175
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Application of Dempster-Shafer theory in combining the experts’ opinions in DEA

& ORCID Icon
Pages 915-925 | Received 17 Feb 2016, Accepted 20 Apr 2018, Published online: 02 May 2018

References

  • Banker, R., Charnes, A., & Cooper, W. (1984). Some models for estimating technical and scale inefficiencies in data envelopment analysis. Management Science, 30(9), 1078–1092.
  • Charnes, A., Cooper, W., Golany, B., Seiford, L., & Stutz, J. (1985). Foundations of data envelopment analysis for pareto-koopmans efficient empirical production functions. Journal of Econometrics, 30(1), 91–107.
  • Charnes, A., Cooper, W., & Rhodes, E. (1978). Measuring the efficiency of decision making units. European Journal of Operational Research, 2(6), 429–444.
  • Cooper, W., Huang , Z., & Li, S. (1996). Satisficing DEA models under chance constraints. Annals of operations research, 66(4), 279–295.
  • Cooper, W., Park, K., & Yu, G. (1999). Idea and ar-idea: Models for dealing with imprecise data in DEA. Management Science, 45(4), 597–607.
  • Dalkey, N., & Helmer, O. (1963). An experimental application of the Delphi method to the use of experts. Management Science, 9(3), 458–467.
  • Dempster, A. (1967). Upper and lower probabilities induced by a multivalued mapping. The Annals of Mathematical Statistics, 38(2), 325–339.
  • Denoeux, T. (2008). Conjunctive and disjunctive combination of belief functions induced by nindistinct bodies of evidence. Artificial Intelligence, 172, 234–264.
  • Dubois, D., & Prade, H. (1988). Representation and combination of uncertainty with belief functions and possibility measures. Computational Intelligence, 4(3), 244–264.
  • Efron, B. (1979). Bootstrap methods: Another look at the jackknife. The annals of Statistics, 7(1), 1–26.
  • Färe, R., & Grosskopf, S. H. (1996). Intertemporal production frontiers: with dynamic DEA. Boston: Kluwer Academic.
  • Färe, R., & Grosskopf, S. H. (2000). Network DEA. Socio-Economic Planning Sciences, 34, 35–49.
  • Helmer, O. (1966). The Delphi method for systematizing judgments about the future. Institute of Government and Public Affairs, University of California.
  • Kanjanatarakul, O., Kaewsompong, N., Sriboonchitta, S., & Denoeux, T. (2015). Estimation and prediction using belief functions: Application to stochastic frontier analysis. In Econometrics of risk (pp. 171–184). Springer International Publishing.
  • Kessentini, Y., Burger, T., & Paquet, T. (2015). A Dempster-Shafer theory based combination of handwriting recognition systems with multiple rejection strategies. Pattern Recognition, 48(2), 534–544.
  • Land, K., Lovell, C., & Thore, S. (1993). Chance-constrained data envelopment analysis. Managerial and Decision Economics, 14(6), 541–554.
  • Lefevre, E., Colot, O., & Vannoorenberghe, P. (2002). Belief function combination and conflict management. Information Fusion, 3(2), 149–162.
  • Liu, B. (2007). Uncertainty theory. Berlin: Springer.
  • Murphy, C. K. (2000). Combining belief functions when evidence conflicts. Decision Support Systems, 29, 1–9.
  • Negoita, C., Zadeh, L., & Zimmermann, H. (1978). Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets and Systems, 1, 3–28.\newpage
  • Olesen, O., & Petersen, N. (1995). Chance constrained efficiency evaluation. Management Science, 41(3), 442–457.
  • Perelman, S., & Santín, D. (2009). How to generate regularly behaved production data? A Monte Carlo experimentation on DEA scale efficiency measurement. European Journal of Operational Research, 199(1), 303–310.
  • Rakowsky, U. K. (2007). Fundamentals of the dempster-shafer theory and its applications to reliability modeling. International Journal of Reliability, Quality and Safety Engineering, 14(6), 579–601.
  • Sengupta, J. (1992). A fuzzy systems approach in data envelopment analysis. Computers & Mathematics with Applications, 24(8), 259–266.
  • Shafer, G. (1976). A mathematical theory of evidence (Vol. 1). Princeton: Princeton University Press.
  • Sigarreta, J. M., Ruesga, P., & Rodriguez, M. (2007). On mathematical foundations of the plausibility theory. International Mathematical Forum, 2(27), 1319–1328.
  • Smets, Ph (1990). The combination of evidence in the transferable belief model. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 12, 447–458.
  • Soyster, A. L. (1973). Convex programming with set-inclusive constraints and applications to inexact linear programming. Operations Research, 21, 1154–1157.
  • Tone, K. (2001). A slacks-based measure of efficiency in data envelopment analysis. European Journal of Operational Research, 130(3), 498–509.
  • Tone, K., & Tsutsui, M. (2009). Network DEA: A slacks-based measure approach. European Journal of Operational Research, 197(1), 243–252.
  • Tone, K., & Tsutsui, M. (2010). Dynamic DEA: A slacks-based measure approach. Omega, 38(3), 145–156.
  • Walley, P. (1991). Statistical reasoning with imprecise probabilities. London: Chapman and Hall.
  • Wang, X., Gao, Z., & Guo, H. (2012). Delphi method for estimating uncertainty distributions. Information: An International Interdisciplinary Journal, 15, 449–460.
  • Yager, R. (1987). On the dempster-shafer framework and new combination rules. Information Sciences, 41(2), 93–137.
  • Zadeh, L. (1979). On the validity of Dempster’s rule of combination of evidence. Electronics Research Laboratory, University of California.
  • Zadeh, L. (1984). Review of a mathematical theory of evidence. AI magazine, 5(3), 81–83.
  • Zadeh, L. (1986). A simple view of the dempster-shafer theory of evidence and its implication for the rule of combination. AI magazine, 7(2), 85–90.
  • Zellner, A., Kmenta, J., & Drèze, J. (1966). Specification and estimation of Cobb-Douglas production function models. Econometrica: Journal of the Econometric Society, 34(4), 784–795.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.