{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T01:33:54Z","timestamp":1770600834407,"version":"3.49.0"},"reference-count":30,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2017,12]]},"abstract":"<jats:p>The belief rules are stored out of order in the extended belief rule base (EBRB), which will weaken its reasoning performance in that all rules are visited when calculating each rule\u2019s activation weight. This paper focuses on reducing the number of rules which are visited in the calculation of each rule\u2019s activation weight. A new rule activation method based on VP-tree and MVP-tree is proposed to build index structure to store rules. The proposed rule activation method is based on rule similarity query, where only partial rules will be retrieved and visited while calculating each rule\u2019s activation weight. Note that, the performance of EBRB systems based on tree index is affected greatly by the value of query threshold. However, sometimes it is difficult to determine the value of query threshold, so this paper also proposes an approach based on the k-means clustering algorithm to choose the appropriate query threshold. Some case studies show how the use of the proposed optimization method enhances the reasoning performance of EBRB systems. The proposed method has been validated to be advantageous to visit partial suitable rules instead of all rules. Beside the work performed in the EBRB, the proposed method alone can also be used in different application areas.<\/jats:p>","DOI":"10.3233\/jifs-17521","type":"journal-article","created":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T12:37:13Z","timestamp":1512131833000},"page":"3695-3705","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":14,"title":["A rule activation method for extended belief rule base with VP-tree and MVP-tree"],"prefix":"10.1177","volume":"33","author":[{"given":"Yan-Qing","family":"Lin","sequence":"first","affiliation":[{"name":"School of Mathematics and Computer Science, Fuzhou University, Fuzhou, P.R. China"}]},{"given":"Yang-Geng","family":"Fu","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Science, Fuzhou University, Fuzhou, P.R. China"}]},{"given":"Qun","family":"Su","sequence":"additional","affiliation":[{"name":"School of Mathematics and Computer Science, Fuzhou University, Fuzhou, P.R. China"}]},{"given":"Ying-Ming","family":"Wang","sequence":"additional","affiliation":[{"name":"Decision Sciences Institute, Fuzhou University, Fuzhou, P.R. China"}]},{"given":"Xiao-Ting","family":"Gong","sequence":"additional","affiliation":[{"name":"Decision Sciences Institute, Fuzhou University, Fuzhou, P.R. China"}]}],"member":"179","published-online":{"date-parts":[[2017,12]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(65)90241-X"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1968.tb00722.x"},{"key":"e_1_3_2_4_2","unstructured":"ShaferG. A mathematical theory of evidence Princeton: Princeton University Press 1976."},{"key":"e_1_3_2_5_2","doi-asserted-by":"crossref","unstructured":"WangC.L. and YoonK.S. Multiple attribute decision making: Methods and applications Berlin: Spring-verlag 1981.","DOI":"10.1007\/978-3-642-48318-9_3"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(91)90074-R"},{"key":"e_1_3_2_7_2","first-page":"311","article-title":"Data structures and algorithms for nearest neighbor search in general metric spaces","author":"Yianilos P.N.","year":"1993","unstructured":"YianilosP.N., Data structures and algorithms for nearest neighbor search in general metric spaces, ACM-SIAM Symposium on Discrete Algorithms (1993), 311\u2013321.","journal-title":"ACM-SIAM Symposium on Discrete Algorithms"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(94)00028-Y"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/328939.328959"},{"issue":"36","key":"e_1_3_2_10_2","first-page":"41","article-title":"Image retrieval based on high-dimensional index structure for metric spaces VP-tree and MVP-tree","volume":"40","author":"Wang Z.Q.","year":"2004","unstructured":"WangZ.Q., GanG.H. and ChengQ.M., Image retrieval based on high-dimensional index structure for metric spaces VP-tree and MVP-tree, Computer Engineering and Applications40(36) (2004), 41\u201344.","journal-title":"Computer Engineering and Applications"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2005.851270"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2007.897606"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2005.11.015"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2008.09.032"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-008-0327-0"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1080\/18756891.2010.9727710"},{"key":"e_1_3_2_17_2","unstructured":"FrankA. and AsuncionA. UCI machine learning repository. School Comput Sci Univ California Los Angeles CA USA 2010. [Online] Available: http:\/\/archive.ics.uci.edu\/ml"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2011.2147312"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.04.077"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.08.019"},{"issue":"8","key":"e_1_3_2_21_2","first-page":"2161","article-title":"Parameter training approach based on variable particle swarm optimization for belief rule base","volume":"34","author":"Su Q.","year":"2014","unstructured":"SuQ., YangL.H., FuY.G., WuY.J. and GongX.T., Parameter training approach based on variable particle swarm optimization for belief rule base, Journal of Computer Applications34(8) (2014), 2161\u20132165.","journal-title":"Journal of Computer Applications"},{"issue":"8","key":"e_1_3_2_22_2","first-page":"2155","article-title":"Data driven construction and inference methodology of belief rule-base","volume":"34","author":"Yu R.Y.","year":"2014","unstructured":"YuR.Y., YangL.H. and FuY.G., Data driven construction and inference methodology of belief rule-base, Journal of Computer Applications34(8) (2014), 2155\u20132160.","journal-title":"Journal of Computer Applications"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2015.03.017"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.09.006"},{"issue":"5","key":"e_1_3_2_25_2","first-page":"88","article-title":"Differential evolutionary algorithm for parameter training of belief rule base under expert intervention","volume":"42","author":"Wang H.J.","year":"2015","unstructured":"WangH.J., YangL.H., FuY.G., WuY.J. and GongX.T., Differential evolutionary algorithm for parameter training of belief rule base under expert intervention, Computer Science42(5) (2015), 88\u201393.","journal-title":"Computer Science"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.06.018"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2356460"},{"key":"e_1_3_2_28_2","unstructured":"BallG. and HallD. A novel method of data analysis and pattern classification. California: Technical rept. NTIS AD 699616. Stanford Research Institute 1965."},{"issue":"2","key":"e_1_3_2_29_2","first-page":"257","article-title":"Structure optimization framework of extended belief rule based on BK-Tree","volume":"10","author":"Su Q.","year":"2016","unstructured":"SuQ., YangL.H., FuY.G. and YuR.Y., Structure optimization framework of extended belief rule based on BK-Tree, Journal of Frontiers of Computer Science and Technology10(2) (2016), 257\u2013267.","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.11.012"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/362003.362025"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-17521","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-17521","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-17521","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T04:19:12Z","timestamp":1770524352000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-17521"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":30,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["10.3233\/JIFS-17521"],"URL":"https:\/\/doi.org\/10.3233\/jifs-17521","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12]]}}}