (0.7,0.8,0.8,0.9). Then the aggregatedimportance weight can be obtained using Eq. (17) as follows:

Wattack ¼ð0:8;0:9;1:0;1:0Þ þ ð0:7;0:8;0:8;0:9Þ þ ð0:7;0:8;0:8;0:9Þ

3¼ ð0:73;0:83;0:86;0:93Þ

All the other aggregated importance weights can be obtained inthe same way and shown in Table 5.Defuzzify the aggregated importance of ‘‘Attack’’ into a crispnumber using Eq. (4).

Wcrispattack ¼

14ð0:73þ 0:83þ 0:86þ 0:93Þ ¼ 0:8375

All the other crisp numbers of aggregated importance weightscan be obtained in the same way and shown in Table 5.The relative can be easily obtained by dividing the crisp numberwith the maximum value among the crisp numbers.For example, the maximum crisp is 0.8755, hence, for the crite-rion ‘‘Attack’’, its relative importance is 0.8375/0.8755 = 0.9544.All the other relative importance of each criterion can be ob-tained in the same way and shown in Table 5. As can be seenfrom Table 5, the most important criterion is ‘‘Mobility’’, whilethe least important criterion is ‘‘Command and Communication’’.The relative importance will be used as the discounted coeffi-cient in the following fusion of multi-criteria data based onDempster rule of combination. The more the discounted coeffi-cient of the criterion, the more the effect by the criterion. Thus,the discounted coefficient of each criterion in our method plays asimilar role as the weight in classical MCDM to some degree.Step4. Aggregate the ratings of the criterion and transform theminto basic probability assignment.Similar to the aggregation of weights, the rating of each crite-rion given by different experts can also be obtained. Let rijt =(oijt,pijt,qijt), rijt 2 R+, i = 1,2, . . . ,m, j = 1,2, . . . ,n, t = 1,2, . . . ,k, bethe suitability rating assigned to alternative Ai by decision mak-ers Dt with respect to criteria Cj. Then, the aggregated ratingRij = (oij,pij,qij), of alternative Ai with respect to criteria Cj canbe obtained as

Rij ¼PK

t¼1rijt

Kð18Þ

For example, according to Table 4, the criterion ‘‘Attack’’ isdecomposed of three sub-criteria ‘‘Armament’’, ‘‘Ammunition’’and ‘‘Smoke grenade dischargers’’. To the M1A1, its ratings canbe evaluated as ‘‘Medium good (MG)’’, ‘‘Very good (VG)’’, and‘‘Good (G)’’, respectively. Then, the aggregated rating of thecriterion ‘‘Attack’’ of M1A1 is given as follows:

ng aggregation value.

SA) Challenger 2 (UK) Leopard 2 (Germany)

G GMG MGMG VG

6,8.33,9.00) (5.66,6.66,7.33,8.33) (6.66,7.66,8.33,9.00)

F GF GMG GMG MG

0,8.00,9.00) (4.50,5.50,6.00,7.00) (6.50,7.50,7.77,8.77)

G FF MG

0,7.00,8.00) (5.50,6.50,6.50,7.50) (4.50,5.50,6.00,7.00)

G GMG MG

0,7.50,8.50) (6.00,7.00,7.50,8.50) (6.00,7.00,7.50,8.50)

Page 8: A new linguistic MCDM method based on multiple-criterion data fusion

Table 5The linguistic importance weight of the criteria and its relative importance.

D1 D2 D3 Aggregated importance Crisp number Relative importance (discount coefficient)

Attack VH H H (0.73,0.83,0.86,0.93) 0.8375 0.9544Mobility VH H VH (0.76,0.86,0.93,0.96) 0.8775 1Self-defense M VH MH (0.56,0.66,0.73,0.80) 0.6875 0.7835Command and communication M M M (0.40,0.50,0.50,0.60) 0.5000 0.5698

Table 6Transform the aggregated ratings of each criterion into basic probability assignment.

m {MP} m {F} m {MP,F} m {MG} m {F,MG} m {G} m {MG,G} m {VG} m {G,VG}

Attack1 0 0 0 0.1720 0 0.5360 0.0745 0.1338 0.0838Attack2 0 0.0220 0 0.7423 0.0126 0.0835 0.1086 0.0174 0.0133Attack3 0 0.0220 0 0.7423 0.0126 0.0835 0.1088 0.0174 0.0133Mobility1 0 0 0 0.1020 0 0.6118 0.0765 0.1224 0.0874Mobility2 0.0303 0.3636 0.0242 0.4848 0.0970 0 0 0 0Mobility3 0 0 0 0.1801 0 0.3613 0.3613 0.0560 0.0412Self-defense1 0 0.1087 0 0.6522 0.0652 0.1087 0.0652 0 0Self-defense2 0 0.0599 0 0.7980 0.0299 0.0748 0.0374 0 0Self-defense3 0.0303 0.3636 0.0242 0.4848 0.0970 0 0 0 0CC1 0 0 0 0.4532 0 0.3569 0.1322 0.0330 0.0248CC2 0 0 0 0.4532 0 0.3569 0.1322 0.0330 0.0248CC3 0 0 0 0.4532 0 0.3569 0.1322 0.0330 0.0248

Table 7Discounted basic probability assignment of each criterion.

m {MP} m {F} m {MP,F} m {MG} m {F,MG} m {G} m {MG,G} m {VG} m {G,VG} m {H}

Attack1 0 0 0 0.1642 0 0.0711 0.5116 0.1277 0.0800 0.0456Attack2 0 0.0210 0 0.7085 0.0120 0.0797 0.1036 0.0166 0.0127 0.0456Attack3 0 0.0210 0 0.7085 0.0120 0.0797 0.1036 0.0166 0.0127 0.0456Mobility1 0 0 0 0.1020 0 0.6118 0.0765 0.1224 0.0874 0Mobility2 0.0303 0.3636 0.0242 0.4848 0.0970 0 0 0 0 0Mobility3 0 0 0 0.1801 0 0.3613 0.3613 0.0560 0.0412 0Self-defense1 0 0.0852 0 0.5110 0.0511 0.0852 0.0511 0 0 0.2165Self-defense2 0 0.0469 0 0.6252 0.0234 0.0586 0.0293 0 0 0.2165Self-defense3 0.0237 0.2849 0.0190 0.3798 0.0760 0 0 0 0 0.2165CC1 0 0 0 0.2582 0 0.2034 0.0753 0.0188 0.0141 0.4302CC2 0 0 0 0.2582 0 0.2034 0.0753 0.0188 0.0141 0.4302CC3 0 0 0 0.2582 0 0.2034 0.0753 0.0188 0.0141 0.4302

Table 8The multi-criteria data fusion results.

m {MP} m {F} m {MP,F} m {MG} m {F,MG} m {G} m {MG,G} m {VG} m {G,VG}

M1A1 (USA) 0 0 0 0.1746 0 0.7881 0.0069 0.0244 0.0060Challenger 2 (UK) 0.0004 0.0115 0.0003 0.9861 0.0017 0 0 0 0Leopard 2 (Germany) 0 0 0 0.8891 0 0.0858 0.0223 0.0019 0.0009

Table 9Results of pignistic probability transformation.

bet {MP} bet {F} bet {MG} bet {G} bet {VG}

M1A1 USA) 0 0 0.1780 0.7945 0.0274Challenger 2 (UK) 0.0005 0.0125 0.9870 0.0017 0Leopard 2 (Germany) 0 0 0.9002 0.0974 0.0023

6992 Y. Deng et al. / Expert Systems with Applications 38 (2011) 6985–6993

RM1A1Attack ¼

ð5;6;7;8Þ þ ð8;9;10;10Þ þ ð7;8;8;9Þ3

¼ ð6:66;7:66;8:33;9:00Þ

All the other aggregated ratings of the criterion can be obtainedin a same way. The results are listed in Table 4.Based on the method proposed in Section 2.2.3, the BPA of eachrating can be obtained and shown in Table 6.Step 5. Discountingthe BPA of ratings with the relative importance.Given the relative importance (discounted coefficient) in Table5 and the BPA in Table 6, the discounted BPA can be easilyobtained through Eq. (14). The results are listed in Table 7.Step 6. Combine the discounted data from each criterion basedon the Dempster rule.

Using the classical Dempster rule of combination, the data fromeach criteria can be fused. The fusion result of each alternativeis listed in Table 8.Step 7. Using the pignistic probability transformation to get thefinal ranking order.

Page 9: A new linguistic MCDM method based on multiple-criterion data fusion

Y. Deng et al. / Expert Systems with Applications 38 (2011) 6985–6993 6993

By the pignistic probability transformation in Eq. (15), theresults are shown in Table 8. The final ranking order isM1A1(USA) > Challenger (Germany) > Leopard (UK), which isthe same as the result presented in Cheng and Lin’s work(2002) (see Table 9).

4. Conclusions

Due to the uncertainity in decision-making, it is flexible to dealwith linguistic information in decision making under the frame-work of fuzzy sets theory and Dempster–Shafer evidence theory.In this paper, a fuzzy evidential method to handle MCDM problemis proposed. The new methodology represents experts’ opinions bythe use of fuzzy numbers. The linguistic weights can be trans-formed as the discounting coefficient. The ratings are used to gen-erate the BPA. Based on the discounting rule, the data from eachcriterion can be fused by the Dempster rule of combination. The fi-nal ranking order can be determined by the pignistic probabilitytransformation. A numerical example to select the best main battletank is used to illustrate the efficiency of the proposed method. Wewill apply it to the linguistic environment evaluation in the future.

Acknowledgements

The first author will appreciate the funding provided by theNational Natural Science Foundation of China, Grant Nos.60874105, 60904099, Program for New Century Excellent Talentsin University, Grant No. NCET-08-0345, Shanghai Rising-StarProgram Grant No. 09QA1402900, Chongqing Natural ScienceFoundation, Grant No. CSCT, 2010BA2003, Aviation ScienceFoundation, Grant Nos. 20090557004, 20095153022, the ChenxingScholarship Youth Found of Shanghai Jiao Tong University GrantNo. T241460612, Doctor Funding of Southwest University GrantNo. SWU110021, Leading Academic Discipline Project of ShanghaiMunicipal Education Commission Grant No. J50704.

References

Bauer, M. (1997). Approximation algorithms and decision making in the Dempster–Shafer theory of evidence – An empirical study. International Journal ofApproximate Reasoning, 17(2-3), 217–237.

Beynon, M. (2002). DS/AHP method: A mathematical analysis, including anunderstanding of uncertainty. European Journal of Operational Research, 140(1),148–164.

Beynon, M. (2005a). A novel technique of object ranking and classification underignorance: An application to the corporate failure risk problem. EuropeanJournal of Operational Research, 167(2), 493–517.

Beynon, M. (2005b). A method of aggregation in DS/AHP for group decision-makingwith the non-equivalent importance of individuals in the group. Computers andOperations Research, 32(7), 1881–1896.

Beynon, M., Cosker, D., & Marshall, D. (2001). An expert system for multi-criteriadecision making using Dempster–Shafer theory. Expert System with Applications,20(4), 357–367.

Beynon, M., Curry, B., & Morgan, P. (2000). The Dempster–Shafer theory of evidence:An alternative approach to multicriteria decision modeling. Omega –International Journal of Management, 28(1), 37–50.

Chen, S. M. (1998). Aggregating fuzzy opinions in the group decision-makingenvironment. Cybernetics and Systems, 27(4), 449–472.

Chen, S. J., & Chen, S. M. (2003). Fuzzy risk analysis based on similarity measures ofgeneralized fuzzy numbers. IEEE Transaction Fuzzy Systems, 11(1), 45–56.

Cheng, C. H., & Lin, Y. (2002). Evaluating the best main battle tank using fuzzydecision theory with linguistic criteria evaluation. European Journal ofOperational Research, 142(2), 174–186.

Christopher, M. B. (2006). Pattern recognition and machine learning. Springer.Demotier, S., Schon, W., & Denoeux, T. (2006). Risk assessment based on weak

information using belief functions: A case study in water treatment. IEEETransactions on System Man and Cybernetics, Part C – Applications and Reviews,36(3), 382–396.

Deng, Y., Shi, W. K., & Liu, Q. (2004). Combining belief function based on distancefunction. Decision Support Systems, 38, 489–493.

Guo, H. W., Shi, W. K., & Deng, Y. (2006). Evaluating sensor reliability inclassification problems based on evidence theory. IEEE Transactions onSystems, Man, and Cybernetics, Part B: Cybernetics, 36, 970–981.

Hsu, S. M., & Chen, C. T. (1996). Aggregation of fuzzy opinions under group decisionmaking. Fuzzy Sets and Systems, 79(3), 279–285.

Kangas, A. S., & Kangas, J. (2004). Probability, possibility and evidence: Approachesto consider risk and uncertainty in forestry decision analysis. Forest Policy andEconomics, 6(2), 169–188.

Lefevre, E. (2002). Belief function combination and conflict management.Information Fusion, 3, 149–162.

Liu, Q., Xiong, J., & Deng, Y. (2008). A subjective methodology for risk quantificationbased on generalized fuzzy numbers. International Journal of General Systems,37(2), 149–165.

Murphy, C. K. (2000). Combining belief functions when evidence conflicts. DecisionSupport Systems, 29, 1–9.

Sadiq, R., Kleiner, Y., & Rajani, B. (2006). Estimating risk of contaminant intrusion inwater distribution networks using Dempster–Shafer theory of evidence. CivilEngineering and Environmental System, 23(3), 129–141.

Sadiq, R., Kleiner, Y., & Rajani, B. (2007). Water quality failures in distributionnetworks – Risk analysis using fuzzy logic and evidential reasoning. RiskAnalysis, 27(5), 1381–1394.

Sii, H. S., Ruxton, T., & Wang, J. (2002). Synthesis using fuzzy set theory and aDempster–Shafer-based approach to compromise decision-making withmultiple-attributes applied to risk control options selection. Proceedings of theInstitution of Mechanical Engineering, 216(E1), 5–29.

Smets, P.(2000). Data fusion in the transferable belief model. In Proceedings of 3rdinternational conference on information fusion, Fusion 2000, Paris, France, July10–13 (pp. PS21–PS33).

Sun, L.-L., Srivastava, R. P., & Mock, T. J. (2006). An information systems security riskassessment model under the Dempster–Shafer theory of belief functions.Journal of Management Information System, 22(4), 109–142.

Yang, J. B., & Sen, P. (1997). Multiple attribute design evaluation of complexengineering products using the evidential reasoning approach. Journal ofEngineering Design, 8(3), 211–230.

Yang, J. B., & Xu, D.-L. (2002). On the evidential reasoning algorithm for multipleattribute decision analysis under uncertainty. IEEE Transactions on Systems Manand Cybernetics Part A – Systems and Humans, 32(3), 289–304.

Zadeh, L. (1986). A simple view of the Dempster–Shafer theory of evidence and itsimplication for the rule of combination. AI Magazine, 7(1), 85–90.

Zimmermann, H. J. (1991). Fuzzy set theory and its applications. Boston: KluwerAcademic Publishers.