1 Introduction

Data fusion has always been a hot topic of research. Many theories proposed to address it, such as the Dempster-Shafer evidence theory (Xiao 2020; Fei and Wang 2022), information fusion in quantum theory (Xiao and Pedrycz 2022; Deng et al. 2023), entropy-based approaches (Pan and Gao 2023; Yang et al. 2022; Zhou et al. 2021), possibility theory (Solaiman and Bossé 2019; Zhou et al. 2022).

Among these methods, the Dempster-Shafer evidence theory has gotten a lot of attention. Compared to probability theory, it requires fewer conditions and can handle uncertain information such as fuzzy, missing, and contradictory information. Therefore it is widely used in decision-making (Xiao 2019; Song et al. 2019; Liao et al. 2020), risk analysis (Chen and Deng 2022; Liang et al. 2021), uncertainty measurements (Moral-García and Abellán 2021; Meng et al. 2020), classification system (Li et al. 2023a), pattern classification (Zhun-Ga Liu et al. 2019; Huang and Xiao 2023; Xiao et al. 2022a), information fusion (Xiao 2022; Xinyang et al. 2022; Xiao et al. 2022b), group decision making settings (Li et al. 2023b; Zhang and Li 2022). Dempster’s combination rule is a crucial method for multi-source combination. But when fusing the highly conflicting evidences, counter-intuitive conditions often occur.

Zadeh (1979) presented an example to illustrate the drawback of the combination rule, that has caused widespread concern. Dealing with contradictory evidence has been extensively researched. The solutions can be divided into two kinds: improving the combination rules and modifying the data model. Yager (1987), Dubois and Prade (1992), Smets (1990) and Lefevre et al. (2002) proposed other combination rules. In addition, Murphy (2000) presented an improved combination rule, which evenly distributes the basic probabilities of the collected evidence. Then, a weighted average in terms of the similarity of evidences was presented for conflict management (Zhang and Deng 2019). Furthermore, several recent works were reported in this area. Liu et al. proposed a new classifier fusion method (Liu et al. 2020). A geometric approach to the theory of evidence was proposed by Cuzzolin (2008). Abellan et al. presented a new hybrid rule and analyzed the mathematical properties Abellán et al. (2021). A method of dealing with high conflicts from the perspective of the network was proposed by Xiong et al. (2021). Deng et al. proposed a method can handle conflicting evidence and produce a fused result that reflects the degree of agreement among the source (Deng et al. 2021). In various fields, conflict management remains a widely discussed and relevant topic.

Yager (1987) pointed out that the normalization of the combination rule is the main reason for counter-intuitive results. To address this issue, the conflict is assigned to the total ignorance set \(\varTheta \) without the normalization step. Yager’s method partially mitigates the counter-intuitive situation of Dempster’s combination rule. However, there are two shortcomings. One is that the convergence rate is relatively slow, and the other is that the uncertainty degree is relatively high. The main reason is that almost all conflicts are not utilized. If all of the conflict is assigned to \(\varTheta \), it would result in the loss of some useful information. In fact, the conflict information contains certain information that could be utilized.

To overcome the problem discussed above, a novel conflict allocation method is proposed. The main contribution is to assign the conflicting mass to the power set (Song and Deng 2021), rather than the total ignorance set. The proposed method offers significant advantages, mainly due to its capability of integrating high-conflict evidence while minimizing the loss of information and accurately identifying the target. Compared to other methods, it shows superior convergence performance and reduces computational complexity. Furthermore, the proposed method supports sequential fusion, making it appropriate for high real-time update systems.

This paper is structured as follows. In Sect. 2, a brief overview of the concepts of Dempster-Shafer evidence theory and a discussion of Yager’s rule. In Sect. 3, a novel method that assigns the conflicting mass to the power set is proposed. The framework and pseudo code of the proposed method are also provided. In Sect. 4, some numerical examples are presented to compare it with other commonly methods. Concluded in Sect. 5.

2 Preliminaries

In this section, brief introductions to previous knowledge are presented.

2.1 Dempster-Shafer evidence theory

Dempster-Shafer evidence theory was first proposed by Dempster (2008) and then expanded by Shafer (1976). It has been researched ever since (Deng 2020; Song et al. 2018; Deng and Jiang 2020), and some applications are being studied in fault diagnosis (Gong et al. 2018) and human reliability analysis (Gao et al. 2021).

2.1.1 Frame of discernment

Let \(\varTheta \) be a fixed set of n exclusive and exhaustive elements, called the framework of discernment (FOD), defined as follows (Shafer 1976):

$$\begin{aligned} \varTheta = \{\theta _1, \theta _2,..., \theta _n\}. \end{aligned}$$
(1)

The power set of \(\varTheta \) is denoted as \(2^\varTheta \), and has \(2^n\) elements, \(2^\varTheta \) is indicated by:

$$\begin{aligned} 2^\varTheta= & {} \{\emptyset , \{\theta _1\}, \{\theta _2\},..., \{\theta _n\}, \{\theta _1,\theta _2\},..., \nonumber \\{} & {} \{\theta _1,\theta _n\},..., \{\theta _1,...,\theta _{n}\},..., \varTheta \}. \end{aligned}$$
(2)

It is different from power sets, as a new type of set called random permutation set have been proposed (Deng 2022). It has received a lot of attention (Zhou et al. 2023; Chen et al. 2023).

2.1.2 Mass function

For \(\varTheta \), the basic probability assignment (BPA), also known as the mass function, can be defined as follows (Shafer 1976):

$$\begin{aligned} m: 2^\varTheta \rightarrow [0, 1], \end{aligned}$$
(3)

constrained conditions as follows:

$$\begin{aligned} \left\{ \begin{array}{lr} \sum \limits _{A \in 2^{\varTheta }} m(A)= 1,\\ m(\emptyset ) = 0. \end{array} \ \right. \end{aligned}$$
(4)

If \(A \in 2^{\varTheta }\) and \(A \ne {\emptyset }\), m(A) represents the degree of belief in the supporting evidence A. The larger m(A), the stronger the evidence that proves. There are some studies about mass function (Xiao 2021; Han et al. 2016; Chen et al. 2021), which has been used in many fields. Related references include (Deng and Jiang 2022; Chang et al. 2021).

2.1.3 Dempster’s combination rule

Given two BPAs \(m_1\) and \(m_2\), their combination \(m_1 \bigoplus m_2\) can be mathematically defined as follows (Shafer 1976):

$$\begin{aligned} m(A) = \left\{ \begin{array}{lr} \frac{1}{1-k} \sum \limits _{B \bigcap C = A }m_1(B)m_2(C) &{}A\ne \emptyset ,\\ 0 &{}A= \emptyset , \end{array} \ \right. \end{aligned}$$
(5)

where A, B, C \(\in 2^\varTheta \), k is a normalization factor,

$$\begin{aligned} k =\sum \limits _{B \bigcap C = \emptyset }m_1(B)m_2(C). \end{aligned}$$
(6)

The conflict coefficient k represents the degree of conflict between two BPAs. When \(k = 0\) indicates that \(m_1\) and \(m_2\) are consistent with each other, while \(k = 1\) means that \(m_1\) and \(m_2\) are completely contradictory. In other words, the two pieces of evidence strongly support different hypotheses that are incompatible with each other. However, it should be noted that when combining highly contradictory evidence using Dempster’s combination rule, the resulting conclusion may be counter-intuitive (Zadeh 1979).

2.2 Yager’s rule

Yager proposed a rule to overcome the counter-intuitive problem of the Dempster’s combination rule, which can be described as (Yager 1987):

$$\begin{aligned} m_{Y}(A) = \left\{ \begin{array}{lr} \sum \limits _{B \bigcap C = A }m_1(B)m_2(C) &{}A\ne \emptyset , A\subset \varTheta , \\ \ \ 0 &{}A = \emptyset ,\\ \sum \limits _{B \bigcap C = \varTheta }m_1(B)m_2(C) + k &{}A = \varTheta , \end{array} \right. \end{aligned}$$
(7)

where A, B, C \(\in 2^\varTheta \), k is conflicting mass,

$$\begin{aligned} k =\sum \limits _{B \bigcap C = \emptyset }m_1(B)m_2(C). \end{aligned}$$

Yager’s rule proposes to allocate conflicting mass k to the total ignorance set \(\varTheta \). However, it remains to be discussed whether this approach to managing conflicts is reasonable or not (Yang and Dong-Ling 2013).

2.3 Murphy’s rule

Suppose there are n BPAs \(m_1, m_2,..., m_n\) on \(\varTheta \), Murphy’s rule is expressed as (Murphy 2000),

$$\begin{aligned} m_{AM}(A) = \frac{1}{n} \sum _{i=1}^n m_i(A). \end{aligned}$$
(8)

Then use Eq. (5) and Eq. (6) combine \(m_{AM(A)}\) n - 1 times to get \(m_{M}(A)\). In Murphy’s rule, all BPAs are assigned to the equal weight without taking into account the difference or similarity among different BPAs.

Fig. 1
figure 1

The situations of taking balls out of the box. a When there are two balls in the box, there are three possible outcomes when taking balls out of the box. b When there are three balls in the box, there are seven possible outcomes when taking balls out of the box

Fig. 2
figure 2

The framework of ACTP

3 The proposed method

A reasonable method for conflict management named ACTP is proposed in this section. The corresponding framework is shown in Sect. 3.1. The proposed algorithm is illustrated in Sect. 3.2. A simple example is provided in Sect. 3.3.

3.1 Assign conflict to the power set (ACTP)

Example 1

Suppose \(\varTheta = \{A, B\}\), two BPAs as follows,

$$\begin{aligned} \begin{aligned}&m_1:m_1(\{A\}) = 1, m_1(\{B\}) = 0, \\&m_2:m_2(\{A\}) = 0, m_2(\{B\}) = 1. \end{aligned} \end{aligned}$$

As shown in Example 1, it can be seen that \(m_1\) and \(m_2\) are completely opposite. If we apply Yager’s rule, \(m_Y(\{A\}) = m_Y(\{B\}) = 0\), \(m_Y(\{\varTheta \})\) = 1. Obviously, after the conflict is given to \(\varTheta \), the result is unreasonable.

Suppose there are two balls of different colors in an opaque box. If we take the ball or balls out of the box, then we can get three \((2^2-1=3)\) situations with the same possibility as shown in Fig. 1a. If there are three balls of different colors, then there are seven \((2^3-1=7)\) situations with the same possibility as shown in Fig. 1b. The main idea of the proposed method is assigning conflict to all situations with the same possibility, that is, all elements in the power set except empty set. By doing this, useful information will not be lost and will be distributed reasonably.

A novel combination rule for conflict management in data fusion which assigns conflict to the power set (ACTP) is proposed. The framework of ACTP is described as Fig. 2. In FOD \(\varTheta = \{\theta _1, \theta _2,..., \theta _n\}\), assume \(m_1,m_2...m_x\) are x pieces of evidence. The power set \(2^\varTheta \) contains \(2^n\) elements. Conflicting mass k is assigned to all elements in the power set except empty set. In this way, k is divided into \({2^n-1}\) parts. We can then utilize the proposed rule to combine the evidence and derive the final combined result.

Table 1 The results of different methods for Example 3
Table 2 The results of different methods for Example 4

3.2 The proposed algorithm

Let \(\varTheta \) be a fixed set, which has n mutually exclusive and exhaustive elements. The power set of \(\varTheta \) is \(2^\varTheta \), in which the number of elements is \(2^n\). The formula is given as:

$$\begin{aligned} \textbf{k}_{AP} = \frac{k}{2^n-1}, \end{aligned}$$
(9)

where k is defined in Eq. (6) and n represents each subset of the power set \( 2^{\varTheta }\) except empty set. \(\textbf{k}_{AP}\) is used to redistribute the conflicting mass, which divides k into \(2^n-1\).

For example, given a FOD with 4 elements,

\(\displaystyle \textbf{k}_{AP} = \frac{k}{2^4-1}=\frac{k}{15}.\)

As shown in the example, conflict is divided into 15 on average.

Given two BPAs \(m_1\) and \(m_2\). For the combination of \(m_1\) \(\bigoplus \) \(m_2\), the resulting mass denoted \(m_{AP}\) is given as:

$$\begin{aligned} m_{AP}(A) = \left\{ \begin{array}{lr} \sum \limits _{B \bigcap C =A }m_1(B) m_2(C) + \textbf{k}_{AP} , &{}A\ne \emptyset ,\\ \\ 0, &{}A= \emptyset , \end{array} \ \right. \end{aligned}$$
(10)

A denotes all subsets in \(\varTheta \) excluding the empty set \(\emptyset \), and \(m_{AP}(A)\) represents the belief value that support the proposition A.

3.3 A simple example

A simple example to show the calculation of ACTP.

Example 2

Suppose \(\varTheta = \{A, B, C\}\), two BPAs as follows,

$$\begin{aligned} \begin{aligned}&m_1:m_1(\{A\}) = 0.6, m_1(\{C\}) = 0.2, m_1(\{A, B\}) = 0.2, \\&m_2:m_2(\{B\}) = 0.7, m_2(\{A, B, C\}) = 0.3. \end{aligned} \end{aligned}$$

As shown in Example 2, it can be seen that the value of \(m_1\) supports the object A and \(m_2\) support the object B, while \(m_1(\{A\}) = 0.6\) and \(m_2(\{B\}) = 0.7\). They also have multiple objects, while \(m_1(\{A, B\}) = 0.2\) and \(m_2(\{A, B, C\}) = 0.3\). The calculation processes are given as follows:

First calculate the conflicting mass k according to Eq. (6),

$$\begin{aligned} \begin{aligned} k&= m_1(\{A\})\times m_2(\{B\})+m_1(\{C\})\times m_2(\{B\}) \\&= 0.6\times 0.7+0.2\times 0.7=0.56. \end{aligned} \end{aligned}$$

Then, get the \(\textbf{k}_{AP}\) according to Eq. (9),

$$\begin{aligned} \textbf{k}_{AP} = \frac{k}{2^n-1}=\frac{0.56}{2^3-1}= 0.08. \end{aligned}$$
Table 3 Five BPAs in Example 5
Table 4 Results of different methods for Example 5
Table 5 Results of different methods for Example 5

Finally, using the combination rules based on Eq. (10).

$$\begin{aligned} \begin{aligned}&{m}_{AP}(\{A\}) = m_1(\{A\}) \times m_2(\{A, B, C\})+ \textbf{k}_{AP}\\&\quad =0.18+0.08= 0.26, \\&{m}_{AP}(\{B\}) = m_1(\{A, B\}) \times m_2(\{B\})+ \textbf{k}_{AP}\\&\quad =0.14+0.08= 0.22, \\&{m}_{AP}(\{C\}) = m_1(\{C\}) \times m_2(\{A, B, C\})+ \textbf{k}_{AP}\\&\quad =0.06+0.08= 0.14, \\&{m}_{AP}(\{A,B\}) = m_1(\{A, B\}) \times m_2(\{A, B, C\})+ \textbf{k}_{AP}\\&\quad =0.06+0.08= 0.14, \\&{m}_{AP}(\{A,B,C\}) = {m}_{AP}(\{A,C\}) = {m}_{AP}(\{B,C\}) = \textbf{k}_{AP}=0.08. \\ \end{aligned} \end{aligned}$$

It can be seen from the result that \({m}_{AP}({A})\) is the largest, so object A is the target.

Fig. 3
figure 3

Mass function value of target A

4 Examples and discussions

In this part, some examples are given to demonstrate the benefits of the proposed method.

Example 3

Suppose \(\varTheta = \{A, B\}\), and the following are the two BPAs,

$$\begin{aligned} \begin{aligned}&m_1:m_1(\{A\}) = 0.6, m_1(\{B\}) = 0.4, \\&m_2:m_2(\{A\}) = 0.6, m_2(\{B\}) = 0.4. \\ \end{aligned} \end{aligned}$$

As shown in Example 3, \(m_1\) and \(m_2\) has the same value, while \(m_1(\{A\}) = 0.6\) and \(m_2(\{A\}) = 0.6\), \(m_1(\{B\}) = 0.4\) and \(m_2(\{B\}) = 0.4\). The results shown in Table 1.

As shown in Table 1, it can be observed that all methods correctly identify A. ACTP is found to be as effective as the other methods when dealing with non-conflicting evidence.

Example 4

Suppose \(\varTheta = \{A, B, C\}\), and the following are the two BPAs (Zadeh 1979),

$$\begin{aligned} \begin{aligned}&m_1:m_1(\{A\}) = 0.99, m_1(\{B\}) = 0.01, \\&m_2:m_2(\{B\}) = 0.01, m_2(\{C\}) = 0.99.\\ \end{aligned} \end{aligned}$$

As demonstrated in Example 4, two sources are in high conflict, where source 1 strongly supports A and source 2 supports C. The resulting combination is presented in Table 2.

Table 2 shows that when using Dempster’s rules, the result is \(m(\{B\}) = 1\). This is counter-intuitive. Using Yager’s rule, the result is \(m_Y(\{B\}) = 0.0001\) and \(m_Y(\varTheta ) = 0.9999\), indicating that B only has minimal support and most of the conflict is assigned to the total ignorance set. Hence, both Dempster’s and Yager’s rules are deemed unreasonable.

According to ACTP, \(m_{AP}({B})\) is not significantly greater than other mass functions, indicating that B does not have more support than others. This result is evidently more reasonable, as A, B, and C have approximate probabilities.

Example 5

Suppose \(\varTheta = \{A, B, C\}\), and there are five BPAs as shown in Table 3 (Guo and Li 2011),

In Example 5, we presented the outcomes of the other five common methods of combining evidence and compared them with our proposed method. The experimental results are illustrated in Tables 4, 5 and Fig. 3. Some discussions are detailed as follows.

(1) Identify the correct evidence

As shown in Table 4, Dempster’s rule produces counterintuitive results. Although the following evidence supports A, the Dempster’s rule supports \(C ( C = 0.8578 )\), but completely against \(A ( A = 0 )\). No matter how much more evidence there is in support of A, Yager’s rule supports \(C ( C= 0.00129 )\) and is totally against \(A ( A = 0 )\). The value of the total ignorance set \(\varTheta \) is increasing, which means increasing uncertainty in the system. Other methods and ACTP can correctly identify A.

(2) The speed of convergence

According to Table 5, Murphy and Li et al. identify the correct target until the 4th evidence appears. In comparison, the convergence speed of the proposed method is better, since identifying correct target A only by two times combined.

(3) Computational complexity

In Fig. 3, Murphy’s method achieves a much higher value than other methods. If there are n evidences in the system, Murphy’s method efficiently combines conflicting evidence by simple averaging. Then use the Dempster’s method to combine n-1 times. The proposed method is a sequential fusion method. When one piece of evidence comes, integrate it immediately. In comparison, the proposed method has lower computational complexity. For example, given a system with 10000 evidence, Murphy’s method needs 9999 times Dempster’s combination process. While the proposed method just need 1 time combination process.

In conclusion, the proposed method is better than other methods in terms of identify the correct evidence, the speed of convergence and computational complexity.

Table 6 Five sources of information
Table 7 Fused results of ACTP
Table 8 Results of different methods

5 Applicaiton

In this section, ACTP is applied in a real-time update system to illustrate its practicability and efficiency. The result is also discussed as well. The data in Li et al. (2020) is used for.

The problem is described as follows. Assuming a radar system is detecting targets from the air. \(\varTheta = \{F_1, F_2, F_3\}\), which means there are three targets. There is a group of five sources of information, \(m_1\) to \(m_5\), providing evidence of the target’s existence. The detection results are shown in Table 6, where each target corresponds to a BPA \(m_i\), \(i \in \{1,2,3,4,5\}\). For example, \(m_1({F_1})=0.5\) indicates that there is a 50% chance of the target object \(F_1\) existing within the scanning range of the radar. By using the rule of ACTP in Eq. (10), these BPAs can be combined to obtain the belief function of the existence of the target object, which provides support for further decision-making. The results are shown in Table 7. It can be seen that BPA of \(F_1\) is the highest one, which means \(F_1\) is the target.

To demonstrate the effectiveness ACTP, we also compared the data with other methods. The results are shown in Table 8 and Fig. 4. Obviously, facing conflicting sources of information \(m_2\), ACTP can effectively identify the target \(F_1\), which is consistent with Murphy’s method and sun et al.’s method. Additionally, Murphy’s method has the highest belief degree \(( F_1 = 0.7958 )\) which is higher than Sun et al.’s method \(( F_1 = 0.2110 )\) and ACTP \(( F_1 = 0.3923 )\).

In the real-time system, new information will always be updated. Assuming the radar system has detected two additional sources, as indicated in Table 9. The results of the fusion using different methods are presented in Table 10. Obviously, as shown in Table 10, in Murphy’s method, the result of sequential fusion is different from the result of simultaneous synthesis. The weighted average method is not suitable for real-time systems. On the contrary, our proposed methods ACTP is simple, fast and accurate. Therefore, this method is particularly suitable for real-time update systems that continuously generate new data.

Fig. 4
figure 4

Mass function value

Table 9 Two other sources of information
Table 10 Result of the comparison

Our method is not only applicable for target recognition, but it also holds an advantage in group decision-making settings (Dong et al. 2022; Yang et al. 2023). In the process of group decision-making, to achieve consensus, ACTP can be utilized to calculate the evidence trustworthiness among decision-makers and determine the final consensus. In software risk assessment (Chen and Deng 2023), ACTP can also be used to combine different risk assessment values and ultimately form a risk ranking.

6 Conclusion

In this paper, a novel conflict management based on assigning conflict to the power set has been proposed. In the case of high conflict, the performance of fusing evidence can be improved when using ACTP. The experimental results illustrate that the evidence combination rule we proposed is better than other methods. The following is a list of the advantages,

  1. (1)

    ACTP can identify the target correctly in different alternatives.

  2. (2)

    Compared with the existing combined method, ACTP has the best convergence performance.

  3. (3)

    The important point is that ACTP can achieve sequential fusion, which has lower computational complexity. Therefore, it is suitable for high real-time update systems.

In the future, based on ACTP, we can do more research.

(a) According to the main ideas of conflict handling proposed in this paper, more conflict management methods can be designed. (b) Besides target recognition, this new combination rule has the potential application in practical engineering base on sensor data fusion, such as fault diagnosis and risk analysis.