You are on page 1of 10

Fusion of identity declarations from dissimilar

sources using the Dempster-Shafer theory

Éloi Bossé Abstract. The problem of fusing identity declarations emanating from
Jean Roy, MEMBER SPIE different sources is explored and decision makers are offered a quanti-
Defence Research Establishment Valcartier tative analysis based on statistical methodology that can enhance their
Decision Support Section decision making processes regarding the identity of detected objects.
2459 Pie Xi North Boulevard The context is naval warfare where commanders and their staff require
P.O. 8800 access to a wide range of information to carry out their duties. This
Val-Bélair, G2J 1X5, Canada information provides them with the knowledge necessary to determine
E-mail: eloi.bosse@drev.dnd.ca the position, identity and behavior of the enemy. Statistical analysis
rooted in the Dempster-Shafer theory of evidence is used to further the
fusion of identity declarations. © 1997 Society of Photo-Optical Instrumentation
Engineers.

Subject terms: sensor fusion; identity information fusion; evidential theory.


Paper SFN-03 received June 3, 1996; revised manuscript received Sep. 24,
1996; accepted for publication Oct. 15, 1996.

1 Introduction Dempster-Shafer evidential theory for fusing uncertain in-


In today’s naval warfare, commanders and their staff, who formation and some remarks are made with respect to the
are both users and active elements of command and control Bayesian paradigm of probability theory. Section 4 briefly
systems, require access to a wide range of information to discusses decision making techniques based on the
Dempster-Shafer representation and pertaining to informa-
carry out their duties. In particular, their actions are based
tion structured in a hierarchical manner to provide a deci-
on information concerning the position, identity and behav-
sion making approach to the identity declaration fusion
ior of other vessels in their vicinity.1 The position informa-
problem. Section 5 proposes an identity declaration fusion
tion determines where objects are, whereas the identity in- function and a complete example is provided; it details the
formation determines what they are. Behavioral inputs, the fusion results and decision making alternatives.
information is concerned with what the objects are doing.
In warfare, no one piece of information can be accepted
as complete truth. To lessen the damaging effects of poor 2 Problem of Identity Declaration
quality evidence, the combination of information from ev- To look at the problem of combining identity declarations
ery possible source is of primary importance. This combi- in a rigorous manner, the following issues need to be ad-
nation process has often been carried out manually, but to dressed: what identity declarations should be combined,
cope with the ever increasing flow of information, automa- how should they be combined and which identity declara-
tion has surfaced as a possible option for the fusion of tion best supports the combined evidence.
positional and identity information. In a maritime environment, various surveillance sys-
This paper is concerned with the investigation of auto- tems, electronic intelligence and human observations are
mated identification techniques through the use of statisti- examples of information sources available to the com-
cal analysis rooted in the Dempster-Shafer theory of evi- mander. Output from these sources is partitioned according
dence. More specifically, the aim is twofold: to explore the to the type of information they provide; output data may be
problem of fusing identity information emanating from dif- characterized as either positional or identity information.
ferent sources and to offer the decision maker a quantitative Positional information represents the dynamic parameters
analysis based on statistical methodology that can enhance describing the movement associated with an object ~con-
his or her decision making process regarding the identity of tact!. This generally includes position, velocity and accel-
detected objects. eration. Identity information can be defined as declarations,
The paper is organized as follows. Section 2 describes propositions or statements that contribute to establish the
the problem facing naval commanders and gives a brief identity of an object. Equivalently, identity information can
survey of identity information sources available on a ship be seen as information from various sources that helps in
such as the Canadian patrol frigate type. As focus is distinguishing one object from another. Possible values for
brought on the fusion of identity declarations, it is sug- identity information can span the range from sensor signals
gested that the North Atlantic Treaty Organization’s to attributes to identity declarations, as depicted in Fig. 1.
~NATO’s! STANAG 4420 ~Standard NATO Agreement! The sensor signals represent some characteristics of the
charts, which were designed to represent maritime tactical energy sensed. Attributes such as size, shape, degree of
information, would be an appropriate tool for a hierarchical symmetry, emitter type, etc. are inferred from these char-
structuring of identity declarations. Section 3 describes the acteristics. Identity declarations specify the detected object;

648 Opt. Eng. 36(3) 648–657 (March 1997) 0091-3286/97/$10.00 © 1997 Society of Photo-Optical Instrumentation Engineers
Downloaded From: http://opticalengineering.spiedigitallibrary.org/ on 05/12/2015 Terms of Use: http://spiedl.org/terms
Bossé and Roy: Fusion of identity declarations . . .

and information from communication links from which po-


sitional and identity information can be obtained.
In general, radars provide positional information in
terms of range, azimuth and velocity components. Elec-
tronic warfare ~EW! systems include the electronic support
measure ~ESM! and the communication intercept system
~CIS!. The ESM system thus provides positional informa-
tion ~azimuth! as well as attribute information in the form
Fig. 1 Identity information.
of emitter type. It may also infer the platform identity by
matching the emitter type to a platform database. The CIS
system is capable of responding to programmable tasking
in the Canadian Navy, for example, they can consist of a to search the communication radio frequencies and provide
general classification of which the observed object is a bearings from airborne and surface originated radio fre-
member ~surface combatant!, a specific type of ship ~frig- quency signals. The IFF system provides information ~both
ate!, a specific class ~city class! or a unique identity ~Ville in terms of position and identity! about a target when a
de Québec!. Therefore surface combatant, frigate, city class cooperative target has responded to the interrogation. In the
and Ville de Québec are all examples of identity declara- absence of an answer, only the location that delimits the
tions. Identity declarations can also include information sector in which the interrogation was performed is available
concerning the threat designation of an object: pending, but identity declarations may be inferred. Human interven-
unknown, assumed friend, suspect, friend, neutral or hos- tion occurs when the operator of the CIS system listens to
tile. the signals and tries to estimate any attribute information
Figure 2 gives examples of information sources avail-
and/or identity declarations.
able on a Canadian patrol frigate ~CPF! type ship with their
corresponding outputs. The latter are defined in terms of The quantity of identity declarations available may be-
positional information and identity information, which is come quite imposing and diverse. A potential way of orga-
itself subdivided into three categories: sensor signals, at- nizing identity declarations might be to use the NATO stan-
tribute information and identity declarations. These include dards for representing maritime tactical information.2 These
organic sources ~under the jurisdiction of the commander!: standards are in the form of charts that define the full range
surveillance and tracking radars, electronic warfare sys- of tactical information required by the operational user at
tems, identification friend or foe systems ~IFF!, operator the command level. The charts were created to establish the
intervention and nonorganic sources: intelligence reports basis for developing a standardized representation of spa-

Fig. 2 Examples of information sources and corresponding outputs.

Optical Engineering, Vol. 36 No. 3, March 1997 649


Downloaded From: http://opticalengineering.spiedigitallibrary.org/ on 05/12/2015 Terms of Use: http://spiedl.org/terms
Bossé and Roy: Fusion of identity declarations . . .

Fig. 3 Hierarchy of tactical information—surface classification.

tially displayed tactical data using symbology and color for must be combined to obtain an estimate of an object’s iden-
NATO maritime units. tity. The italicized elements symbolize identity declaration
Figures 3 and 4 offer an adapted version of a tactical domains; they do not belong to the STANAG 4420 charts
information hierarchy for surface and air objects, respec- but were added to establish a relationship between the do-
tively; certain levels and entries have been omitted for sim- mains and their specific entities. Some entities can be fur-
plicity. The names in the various boxes, which are indica- ther divided into class and unit. These categories typify the
tive of the taxonomy used in STANAG 4420, represent identity of objects at two levels of specificity. The ‘‘unit’’
identity declaration entities. These entities illustrate the sort declaration domain characterizes uniquely a detected ob-
of identity declarations provided by various sources that ject. Also included in the hierarchy of tactical in-

Fig. 4 Hierarchy of tactical information—air classification.

650 Optical Engineering, Vol. 36 No. 3, March 1997


Downloaded From: http://opticalengineering.spiedigitallibrary.org/ on 05/12/2015 Terms of Use: http://spiedl.org/terms
Bossé and Roy: Fusion of identity declarations . . .

Fig. 5 Hierarchy of tactical information—threat category.

formation is the threat designation; its subdivisions are of Q. The elements of 2Q, or equivalently the subsets of Q,
given in Fig. 5. The hierarchy of tactical information delin- are the class of general propositions and include the empty
eated by Figs. 3 to 5 should encompass many of the identity set B, which corresponds to a proposition that is known to
declarations provided by the organic and nonorganic be false, and the whole set Q, which corresponds to a
sources of Fig. 2. Furthermore, because this hierarchy is a proposition that is known to be true. We assume throughout
NATO standard, it provides a better base for achieving in- our discussion that the frame of discernment is finite.
teroperability in information exchange between nations Let A be a subset of Q. The evidential theory differen-
than uncontrolled alternatives. tiates between the measure of belief committed exactly to A
and the total belief committed to A. The first is character-
3 Fusion of Uncertain Information ized by the basic probability assignment and the latter by
the belief function. A function m is a basic probability
If a priori probability distributions and conditional prob-
assignment if it assigns a number m(A) to each subset
ability matrices are available and if probabilities can be
distributed to single elements, then the Bayesian approach AP2Q, in such a way that m~B!50, and ( A#Q m(A) 5 1.
should be used to fuse uncertain information. However, the The quantity m(A) is called A’s basic probability num-
Bayesian approach suffers from major deficiencies in a hi- ber and represents the exact belief in the proposition de-
erarchical context, when fully specified likelihoods are not picted by A. A function Bel is a belief function if it assigns
available. Pearl’s rules3 can be applied but may not always a number Bel (A) to each subset AP2Q in such a way that:
lead to an appropriate estimation of the posterior probabili- Bel ~B!50, Bel ~Q!51 and for every positive integer n and
ties associated with certain nodes of a hierarchy. Other every collection, A 1 , A 2 , . . . , A n of subsets of Q,
problems associated with the Bayesian approach are the
coding of ignorance and the strict requirements on the be-
lief of a hypothesis and its negation.
Consequently, the Bayesian approach may not be the
Bel ~ A 1 ø•••øA n ! > (i Bel ~ A i ! 2 (
i, j
Bel ~ A i ùA j !
ideal technique to fuse uncertain information in the context
of identity estimation by multiple dissimilar sources. We 1•••1 ~ 21 ! n11 Bel ~ A 1 ù•••ùA n !
thus investigate a generalization of the Bayesian approach
that does not arbitrarily allocate probabilities to the children > (
I, $ 1...n %
~ 21 ! u I u 11 Bel ~ ù A i ! ....
and parents of a node when this node is updated with new IÞB
iPI
information. This technique is based on the Dempster-
Shafer theory of evidence.
The quantity Bel (A) is called the degree of belief about
3.1 Dempster-Shafer Theory of Evidence proposition A. A belief function assigns to each subset of Q
The Dempster-Shafer technique does not require prior a measure of the total belief in the proposition represented
probabilities nor does it need to know the capability of each by the subset. Here u I u stands for the cardinality of the set I.
source. Evidence is not committed to any specific event or The simplest belief function is the one where Bel ~Q!51
set of events until evidence is gained. Also, it is not re- with Bel (A)50 for all AÞQ; this function is called the
quired that belief not committed to a given proposition vacuous belief function. A belief function can be obtained
should be committed to its negation, nor that belief com- from the basic probability assignment:
mitted to a given proposition should be committed more
specifically.4 The Dempster-Shafer technique has the capa-
bility of expressing ignorance explicitly. The technique ac-
tually focuses on the probability of a collection of points
Bel ~ A ! 5 (
B#A
m ~ B ! , for all A#Q. ~1!
belonging to the sample space, whereas the classical prob-
ability theory is interested in the probability of the indi-
vidual points.5 A subset A of Q is called a focal element of a belief func-
In the Dempster-Shafer evidential theory, the terminol- tion Bel over Q if m(A).0. The union of all the focal
ogy is slightly different from that used in probability elements of a belief function is called its core. A belief
theory. The frame of discernment Q is defined as an ex- function Bel is called a simple support function S if there
haustive set of mutually exclusive events or propositions of exists a nonempty subset A#Q and a number 0<s<1 such
a particular experiment. We denote 2Q the set of all subsets that:

Optical Engineering, Vol. 36 No. 3, March 1997 651


Downloaded From: http://opticalengineering.spiedigitallibrary.org/ on 05/12/2015 Terms of Use: http://spiedl.org/terms
Bossé and Roy: Fusion of identity declarations . . .

S ~ B ! 5Bel ~ B ! 5 H 0
s
1
if B does not contain A
if B contains A but BÞQ
if B5Q.
~2!
and Bel2’s focal elements are C 1 , . . . , C n , the total portion
of belief exactly committed to A (AÞB) is given by the
orthogonal sum m5m 1 % m 2 :

Therefore, a simple support function precisely supports the m ~ A ! 5K (


i, j
m 1 ~ B i ! •m 2 ~ C j ! , ~4!
subset A and any subset containing A to the degree s, but it B i ùC j 5A
provides no support for the subsets of Q that do not contain
A. A singleton is a subset of the frame of discernment with where
only a single member. A simple support function focused
on a singleton is a belief function whose only focal ele-
ments are the singleton and Q. If all the focal elements are 1/K512 (
i, j
m 1 ~ B i ! •m 2 ~ C j !
singletons, then the belief function Bel is called a Bayesian B i ùC j 5B
belief function.
Another function conveys the same information as the
belief function; it is called the plausibility function. Let Bel
5 (
i, j
m 1 ~ B i ! •m 2 ~ C j ! . ~5!
be a belief function over a frame Q; a function Pl is a B i ùC j ÞB

plausibility function if it assigns a number Pl (A) to each


subset AP2Q in such a way that Pl (A)512Bel (Ā) or The scalar K is a normalizing constant. It normalizes to 1
the total portion of belief exactly committed to A. If m i are
a collection of basic probability assignments with focal el-
Pl ~ A ! 5 (
AùBÞB
m ~ B ! , for all A#Q. ~3! ements A i , B j , C k , D 1 , ..., respectively, then

The quantity Pl (A) is known as the degree of plausibility m ~ A ! 5K (


A i ,B j ,C k ,D m ,...
@ m 1~ A i ! m 2~ B j !
of A and expresses the extent to which one fails to doubt A.
A i ùB j ùC k ùD m ù...5A
Pl (A) will be 0 when the evidence refutes A, and 1 when
there is no evidence against A. From Eqs. ~1! and ~3! we 3m 3 ~ C k ! m 4 ~ D m ! ... # ,
conclude that Bel (A)<Pl (A). The degree of belief and
degree of plausibility summarize the impact of the evidence m ~ B ! 50, ~6!
on a particular proposition A in the following manner: the
first shows how well the evidence supports proposition A
and the second reports on how well its negation Ā is sup- 1/K512 (
A i ùB j ùC k ùD m ù...5B
@ m 1~ A i ! m 2~ B j !
ported. This information can be expressed in the form of an
interval called evidential interval whose length Pl (A) 3m 3 ~ C k ! m 4 ~ D m ! ... # .
2Bel (A), can be referred to as the ignorance remaining
about subset A. If ignorance about subset A is 0, then the The order of combination is immaterial.6
Dempster-Shafer process is identical to the Bayesian ap-
proach such that Bel (A)5P(A)5Pl (A); if ignorance
about A is equal to 1, then no knowledge at all is available 3.3 Computational Complexity
concerning subset A. More generally, the relationship be- One drawback of the Dempster-Shafer evidential theory is
tween the Bayesian and evidential theories can be described the long calculation time required by its high computational
by the following equation: Bel (A)<P(A)<Pl (A). Thus, complexity. Because the combination rule produces basic
the degree of belief and degree of plausibility on a hypoth- probability numbers on the subsets of Q, the calculations
esis can be seen as the lower bound and upper bound on the are time exponential. In comparison, the Bayesian approach
probability of that hypothesis. provides probability statements on the elements of Q.
Therefore, if Q consists of four possible points/outcomes,
3.2 Combination of Evidence the definition of a probability function on Q requires the
As in the Bayesian theory,2 evidential theory proposes a assignment of probability to four points, whereas the defi-
combination rule, called Dempster’s rule of combination, nition of the Dempster-Shafer basic probability assignment
which synthesizes basic probability assignments and yields requires the definition of m(A) for 24516 subsets A of Q.
a new basic probability assignment representing the fused Three categories of options are available to reduce com-
information. The combination rule is known as the or- putational complexity. The first approximates the belief
thogonal sum and is denoted by % . Basically, this rule cor- function, the second treats simple support functions instead
responds to the pooling of evidence: if the belief functions of belief functions and the last one separates the frame of
being combined are based on entirely distinct bodies of discernment into smaller, more manageable frames, one for
evidence and the set Q discerns the relevant interaction each set of mutually exclusive hypotheses. Table 1 summa-
between those bodies of evidence, then the orthogonal sum rizes the various options available for reducing the compu-
gives degrees of belief that are appropriate on the basis of tational complexity of Dempster’s combination rule.
the combined evidence. Voorbraak7 has defined a Bayesian approximation of a
Let m 1 and m 2 be basic probability assignments, on the belief function and he has shown that combining the Baye-
same frame of discernment Q, for belief functions Bel1 and sian approximations of belief functions is computationally
Bel2 , respectively. If Bel1 focal elements are B 1 , . . . , B k , less involved than combining the belief functions them-

652 Optical Engineering, Vol. 36 No. 3, March 1997


Downloaded From: http://opticalengineering.spiedigitallibrary.org/ on 05/12/2015 Terms of Use: http://spiedl.org/terms
Bossé and Roy: Fusion of identity declarations . . .

Table 1 Options to reduce computational complexity of Dempster’s rule.

Author(s) Technique Calculation

Voorbraak7 Bayesian approximation of Polynomial time


belief function proportional to uQu
Barnett8 Simple support function Linear time proportional to
focused on singleton uQu
Gordon and Shortliffe9 Simple support function Linear time proportional to
using subsets of Q; evidence uQu
hierarchically structured
Shafer10 Belief functions carried by Proportional to size of sibs
the field of subsets
generated by children of
node; evidence
hierarchically structured
Shafer and Logan11 Simple support function Linear time proportional to
focused on a subset of Q or number of nodes in the tree
its complement and carried
by the field of subsets
generated by children of
node; evidence
hierarchically structured

selves; the computational time will be reduced from expo- frames, one for each set of mutually exclusive hypotheses.
nential to polynomial. This approach, however, is appealing Of course, once the elements have been separated into mul-
only when one is interested in final conclusions about the tiple frames, items from different frames can no longer be
elements of Q; in the study of identity declaration fusion, compared since they then pertain to different belief func-
we are mostly interested in subsets of Q. tions. Shafer’s first approach combines belief functions
Barnett8 demonstrated that if each piece of evidence each of which is carried by the field of subsets generated by
consists of simple support functions focused on singleton the children of a particular node. His second approach com-
propositions and their negations, computational time will bines simple support functions focused on a subset of Q or
be reduced from exponential to linear. Another option was its complement.11 The latter uses the same type of evidence
proposed by Gordon and Shortliffe.9 It is based on the as- as considered by Gordon and Shortliffe,9 while avoiding
sumptions that ~1! each piece of evidence consists of some of its shortcomings. This approach is detailed in Ref.
simple support functions focused for or against subsets of 13.
Q instead of singletons, and that ~2! the subsets of Q can be
structured in a strict hierarchical tree. This method builds 4 Statistical Decision Making
on Barnett’s approach while permitting hierarchical rela-
tionships among hypotheses; its aim is similar to that of An important element to take into consideration in the de-
Pearl.2 sign of an identity declaration fusion function is the deci-
However, combining negative evidence leads to compu- sion making process required to select the identity declara-
tational difficulties because the intersection of the comple- tion which best supports the combined declarations.
ments of nodes may fail to correspond to a node or its Statistical decision making is necessary since, after fusion,
complement. In such a case, an approximation is suggested the resulting hierarchical structure may contain many iden-
by the authors but this approximation restricts the useful- tity declarations with a non-null confidence value. Because
ness of the plausibility measure. The algorithm can be decisions are subjective, the decision maker will undoubt-
implemented in a form that is linear in the number of nodes edly depend on his or her own judgment as well as infor-
in the tree. mation collected from various sources. The fusion function
Cleckner12 offers a comparative study in terms of should still suggest to the decision maker the ‘‘best’’ can-
memory requirements and computational complexity in didate or candidates according to predetermined decision
which the standard Dempster-Shafer combination rule is rules. A number of factors are involved in the choice of the
compared with Barnett’s algorithm and the alternative due decision rules to be used:14
to Gordon and Shortliffe.9 Cleckner concluded that when 1. rule complexity ~if the computational time required
dealing with simple support functions focused on singleton to make a decision is too high, the process becomes
hypothesis, Barnett’s technique is the least computer inten- useless!
sive of the three.
The last category of options, which also assumes that 2. confidence level ~decision rules are made on a proba-
evidence is hierarchically structured, was proposed by bilistic basis!
Shafer.10 He suggested that belief functions being com- 3. fusion technique used to combine uncertain informa-
bined should be carried by a partition P of Q, which has tion ~for example the Dempster-Shafer approach pro-
fewer elements than Q. This is done by separating the duces belief and plausibility values instead of single
frame of discernment into smaller, more manageable probability values!

Optical Engineering, Vol. 36 No. 3, March 1997 653


Downloaded From: http://opticalengineering.spiedigitallibrary.org/ on 05/12/2015 Terms of Use: http://spiedl.org/terms
Bossé and Roy: Fusion of identity declarations . . .

Fig. 7 Results from the Shafer-Logan algorithm—steps 4 to 6.


Fig. 6 Results from the Shafer-Logan algorithm—steps 1 to 3.

Based on the graph constructed by this decision approach,


the decision maker can select the best alternative according
4. type of application ~the application environment can to the highest belief value, or the hierarchical level of in-
dictate decision rules!. terest or any other criteria. The plausibility value is not
included in the graph as it is not deemed to be essential to
When dealing with a hierarchical structure, the decision the decision making process. To illustrate the approach, the
making techniques cannot rely on the maximum value of decision technique will be applied to the following simple
belief because the belief of a parent will always be equal to, example.
or higher than, the belief of each of the children. Also, the The example of Figs. 6 and 7 shows the propagation
plausibility of a parent will always be equal to, or higher effect of combining dichotomous belief functions using the
than, the plausibility of each of the children. Furthermore, Shafer-Logan algorithm. The example is composed of six
an important aspect that should not be forgotten in military steps, at which additional evidence is received for a specific
applications is the fact that decision making is scenario and node in the form of a simple support function or dichoto-
mission dependent. What we propose, therefore, is a semi- mous function, and then combined. The new belief ~Bel!
automated approach based on the belief and plausibility and plausibility ~Pl! values are calculated for each node.
values. It is called semiautomated because threshold values Figures 6 and 7 show the results of the Shafer-Logan algo-
will be applied to the belief and plausibility measures. rithm after adding evidence from steps 1 to 6, respectively.
However, the final decision will be made by the decision A plausibility of 1 for $ N % implies that so far no evi-
maker, because he or she remains an important part of the dence can refute $ N % , whereas a plausibility of 0.5 for $ L %
process and because the choice of the final identity is typi- ~for example! is obtained through evidence m~Q!50.5. The
cally scenario and mission dependent. The decision making evidence m( $ H % )50.5 does not influence the children of
approach proposed is as follows: $ H % ~in terms of belief and plausibility! but influences the
belief of the father of $ H % and the plausibility of the other
1. Select all alternatives with a plausibility value greater
nodes. In a similar fashion, a strong evidence for $ F % does
than a certain threshold T Pl .
not affect the belief of $ B % ; however, it diminishes the
2. Plot the chosen alternatives according to hierarchical plausibility of $ B % . As expected, the evidence against $ F %
structure and indicate for each node its belief value. @m( $ F̄ % )50.5# affects the children of $ F % . The contradic-
3. Add to the graph all the nodes directly below Q with tory evidences greatly modifies the belief and plausibility
their belief values. of $ B % and $ F % , when combining the two dichotomous be-

654 Optical Engineering, Vol. 36 No. 3, March 1997


Downloaded From: http://opticalengineering.spiedigitallibrary.org/ on 05/12/2015 Terms of Use: http://spiedl.org/terms
Bossé and Roy: Fusion of identity declarations . . .

Fig. 8 Decision graphs.

lief functions focused on the same nodes B and F interesting issue that distinguishes this study from other
@ m( $ B % )50.99, m( $ F % )50.01 with m( $ B % )50.02, studies on identity fusion is the fact that two different
m( $ F % )50.95, m~Q!50.03#. Dempster’s rule calculates a frames of discernment are introduced to estimate the iden-
small normalizing constant ~K50.06!, indicating conflict. It tity of the observed objects. The first frame of discernment
is interesting to note that this evidence is dichotomous is the hierarchical tree of surface and air classifications, as
since $ B % 5$ F̄ % . The small evidence for $ B % slightly modi- shown in Figs. 3 and 4, and the second one deals with the
fies the belief and plausibility of $ B % ; the big uncertainty is threat categories as described in Fig. 5. The purpose of this
distributed amongst the other nodes. approach is to circumvent the problem whereby the threat
The plausibility threshold T Pl is chosen equal to 0.6. At category of a detected object is directly inferred from its
each step, the decision technique creates a graph ~Fig. 8! identity. For example, the Exocet missile can be automati-
from which the decision maker can select the best alterna- cally assumed friendly. During the Falklands war, however,
tive according to his or her needs. If no nodes other than
the Exocet missile was definitely not considered friendly to
the direct children of Q appear in the graph, then no alter-
native has a plausibility value higher than the threshold T Pl the British Navy. By eliminating false automated infer-
and no decision can be made. The contradictory evidence at ences, this approach allows more freedom in the decision
step 5 greatly modifies the belief of $ B % and $ F % . The de- making.
cision technique reproduces the effect of this contradictory The most basic concept to which the study adheres is the
evidence. fact that information sources are self-contained and that
each one represents a local decision node capable of iden-
5 Example of the Identity Declaration in a tifying a detected object. The aim is therefore to combine
Military Context local decisions in the hope of obtaining the correct identity
The following example illustrates the use of the Shafer- with a high probability. Dasarathy15 calls this type of fusion
Logan algorithm for the specific problem of combining ‘‘Decision In-Decision Out Fusion’’ because both the input
identity declarations using two frames of discernment. An and output are decisions.

Optical Engineering, Vol. 36 No. 3, March 1997 655


Downloaded From: http://opticalengineering.spiedigitallibrary.org/ on 05/12/2015 Terms of Use: http://spiedl.org/terms
Bossé and Roy: Fusion of identity declarations . . .

Table 2 Evidence received from various sources. tion received can consist of a general classification ~surface
combatant!, a specific type of ship ~frigate!, a specific class
Frame of discernment Q1 Frame of discernment Q2 ~city class! or a unique identity ~Ville de Québec!. In Fig. 1
we labeled these ‘‘identity declarations.’’ Identity declara-
m ($fighter%)50.4 m ($unknown%)50.2
tions also include the threat designation, as in Fig. 5. The
m (Q)50.6 m (Q)50.8
belief and plausibility values at each node of the two hier-
m ($carrier%)50.7 m ($friend%)50.6 archical trees are 0. The evidence received from various
m (Q)50.3 m (Q)50.4 information sources are given in Table 2 ~assuming that the
m ($fixed-wing%)50.3 m ($hostile%)50.7 order of the received evidences is unimportant!.
m (Q)50.7 m (Q)50.3 The evidence items are the only ones received concern-
m ($noncombatant%)50.8 m ($neutral%)50.3 ing the object; a decision could be made after each evi-
dence if the plausibility of at least one node is greater than
m (Q)50.2 m (Q)50.7
T Pl . However, we have chosen to combine all the evidence
m ($air%)50.5 m ($hostile%)50.8
before the decision making process. In this example, T Pl is
m (Q)50.5 m (Q)50.2
set to 0.5. Evidence m( $ air% )50.5 and m~$ air%!50.1 are
m ($air%)50.1 contradictory but not enough for the Dempster’s combina-
m (Q)50.9 tion rule to produce irregular results. Figures 9 and 10 show
m ($MiG-25%)50.1 the belief and plausibility measures for each node after the
m (Q)50.9 combination of evidence for the two frames of discernment,
m ($helicopter%)50.5 respectively.
m (Q)50.5 Figures 11 and 12 give the graphs that are available to
m ($MiG-19%)50.6
the decision maker. It seems that the object is airborne and
hostile; there is a fairly good chance that it is a fixed wing
m (Q)50.4
fighter. According to the mission, the decision maker will
m ($missile %)50.7 choose the best alternative and take appropriate action if
m (Q)50.3 necessary.
m ($MiG-25%)50.4
m (Q)50.6
6 Conclusion
This paper concerns the use of the Dempster-Shafer theory
of evidence for the fusion of identity declarations within a
The scenario is as follows: the commander of a CPF- naval environment. It proposes to hierarchically structure
type ship receives a series of identity declarations concern- the identity declarations according to NATO’s STANAG
ing one object; he or she must determine the identity of the 4420 charts, which provide a better base for achieving in-
object and take action. For example, the types of informa- teroperability in information exchange between nations

Fig. 9 Results from combining evidence using Q1 .

656 Optical Engineering, Vol. 36 No. 3, March 1997


Downloaded From: http://opticalengineering.spiedigitallibrary.org/ on 05/12/2015 Terms of Use: http://spiedl.org/terms
Bossé and Roy: Fusion of identity declarations . . .

2. ‘‘STANAG 4420. Display Symbology and Colours for NATO Mari-


time Units,’’ Edition 1, NATO Unclassified ~1987!.
3. J. Pearl, Probabilistic Reasoning in Intelligent Systems: Networks of
Plausible Inference, Morgan Kaufmann Publishers, San Mateo, CA
~1988!.
4. J. C. Donker, ‘‘Reasoning with uncertain and incomplete information
in aerospace application,’’ in AGARD Symp. on Machine Intelligence
Fig. 10 Results from combining evidence using Q2 . for Aerospace Electronic Systems, Vol. 30, pp. 30.1–30.16, Lisbon
~1991!.
5. E. Cortes-Rello and F. Golshani, ‘‘Uncertain reasoning using the
Dempster-Shafer method: an application in forecasting and marketing
management,’’ Expert Syst. 7, 9–17 ~1990!.
6. R. R. Yager, ‘‘On the Dempster-Shafer framework and new combi-
nation rules,’’ Inform. Sci. 41, 93–137 ~1987!.
7. F. Voorbraak, ‘‘A computationally efficient approximation of
Dempster-Shafer theory,’’ Int. J. Man-Mach. Stud. 30, 525–536
~1989!.
8. J. A. Barnett, ‘‘Computational methods for a mathematical theory of
evidence,’’ in Proc. 7th Int. Joint Conf. on AI, pp. 868–875, Morgan
Kaufman, Palo Alto, CA ~1981!.
9. J. Gordon and E. H. A. Shortliffe, ‘‘Method for managing evidential
reasoning in a hierarchical hypothesis space,’’ Artif. Intell. 26, 323–
357 ~1986!.
10. G. Shafer, ‘‘Hierarchical evidence,’’ in Proc. 2nd Conf. on Artificial
Intelligence Applications, pp. 16–21 ~1985!.
11. G. Shafer and R. Logan, ‘‘Implementing Dempster’s rule for hierar-
chical evidence,’’ Artif. Intell. 33, 271–298 ~1987! .
12. W. H. Cleckner IV, ‘‘Tactical evidential reasoning: an application of
the Dempster-Shafer theory of evidence,’’ Master’s Thesis, Naval
Postgraduate School, Monterey, CA ~1985!.
13. L. Des Groseilliers, É. Bossé, and J. Roy, ‘‘Fusion of hierarchical
identity declarations for Naval command and control,’’ DREV Report
Fig. 11 Decision graph representing best alternatives using Q1 . R-9527, Valcartier, CA ~1996!.
14. P. Nahim and J. Pokoski, ‘‘NCTR plus sensor equals IFFN or can two
plus two equal five?’’ IEEE Trans. Aerospace Electron. Syst. 16,
320–337 ~1980!.
15. B. V. Dasarathy, Decision Fusion, IEEE Computer Society Press, Los
Alamitos, CA ~1994!.

Éloi Bossé received BASc, MASc and


PhD degrees in electrical engineering from
Laval University. In 1981 he joined the
Communications Research Centre, Ot-
tawa, Canada, where he worked on radar
Fig. 12 Decision graph representing best alternatives using Q2 . signal processing, high resolution spectral
analysis and radar tracking in multipath. In
1988 he was transferred to the Defence
than uncontrolled alternatives. One drawback of the Research Establishment Ottawa (DREO)
Dempster-Shafer evidential theory is the long calculation and in 1992 to the Defence Research Es-
time required by its high computational complexity. Due to tablishment Valcartier (DREV), where he
the hierarchical nature of the evidence, an algorithm pro- now heads the Data Fusion and Resource Management Group. His
posed by Shafer and Logan was implemented, which re- current interests include multisensor data fusion, neural networks,
duces the calculations from exponential to linear time pro- wavelets and multitarget tracking.
portional to the number of nodes in the tree. A
semiautomated decision making technique, based on belief Jean Roy received BASc and MASc de-
and plausibility values, was then described to select alter- grees in electrical engineering from Laval
natives that best support the combined identity declarations. University. In 1987 he joined the Defence
The final decision will be made by the decision maker, Research Establishment Valcartier
because he or she remains an important part of the process (DREV), Canada, where he worked on the
modeling and simulation of radar wave
and because the choice of the final identity is typically sce-
propagation effects. In 1988 he was
nario and mission dependent. posted at the John Hopkins University/
Applied Physics Laboratory (JHU/APL),
Acknowledgments where he worked on a multisensor integra-
The authors acknowledge participation of Mrs. L. Des- tion experiment under the NATO Anti-Air
Groseilliers in writing this paper. Warfare System (NAAWS) project. In 1989 he initiated a research
program in multisensor data fusion (MSDF) at DREV on which he
References has been working since then. His current interests include the per-
formance evaluation of MSDF systems and the development of an
1. G. B. Wilson, ‘‘Some aspects of data fusion,’’ in Advances in Com- MSDF algorithm-level testbed.
mand, Control & Communications Systems, IEE Computing Series,
Vol. 11, pp. 321–338 ~1987!.

Optical Engineering, Vol. 36 No. 3, March 1997 657


Downloaded From: http://opticalengineering.spiedigitallibrary.org/ on 05/12/2015 Terms of Use: http://spiedl.org/terms

You might also like