1 Introduction

With the emergence of various big data platforms, it is becoming easier to access multiple sources of information describing the same research object. However, there is a large amount of conflicting or even distorted information. Therefore, the main challenge is how to fuse these information sources while eliminating interference and preserving the truth.

As an important method for modelling and processing uncertain information fusion [1, 2], Dempster–Shafer (D-S) evidence theory is an effective tool to fuse information from different sources [3,4,5], and it can be applied to situations of uncertainty without prior information, which is required for Bayesian theory [3, 6]. Therefore, it has attracted considerable attention from many scholars and has been widely applied in many fields, such as risk and reliability analysis [7,8,9], decision making [10, 11], fault diagnosis [12,13,14], pattern recognition [15, 16].

However, Zadeh [17] presented the famous “Zadeh’s Paradox”, which challenges D-S theory. The paradox shows that counterintuitive results obtain when fusing highly conflicting evidence by using Dempster’s rule of combination. To address this issue, hundreds of methods have been developed [18,19,20,21,22], and they can be divided into three main categories: (1) modifying Dempster’s rule of combination; (2) preprocessing the bodies of evidence; and (3) modifying the closed-world assumption.

Some researchers hold the view that the counterintuitive results are due to Dempster’s rule of combination. Therefore, they have proposed various alternative combination rules to replace Dempster’s rule of combination. These combination rules mainly focus on how to redistribute conflicting information [23]. The main alternative combination rules are Yager’s combination rule [24], which assigns conflicting mass assignments to the empty set; Dubois and Prade’s disjunctive combination rule [25], which assigns conflicting mass assignments to the union of conflict focal elements; Lefèvre’s combination rule [26], which assigns conflicting mass assignments to each focal element based on weighting factors; and a combination rule for the assignment of local conflicts [27], which subdivides global conflicts into local conflicts and then assigns them to the focal elements involved in the conflict.

Some scholars think that the counterintuitive results are due to unreliable evidence rather than Dempster’s rule of combination and that the bodies of evidence should be revised before combination [28]. There are two ways to modify the bodies of evidence in practical applications. (1) The first is the weighted average of the bodies of evidence, as in Murphy’s simple average of the bodies of evidence [29]. However, Murphy treats all the evidence with the same weight and does not take into account the relationships and difference among bodies of evidence, but not all evidence to be combined has equal significance in real applications. To better determine the weight of each piece of evidence, a series of methods have been published [3, 5, 30,31,32,33]. The main difference between these methods is the way in which the weight of evidence is obtained, such as Deng et al.’s weight of evidence based on the evidence distance [30] and Yuan et al.’s entropy-based weight [33]. (2) The second is discounting the bodies of evidence. The discounting approach is based on the idea that conflicts are generated by disturbed sources of information. As a result, information from the disturbed sources needs to be treated by discounting factors before combination [4]. The discounting approach was first developed by Shafer [34]. The key is to obtain the discounting factor. Since Shafer’s book, many methods for obtaining the discounting factor have been developed. Yang et al. discounted unreliable evidence using the degree of disagreement among bodies of evidence [35]. Schubert dealt with conflicting evidence based on the degree of falsity [36]. Yu et al. proposed a new supporting probability distance to discount conflicting evidence [31].

D-S theory assumes that the frame of discernment is the close world. However, some researchers believe that it is often difficult to determine the closed-world frame of discernment because of the limitations in the scopes of knowledge, there may exist some unknown things, which means the frame is in the open world [37]. When the object of the study is not within the closed-world frame of discernment, it is unreasonable or even wrong to assign the basic probability assignment to each subset in the close world based on different bodies of evidence, which will lead to counterintuitive results. Smets [38] was the first to question the closed-world assumption and put forward the open-world assumption. He proposed the transferable belief model, which assigns conflicts to an unknown new proposition. Subsequently, some scholars have developed combination methods based on open-world assumptions, such as Tang et al.’s method [39], Sun and Deng’s method [40], and Wen et al.’s method [1].

These three types of methodologies have played an important role in overcoming the counterintuitive results caused by highly conflicting evidence. However, each methodology has its own limitations. D-S evidence theory possesses several interesting mathematical properties, such as commutativity and associativity [10]. Yager’s combination rule, Dubois and Prade’s disjunctive combination rule, and Lefèvre’s combination rule and other methods of modifying the combination rule not only destroy the mathematical properties but also lose the most important polarizability of Dempster’s rule of combination [41]. Moreover, these methods have no effect if the counterintuitive results are caused by sensor failure [3, 30, 42]. Although the combination methods of the weighted average, such as Murphy’s and Deng’s method, do not destroy the mathematical properties of Dempster’s rule of combination, the approaches lose the information of the original evidence and sacrifice the independence of each piece of evidence because the weighted evidence replaces the original n pieces of evidence and fuses itself n − 1 times with Dempster’s rule of combination. Regarding the combination methods of discounting the bodies of evidence, if the discount factor is not reasonable, the ambiguity of the original evidence will increase, which decreases the accuracy of the fusion results. The open-world assumption changes the closure of D-S theory. If the frame of discernment is known, this method is not applicable to conflicting evidence. More importantly, these methods do not work in some cases. To overcome the shortcomings of the existing methods, this research was carried out by the authors.

The sources providing information are not in a stable environment and are always interfered with by the natural environment, human factors, and the performance of the instrument and equipment. In addition, the models that generate the basic probability assignments based on these sources are subject to certain errors. The causes mentioned above may lead to unreasonable or even incorrect basic probability assignments. The unreasonable basic probability assignment is the direct cause of counterintuitive results by fusing the conflicting evidence. Therefore, ensuring the validity and reliability of the basic probability assignment is the basis for fusing the conflicting evidence.

Based on the above analysis, an improved combination method for conflicting evidence based on the redistribution of the basic probability assignment is proposed. First, the redistribution equation of the basic probability assignment is constructed based on four parameters: the consistency degree and conflict intensity among bodies of evidence, the unreliability of the evidence, and the adjusted coefficient. Second, to avoid excessive redistribution of the basic probability assignment, the precision degree obtained by information entropy is used as the correction factor to modify the basic probability assignment for the second time. Ultimately, the modified basic probability assignment is fused by Dempster’s rule of combination. By comparison with other methods, several different types of examples and actual data sets are illustrated to demonstrate the rationality and effectiveness of the proposed method. The proposed method not only retains the mathematical properties of D-S theory but also overcomes the disadvantages of the weighted average and the discounting method, which compensates for the shortcomings of related methods. Furthermore, the proposed method is able to deal with cases that cannot be solved by other methods, which expands the application of D-S theory.

The paper is organized as follows. Section 2 briefly introduces the preliminaries of the paper. Section 3 proposes indicators for evaluating the improvement methods. In section 4, an improved combination method for conflicting evidence based on the redistribution of the basic probability assignment is proposed. Section 5 illustrates examples to show the effectiveness of the proposed method. In section 6, various fusion methods are discussed. Finally, a brief conclusion is drawn in section 7.

2 Preliminaries

2.1 The basic concepts of Dempster–Shafer theory

D-S theory, proposed by Dempster (1967) and improved by Shafer (1976) [43], is a flexible and effective tool to deal with multisource information without prior information [3, 22]. In this section, we list several commonly used concepts in D-S evidence.

Definition 2.1 (Frame of discernment).

Let Θ = {θ1, θ2, ⋯, θn} be a finite nonempty set of mutually exclusive and collectively exhaustive elements, called a frame of discernment. The power sets of Θ is 2Θ, indicated as:

$$ {\displaystyle \begin{array}{c}{2}^{\Theta}=\left\{\phi, \left\{{\theta}_1\right\},\cdots, \left\{{\theta}_n\right\},\left\{{\theta}_1,{\theta}_2\right\},\cdots, \right.\\ {}\left.\left\{{\theta}_1,{\theta}_2,\cdots {\theta}_i\right\},\cdots, \Theta \right\}\end{array}} $$
(1)

where ϕ is an empty set. If A ∈ 2Θ, A is called a proposition.

Definition 2.2 (Basic Probability Assignment).

For a frame of discernment Θ, m(A) is a function that maps A to [0, 1], formally denoted by m: 2Θ → [0, 1], which satisfies the following conditions:

$$ m\left(\varnothing \right)=0\kern2em \mathrm{and}\kern2em {\sum}_{A\in {2}^{\Theta}}\,m(A)=1 $$
(2)

where m(A) is a basic probability assignment (BPA), also called a mass function, which represents the support degree for proposition A; m(∅) denotes BPA of empty set and is assigned 0, and if m(A) > 0, then A is called a focal element. When a piece of evidence is given, the support degree ranging from 0 to 1 is assigned to each possible proposition or combination. The sum of the BPAs corresponding to each piece of evidence is 1.

Definition 2.3 (Belief function and Plausibility function).

The belief function and plausibility function on 2Θ are defined as follows:

$$ Bel(A)={\sum}_{B\subseteq A}\,m(B) $$
(3)
$$ Pl(A)={\sum}_{A\cap B\ne \phi}\,m(B) $$
(4)

where Bel(A) is the belief function, which shows the total support degree for proposition A; Pl(A) is the plausibility function, which represents the maximum volume of support for proposition A. Bel(A) and Pl(A) separately represent the lower and upper limit functions of support for proposition A. Therefore, these two functions can be used to represent the uncertainty interval for proposition A, which is denoted by [Bel(A),Pl(A)].

Definition 2.4 (Dempster’s rule of combination)

Let m1and m2, based on the same frame of discernment Θ, be two BPAs provided by two pieces of evidence from independent sources. Dempster’s rule of combination is denoted by m = m1 ⨁ m2, which is defined as follows:

$$ \left\{\begin{array}{c}m\left(\varnothing \right)=0\\ {}m(A)=\frac{1}{1-k}{\sum}_{A_{i\cap}\,{A}_j=A}\,{m}_1\left({A}_i\right){m}_2\left({A}_j\right)\end{array}\right. $$
(5)
$$ k={\sum}_{A_i\cap {A}_j=\varnothing}\,{m}_1\left({A}_i\right){m}_2\left({A}_j\right), $$
(6)

where k is the conflict coefficient that measures the conflict degree between pieces of evidence; 1/(1 − k) is the normalized coefficient that avoids assigning a nonzero probability to the empty set ϕ in the combination. The combination rule can be extended directly [32, 44], which is denoted by m = m1 ⨁ m2 ⨁ ⋯mq(q is the number of pieces of evidence). Note that Dempsters rule of combination is not applicable for fusing multiple pieces of evidence when k is close to or equals 1.

2.2 Types of high conflict

D-S theory can deal well with general conflicting evidence [5]. However, counterintuitive results were obtained when fusing highly conflicting evidence, which is the primary reason for the criticism of D-S theory. There are four common types of high-conflict evidence fusion as follows [45]:

  1. (1)

    “Total Trust” Conflict

“Total Trust” conflict is related to the famous “Zadeh’s Paradox”. In a multisensor system, we assume that the frame of discernment is Θ = {A, B, C} and that there are two bodies of evidence.

$$ {E}_1:\kern0.5em {m}_1(A)=0.99\kern1.25em {m}_1(B)=0.01\kern1.25em {m}_1(C)=0.00 $$
$$ {E}_2:\kern0.5em {m}_2(A)=0.00\kern1em {m}_2(B)=0.01\kern1.25em {m}_2(C)=0.99 $$

Through the calculation using D-S theory, the conflict coefficient k is 0.9999, and the fusion result is:

$$ \mathrm{m}(A)=0\kern1.5em \mathrm{m}(B)=1\kern1em \mathrm{m}(C)=0 $$

It can be seen that the BPAs of proposition B assigned by two pieces of evidence are very small, but the fusion result fully supports proposition B, which is the counterintuitive result in practice.

  1. (2)

    Complete Conflict

In a multisensor system, it is assumed that the frame is Θ = {A, B} and that there are three bodies of evidence.

$$ {E}_1:{m}_1(A)=0.90\kern2.75em {m}_1(B)=0.10 $$
$$ {E}_2:{m}_2(A)=0.00\kern2.75em {m}_2(B)=1.00 $$
$$ {E}_3:{m}_3(A)=1.00\kern2.75em {m}_3(B)=0.00 $$

It is clear that evidence E2 and E3 completely conflict. The conflict coefficient k is 1. In this case, Dempster’s rule of combination cannot be applied because the normalized coefficient 1/1 − k is 0.

  1. (3)

    “One Ballot Veto” Conflict

In a multisensor system, assume that the frame is Θ = {A, B} and proposition A is true. There are three bodies of evidence.

$$ {E}_1:{m}_1(A)=0.90\kern1.75em {m}_1(B)=0.10 $$
$$ {E}_2:{m}_2(A)=0.80\kern1.75em {m}_2(B)=0.20 $$
$$ {E}_3:{m}_3(A)=0.00\kern2em {m}_2(B)=1.00 $$

Evidence E1, E2 all conformably allocate the largest BPA to proposition A. However, evidence E3 completely denies proposition A, which highly conflicts with evidence E1, E2. Applying Dempster’s rule of combination, the conflict coefficient and the fusion result are obtained as follows.

k = 0.98     m(A) = 0  m(B) = 1

It is clear that the support of proposition A in the fusion result is zero, which is contrary to the true result. As long as one piece of evidence contradicts a certain proposition, no matter how much the other pieces of evidence support it, the fusion result of the proposition is 0. The situation is named the “one ballot veto” conflict.

  1. (4)

    Pseudo Complete Conflict

Pseudocomplete conflict is very similar to complete conflict. There are two main differences between them. One is that many pieces of evidence are consistent, and only a few abnormal pieces of evidence exist in the case of pseudocomplete conflict. The other is that D-S theory cannot be applied to complete conflict. Although D-S theory can fuse the bodies of evidence in pseudocomplete conflict situations, it often fails to obtain the correct results, such as in the following example.

In a multisensor system, assume that the frame is Θ = {A, B, C} and proposition A is true. There are three bodies of evidence.

$$ {E}_1:{m}_1(A)=0.55\kern1em {m}_1(B)=0.25\kern1em {m}_1(C)=0.20 $$
$$ {E}_2:{m}_2(A)=0.10\kern1em {m}_2(B)=0.89\kern1em {m}_2(C)=0.01 $$
$$ {E}_3:{m}_3(A)=0.60\kern1em {m}_3(B)=0.20\kern1em {m}_3(C)=0.20 $$

Evidence E1 and E3 are similar, while evidence E2 conflicts with them. Applying Dempster’s rule of combination, the fusion result is shown below.

$$ \mathrm{m}(A)=0.4223,\kern1em m(B)=0.5696\kern1em m(C)=0.0051 $$

It is clear that the support of proposition B (0.5696) is greater than that of proposition A (0.4223). It seems that proposition B is true, but proposition A is actually the true proposition. Therefore, the correct result cannot be produced by the application of D-S theory in the situation.

3 Evaluation indicators for the improvement methods

To better improve the performance of Dempster’s rule of combination, many researchers have proposed various improvement methods [42]. Whether these methods can be widely used needs to be tested. The commonly used test is based on only whether the method can correctly identify the real target, while it lacks specific quantitative indicators. Based on the research of typical improved methods, four indicators are proposed in the paper to evaluate the improvement methods.

  1. (1)

    Identifying the real target

A good improvement method should first be able to fuse the bodies of evidence in various situations as much as possible to identify the real target. If a method cannot obtain the correct result when fusing the bodies of evidence in some cases, the scope of its application will be limited, and the performance of the method will be questioned. Therefore, correctly identifying the target is the basic condition for evaluating the improvement methods.

  1. (2)

    Uncertain interval value

The uncertain interval value indicates the uncertainty of the support degree of the recognized target. The greater the value is, the greater the uncertainty of the recognized target, which will increase the risk of incorrectly identifying the target. The uncertain interval value is defined as follows.

$$ L(A)= Pl(A)- Bel(A) $$
(7)

where L(A) is the uncertainty interval value for identifying target A; Bel(A) is the belief function for identifying target A; Pl(A) is the plausibility function for identifying target A. The smaller the value of the uncertainty interval is, the better the performance of the method.

  1. (3)

    Differentiation value

The differentiation value is the degree of differentiation in the support degree between the real target and the interfering targets. The smaller the value is, the less obvious the difference in the support degree for different recognized targets, which is not conducive to decision making because the real target is easily disturbed by the targets whose support degree are close to that of the real target. The differentiation value is obtained according to Eq. (8).

$$ \mathrm{D}= Bel\left({A}^{\prime}\right)-{\max}_{A^{\prime}\ne {A}_j} Bel\left({A}_j\right) $$
(8)

where D is the differentiation value; Bel(A) is the belief function of the real target. The greater the differentiation value is, the better the performance of the method.

  1. (4)

    The unknown degree

The unknown degree relates to a frame of discernment and can be measured by m(Θ) which is the BPA of the focal element Θ. The smaller the value of m(Θ) is, the smaller the unknown degree of the fusion result, which makes it easier to make right decisions in the actual decision-making process, and vice versa. One of the advantages of multisource information fusion is that it can significantly decrease the unknown degree of fusion results. If a fusion method fails to achieve this effect, it will lose its value in practical applications.

4 The proposed method

The proposed method is as follows. First, the consistency degree and conflict intensity between the bodies of evidence are measured. Second, the unreliability of the evidence is calculated. Third, the redistribution equation of the BPA is constructed. Then, to avoid excessive redistribution of the BPA, the precision degree obtained by information entropy is used as the correction factor to modify the BPA for the second time. Finally, Dempster’s rule of combination is used to fuse the modified BPA, and the recognition target is determined based on the fusion results.

4.1 Consistency and conflict of evidence

Definition 3.1 (Consistency degree and Conflict degree [46]). Let m1 and m2, based on the same frame of discernment Θ, be two BPAs provided by two pieces of evidence E1 and E2, Ai and Aj belong to 2Θ, which is the power set of Θ.

$$ H\left({m}_1,{m}_2\right)={\sum}_{A_i\bigcap {A}_j\ne \varnothing }{m}_1\left({A}_i\right){m}_2\left({A}_j\right)\frac{\left|{A}_i\cap {A}_j\right|}{\left|{A}_i\cup {A}_j\right|} $$
(9)
$$ C\left({m}_1,{m}_2\right)={\sum}_{A_i\cap {A}_{j=\varnothing }}{m}_1\left({A}_i\right){m}_2\left({A}_j\right) $$
(10)

where H(m1, m2) is the consistency degree between E1and E2, which describes the consistency degree of corresponding focal elements between two bodies of evidence; C(m1, m2) measures the conflict degree between two bodies of evidence, which indicates the degree of conflict in the distribution of the support degree among the focus elements.

If there are more than two pieces of evidence, the consistency degree of the ith piece of evidence can be obtained based on Eq. (11), where q is the number of pieces of evidence.

$$ {R}_i={\sum}_{\begin{array}{c}j=1\\ {}j\ne i\end{array}}^qH\left({m}_i,{m}_j\right) $$
(11)

Similarly, the conflict degree of the ith piece of evidence can be obtained, as shown in the equation below.

$$ {K}_i={\sum}_{\begin{array}{c}j=1\\ {}j\ne i\end{array}}^qC\left({m}_1,{m}_2\right) $$
(12)

Based on Eqs. (11) and (12), the conflict intensity of the ith piece of evidence can be obtained.

$$ {CI}_i=\frac{K_i}{K_i+{R}_i} $$
(13)

The conflict intensity CIi is the degree of divergence between the ith piece of evidence and other pieces of evidence. The greater the divergence, the more likely the evidence is to be inconsistent with other bodies of evidence. If there is no prior knowledge to determine the reliability and importance of the evidence, it is unreasonable to arbitrarily discard the evidence. One of the ways to effectively utilize the evidence of divergence is to assign a partial BPA to the focal element Θ. Moreover, the more divergent the evidence is, the greater the likelihood of assigning a value to the focal element Θ, and the greater the value assigned to it.

4.2 The unreliability of evidence

Because of the interference of many factors, each piece of evidence may be unreliable. Without prior knowledge related to the evidence, the unreliability of the evidence is mainly estimated based on the “majority of principle” [43]. Generally, the higher the consistency degree between the BPAs of a piece of evidence and the BPAs of other bodies of evidence, the more reliable the evidence is, and the lower the consistency degree, the less reliable the evidence is. The unreliability of evidence is obtained by the following formulas [43, 47].

$$ {r}_{BPA}\left({m}_i,{m}_j\right)=\frac{H\left({m}_i,{m}_j\right)}{\sqrt{H\left({m}_i,{m}_i\right)\bullet H\left({m}_j,{m}_j\right)}} $$
(14)
$$ U\left({m}_i\right)=\frac{\sum \limits_{\begin{array}{c}j=1\\ {}j\ne i\end{array}}^q\left(1-{r}_{BPA}\left({m}_i,{m}_j\right)\right)}{\sum_{i=1}^q\sum \limits_{\begin{array}{c}j=1\\ {}j\ne i\end{array}}^q\left(1-{r}_{BPA}\left({m}_i,{m}_j\right)\right)} $$
(15)

where rBPA is the correlation coefficient between Ei and Ej; U(mi) is the unreliability of the ith piece of evidence.

4.3 Redistribution of the basic probability assignment

Based on the conflict intensity and the unreliability of the evidence, the redistribution equation of BPAs is constructed to modify the original BPAs.

$$ {m}_i\left(\Delta \right)=\alpha \cdotp {CI}_i\bullet U\left({m}_i\right),\kern0.75em 0\le {m}_i\left(\Delta \right)\le 1 $$
(16)
$$ \left\{\begin{array}{c}{m}_i^{\prime}\left({A}_s\right)=\left(1-{m}_i\left(\Delta \right)\right)\cdotp {m}_i\left({A}_s\right)\kern0.75em {A}_s\ne \Theta \\ {}{m}_i^{\prime}\left({A}_s\right)={m}_i\left({A}_s\right)+{m}_i\left(\Delta \right)\kern0.5em {A}_s=\Theta \end{array}\right. $$
(17)

where \( {m}_i^{\prime } \) is the BPA after redistribution of the ith piece of evidence; mi(Δ) is the BPA transferred from other propositions to Θ for the ith piece of evidence; and α is the adjusted coefficient. The paper suggests that the value of α is divided into three cases: (i) when it can be determined that the original BPAs of the ith piece of evidence is correct, the value of α is zero; (ii) when the proposition corresponding to the maximum basic probability given by the evidence is not the same as the proposition corresponding to the maximum basic probability given by any other evidence, and the BPA of the proposition given by the evidence is close to 1, the value of α is one; and (iii) in other cases, the value of α is 0.5. Note that when the value of α is zero, the original BPAs remain unchanged, and the proposed method becomes the D-S evidence method, i.e., D-S evidence method can be seen as a special case of the proposed method.

4.4 Modification of BPAs after redistribution based on the degree of precision

Although the initial BPAs are modified by the above equations, the BPAs of some propositions may be overcorrected, which can distort the original evidence information. Moreover, if the BPA transferred to the focal element Θ is excessive, the ambiguity of the evidence will be increased. To reduce this adverse effect, the BPAs of the propositions need to be modified for a second time.

The primary focal element, which is the proposition with the maximum BPA, covers the maximum information volume of the evidence. If the primary focal element does not change after redistribution and there is no significant change in the BPA of the primary focal element and the BPA of the focal element Θ, then the original information does not change substantially. To avoid excessive redistribution of the BPAs, the redistributive BPAs are revised for a second time while ensuring that the primary focal element corresponding to the evidence remains unchanged.

The greater the difference between the BPA of the primary focal element corresponding to a piece of evidence and the BPAs of other propositions corresponding to the evidence is, the more precision the information contained in this evidence. However, the more precise the evidence, the more likely the BPAs will overcorrect. Therefore, the issue can be solved from the perspective of the precision of the evidence. Information entropy is an effective way to calculate the precision of evidence. In this paper, information entropy theory is used to calculate the precision degree of each piece of evidence. Then, the precision degree is used as the transfer factor to transfer a part of the BPA of focal element Θ to the primary focal element, which avoids the problem caused by the redistribution of the BPAs. The relevant formulas are as follows.

$$ {F}_i=-\frac{1}{{\mathit{\log}}_2n}{\sum}_s^n{m}_i\left({A}_s\right){\mathit{\log}}_2{m}_i\left({A}_s\right) $$
(18)
$$ {F}_i^{\prime }=\frac{1-{F}_i}{\sum_{k=1}^q\left(1-{F}_k\right)} $$
(19)
$$ \left\{\begin{array}{ll}{m}_i^{\prime \prime}\left({A}_s\right)={m}_i^{\prime}\left({A}_s\right)+{F}_i^{\prime}\cdotp {m}_i\left(\Delta \right)& {m}_i^{\prime}\left({A}_s\right)={}_{t=1,2,\cdots n}{}^{\max }\ {m}_i^{\prime}\left({A}_t\right),{A}_s\ne \Theta \\ {}{m}_i^{\prime \prime}\left({A}_s\right)={m}_i^{\prime}\left({A}_s\right)& {m}_i^{\prime}\left({A}_s\right)\ne {}_{t=1,2,\cdots n}{}^{\max }\ {m}_i^{\prime}\left({A}_t\right),{A}_s\ne \Theta \\ {}{m}_i^{\prime \prime}\left({A}_s\right)={m}_i^{\prime}\left({A}_s\right)-{F}_i^{\prime}\cdotp {m}_i\left(\Delta \right)& {A}_s=\Theta \end{array}\right. $$
(20)

where Fi and \( {\mathrm{F}}_i^{\prime } \) are the entropy value and the precision degree of the ith piece of evidence, respectively;\( {m}_i^{\hbox{'}\hbox{'}} \)is the final modified BPA of all the propositions corresponding to the ith piece of evidence.

Based on the final modified BPAs, Dempster’s rule of combination is used to combine multisource evidence. Then, Eq. (3) is used to calculate the belief function of each proposition. The identification result is determined based on the principle of maximum membership.

$$ F(A)={\max}_{A_i\in \Theta} Bel\left({A}_i\right) $$
(21)

where F(A) is the final identification result. An algorithm flowchart of the proposed method is shown below.

Table 1 The relevant information of various examples

5 Example and analysis

5.1 Conflict evidence fusion

The paper holds that a good improvement method can deal with not only highly conflicting evidence but also general conflicting evidence. To demonstrate the feasibility and effectiveness of the proposed method, various examples are selected. These examples include four types of highly conflicting evidence (introduced in section 2.2) and general conflicting evidence. The fusion results of each example are compared with those of typical methods, which include D-S theory, Murphy’s method [29], Deng’s method [30], Yager’s method [24], Dubois’ method [25], and Smets’ method [38]. The example data are from [30, 48,49,50], and these data from various sources are turned into BPAs, which are shown in Table 1. There are multiple pieces of evidence in each example. To compare the performance of various methods in detail, the different amounts of evidence in each example are fused separately. The detailed fusion results are shown in Tables 2, 3, 4, 5. Figures 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 and 12 show the indicators based on the fusion results of the various methods under different amounts of evidence.

Table 2 Fusion results of various methods for different examples under two pieces of evidence
Fig. 1
figure 1

Belief value of the real target fused by different methods for different examples under two pieces of evidence

Fig. 2
figure 2

Belief value of the real target fused by different methods for different examples under three pieces of evidence

Fig. 3
figure 3

Belief value of the real target fused by different methods for different examples under four pieces of evidence

Fig. 4
figure 4

Uncertainty interval value of various methods for different examples under two pieces of evidence

Fig. 5
figure 5

Uncertainty interval value of various methods for different examples under three pieces of evidence

Fig. 6
figure 6

Uncertainty interval value of various methods for different examples under four pieces of evidence

Fig. 7
figure 7

D values of various methods for different examples under two pieces of evidence

Fig. 8
figure 8

D values of various methods for different examples under three pieces of evidence

Fig. 9
figure 9

D values of various methods for different examples under four pieces of evidence

Fig. 10
figure 10

The unknown degree of various methods for different examples under two pieces of evidence

Fig. 11
figure 11

The unknown degree of various methods for different examples under three pieces of evidence

Fig. 12
figure 12

The unknown degree of various methods for different examples under four pieces of evidence

According to Eq. (21), the belief function is the basis for identifying the target. The larger the belief value of the target to be identified is, the greater the degree of support for the target. The following conclusions can be drawn from Fig. 1 when fusing two pieces of evidence: (1) the belief values of the real targets obtained by Yager’s method, Smets’ method and Dubois’ method are significantly lower than those obtained by Murphy’s method, the proposed method and Deng’s method; (2) the belief values of the real targets obtained by D-S theory, Yager’s method, Smets’ method and Dubois’ method are 0 in examples 1 and 2; and (3) the belief values of the real target obtained by all methods are very small in example 4. According to Table 2 in the appendix, all these methods fail to identify the real targets in example 1, example 2 and example 4, and Yager’s method, Smets’ method and Dubois’ method cannot also identify the real target in example 6. Murphy’s method, the proposed method and Deng’s method are able to obtain the real targets in examples 3, 5 and 6, moreover, the belief values of the real targets obtained by the proposed are higher than the two method in the three examples

The following conclusions can be drawn from Fig. 2 when fusing three pieces of evidence: (1) the belief values of the real targets obtained by the proposed method and Deng’s method are obviously higher than those obtained by other methods; and (2) the difference between the belief values obtained by the proposed method and Deng’s method various across examples. Based on Table 3 in the appendix, only the proposed method and Deng’s method can obtain the real targets in all examples, while the other methods cannot identify the real targets in all the examples above, for example, Murphy’s method fails to identify the real target in example 4.

The following conclusions can be drawn from Fig. 3 when fusing four pieces of evidence: (1) The belief values of the real targets obtained by the proposed method, Deng’s method and Murphy’s method are obviously higher than those obtained by other methods; and (2) the belief values of the real targets obtained by the proposed method and Deng’s method are higher than those obtained by Murphy’s method. However, according to Table 4 in the appendix, Deng’s method cannot identify the real target in example 6. The proposed method and Murphy’s method are able to obtain the real targets in all the examples. The other methods cannot identify the correct results insome examples above.

Based on the above analysis, it can be seen that the ability of the proposed method to identify real targets is better than that of other methods. In addition, there are five pieces of evidence in examples 3 and 5, but the other examples have only four pieces of evidence. Therefore, in terms of the five pieces of evidence in examples 3 and 5, the fusion results of various methods are not analysed in detail. The fusion results are shown in Table 5 in the appendix.

From Fig. 4, because the belief values of the real targets obtained by D-S theory, Yager’s method,  and Dubois’ method are 0 in example 2 when fusing two pieces of evidence, the uncertain interval values of the targets to be identified obtained by these methods are 1, while the uncertain interval values of the targets to be identified obtained by the other methods are very low in all the examples. On the basis of correctly identifying the real target, combining Figs. 5 and 6, it can be seen that the uncertain interval values of the targets to be identified obtained by Yager’s and Dubois’ methods are much higher than those obtained by other methods, while the uncertain interval values of the targets to be identified obtained by the proposed method and other methods are zero or close to zero. As introduced in section 3, the greater the value is, the greater the uncertainty of the identified target, which will increase the risk of incorrectly identifying the target. It shows that the performance of Yager’s and Dubois’ methods are worse than the proposed method, Murphy’s method and Deng’s method, while there is no significant difference in the uncertain interval value obtained by the three methods.

Negative D values indicate that the methods cannot identify the real targets in these examples. The greater the D value, the more likely it is to obtain the real target, so it can be seen that all the methods fail to obtain the real target in example 4 when fusing two pieces of evidence. On the basis of correctly identifying the real target, the following conclusions can be drawn from Fig. 7: (1) D values obtained by all the methods are equal to or less than 0 in examples 1, 2, and 4; and (2) the D value obtained by D-S theory is the highest (0.9780), followed by the proposed method (0.9440) in example 3; and (3) D values obtained by the proposed method are the highest in example 5 and example 6.

The following conclusions can be drawn from Fig. 8: (1) the D values obtained by the proposed method and Deng’s method are higher than those obtained by other methods in examples 1, 2, 3, and 6; and (2) the D value obtained by the proposed method is lower than those obtained by Dubois’ method and Deng’s method in example 4; and (3) the D value obtained by Deng’s method is lower than those obtained by the proposed method and D-S theory in example 5; and (4) the difference between the D values obtained by the proposed method and D values obtained by Deng’s method various across examples, which makes it difficult to evaluate the performance of these two methods.

It can be seen from Fig. 9 that the following conclusions can be drawn: (1) the D values obtained by the proposed method are higher than those obtained by other methods in example 3 and 6; and (2) the D values obtained by the proposed method and Deng’s method are higher than those obtained by other methods in example 1,2,4, while the D values obtained by Deng’s method are higher than those obtained by the proposed method in these examples; and (3) in example 5, there is no significant difference in the D values obtained by the proposed method, D-S theory, Deng’s method, and Murphy’s method, and the D values obtained by them are 0.9344,0.9344, 0.9380 and 0.9380, respectively.

Through the comparative analysis of D values obtained by different methods, it can be seen that the performance of the proposed method and Deng’s method is better than other methods, while the performance of the two methods various across examples.

In the bubble chart, the bubble represents the unknown degree of the fusion results. The larger the bubble is, the greater the unknown degree of the fusion results. From Figs. 10, 11 and 12, combined with Table 2 to Table 4 in the appendix, the following conclusions can be drawn: (1) The unknown degree of fusion results obtained by the proposed method are either 0 or close to 0 in the fusion of different amounts of evidence in the examples except for example 2 in Fig. 10 (0.1429). (2) Dempster’s rule of combination cannot be applied in example 2 because the normalized coefficient 1/1 − k is 0. Any useful information cannot be obtained based on D-S theory, so the unknown degree in example 2 is 1.0000, while the unknown degree of the fusion results obtained by D-S theory is 0 in the other examples. (3) The unknown degree of the fusion results obtained by Deng’s method and Murphy’s method are either 0 or close to 0 in the above examples. (4) The unknown degree of the fusion results obtained by Dubois’ method and Yager’s method are obviously higher than those obtained by other methods in the fusion of different amounts of evidence in many examples, although the unknown degree of the fusion results obtained by Smets’ method are 0 in the above examples, the method cannot identify the real targets in the examples except for example 3 in Fig. 8.

According to the unknown degree of the fusion results for different examples, the performance of Deng’s method and Murphy’s method is best, followed by the proposed method and D-S theory. The performances of Dubois’ method, Yager’s method, and Smets’ method are worse than those of the other methods.

From the perspective of various indicators, the proposed method and Deng’s method are superior to the other methods, while Deng’s method is slightly better than the proposed method. However, the proposed method can identify the real targets that Deng’s method cannot identify in a certain example, for example, in Fig. 9, Deng’s method fails to identify the real target in example 6, while the proposed method is able to obtain the right result. In other examples, the two methods have the same ability to identify the real target.

5.2 Application

In this section, four real cases are used to further verify the effectiveness of the proposed method.

5.2.1 Fault diagnosis based on multisource information fusion

Case 1

Suppose that the frame of discernment (Θ) consists of three different faults {F1, F2, F3}. The set of sensors given by S = {S1, S2, S3} are positioned on different places to gather the reports [3]. The BPAs of the sensors are listed as follows:

$$ {\displaystyle \begin{array}{c}\mathrm{S}1:{m}_1\left({F}_1\right)=0.60\kern1em {m}_1\left({F}_2\right)=0.10\\ {}\kern0ex \hspace{1em}{m}_1\left({F}_2,{F}_3\right)=0.10\kern1em {m}_1\left({F}_1,{F}_2,{F}_3\right)=0.20\end{array}} $$
$$ {\displaystyle \begin{array}{c}\mathrm{S}2:{m}_2\left({F}_1\right)=0.05\kern1em {m}_2\left({F}_2\right)=0.80\\ {}\kern0ex \hspace{1em}{m}_2\left({F}_2,{F}_3\right)=0.05\kern1em {m}_2\left({F}_1,{F}_2,{F}_3\right)=0.10\end{array}} $$
$$ {\displaystyle \begin{array}{c}\mathrm{S}3:{m}_3\left({F}_1\right)=0.70\kern1em {m}_3\left({F}_2\right)=0.10\\ {}\kern0ex \hspace{1em}{m}_3\left({F}_2,{F}_3\right)=0.10\kern1em {m}_3\left({F}_1,{F}_2,{F}_3\right)=0.10\end{array}} $$

Based on the information provided above, sensors S1 and S3 both support F1 with the maximum support degree, while sensor S2 strongly supports F2. This indicates that there is a high conflict between sensors S1 and S3 and sensor S2. The combination results obtained by several methods are shown in Table 6.

Table 3 Fusion results of various methods for different examples under three pieces of evidence

From Table 6, it can be seen that the fault judged by D-S evidence theory is an incorrect result because the real type of fault is F1. Smets’ method assigns conflict information to the empty set so that the belief function of the faults to be identified is too small to support any type of fault. Yager’s method assigns conflict information to focal element Θ. This causes the belief function of Θ to be much larger than that of any fault type, so it is unable to determine which fault is real. The proposed method is able to diagnose the fault type F1, which is consistent with Murphy’s method, Deng’s method and Dubois’ method, and the belief function of fault F1obtained by the proposed method is greater than that of Murphy’s method and Dubois’ method. Based on these four indicators, the performance of Deng’s method is the best, followed by that of the proposed method.

5.2.2 Type recognition based on multisource information fusion

Case 2

In the Iris dataset, there were three species of iris flowers (Setosa, Versicolor, and Virginica). Three species of iris flowers form a frame of discernment Θ = {Se, Ve, Vi}. Given data collected from Iris data, shown as {5.3 cm, 3.5 cm, 1.3 cm, 0.2 cm}. The data represent four attributes of iris flowers: sepal length (SL), sepal width (SW), petal length (PL), and petal width (PW). The data above belong to “Setosa”. The four attributes that are modelled as BPAs are shown in Table 7 [20].

Table 4 Fusion results of various methods for different examples under four pieces of evidence

Based on the data above, it can be seen that the information between the four attributes has good consistency, and all attributes identify the target as Se. The various methods are used to conduct multi-attribute information fusion, and the fusion results are shown in Table 8.

Table 5 Fusion results of various methods for different examples under five pieces of evidence

As seen from Table 8, except for Smets’ method and Yager’s method, the other methods can correctly identify the type of flowers (Se). Although Dubois’ method identifies the real target, the indicators obtained by this method are inferior to those obtained by the other three methods. D-S theory, Murphy’s method, Deng’s method, and the proposed method can obtain ideal fusion results. According to these four indicators, the proposed method and D-S theory outperform the other methods, while there is no difference in performance between the two methods.

To verify the anti-interference performance of the proposed method, the information of the attribute SW is assumed to be interfered with, and the corresponding BPAs are listed as follows [23]:

$$ {\displaystyle \begin{array}{c}{SW}^{\prime }:{m}_{sw}^{\prime}\left(\mathrm{Se}\right)=0.0000,{m}_{sw}^{\prime}\left(\mathrm{Ve}\right)=0.9900\\ {}\kern0ex {m}_{sw}^{\prime}\left(\mathrm{Vi}\right)=0.0100,{m}_{sw}^{\prime}\left(\mathrm{Se},\mathrm{Ve}\right)=0.0000\end{array}} $$
$$ {m}_{sw}^{\prime}\left(\mathrm{Se},\mathrm{Vi}\right)=0.0000,{m}_{sw}^{\prime}\left(\mathrm{Ve},\mathrm{Vi}\right)=0.0000,{m}_{sw}^{\prime}\left(\Theta \right)=0.0000 $$

When SW becomes an interference term, SW conflicts significantly with other attributes. The fusion results of different methods after interference are shown in Table 9.

Table 6 The comparison results between the proposed method and other methods

From Table 9, D-S theory and Murphy’s method classify the type of flower as versicolor (Ve) which is the wrong classification. Although Bel(Se) obtained by Yager’s method is larger than Bel(Ve) and Bel(Vi) obtained by Yager’s method, Bel(Se)(0.0213) is too small, and the unknown degree (0.9787) is far greater than Bel(Ve); therefore, the real type cannot be identified by Yager’s method. The belief function of the empty set (0.9787) obtained by Smets’ method is far greater than those of other recognition types obtained by Smets’ method, so the fusion results cannot provide any useful information for identifying the type of flower. The other three methods can correctly identify the type of flower; however, Bel(Se) obtained by Dubois’ method is smaller than that of the other two methods, which decreases the credibility of the identified type. The uncertainty interval value obtained by Dubois’ method is far greater than those obtained by Deng’s method and the proposed method, which increases the uncertainty of identifying the object. Moreover, the unknown degree of the fusion result (0.0468) obtained by Dubois’ method is greater than those obtained by Deng’s method (0.0000) and the proposed method (0.0004). This indicates that the fusion ability of Dubois’ method is relatively weak. Based on the indicators in Table 9, the fusion result of Deng’s method is best, followed by that of the proposed method.

5.2.3 Freeway incident detection based on multisource information fusion

Case 3

There are usually two types of incident detection on the freeway, namely, A (incident state) and B (no incident state), which form a frame of discernment Θ, denoted by Θ = {A, B}. Three information sources are used to detect the incident state at the same location. The BPAs obtained based on the three information sources are as follows [51]:

$$ \mathrm{S}1:{m}_1(A)=0.4613\kern1em {m}_1(B)=0.4750\kern1em {m}_1\left(A,B\right)=0.0638 $$
$$ \mathrm{S}2:{m}_2(A)=0.8606\kern1em {m}_2(B)=0.0802\kern1em {m}_2\left(A,B\right)=0.0593 $$
$$ \mathrm{S}3:{m}_3(A)=0.1110\kern1em {m}_3(B)=0.8594\kern1em {m}_3\left(A,B\right)=0.0296 $$

As seen from these BPAs, S2 strongly supports the target to be A, while S3 strongly supports the target to be B, which indicates that there is a high conflict between S2 and S3. For S1, there is no significant difference between support for A and support for B, which shows that there is no significant conflict between evidence S1 and evidence S2 or S3. The results of various methods are shown in Table 10.

Table 7 The BPA of the iris instance

As seen from Table 10, D-S theory and Murphy’s method obtain the wrong result. Bel(B) obtained by Yager’s method, Dubois’ method and Smets’ method is too small to support the real target (B). Only the proposed method and Deng’s method can yield the correct result, and there is no obvious difference between the fusion results of these two methods, which indicates that the two methods are better than the other methods. element Θ. This causes the belief function of Θ to be much larger than that of any fault type, so it is unable to determine which fault is real. The proposed method is able to diagnose the fault type F1, which is consistent with Murphy’s method, Deng’s method and Dubois’ method, and the belief function of fault F1obtained by the proposed method is greater than that of Murphy’s method and Dubois’ method. Based on these four indicators, the performance of Deng’s method is the best, followed by that of the proposed method.

5.2.4 Emergency decision based on multisource information fusion

Case 4

There are usually conflicts in the emergency decision-making process of disaster accidents. In the process of fighting a chemical storage fire, five emergency experts gave different views on four emergency plans [52]. The four emergency rescue plans are A, B, C, and D, which form a frame of discernment (Θ), denoted by Θ = {A, B, C, D}. The views from these emergency experts are turned into BPAs, which are listed below:

$$ {\displaystyle \begin{array}{c}{\mathrm{E}}_1:{m}_1(A)=0.3333\kern1em {m}_1(B)=0.3750\\ {}\kern0ex \hspace{1em}{m}_1(C)=0.1667\kern1em {m}_1(D)=0.1250\end{array}} $$
$$ {\displaystyle \begin{array}{c}{\mathrm{E}}_2:{m}_2(A)=0.3103\kern1em {m}_2(B)=0.2069\\ {}\kern0ex \hspace{1em}{m}_2(C)=0.2759\kern1em {m}_2(D)=0.2069\end{array}} $$
$$ {\displaystyle \begin{array}{c}{\mathrm{E}}_3:{m}_3(A)=0.3103\kern1em {m}_3(B)=0.2069\\ {}\kern0ex \hspace{1em}{m}_3(C)=0.2759\kern1em {m}_3(D)=0.2069\end{array}} $$
$$ {\displaystyle \begin{array}{c}{\mathrm{E}}_4:{m}_4(A)=0.1875\kern1em {m}_4(B)=0.2500\\ {}\kern0ex \hspace{1em}{m}_4(C)=0.2813\kern1em {m}_4(D)=0.2813\end{array}} $$
$$ {\displaystyle \begin{array}{c}{\mathrm{E}}_5:{m}_5(A)=0.1852\kern1em {m}_5(B)=0.2593\\ {}\kern0ex \hspace{1em}{m}_5(C)=0.2593\kern1em {m}_5(D)=0.2963\end{array}} $$

Ei(i = 1, 2, ⋯5) represents the view of the ith expert. Based on the data above, these experts have different views on the four emergency rescue plans. Emergency expert 1 supports rescue plan B. Expert 2 and expert 3 are in favour of plan A. Expert 4 prefers plan C and D. Expert 5 supports plan D. The fusion results of different views by different methods are shown in Table 11.

Table 8 The comparison of different methods applied in the Iris data set classification

From Table 11, the rescue plan A should be the best execution plan based on the fusion results obtained by D-S theory, Murphy’s method and Deng’s method. However, it is an incorrect conclusion according to reference [52]. Yager’s method, Dubois method and Smets’ method lose the polarizability of Dempster’s rule of combination, which leads to the belief function of each plan after multiple information fusion being too small to provide any useful information for identifying the optimal rescue plan. Only the proposed method can select the optimal plan. The case shows that the proposed method is superior to the other methods.

6 Discussion

Through the study of examples and real cases, the performance of various fusion methods was discussed.

  1. (1)

    Which of the three approaches of improved D-S theory is best?

Given the closed-world assumption, that is, the frame of discernment contains all possible research propositions, the belief function of each proposition obtained by the combination rule proposed by Smets based on the open-world assumption is too small to identify the real target. The fusion results of the above examples show that the method cannot provide effective information for identifying the real target.

Yager’s method and Dubois’ method are typical representatives of modified versions of Dempster’s rule of combination. However, Yager’s method cannot identify the real target in all examples and cases except for example 3 in Fig. 7. Although Dubois’ method identifies the correct result in some examples, it cannot identify the real target in all cases. Moreover, the uncertain interval value and the unknown degree obtained by these two methods are larger than those obtained by other methods, and the D value is relatively small.

Murphy’s method and Deng’s method belong to the weighted fusion method for modifying sources of evidence. The difference between the two is that Murphy does not consider the difference in the weight of the evidence, while Deng takes into account the difference in the weight of the evidence. According to the fusion results of the examples in section 5.1, the performances of Murphy’s method and Deng’s method are better than those of Yager’s method, Dubois’ method and Smets’ method. However, the two methods do not produce the right results when fusing different amounts of evidence in certain examples, for example, Deng’s method fails to identify the real target in example 6 in Fig. 9, and Murphy’s method fails to identify the real target in example 4 in Fig. 8. Based on the fusion results of the cases in section 5.2, Murphy’s method cannot identify the real target in cases 3, 4, or 2 which is under the disturbance condition, and Deng’s method cannot identify the real target in case 4.

Based on the above analysis, although Murphy’s method and Deng’s method cannot obtain the correct results in some cases in the paper, the two methods outperform Yager’s method, Dubois’ method and Smets’ method in terms of various indicators of the fusion results. Therefore, the approach of modifying evidence sources is better than the other two approaches.

  1. (2)

    How does the proposed method compare with Deng’s method and Murphy’s method?

Murphy’s method replaces multiple original bodies of evidence with the average evidence. In many situations, reasonable fusion results can be obtained, but when there is extremely abnormal evidence, multiple valid bodies of evidence are needed to offset the adverse effects of abnormal evidence. If the amount of valid evidence is limited, then this method will yield the wrong fusion results, as shown in Table 9, in case 3 and case 4. Deng’s method takes into account the weight of the evidence and makes up for Murphy’s shortcomings. However, this method excessively excludes abnormal information, which easily causes the loss of weak information. It may fail to identify the correct results, such as in case 4 and example 6 in Fig. 9. Moreover, because the weighted evidence itself fuses, the operation lacks reasonable explanation and undermines the independence of the evidence for Deng’s and Murphy’s method. The proposed method avoids the defects of these two methods by redistributing BPAs, which is efficient in dealing with conflicting evidence under various circumstances. Based on the fusion results in section 5, it can be seen that the ability of the proposed method to identify real targets is better than Deng’s method and Murphy’s method, which indicates that the proposed method has the widest range of applications.

  1. (3)

    Limitations of the proposed method

The proposed method deals with conflicting evidence to determine the target to be identified based on the closed-world frame of discernment. If the target to be identified is not within the closed frame, the proposed method cannot obtain the correct result. Determining how the proposed method can be improved to obtain the correct results in an open frame of discernment is a promising direction for future work. In addition, it is difficult to determine the adjusted coefficient (α) in Eq. (16). The paper gives only three reference values (0, 0.5, 1), but alpha can not only take any value between 0 and 1 but also take a value greater than 1. If the value of alpha is reasonable, the correct results can be obtained in examples 1, 2 and 4 when two pieces of evidence are fused. How the value range of alpha and the value of alpha corresponding to each piece of evidence can be determine has not been studied in detail. Future research should investigate the value of alpha to optimize the proposed method.

7 Conclusions

To solve the paradoxical problem of multisource information fusion, an improved combination method for conflicting evidence based on the redistribution of the BPA is proposed. By modifying the original BPAs twice, the conflict between the evidence is reduced. The proposed method not only retains the mathematical properties of D-S theory but also overcomes the disadvantages of the weighted average and the discounting method. The examples show that the proposed method is effective and feasible in dealing with the problem of the fusion of evidence in different conflicts, which is not limited to addressing the fusion of high-conflict evidence but is also applicable to the fusion of conflicting evidence in general. In addition, four actual cases are presented to demonstrate that the proposed method is able to deal with cases that cannot be solved by other methods, which expands the application of D-S theory.

In future work, we focus on how the proposed method can be improved to obtain the correct results in an open frame of discernment. In addition, how the value range of alpha and the value of alpha corresponding to each piece of evidence can be determined needs to be researched in detail.