
Citation: Hongji Xu, Shi Li, Shidi Fan, Min Chen. A new inconsistent context fusion algorithm based on BP neural network and modified DST[J]. Mathematical Biosciences and Engineering, 2021, 18(2): 968-982. doi: 10.3934/mbe.2021051
[1] | Xiong Wang, Zhijun Yang, Hongwei Ding, Zheng Guan . Analysis and prediction of UAV-assisted mobile edge computing systems. Mathematical Biosciences and Engineering, 2023, 20(12): 21267-21291. doi: 10.3934/mbe.2023941 |
[2] | Biyun Hong, Yang Zhang . Research on the influence of attention and emotion of tea drinkers based on artificial neural network. Mathematical Biosciences and Engineering, 2021, 18(4): 3423-3434. doi: 10.3934/mbe.2021171 |
[3] | Ming Chen, Yan Qi, Xinxing Zhang, Xueyong Jiang . An intelligent decision support approach for quantified assessment of innovation ability via an improved BP neural network. Mathematical Biosciences and Engineering, 2023, 20(8): 15120-15134. doi: 10.3934/mbe.2023677 |
[4] | Sukun Tian, Ning Dai, Linlin Li, Weiwei Li, Yuchun Sun, Xiaosheng Cheng . Three-dimensional mandibular motion trajectory-tracking system based on BP neural network. Mathematical Biosciences and Engineering, 2020, 17(5): 5709-5726. doi: 10.3934/mbe.2020307 |
[5] | Pu Yang, Zhenbo Li, Yaguang Yu, Jiahui Shi, Ming Sun . Studies on fault diagnosis of dissolved oxygen sensor based on GA-SVM. Mathematical Biosciences and Engineering, 2021, 18(1): 386-399. doi: 10.3934/mbe.2021021 |
[6] | Feiyan Ruan, Xiaotong Ding, Huiping Li, Yixuan Wang, Kemin Ye, Houming Kan . Back propagation neural network model for medical expenses in patients with breast cancer. Mathematical Biosciences and Engineering, 2021, 18(4): 3690-3698. doi: 10.3934/mbe.2021185 |
[7] | Hong Gao, Cuiyun Wu, Dunnian Huang, Dahui Zha, Cuiping Zhou . Prediction of fetal weight based on back propagation neural network optimized by genetic algorithm. Mathematical Biosciences and Engineering, 2021, 18(4): 4402-4410. doi: 10.3934/mbe.2021222 |
[8] | Hang Yu, Jiarui Shi, Jin Qian, Shi Wang, Sheng Li . Single dendritic neural classification with an effective spherical search-based whale learning algorithm. Mathematical Biosciences and Engineering, 2023, 20(4): 7594-7632. doi: 10.3934/mbe.2023328 |
[9] | Xinran Zhang, Yongde Zhang, Jianzhi Yang, Haiyan Du . A prostate seed implantation robot system based on human-computer interactions: Augmented reality and voice control. Mathematical Biosciences and Engineering, 2024, 21(5): 5947-5971. doi: 10.3934/mbe.2024262 |
[10] | Xiaoyan Su, Shuwen Shang, Leihui Xiong, Ziying Hong, Jian Zhong . Research on dependent evidence combination based on principal component analysis. Mathematical Biosciences and Engineering, 2024, 21(4): 4853-4873. doi: 10.3934/mbe.2024214 |
With the development and progress of information technology, such as Internet of things and big data, the context-aware computing has broad research prospects, and many continuously optimized ubiquitous computing technologies have been adopted into various application scenarios, like digital home, smart city and intelligent agriculture. As one of the core concepts of ubiquitous computing [1], context awareness has attracted attentions of many researchers [2,3,4]. It allows user-centered computing applications to provide appropriate services.
Contexts can be any information, which are used to characterize the situation of an entity. An entity is indicated to be the object that is considered relevant to the context-aware application [5]. With significant amounts of context information from different sources, such as different kinds of sensors, context-aware systems can adaptively adjust their services according to the continuously changing circumstances without attracting users' attention in order to improve the quality of experience (QoE) during the process of the human-computer interaction. For example, a digital home system with context-aware applications can control the air conditioning in bedroom by considering user's situation and the variation of air temperature automatically.
However, due to dynamic environments, heterogeneous context sources, limitation of context-aware computing resources and network delay, the raw context information from different sources is usually imperfect and uncertain [6,7], and specially the inconsistency is a kind of main uncertainty problems and should be considered very carefully [8,9]. The inconsistent information may affect the normal operation of context-aware applications, which may induce improper decisions or inappropriate services. Therefore, there is an urgent need to solve context inconsistency problem using effective means so as to provide appropriate context-aware services and enhance the user satisfaction [10,11].
To handle this problem, Dempster-Shafer theory (DST) [12], Bayesian network, association rules, rule-based method and other methods have been used for inconsistent context reasoning and fusion. In [13], Zhang et al. proposed a general context-aware application model and applied DST into the reasoning mechanism. Data collected from sensors is mapped to prior probability and then basic belief assignment (BBA) of related prior probability is calculated. According to the combination rule of DST, related BBAs are fused. A space-based context model and dynamic Bayesian network were introduced into dynamic data fusion in [14]. Space-based context model intuitively describes the relationship between the context attribute and the situation space. But there are two main limits of Bayesian method when it is used for the context fusion, one is the mutual exclusivity required for computing hypotheses, and the other is the inability to account for the general uncertainty. In [15], Al-Shargabi et al. proposed the resolving context conflict using association rules (RCCAR) algorithm to predict the valid values among conflict contexts. Lee et al. proposed a rule-based context inconsistency elimination scheme for context management in ubiquitous computing [16]. Based on the designed rule language, they determined the conditions that have the main influence on the corresponding activities, and used the condition contexts to process the inconsistent contexts. The method proposed in [17] comprehensively combined formal concept analysis, Bayesian theory, ontologies and two environment factors, i.e., time reliability and location reliability, which was beneficial for solving the context inconsistency. The quality of context (QoC) parameters were discussed as the worth of context information for a specific application in [18,19,20], which laid the foundation of self-adaptive inconsistent context processing algorithms. To prevent emergencies of patients in home-based healthcare, Lee et al. proposed a static evidential network for context reasoning based on Dezert–Smarandache theory (DSmT) [21], which is a new evidence theory popularized by DST. The context reasoning engine assigned evidence belief degree to sensor data based on the DSmT. A discounting factor was introduced into the method to express the degree of sensor data's unreliability and uncertainty. However, it did not support dynamic weighting factors.
To improve system's performance, DST or DSmT has been combined with many different methods. In [22], Chen et al. combined group neural network with DST in a two level fusion structure, which enhanced the anti-interference capacity of system. A data fusion method based on support vector machine (SVM), extreme learning machine (ELM) and DST was proposed for customer recognition [23]. Zhao et al. proposed a data fusion algorithm based on fuzzy set theory and DST, combining attribute evidence with the reliability of physical nodes in sensor networks to improve decision accuracy and reduce data redundancy [24]. From the perspective of QoC, we proposed an index OQoC to measure the comprehensive context quality, which is combined with DST to eliminate context inconsistency [25].
However, the above-mentioned methods still cannot meet the accuracy requirements of the systems in some specific scenarios. In view of this limitation, the main contributions of this paper are as follows: Firstly, by modifying the combination rule of DST, adaptive redistribution of conflicting information is realized. Secondly, a new inconsistent context fusion method by combining back propagation (BP) neural network with modified DST is presented in this paper. It can help context-aware system to take full advantage of all contexts from different sources and perform context-aware tasks effectively. Thirdly, the validity of the proposed method is verified in personal identity verification (PIV) application scenarios, optimizing the processing scheme of inconsistency for different scenarios in the field of signal processing.
The rest of the paper is organized as follows: Section 2 describes the overall framework and the specific processing steps of the proposed inconsistent context fusion algorithm. We present the performance of evaluation and experiment results, and give a comprehensive discussion in Section 3. Finally, Section 4 states the conclusion and the future outlook.
In the typical smart spaces, there are different context information sources providing raw context information for context reasoning and fusion.
We can preprocess the raw context information according to the state-space-based context model, which was defined in [26]. For example, the raw information related to user's situation is collected by different context sources. A context state from one source can be denoted as Sα=(a1,a2,⋯,aK), and S′α=(a′1,a′2,⋯,a′K) can be defined as another context state information from a different source. Then context-aware system infers the situation by BP neural network with different context state Sα and S′α. Each neural network is responsible for the situation recognition of one context source. And we test the accuracy of each BP neural network before the context situation reasoning and define it as a control factor for combination rule. The neural network outputs are normalized as the mass functions and combined according to the modified DST rule. Finally, the result will be determined by fusion output.
The framework and specific procedure of the proposed inconsistent context fusion algorithm are shown in Figures 1 and 2, respectively, and the processing steps are explained as follows.
In this step, we gather the raw context information from several context sources and preprocess the contexts according to the state-space-based context model. By modeling the context and dividing the situation space, the raw context information can be classified by BP neural networks and transformed into situation recognition information.
1) Context Attribute: A context attribute, denoted by ai, is defined as any type of information that can help infer relevant entity's situation. Context attributes are often associated with context information sources, and context attributes from different sources have different forms and are usually inconsistent. For example, the location attribute from user's smart watch may be in conflict with the context attribute inferred from ID card recognition.
2) Context State: Context state is a collection of K context attribute values, which is the input of BP neural networks and can be used to infer the entity's situation. It is denoted by Sα=(a1,a2,⋯,aK), where ai corresponds to the value of the i-th context attribute.
3) Situation Space: Ri=(aR1,aR2,⋯,aRK) is a set of regions in situation space and represents the situation of interested entity (e.g., indoor or outdoor), consisting of K acceptable regions for these attributes. An acceptable region aRi is defined as a collection of elements V which satisfies a predication P, i.e., aRi={V|P(V)}. The special context information can be performed or associated with a certain region.
As we can see in Figure 3, Sα is a context state inside the situation subspace Ri, ax, ay, azare three different attributes, respectively, and the acceptable ranges make up the situation subspace.
The BP neural network has been applied to solve diverse problems successfully by training with a supervised manner, which is also one of the most widely used models of the neural network. In this step, we define the context state Sα=(a1,a2,⋯,aK) as the input of BP neural network. Each context source is associated with a BP neural network. So we can transform the context state into high level context information. In output layer, we set output function as "logsig" to limit the output in the range of [0, 1] and each output neuron is corresponding to an acceptable region in situation space.
First, we train the BP neural networks and test their accuracy, and then define a control factor Ci to represent the credibility of the i-th BP neural network which equals to the correct rate of the i-th BP neural network.
Then the BP neural network is used to recognize the entity's situation.
In this step, we use the DST to establish recognition framework [27,28]. There are some basic definitions in DST.
Definition 1: The recognition framework Θ is defined as an exhaustive set of mutually exclusive events.
Let Θ={θ1,θ2,⋯,θN} be a finite set of possible situations, where θi denotes a possible situation which can be recognized by BP neural network.
Definition 2: If for any subset A of recognition framework Θ, we can get m(ϕ)=0 and ∑A⊂Θm(A)=1, then m will be called the BBA function and denoted by m:2Θ→[0,1].
If m(A)>0, then A is a focal element of the recognition framework Θ.
Definition 3: The belief function for subset B in the recognition framework Θ is defined as:
Bel(B)=∑A⊆Bm(A). | (1) |
In this algorithm, recognition framework is the exhaustive set of mutually exclusive situations and we define each situation as a focal element θi.
For example, for the recognition framework Θ={A,B,C}, it supposes that Aout can be the recognition result of output neuron about situation A.
Output neuron's recognition results of each BP neural network can be seen as a BBA of recognition framework Θ, which is defined by:
mi(A)=AoutAout+Bout+Cout. | (2) |
Because the raw context information from different sources could be inconsistent, it is imprecise to fusion the BBA by traditional DST rule. Therefore, we propose a modified DST combination rule to enhance the accuracy of the fusion results.
Assume that m1 and m2 are BBA functions of the recognition framework Θ for two sources S1 and S2. θ1,θ2,⋯,θi⋯,θN are the focal elements of m1 and θ′1,θ′2,⋯,θ′j⋯,θ′N are the focal elements of m2.
The Dempster's basic combination rule [27] of m1 and m2 can be expressed as follows:
m(X)=∑θi∩θ′j=Xm1(θi)m2(θ′j)1−K12subjectto:K12=∑θi∩θ′j=ϕm1(θi)m2(θ′j). | (3) |
However, DST would give imprecise and counterintuitive fusion results when the context information acquired from different sources are highly conflictive.
To combine the conflict information, Murphy et al. proposed an average rule [29], which is defined as follows:
m(X)=∑θi⊂Xm1(θi)+∑θ′j⊂Xm2(θ′j)k | (4) |
where k is the number of BP neural networks.
Introducing control factor Ci into the average rule, we can get the weighted average rule, which can be expressed as:
m(X)=∑θi⊂XC1m1(θi)+∑θ′j⊂XC2m2(θ′j)C1+C2. | (5) |
Firstly, we propose a modified weighted average rule that is defined as follows:
m(X)=m∩(X)+∑θi⊂XC1m1(θi)+∑θ′j⊂XC2m2(θ′j)C1+C2K12 | (6) |
where m∩(X)=∑θi∩θ′j=Xm1(θi)m2(θ′j).
Then we combine Eq (6) with the self-adaptive fusion algorithm based on DST and DSmT [30] and get the weighted self-adaptive DST synthesis principle, which can be expressed as:
m(X)=m∩(X)+σK12m∩(X)+P(X)1−σK12 | (7) |
where P(X)=(1−σ)∑θi⊂XCn1m1(θi)+∑θ′j⊂XCn2m1(θ′j)Cn1+Cn2K12, σ=(Cn1+Cn2)/n, and n is a factor to control the effect of C1 and C2.
As σ changes, the fusion result would be different and the conflict information will be distributed to different hypotheses. When σ is equal to 1, the fusion result will be the same as that of the Dempster's rule; when σ goes to 0, it will approach to the result of Eq (6); when σ∈(0,1), part of the conflict will be redistributed by control factor and the rest will be distributed averagely and then the new algorithm is the synthesis of the modified weighted average and the DST combination rules. Therefore, the system can get more preferable fusion results.
In this section, the performance of the proposed algorithm is evaluated through several experiments and also compared with some other peer methods.
In order to verify the superiority of the proposed algorithm, we choose the typical scenario of multi-source context information, i.e., PIV system as the application example, and of course the proposed algorithm can also be applied to other intelligent scenarios, such as smart medical treatment and smart prison.
As we know, PIV system is of great importance to security and is wildly used in digital home and many social security scenarios. The typical identity recognition technologies usually make use of many different sensors, such as identity card, fingerprint, voice, iris and face image. In the experiments of this paper, five sensors are placed in different locations to detect and confirm user's identity. The contexts collected from which belong to the same type that has only two states to represent the user's identity is correct or not. Assume that the number of context information collected by one sensor is 8000, therefore the number of total context information provided by context sources is 40,000. To get stable results, we repeat the experiment 1000 times and get the average of context aware rates as the final results.
We choose the context aware rate CCAR [31,32] to evaluate the performance of several inconsistent context processing algorithms including the proposed weighted self-adaptive algorithm, the trust-worthiness based algorithm [33], the voting algorithm [34], the user feedback based context selection algorithm [31], and the DST algorithm [13].
CCAR is defined as follows:
CCAR=CcorCtot | (8) |
where Ccor denotes the number of correct information calculated by context processing algorithms and Ctot is the number of total context information provided by context sources.
Table 1 shows the abbreviations used in the performance evaluation of inconsistent context processing.
Symbols | Meaning |
A-wsa | The proposed weighted self-adaptive algorithm |
A-tw | The algorithm based on trust-worthiness [33] |
A-vote | The algorithm based on voting [34] |
A-fb | The context-aware selection algorithm based on user feedback [31] |
A-DST | The DST algorithm [13] |
The control factor Ci is computed by using user feedback data, and the user feedback rate is set to be a suitable value 1%. The control factor Ci is defined as follows:
Ci=Ri−fbTi−fb | (9) |
where Ti−fb denotes the total number of user feedback and Ri−fb denotes the number of correct context information provided by context source when user feedback occurs.
In this experimental part, we assume that the five sensors used to provide context information have different error rates, which mean the ratio of wrong context information. Therefore, we can choose the error rate to simulate different situations and approximate real application states.
The error rate of every context source can be defined as follows:
Errorrate=nEnT | (10) |
where nE denotes the number of error context information, and nT denotes the total number of context information.
Table 2 shows an example of the error rates of five context information sources in the experiments, where Ei denotes the error rate of the i-th context information source. We try to consider different combinations of error rates for five sources to cover different conditions, and of course we can choose more values to do the simulations next step.
Experiment No. | Error rates of five context information sources (%) |
Experiment No.1 | E1=0−0.5, E2=0.05, E3=0.05, E4=0.05, E5=0.05 |
Experiment No.2 | E1=0−0.5, E2=0.05, E3=0.05, E4=0.05, E5=0.35 |
Experiment No.3 | E1=0−0.5, E2=0.05, E3=0.05, E4=0.35, E5=0.35 |
Experiment No.4 | E1=0−0.5, E2=0.05, E3=0.35, E4=0.35, E5=0.35 |
Experiment No.5 | E1=0−0.5, E2=0.35, E3=0.35, E4=0.35, E5=0.35 |
Firstly, the A-wsa algorithm is simulated with six sets of context sources, which have different error rates, to identify the best n in the experiments, n is a factor to control the effect of Ci.
Figure 4 illustrates the influence of n in different conditions. The error rates of the context information sources are listed in the legend area of Figure 4, which can be seen as different conditions.
From Figure 4, we can see that the A-wsa algorithm gets the best performance when n = 3. So we set n to be 3 in experiments No.1 to No.5.
In the following experiments No.1 to No.5, Figures 5–9 illustrate the performances of five inconsistent context processing algorithms under different conditions where the error rates of context information sources vary with the relation according to Table 2.
Figure 5 shows the performance of five context information processing algorithms in experiment No.1. It can be seen that the context aware rate of the A-wsa algorithm is almost the same as the A-vote algorithm and better than the other algorithms.
Figure 6 illustrates the context aware rate of five inconsistent context processing algorithms in experiment No.2. We can see that when the error rate of S1 changes from 0 to 0.1, the A-wsa algorithm can get the best performance, which is almost equal to the context aware rate of the A-vote algorithm. When the error rate of S1 is larger than 0.1, the context aware rate of the A-wsa algorithm is better than the other algorithms and keep stable around 0.99.
As shown in Figure 7, the context aware rates of five inconsistent context information processing algorithms decrease when the error rate of context information source S1 increases. We can see that the performance of the A-wsa algorithm is better than the other algorithms as error rate of context information source S1 increases from 0.05 to 0.5. When the error rate of context information source S1 is 0, the context aware rate of the A-wsa algorithm is 0.9963 and which is better than that of the A-vote algorithm and the A-DST algorithm. When error rate of context information source S1 is 0.5, the A-wsa algorithm gets a good performance and the context aware rate is 0.9629. We can see that the performance of the A-wsa algorithm is relatively steady.
In Figure 8, the performances of five inconsistent context information processing algorithms are presented. We can see that as the error rate of context information source S1 changes from 0.05 to 0.2, the A-wsa algorithm obtains the best performance among the five algorithms. The context aware rate of the A-wsa algorithm is lower than that of the A-tw algorithm, when the error rate of context information source S1 changes from 0.2 to 0.5. The difference of context aware rates is 0.101 when the error rate of context information source S1 gets to be 0.5.
Figure 9 shows the results of experiment No.5 and gives a comparison of context aware rate of five inconsistent context information processing algorithms. We can see that the performance of the A-wsa algorithm is similar to that of the A-fb algorithm. Meanwhile, the A-wsa algorithm gets performance enhancement compared to other algorithms when the error rate of context information source S1 is 0.15.
The performances of context processing in Figures 5–9 show that the advantages of the proposed algorithm in context information fusion. For instance, in Figure 7, the improvement of the context aware rate by the proposed algorithm is 2.41% compared to the A-vote algorithm, 3.15% compared to the A-tw algorithm, the A-fb algorithm, and the A-DST algorithm.
In this paper, a new inconsistent context fusion algorithm based on BP neural network and modified DST is presented. Through modeling the raw context information collected from different sources on the basis of the state-space-based context model, the situation of entities can be recognized with the help of BP neural network. Then the recognition framework can be built based on the modification of DST. We transform the output of neural network into the BBAs of different situations which can be treated as the focal elements of the recognition framework. Through the correct rates, the fusion result is improved by adjusting the conflict redistribution on the focal elements. The experiment results show that the proposed weighted self-adaptive rule can obtain better context fusion results compared to other inconsistent context processing algorithms in most cases by setting up different error rates, so we can get the conclusion that the proposed algorithm has good accuracy and robustness.
In future's work, we plan to delve into BP neural network to improve the algorithm and apply it to more real-world scenarios to deal with the inconsistency problem of complex multi-modal contexts.
This work was financially supported by the National Key Research and Development Program of China (2018YFC0831001) and the Natural Science Foundation of Shandong Province of China (ZR2020MF139).
All authors declare that they have no conflict of interest.
[1] | W. N. Schilit, A system architecture for context-aware mobile computing, PhD thesis, Columbia University, 1995. |
[2] | V. T. Anh, P. Q. Cuong, P. C. Vinh, Context-aware mobility in internet of thing: A survey, EAI Endorsed Trans. Context Aware Syst. Appl., 6 (2019), 1–5. |
[3] | J. Aguilar, M. Jerez, T. Rodríguez, CAMeOnto: Context awareness meta ontology modeling, Appl. Comput. Inf., 14 (2018), 202–213. |
[4] | B. Rakita, Z. Bundalo, D. Bundalo, M. Sajic, Context-aware smartphone applications based on generic context supervision services, Proceedings of the 2018 26th Telecommunications Forum, 2018. |
[5] |
H. D. Vianna, J. L. Barbosa, A scalable model for building context-aware applications for noncommunicable diseases prevention, Inf. Proces. Lett., 148 (2019), 1–6. doi: 10.1016/j.ipl.2019.03.010
![]() |
[6] | Y. Li, Y. Pang, J. Shen, J. Cao, L. Shao, NETNet: Neighbor Erasing and Transferring Network for Better Single Shot Object Detection, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, 2020. |
[7] | X. Jiang, Y. Pang, M. Sun, X. Li, Cascaded subpatch networks for effective CNNs, IEEE Trans. Neural Network Learn. Syst., 29 (2018), 2684–2694. |
[8] | H. Xu, L. Wang, H. Xiong, Z. Du, Z. Xie, Effective context inconsistency elimination algorithm based on feedback and reliability distribution for IoV, China Commun., 11 (2014), 16–28. |
[9] | A. A. Al-Shargabi, F. Siewe, A. Zahary, Quality of context in context-aware systems, EAI Endorsed Trans. Context Aware Syst. Appl., 17 (2017), 1–25. |
[10] | D. Zheng, J. Wang, B. Kerong, Research of QoC based management for complex sensor networks applications, Proceedings of the IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, 2014. |
[11] |
S. Bobek, G. J. Nalepa, Uncertainty handling in rule-based mobile context-aware systems, Pervasive Mob. Comput., 39 (2017), 159–179. doi: 10.1016/j.pmcj.2016.09.004
![]() |
[12] | V. Venkatesh, P. Raj, T. S. Praba, R. Anushiadevi, Cloud-based Dempster-Shafer theory (CDST) for precision-centric activity recognition in smarter environments, Data Eng. Commun. Technol., 7 (2020), 881–891. |
[13] | J. Zhang, S. Zhang, J. Yang, P. Zhang, Reasoning mechanism based on the Demspter-Shafer evidence theory for pervasive context aware computing application, Proceedings of Communications and Networking, 2006. |
[14] | Q. Jiang, R. Tang, P. Liu, Y. Qiu, H. Xu, Research on dynamic data fusion algorithm based on context awareness, Proceedings of Informatics and Computing, 2014. |
[15] | A. A. Al-Shargabi, F. Siewe, Resolving context conflicts using association rules (RCCAR) to improve quality of context-aware systems, Proceedings of the 8th International Conference on Computer Science and Education, 2013. |
[16] | Y. Lee, J. Lim, S. J. Hyun, D. Lee, Rule-based approach for context inconsistency management scheme in ubiquitous computing, Proceedings of IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010. |
[17] | X. Li, G. Li, A hybrid context inconsistency resolution method, Proceedings of the 7th International Conference on Intelligent Human-Machine Systems and Cybernetics, 2015. |
[18] | X. Yang, An adaptive mechanism for inconsistent context resolution in ubiquitous computing, Proceedings of the International Conference on Control Engineering and Communication Technology, 2012. |
[19] | A. Manzoor, H. L. Truong, S. Dustdar, On the evaluation of quality of context, Proceedings of 3rd European Conference of Smart Sensing and Context, 2008. |
[20] |
A. Manzoor, H. L. Truong, S. Dustdar, Quality of context: Models and applications for context-aware systems in pervasive environments, Knowl. Eng. Rev., 29 (2014), 154–170. doi: 10.1017/S0269888914000034
![]() |
[21] |
H. Lee, J. S. Choi, R. Elmasri, A static evidential network for context reasoning in home-based care, IEEE Trans. Syst. Man Cybern., 40 (2010), 1232–1243. doi: 10.1109/TSMCA.2010.2046733
![]() |
[22] | Y. Chen, Q. Huang, Y. Chen, An improve information fusion algorithm based on BP neural network and DS evidence theory, Proceedings of Digital Manufacturing and Automation, 2012. |
[23] | J. Wang, Z. Huang, G. Duan, An information fusion model of customer identification based on ELM-SVM-DS, Proceedings of Information Management, Innovation Management and Industrial Engineering, 2010. |
[24] |
G. Zhao, A. Chen, G. Lu, W. Liu, Data fusion algorithm based on fuzzy sets and D-S theory of evidence, Tsinghua Sci. Technol., 25 (2020), 12–19. doi: 10.26599/TST.2018.9010138
![]() |
[25] |
M. Chen, H. J. Xu, H. L. Xiong, L. Pan, B. Du, F. Li, A new overall quality indicator OQoC and the corresponding context inconsistency elimination algorithm based on OQoC and Dempster-Shafer theory, Soft Comput., 24 (2020), 10829–10841. doi: 10.1007/s00500-019-04585-0
![]() |
[26] | A. Padovitz, S. W. Loke, A. Zaslavsky, B. Burg, C. Bartolini, An approach to data fusion for context awareness, Proceedings of International and Interdisciplinary Conference on Modeling and Using Context, 2005. |
[27] | A. P. Dempster, Upper and lower probabilities induced by a multivalued mapping, Classic Works of the Dempster-Shafer Theory of Belief Functions, 2008. |
[28] |
W. Jiang, M. Zhuang, C. Xie, J. Wu, Sensing attribute weights: A novel basic belief assignment method, Sensors, 17 (2017), 721–741. doi: 10.3390/s17040721
![]() |
[29] |
C. K. Murphy, Combining belief functions when evidence conflicts, Decis. Support Syst., 29 (2000), 1–9. doi: 10.1016/S0167-9236(99)00084-6
![]() |
[30] | X. Yu, Q. Zhou, Y. Li, J. An, Z. Liu, A new self-adaptive fusion algorithm based on DST and DSmT, Proceedings of Information Fusion, 2014. |
[31] |
B. H. Lee, D. H. Kim, Efficient context-aware selection based on user feedback, IEEE Trans. Consum. Electron., 58 (2012), 978–984. doi: 10.1109/TCE.2012.6311345
![]() |
[32] |
M. Ji, H. Xu, L. Wang, J. Dang, Z. Xu, H. Fang, Approach of measuring PoC of context using limited self-feedback in context-aware systems, IET Wirel. Sens. Syst., 6 (2016), 158–165. doi: 10.1049/iet-wss.2015.0132
![]() |
[33] | Y. Kim, K. Lee, A quality measurement method of context information in ubiquitous environments, Proceedings of International Conference on Hybrid Information Technology, 2006. |
[34] |
D. F. McAllister, C. E. Sun, M. A. Vouk, Reliability of voting in fault-tolerant software systems for small output-spaces, IEEE Trans. Reliab., 39 (1990), 524–534. doi: 10.1109/24.61308
![]() |
1. | Yiqin Bao, Hongbing Lu, Qiang Zhao, Zhongxue Yang, Wenbin Xu, Detection system of dead and sick chickens in large scale farms based on artificial intelligence, 2021, 18, 1551-0018, 6117, 10.3934/mbe.2021306 | |
2. | Hailing Sun, Mohamed Elhoseny, Prediction of Building Energy Consumption Based on BP Neural Network, 2022, 2022, 1530-8677, 1, 10.1155/2022/7876013 | |
3. | Shuting Chen, Sen Xu, Xinmiao Hu, Anqing Chen, Samir Ladaci, Suresh Kaswan, 2023, Distribution substation heavy overload data processing method based on BP neural network, 9781510667662, 140, 10.1117/12.2686649 |
Symbols | Meaning |
A-wsa | The proposed weighted self-adaptive algorithm |
A-tw | The algorithm based on trust-worthiness [33] |
A-vote | The algorithm based on voting [34] |
A-fb | The context-aware selection algorithm based on user feedback [31] |
A-DST | The DST algorithm [13] |
Experiment No. | Error rates of five context information sources (%) |
Experiment No.1 | E1=0−0.5, E2=0.05, E3=0.05, E4=0.05, E5=0.05 |
Experiment No.2 | E1=0−0.5, E2=0.05, E3=0.05, E4=0.05, E5=0.35 |
Experiment No.3 | E1=0−0.5, E2=0.05, E3=0.05, E4=0.35, E5=0.35 |
Experiment No.4 | E1=0−0.5, E2=0.05, E3=0.35, E4=0.35, E5=0.35 |
Experiment No.5 | E1=0−0.5, E2=0.35, E3=0.35, E4=0.35, E5=0.35 |
Symbols | Meaning |
A-wsa | The proposed weighted self-adaptive algorithm |
A-tw | The algorithm based on trust-worthiness [33] |
A-vote | The algorithm based on voting [34] |
A-fb | The context-aware selection algorithm based on user feedback [31] |
A-DST | The DST algorithm [13] |
Experiment No. | Error rates of five context information sources (%) |
Experiment No.1 | E1=0−0.5, E2=0.05, E3=0.05, E4=0.05, E5=0.05 |
Experiment No.2 | E1=0−0.5, E2=0.05, E3=0.05, E4=0.05, E5=0.35 |
Experiment No.3 | E1=0−0.5, E2=0.05, E3=0.05, E4=0.35, E5=0.35 |
Experiment No.4 | E1=0−0.5, E2=0.05, E3=0.35, E4=0.35, E5=0.35 |
Experiment No.5 | E1=0−0.5, E2=0.35, E3=0.35, E4=0.35, E5=0.35 |