Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Editor-in-Chief
Prof. Janusz Kacprzyk
Systems Research Institute
Polish Academy of Sciences
ul. Newelska 6
01-447 Warsaw
Poland
E-mail: kacprzyk@ibspan.waw.pl
284
Janusz T. Starczewski
Advanced Concepts
in Fuzzy Logic and Systems
with Membership Uncertainty
ABC
Author
Dr. Janusz T. Starczewski
Czestochowa University of Technology
Poland
ISSN 1434-9922
e-ISSN 1860-0808
ISBN 978-3-642-29519-5
e-ISBN 978-3-642-29520-1
DOI 10.1007/978-3-642-29520-1
Springer Heidelberg New York Dordrecht London
Library of Congress Control Number: 2012936523
c Springer-Verlag Berlin Heidelberg 2013
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of
the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology
now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection
with reviews or scholarly analysis or material supplied specifically for the purpose of being entered
and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of
this publication or parts thereof is permitted only under the provisions of the Copyright Law of the
Publishers location, in its current version, and permission for use must always be obtained from Springer.
Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations
are liable to prosecution under the respective Copyright Law.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any
errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect
to the material contained herein.
Printed on acid-free paper
Springer is part of Springer Science+Business Media (www.springer.com)
Preface
It is well known that fuzzy sets can describe gradual properties, such as
young or big, using functions for membership to sets. Fuzzy sets of type-2
are equipped with fuzzy membership functions, and hence are called fuzzyvalued fuzzy sets. Whilst fuzzy sets are used to model vagueness, fuzzy-valued
fuzzy sets have the capacity to model the imprecision of the actual membership function. Both, vagueness and imprecision are intrinsic aspects of any
engineering design.
This book summarizes achievements of the author in type-2 fuzzy set theory, reasoning using rough approximations of fuzzy sets, and construction of
fuzzy logic systems. The original contribution is situated on a background of
the most important scientic developments in these elds. To date, mostly
interval type-2 fuzzy sets have been used to construct many concrete working
designs of fuzzy logic systems. Unfortunately, most of such realizations are
burdened with the same level of uncertainty regarding membership function.
Moreover, it is common practice to add membership uncertainty to a fuzzy
model having no specic cause or source of such uncertainty. By defuzzifying
outputs to crisp values, it would be naive to expect that the performance in
such cases will be improved beyond that of the classical fuzzy logic systems.
However, uncertainty taken into account for some particular system parameters, for which we have only limited perception, undoubtedly, bring more
reliable responses of a fuzzy-valued fuzzy system. The use of type-2 systems
is also justied if we want to get the full spectrum of systems responses under parametric uncertainty, rather than crisp responses. Consequently, this
book sets new trends in handling of uncertainty with as simple as possible
formulations of proposed type-2 and rough-fuzzy methods without limiting
a broad perspective on fuzzy and rough reasoning. Hopefully, this book is
a largely complete source of information about extensions to fuzzy sets and
systems.
VIII
Preface
Particularly:
starting from semantics, we aim to categorize dierent types of uncertainty
regarding various sources of it within fuzzy logic framework,
then, we derive a number of formulae for t-norms, t-conorms and
S-implications extended on fuzzy subsets of the membership interval,
alternatively, we demonstrate how to create a new class of fuzzy-valued
fuzzy systems based on axiomatic norms, departing from the extension
principle,
we generalize type-2 fuzzy logic systems, rough-fuzzy systems and fuzzyrough systems to a so called uncertain fuzzy logic systems,
in this matter, we exhibit particular constructions of uncertain fuzzy logic
systems, including systems based on triangular, trapezoidal and Gaussianvalued fuzzy sets,
we provide several methods to generate membership uncertainty, therein,
a membership uncertainty tting using the fuzzy C-means algorithms, an
approach to multiperson decision making, incomplete information reasoning based on rough-fuzzy sets, and generalized fuzzication,
we point out the possibility to use approximations of some uncertain fuzzy
logic systems to ordinary fuzzy systems, when the uncertainty is either
uniform or proportional to activation of rules,
nally, we include all derived methods in the new methodology for designing fuzzy systems under parametric uncertainty.
With hope, this book delivers a sucient mathematical background to treat
a matter of computing seriously, respecting important engineering properties
of fuzzy sets and of their uncertain extensions. Experiments and numerical
simulations are attached for exemplary purposes especially in order show
the potential of uncertain fuzzy logic systems. For more advanced methods
the reader is referred to the literature, while further methods are still under elaboration at the Department of Computer Engineering in Czestochowa
University of Technology. This book has been written in partial fullment
of habilitation qualication and the work has been partly supported by Polish Ministry of Science and Higher Education (Habilitation Project N N516
372234 20082011).
I am very grateful to Professor Leszek Rutkowski and Professor Janusz
Kacprzyk for their help and valuable comments.
Czestochowa, January 22, 2012
Janusz T. Starczewski
Contents
1
1
4
9
11
12
13
17
18
21
22
25
27
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
2
33
33
35
36
38
40
41
44
Contents
2.3
2.4
2.5
2.6
49
51
53
58
61
62
63
66
70
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
3
77
77
79
80
82
85
86
87
89
90
90
92
99
103
113
116
117
118
125
Contents
XI
137
137
140
143
146
146
160
168
169
171
173
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
5
181
181
181
182
184
186
186
187
189
192
193
201
202
206
206
210
210
217
219
XII
Contents
279
279
280
282
282
283
299
302
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Chapter 1
(1.1)
A : X [0, 1] .
(1.2)
(1.3)
(1.4)
(1.6)
(1)
(1.7)
(1.8)
It is known [Klement et al 2000] that f (1) is non-decreasing and leftcontinuous whenever f is non-decreasing and f (1) is non-increasing and
right-continuous whenever f is non-increasing. The double use of the pseudo
(1)
inverse gives an original function f , i.e., f (1)
= f , if and only if
f is either non-decreasing and left-continuous such that f (a) = c or nonincreasing and right-continuous such that f (a) = d. Unfortunately, upper
semicontinuous functions are either non-decreasing and right-continuous or
non-increasing and left continuous. Thus, we need to dene a new pseudoinverse, which is the least upper bound of all quasi-inverses presented
[Klement et al 1999].
Denition 1.6. Let f : [a, b] [c, d] be a non-decreasing (non-increasing)
and non-constant function, where [a, b] and [c, d] are closed subintervals of
the real line R. Then an upper pseudo-inverse f [1] : [c, d] [a, b] of f is
dened by
f [1] () = inf {u [a, b] |f (u) > }
(f [1] () = inf {u [a, b] |f (u) < }) ,
(1.9)
(1.10)
where inf = b.
It is easy to verify that f [1] is non-decreasing and right-continuous whenever
f is non-decreasing and f [1] is non-increasing and left-continuous whenever
f is non-increasing. Moreover, the upper pseudo-inverse fullls the require
[1]
ment f [1]
= f for non-decreasing and right-continuous functions when
f (b) = d, and for non-increasing and left-continuous functions when f (b) = c.
(1.11)
(1.12)
(1.13)
where
The proof of this theorem is in [Negoita and Ralescu 1975]. Two other extensions of it can be found in [Klir and Yuan 1995].
It can be easily notied that the standard fuzzy operations dened by
(1.11), (1.12) and (1.13) are not the only possible generalizations of classical
set operations. Conventional fuzzy logic performs intersection and union of
fuzzy sets also by calculating triangular norms and triangular conorms, respectively. The triangular norms operate on crisp membership grades of fuzzy
sets taking part in set operations. Having two fuzzy subsets of X, A X and
B X, characterized by their membership functions, A : X [0, 1] and
B : X [0, 1], respectively, a membership grade of the intersection A B
of the two sets at x X, AB is expressed by
AB (x) = T (A (x) , B (x)) ,
(1.14)
(1.15)
(1.16)
Triangular norms were originally studied as triangular inequalities from classical metric spaces to probabilistic metric spaces [Menger 1942; Schweizer
and Sklar 1983b].
Denition 1.9. A t-norm is a function of two variables T : [0, 1] [0, 1]
[0, 1] that for all x, y, z [0, 1] satises the following four axioms:
1. monotonicity: T (x, y) T (x, z) if y z,
2. commutativity: T (x, y) = T (y, x),
3. associativity: T (T (x, y) , z) = T (x, T (y, z)),
4. existence of the unit element: T (x, 1) = x.
In addition to the existence of the unit element, form this denition the
following boundary can be derived:
T (x, 0) = 0.
(1.17)
equivalently, T1 weaker than T2 . The four basic t-norms are ordered in the
following way
(1.18)
TD < TL < TP < TM ,
while the drastic product and the minimum are the smallest (weakest) and
the largest (strongest) t-norm of all t-norms. Moreover, the minimum t-norm
is the unique triangular norm in which each x [0, 1] is an idempotent
element, i.e. T (x, x) = x. Contrary, the drastic product is the unique t-norm
that satises T (x, x) = 0 for all x [0, 1).
The product t-norm is a prototype of a subclass of continuous t-norms
called strict t-norms, which is dened by the inequality T (x, z) < T (y, z)
whenever x < y and z > 0. Each strict t-norm is isomorphic to the product tnorm, which means there exist a strictly increasing bijection : [0, 1] [0, 1]
2
such that for all pairs {x, y} [0, 1]
Ts (x, y) = 1 ( (x) (y)) .
(1.19)
The L
ukasiewicz t-norm is a prototype of a subclass of t-norms called nilpotent t-norms being continuous and such that for all x (0, 1) there exists
n
n N such that T x, x, . . . , x = 0. Each nilpotent t-norm is isomorphic to
the L
ukasiewicz t-norm, which means that there exists a strictly increasing
2
bijection : [0, 1] [0, 1] such that for all pairs {x, y} [0, 1]
Tn (x, y) = 1 (max ( (x) + (y) 1) , 0) .
(1.20)
Throughout this book, especially in Chapt. 2, quite often continuous Archimedean t-norms will be employed.
The t-normis called Archimedean whenn
ever there exists n N such that T x, x, . . . , x < y for each {x, y} (0, 1)2 .
Narrowing its meaning to a continuous Archimedean t-norm, its denition
may be reduced to the statement that T (u, u) < u for all u (0, 1). Each
continuous Archimedean t-norm is either strict or nilpotent [Schweizer and
Sklar 1983a]. From [Mostert and Shields 1957; Ling 1965], it follows a well
known characterization that a t-norm is continuous if and only if it is isomorphic to an ordinal sum of the minimum, L
ukasiewicz, and product t-norms.
While t-norms are used in modelling logical conjunction of fuzzy sets,
to model a logical disjunction of fuzzy sets, a notion of a triangular norm
complementary to a t-norm is introduced, called a t-conorm for short.
Denition 1.10. A t-conorm is a function of two variables S : [0, 1][0, 1]
[0, 1] that for all x, y, z [0, 1] satises the following four axioms:
1. monotonicity: S (x, y) S (x, z) if y z,
2. commutativity: S (x, y) = S (y, x),
3. associativity: S (S (x, y) , z) = S (x, S (y, z)),
4. existence of the zero element: S (x, 0) = x.
(1.21)
(1.22)
(1.23)
z[0,1]
(1.24)
4. the Dubois-Prade
implication:
max (1 x, y) if min (1 x, y) = 0 ,
IDP (x, y) =
.
1
otherwise .
The foundation of residual implications is that these implications reect a
partial ordering on propositions, i.e., Ir (x, y) = 1 if and only if x y. The
four fundamental r-implications can be determined as residua of the minimum, the product, the L
ukasiewicz and the drastic product t-norm, respectively as:
y if x > y ,
1. the Godel implication: IG (x, y) =
,
1 otherwise .
min xy , 1 if x > 0 ,
,
2. the Goguen implication: IGog (x, y) =
1
otherwise .
3. the L
ukasiewicz implication IL (x, y),
y if x = 1 ,
4. residuum of the drastic product: IrD (x, y) =
.
1 otherwise .
Note that the L
ukasiewicz implication is both the strong and the residual implication. Similarly, Kleene-Dienes implication may be constructed
as the residuum of the nilpotent minimum t-norm dened by TnM (x, y) =
{min (x, y) if x + y > 1; 0 otherwise}.
Derivations of quantum logic implications successively by TM , TP , TL , TD
and their dual t-conorms with respect to the standard fuzzy negation are
presented as:
1.
2.
3.
4.
10
Several years after, in 1975, returning to this topic, Zadeh generalized the
notion of the fuzzy set to the well known fuzzy sets of type-2, whose membership grades are fuzzy subsets of the unit interval [Zadeh 1975]. As in recent
years the concept of the type-2 fuzzy set has been severely devalued by using
it almost exclusively in the context of interval-valued fuzzy sets, we will refer
to general type-2 fuzzy sets using its alternative name of fuzzy-valued fuzzy
sets.
Denition 1.12. A type-2 fuzzy subset of a set X (called also a fuzzy is a vague collection of elements characvalued fuzzy set), denoted by A,
terized by membership function A : X F ([0, 1]), where F ([0, 1]) is a set
of all classical fuzzy sets in the unit interval [0, 1].
In detail, each x X is associated with a secondary membership function
fx F ([0, 1]) being a mapping fx : [0, 1] [0, 1]. The fuzzy membership
grade A (x) applied is called a fuzzy truth value, since its domain is the
truth interval [0, 1].
Denition 1.13. A fuzzy truth value, F , is a fuzzy subset of the unit
interval [0, 1].
We can say that F belongs to the power set of all fuzzy truth values F ([0, 1]).
Only convex fuzzy truth values have linguistic interpretation as for example more or less high, denitely medium, and somehow low. Thus, usually
F ([0, 1]) is restricted to fuzzy truth intervals (called also at fuzzy truth
numbers) or fuzzy truth numbers for their fuzzy-convexity. In Chapt. 2,
we will show that the fuzzication of operations for non-convex fuzzy sets
according to the extension principle does not always lead to t-norms on these
fuzzy truth values, which is not the case for convex fuzzy truth values. Hence,
the application of non-convex fuzzy truth values to fuzzy logic is questionable.
Convex fuzzy truth intervals which are also normal, in the context of secondary membership functions, can be regarded as an uncertain interval.
Denition 1.14. A fuzzy truth value F with a membership function f is
called a fuzzy truth interval if it is normal, u [0, 1] f (u) = 1, and
convex, u1 , u2 , [0, 1] , f (u1 + (1 ) u2 ) min (f (u1 ) , f (u2 )).
Secondary membership functions in the particular form of fuzzy truth intervals, which are fuzzy truth numbers, may instead be seen as a fuzzied single
membership grade.
Denition 1.15. A fuzzy truth interval is a fuzzy truth number when
the normality is additionally satised by a unique number, i.e., !u
[0, 1] f (u) = 1.
Note that fuzzy truth intervals represent a more general concept than intervals in interval type-2 fuzzy sets or interval-valued fuzzy sets. Specically,
11
0.8
0.6
0.4
0.2
0.2
0.4
0.6
0.8
12
(1.25)
B
can be realized using an extension of the maximum,
the standard union A
i.e.,
(A (x) , B (x)) = [max(ux , v x ), max(ux , v x )] ,
A
B
(x) = max
(1.26)
and the standard complement A can be characterized by an extended negation function, i.e.,
eg (A (x)) = [1 ux , 1 ux ] .
A (x) = n
(1.27)
The algebraic operations for interval-valued fuzzy sets are well dened and
elaborated [Dziech and Gorzalczany 1987; Gorzalczany 1987; Karnik and
Mendel 2000; Uncu and T
urksen 2007; Walker and Walker 2009; Zadeh 1975].
The set of truth intervals I ([0, 1]) is only a partially ordered set under max
[Dubois and Prade 1980], while the ordering relation for truth inand min,
tervals is dened by [Zadeh 1975] as
[u, u] [v, v] u v u v .
(1.28)
The algebra of interval-valued fuzzy sets, denoted by I ([0, 1]) , max,
min,
n
eg, [0, 0] , [1, 1]), is a bounded distributive lattice with an involution n
eg that
satises De Morgans laws [Walker and Walker 2009].
13
(1.29)
(1.30)
min(u,v)=w
(1.31)
(1.32)
max(u,v)=w
(1.33)
(1.34)
14
(1.35)
xA
(1.37)
xA
/
= inf (1 (x)) .
xA
/
(1.38)
It can be easily veried that, with respect to the possibility, the necessity
measure satises
1. () = 0, and (X) = 1;
2. for any family {Ai } of subsets of X, ( i Ai ) = inf i (Ai ).
15
Moreover, measures of possibility and necessity constrain each other such that
at least one of possibility and necessity degrees takes the extreme value, i.e.,
(A) = 0 or (A) = 1. Of course, they can take these values simultaneously,
which characterizes the largest uncertainty about A. For every A P (X),
any necessity measure on P (X) and the associated possibility measure
satisfy the following implications [Klir and Yuan 1995] (see also [Kruse et al
1994]):
(A) < 1 (A) = 0,
(1.39)
(1.40)
(1.41)
let us measure possibility and necessity of A1 = [0.5, 2.5], A2 = [2.5, 3.5], and
A3 = [2.5, 10]. According to (1.35) and (1.36), we obtain the following
1
(A1 ) = sup (x) = (2.5) = ,
e
xA1
(A1 ) = inf (1 (x)) = 1 (5) = 0,
xA
/ 1
1
,
0.18
e
xA2
(A2 ) = inf (1 (x)) = 1 (5) = 0,
1
(A3 ) = inf (1 (x)) = 1 (2.5) = 1 .
e
xA
/ 3
16
Figure 1.2 presents the construction of possibility and necessity degrees for
the three crisp sets from Example 1.1. It may seem surprising that the left
endpoint of A1 does not have any inuence neither on the possibility degree
nor the necessity degree. Identically, the actual value of the left endpoint A2
is of no importance. This is a specicity of applying the possibility measure
given by (1.35).
Now, let us recall some basic properties of fuzzy measures.
Denition 1.19. The fuzzy measure is dened as a set function g : P (X)
[0, 1], which satises
1. boundary constraints
g () = 0,
g (X) = 1.
(1.42)
(1.43)
(a)
1
0.8
A1,
(A1) 0.6
0.4
0.2
(A1) 0
10
10
10
x
(b)
1
A2,
(A2)
0.8
0.6
0.4
0.2
(A ) 0
2
4
x
(c)
(A3) 1
A3,
0.8
0.6
(A ) 0.4
3
0.2
0
4
x
Fig. 1.2 Calculation of possibility and necessity degrees of crisp sets: possibility distribution (dashed lines), Ai crisp sets (solid lines), (Ai ) and (Ai )
possibility and necessity, i = 1, 2, 3
17
2. monotonicity
g (A) g (B) if A B, A, B P (X) ,
3. continuity (for an innite reference set X)
lim g (Ai ) = g lim Ai
i
(1.44)
(1.45)
if A1 A2 . . . or A1 A2 . . . , i N, Ai P (X) ,
For any two sets A and B, both A, B AB, thus the monotonicity of fuzzy
measures ensures that every fuzzy measure g satises the following inequality
g (A B) max (g (A) , g (B)) .
(1.46)
(1.47)
Obviously, the possibility and necessity measures are special forms of fuzzy
measures. The following basic operations of possibility theory hold for every
A, B P (X) (see e.g. [Klir and Yuan 1995; Kruse et al 1994])
(A B) = max ( (A) , (B))
(1.48)
(1.49)
In general, for the possibility of a conjunction of sets only (1.47) holds, with
g acting as , while for the necessity of a disjunction of sets (1.46) is valid,
with g representing . Next, if we compare (1.48) with the general property
(1.46), and (1.49) with (1.47), we can observe that possibility theory is based
on marginal fuzzy measures with respect to disjunctions and conjunctions of
sets.
18
(1.50)
xX
(1.51)
Although instead of min and max, generally t-norms and t-conorms may be
considered, Dubois et al. proposed set of axioms justifying the use of min
and max in the denitions of possibility and necessity measures [Dubois et al
2001]. Note that these equations are even valid when A is a classical subset
of X, which will be helpful in understanding notions of rough-fuzzy sets and
fuzzy-rough sets in the next section.
Example 1.2. Considering the Gaussian possibility distribution (1.41) from
Example 1.1, we can measure possibility and necessity of fuzzy
events
charac
terized by following membership functions A1 (x) = exp 21 x2 , A2 (x) =
max (0, min (x/2.5, (5 x) /2.5)), and A3 (x) = {1 if x [2.5, 10] , 0 otherwise }.
The respective possibility and necessity degrees determined according to
(1.50) and (1.51) are presented in Fig. 1.3. Obviously the constraining properties (1.40) and (1.39) are not valid for the case of possibility and necessity
of fuzzy sets.
19
(1.52)
(1.53)
Therefore, the rough set is an approximation by two crisp sets, one representing the lower boundary of the target set A, and the other representing the
upper boundary of A. Equation (1.52) represents the union of all equivalence
classes [x]R that are contained in A, while an another meaning of (1.53) is the
(a)
1
A1,
0.8
0.6
(A1) 0.4
0.2
(A ) 0
1
10
10
10
x
(b)
1
A2,
(A2)
0.8
0.6
0.4
(A2) 0.2
0
4
x
(c)
(A3) 1
A3,
0.8
0.6
0.4
(A )
3
0.2
0
4
x
Fig. 1.3 Calculation of possibility and necessity degrees of fuzzy sets: possibility distribution (dashed lines), Ai membership functions of fuzzy sets (solid
lines), (Ai ) and (Ai ) possibility and necessity, i = 1, 2, 3
20
union of all equivalence classes that overlap with each other in A. Obviously,
A cannot be precisely described if there is the evident indiscernibility between elements in A, i.e. R (A) = R (A). The equivalence relation R (x1 , x2 )
signies that elements x1 and x2 are such similar that are indiscernible. The
equivalence class [x]R induced by R acts as an information granule of coarsened X.
A one-dimmensional example in measure processing can help to clarify
rough sets.
Example 1.4. Suppose we have to measure a length of an objects within
interval X = [0, 10) mm. Furthermore, we assume that technically only millimeters can be measured; thus X must be coarsened into elementary intervals
Xi = [i, i + 1), i = 0, . . . , 9. Formally, an equivalence relation R (x, i) informs
that x can be rounded by i and induces the class of objects labelled with the
same description
[x]R . In consequence, the rough approximation of subset
is
evaluated
as follows
A = 53 , 10
3
R (A) = {x| [x]R A} = X2
R (A) = {x| [x]R A = } =
(1.54)
(X1 , X2 , X3 ) ,
(1.55)
Figure 1.4 presents the case when A from Example 1.4 is approximated by
the partition dened as X1 = [1, 2), X2 = [2, 3), X3 = [3, 6), and X4 = [6, 9).
To better understand the notion of rough sets, we may compare them
to fuzzy sets. In the concept of rough sets, an object cannot be precisely
described since some other objects are indiscernible to the considered one.
On the contrary, the concept of fuzzy sets introduces an intrinsic vagueness
of an object, as for example we cannot describe a yellow color in therms of
its wavelength. Some colors may be even ambivalent. Therefore roughness is
the problem connected with granularity of X, while fuzziness is the problem
of ill-denition of the object itself.
The following properties are satised by rough sets.
1.
2.
3.
4.
5.
R (X) X R (X),
R () = R () = and R (X) = R (X) = X,
R (X Y ) = R (X) R (Y ) and R (X Y ) = R (X) R (Y ),
X Y implies that R (X) R (Y ) and R (X) R (Y ),
R (X X) = XR (X) and R (X X) = XR (X).
21
A, X
(a)
R(A)1
R(A)1 =
1
5
x
(b)
10
5
x
(c)
10
10
10
A, X
R(A)2
R(A)2
1
A, X
R(A)3
R(A)3 =
0
5
x
(d)
R(A)
R(A)
0
5
x
Fig. 1.4 Rough approximations of a set A (thin solid lines); Xi partition sets
(dashed lines); (ac) R (A)i and R (A)i lower and upper rough approximations
by individual partition sets (thick solid lines), i = 1, 2, 3, (d) R (A) and R (A)
rough set of A by crisp partition sets
In [Dubois and Prade 1990b], the rough approximation of a fuzzy set is provided
such that a label Xi indicates the equivalence class in the condition clause. In
our approach, we identify a coarse subset of X with its label, such that the upper
and lower approximations are functions of subsets of X rather than mappings
from names to membership degrees.
22
(1.56)
(1.57)
(1.58)
(1.59)
23
(a)
A, X
0.5
R(A) (X1 )
A, X2
R(A) (X1 )
0
0
5
x
(b)
10
5
x
(c)
10
5
x
(d)
10
5
x
10
R(A) (X2 )
0.5
R(A) (X2 )
0
R(A) (X3 )
1
A, X
R(A) (X3 )
0.5
1
R(A)
0.5
R(A)
Fig. 1.5 Rough approximations of fuzzy sets: A fuzzy set (solid line), Xi
partition sets (dashed lines); (ac) R(A) (Xi ) and R(A) (Xi ) membership set
functions of individual partition sets for lower and upper rough approximations
(thick solid lines), i = 1, 2, 3, (d) R(A) and R(A) rened membership functions
of x for the rough-fuzzy set
A general and exible interpretation of the these approximations was proposed in [Nakamura 1988] as a fuzzy-rough sets based on extended equivalence relations that correspond to Zadehs similarity relations. More precisely, Nakamura considered a fuzzy relation R on X, which are reexive
(R (x, x) = 1 x X), symmetric (R (x, y) = R (y, x) x, y X), and
transitive (R (x, z) supy min (R (x, y) , R (y, z)) x, y, z X), which
can be decomposed into -cuts allowing the fuzzy-rough set to be an composition of rough-fuzzy sets of the forms given by (1.56) and (1.57).
Denition 1.22 ([Nakamura 1988]). Let X be a set, X be a subset of
X and R be a fuzzy equivalence relation on X, i.e. reexive, symmetric and
transitive, characterized by its membership function R . A fuzzy-rough
approximation of a fuzzy set A in the sense of Nakamura is a composition
of upper and lower rough approximations of A, by -cuts of R , characterized
by
24
(1.60)
(1.61)
(1.62)
Therefore, a fuzzy-rough set may also be interpreted as a pair (A) , (A)
of the lower and upper approximations of A by which may be derived in
the spirit of Nakamuras denition. Now, fuzzy partition sets Fi can be decomposed into -cuts allowing the fuzzy-rough set to be an -composition of
rough-fuzzy sets.
Let {Fi } be a family of fuzzy partition sets. A fuzzy-rough approximation
of a fuzzy set A is a family of lowerand upper
rough
approximations of A by
-cuts of Fi , denoted by i, (A) and i, (A) , (0, 1], for each i-th
partition set, i.e.,
i, (A) = sup {A (x) |x [Fi ] } ,
(1.63)
(1.64)
Such interpreted fuzzy-rough sets are always dened on weak fuzzy partitions
on X with disjoint subpartition fuzzy sets Fi satisfying
sup min Fi (x) , Fj (x) < 1 i = j .
(1.65)
x
(A)
,
(A)
formally represents a fuzzy grade of type-2.
i,
i,
(0,1]
25
(b)
(a)
1
A, F
0.5
5
x
(c)
A, F
0.5
5
x
(e)
10
A, F
0.5
10
0.5
5
x
10
0.5
(d)
0.5
(f)
0.5
0.5
0.5
(1.66)
(1.67)
26
(b)
1
[1, (A), 1, (A)]
A, F1
0.5
A, F2
0.5
5
x
(e)
A, F3
0.5
5
x
10
0.5
(d)
0.5
(f)
0.5
0.5
10
10
5
x
(c)
0.5
0.5
Fig. 1.7 Fuzzy-rough approximations of a Gaussian fuzzy set in the sense of Nakamura: (a,c,e) A Gaussian fuzzy set (solid lines), Fi fuzzy partition sets (dashed
lines), (b,d,f) i, (A) , i, (A) -cuts of the fuzzy-rough set, i = 1, 2, 3
It can be easily observed that fuzzy-rough sets, with respect to normal fuzzy
partition sets, are isomorphic to the possibility and necessity measures of
a fuzzy event. One may nd similarities between (1.56)(1.57) and (1.50)
(1.51). For that reason, a graphical explanation of the fuzzy-rough set is
identical with that presented in Fig. 1.3 if only we replace a possibility distribution to the fuzzy partition set Fi , and possibility degrees (Ai ) to
the upper approximations of Ai , and necessity degrees (Ai ) to the lower
approximations of Ai .
By analogy to the two concepts, the possibility and necessity measures,
fuzzy-rough sets of Dubois and Prade can be expressed with the use of a
t-norm and a fuzzy implication operator, i.e.,
R(A) (Fi ) = sup T (Fi (x) , A (x)) ,
(1.68)
(1.69)
27
28
References
Atanassov, K.T.: Intuitionistic fuzzy sets. Fuzzy Sets and Systems 20, 8796 (1986)
Atanassov, K.T.: Intuitionistic fuzzy sets: theory and applications. Studies in Fuzziness and Soft Computing, vol. 35. Springer-Verlag (1999)
Baczy
nski, M., Jayaram, B.: Fuzzy implications. Studies in Fuzziness and Soft Computing, vol. 231. Springer, Heidelberg (2008)
Borkowski, L. (ed.): Selected Works of J. L
ukasiewicz, North-Holland, Amsterdam
(1970)
Bustince, H., Burillo, P.: Vague sets are intuitionistic fuzzy sets. Fuzzy Sets and
Systems 79(3), 403405 (1996)
Dubois, D., Prade, H.: Fuzzy sets and systems: Theory and applications. Academic
Press, Inc., New York (1980)
Dubois, D., Prade, H.: Necessity measures and the resolution principle. IEEE Transactions on Systems, Man, and Cybernetics 17, 474478 (1987)
Dubois, D., Prade, H.: Possibility Theory. Plenum Press, New York (1988)
Dubois, D., Prade, H.: Resolution principles in possibilistic logic. International Journal of Approximate Reasoning 4, 121 (1990a)
Dubois, D., Prade, H.: Rough fuzzy sets and fuzzy rough sets. International Journal
on General Systems 17, 191209 (1990)
Dubois, D., Prade, H.: Fuzzy sets in approximate reasoning, part 1: inference with
possibility distributions. Fuzzy Sets and Systems 40, 143202 (1991)
Dubois, D., Prade, H.: Interval-valued fuzzy sets, possibility theory and imprecise probability. In: Proceedings of International Conference in Fuzzy Logic and
Technology, pp. 314319 (2005)
Dubois, D., Prade, H., Sabbadin, R.: Decision-theoretic foundations of qualitative possibility theory. European Journal on Operational Research 128, 459478
(2001)
Dubois, D., Esteva, F., Godo, L., Prade, H.: An information-vased discussion of
vagueness. In: Cohen, H., Lefebvre, C. (eds.) Handbook of Categorization in
Cognitive Science, ch. 7, pp. 892913. Elsevier (2005)
Dziech, A., Gorzalczany, M.B.: Decision making in signal transmission problems
with interval-valued fuzzy sets. Fuzzy Sets and Systems 23, 191203 (1987)
G
odel, K.: Zum intuitionistischen aussagenkalk
ul (on the intuitionistic propositional
calculus). Mathematisch-Naturwissenschaftliche Klasse 69, 6566 (1932)
30
References
Goguen, J.: L-fuzzy sets. Journal of Mathematical Analysis and Applications 18,
145174 (1967)
Gorzalczany, M.B.: A method of inference in approximate reasoning based on
interval-valued fuzzy sets. Fuzzy Sets and Systems 21, 117 (1987)
Greco, S., Matarazzo, B., Slowi
nski, R.: Fuzzy Similarity Relation as a Basis for
Rough Approximations. In: Polkowski, L., Skowron, A. (eds.) RSCTC 1998.
LNCS (LNAI), vol. 1424, pp. 283289. Springer, Heidelberg (1998)
Greco, S., Inuiguchi, M., Slowi
nski, R.: Fuzzy rough sets and multiple-premise gradual decision rules. International Journal of Approximate Reasoning 41(2), 179
211 (2006)
Inuiguchi, M., Tanino, T.: New fuzzy rough sets based on certainty qualication.
In: Pal, S.K., Polkowski, L., Skowron, A. (eds.) Rough-Neural Computing: Techniques for Computing with Words, pp. 277296. Springer, Heidelberg (2004)
Karnik, N.N., Mendel, J.M.: Operations on type-2 fuzzy sets. Fuzzy Sets and Systems 122, 327348 (2000)
Kleene, S.: Introduction to Metamathematics. Van Nostrand (1952)
Klement, E.P., Mesiar, R., Pap, E.: Quasi- and pseudo-inverses of monotone functions, and the construction of t-norms. Fuzzy Sets and Systems 104, 313 (1999)
Klement, E.P., Mesiar, R., Pap, E.: Triangular Norms. Kluwer, Dordrecht (2000)
Klir, G.J., Yuan, B.: Fuzzy sets and fuzzy logic: Theory and applications. Prentice
Hall PTR, Upper Saddle River (1995)
Kruse, R., Gebhardt, J., Klawonn, F.: Foundations of fuzzy systems. John Wiley
& Sons (1994)
Ling, C.H.: Representation of associative functions. Publicationes Mathematicae
Debrecen 12, 189212 (1965)
Liu, W.N., Yao, J., Yao, Y.: Rough Approximations Under level Fuzzy Sets.
In: Tsumoto, S., Slowi
nski, R., Komorowski, J., Grzymala-Busse, J.W. (eds.)
RSCTC 2004. LNCS (LNAI), vol. 3066, pp. 7883. Springer, Heidelberg (2004)
L
ukasiewicz, J.: O logice tr
ojwartosciowej (on three-valued logic). Ruch Filozoczny 5, 170171 (1920c) (in english translation) [Borkowski 1970]
L
ukasiewicz, J., Tarski, A.: Untersuchungen u
ber den aussagenkalk
ul. Comptes
Rendus des Seancs de la Societe des Sciences et des Lettres de Varsovie 23,
3050 (1930) (in english translation) [Borkowski 1970]
Mas, M., Monserrat, M., Torrens, J., Trillas, E.: A survey on fuzzy implication
functions. IEEE Transactions on Fuzzy Systems 15(6), 11071121 (2007)
Mendel, J.M.: Uncertain rule-based fuzzy logic systems: Introduction and new directions 2001. Prentice Hall PTR, Upper Saddle River (2001)
Menger, K.: Statistical metrics. Proc. National Academy of Science 28(12), 535537
(1942)
Mizumoto, M., Tanaka, K.: Some properties of fuzzy sets of type-2. Information
and Control 31, 312340 (1976)
Moore, R.: Interval Analysis. Prentice-Hall, Englewood Clis (1966)
Mostert, P., Shields, A.: On the structure of semigroups on a compact manifold
with boudary. Annals of Mathematics 65, 117143 (1957)
Nakamura, A.: Fuzzy rough sets. Note on Multiple-Valued Logic in Japan 9(8), 18
(1988)
Negoita, C., Ralescu, D.: Applications of Fuzzy Sets to Systems Analysis. Wiley,
New York (1975)
References
31
Nguyen, H.S., Pal, S.K., Skowron, A.: Rough sets and fuzzy sets in natural computing. Theoretical Computer Science 412(42), 58165819 (2011)
Nguyen, H.T., Walker, E.A.: A rst course in fuzzy logic, 2nd edn. Chapman &
Hall/CRC (2000)
Pawlak, Z.: Rough sets. International Journal of Computer and Information Science 11, 341356 (1982)
Pawlak, Z.: Rough classication. International Journal of Man-Machine Studies 20,
469485 (1984)
Schweizer, B., Sklar, A.: Probabilistic Metric Spaces. North-Holland, New York
(1983a)
Schweizer, B., Sklar, A.: Statistical metric spaces. Pacic Journal of Mathematics 10, 313334 (1983b)
Shafer, G.: A Mathematical Theory of Evidence. Princeton Univ. Press, Princenton
(1976)
Skowron, A.: Rough sets and vague concepts. Fundamenta Informaticae 64(14),
417431 (2005)
Skowron, A.: Rough Sets in Perception-Based Computing. In: Pal, S.K., Bandyopadhyay, S., Biswas, S. (eds.) PReMI 2005. LNCS, vol. 3776, pp. 2129.
Springer, Heidelberg (2005)
Starczewski, J.T.: General type-2 FLS with uncertainty generated by fuzzy rough
sets. In: Proc. IEEE-FUZZ 2010, Barcelona, pp. 17901795 (2010)
Uncu, O., T
urksen, I.B.: Discrete interval type 2 fuzzy system models using uncertainty in learning parameters. IEEE Transactions on Fuzzy Systems 15(1),
90106 (2007)
Walker, C.L., Walker, E.A.: The algebra of fuzzy truth values. Fuzzy Sets and
Systems 2, 309347 (2005)
Walker, C.L., Walker, E.A.: Sets with type-2 operations. International Journal of
Approximate Reasoning 50, 6371 (2009)
Willaeys, D., Malvache, N.: The use of fuzzy sets for the treatment of fuzzy information by computer. Fuzzy Sets and Systems 5, 323328 (1981)
Yao, Y.: Semantics of Fuzzy Sets in Rough Set Theory. In: Peters, J.F., Skowron,
A., Dubois, D., Grzymala-Busse, J.W., Inuiguchi, M., Polkowski, L. (eds.) Transactions on Rough Sets II. LNCS, vol. 3135, pp. 297318. Springer, Heidelberg
(2004)
Zadeh, L.: Fuzzy sets. Information and Control 8, 338353 (1965)
Zadeh, L.A.: The concept of a linguistic variable and its application to approximate
reasoning I. Information Sciences 8, 199249 (1975)
Zadeh, L.A.: Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets and
Systems 1, 328 (1978)
Chapter 2
34
seem very promising and are continuing [Mendel 2007]. Operations on triangular [Starczewski and Rutkowski 2002; Starczewski 2009a] and Gaussian
type-2 fuzzy sets [Starczewski 2005] have been just the rst steps we made
in this direction. Therefore, it is necessary to supply analytical formulae for
extensions of t-norms and t-conorms. This problem is studied and solved in
this chapter.
In the case of ordinary fuzzy sets, triangular norms operate on crisp membership grades of fuzzy sets taking part in set operations. In the context of
fuzzy-valued or interval-valued fuzzy sets, classical set-theoretic operations
are extended to operations on fuzzy quantities in accordance with the Zadeh
extension principle [Zadeh 1975].
Denition 2.1 (Zadeh Extension Principle). For a non-fuzzy operation
w = (u1 , . . . , un ) the extension principle induces from fuzzy sets characterized by their membership functions A1 (u1 ),. . . ,An (un ) a fuzzy set
characterized by the following membership function
2.1 Set Theoretic Operations with the Extension Principle: State of the Art
35
(2.3)
is expressed as
and the membership grade of union A B
(x) , (x)) ,
A
B
(x) = S (A
B
(2.4)
where T denotes an extended t-norm and S stands as a symbol for an extended t-conorm operation. Also the complementation function N has to be
extended to operate on truth intervals, i.e.
( (x)) .
A (x) = N
A
(2.5)
interval (1.26), and the standard complement A with (1.27). The presented
formulae are direct results of applying the extension principle (2.1) to the
minimum, the maximum and a continuous, strictly monotone and involutive
complement neg(u) 1 u. Let I ([0, 1]) denote the set of all subintervals
of the unit interval. If membership grades characterizing a fuzzy set are extended from numbers to subintervals of [0, 1], the resultant membership grade
turns into an interval from I ([0, 1]) as well, i.e.,
u] , [v, v]) = [min(u, v), min(u, v)] ,
min([u,
(2.6)
max([u,
u] , [v, v]) = [max(u, v), max(u, v)] ,
[ux , ux ] = [1 ux , 1 ux ] ,
N
(2.7)
(2.8)
[u, u] , [v, v] I ([0, 1]). In the context of intervals, we refer to these operations as an extended minimum, an extended maximum, and an extended
negation.
36
The operations on interval-valued fuzzy sets are well dened and elaborated [Dziech and Gorzalczany 1987; Gorzalczany 1987; Karnik and Mendel
2000; Uncu and T
urksen 2007; Walker and Walker 2009; Zadeh 1975]. The
set of truth intervals I ([0, 1]) is only a partially ordered set under max
and
with the ordering dened by (1.28) [Dubois and Prade 1980].
min
Concerning weaker intersections and unions, t-norms and t-conorms can
be extended to perform calculations on I ([0, 1]), i.e.,
T([u, u] , [v, v]) = [T (u, v), T (u, v)] ,
(2.9)
S([u,
u] , [v, v]) = [S(u, v), S(u, v)] ; [u, u] , [v, v] I ([0, 1]) . (2.10)
Note that the use of a generalized extension principle, given by (2.2), does
not lead to other forms of extended triangular norms than (2.9) and (2.10).
2.1 Set Theoretic Operations with the Extension Principle: State of the Art
37
sup
(2.11)
(2.12)
min(u,v)=w
sup
max(u,v)=w
n
eg(f (u)) = f (1 w) ,
(2.13)
is characterized
where A is characterized by its membership grades Fx , and B
by Gx , Fx , Gx F ([0, 1]), x R.
If we abolish the restriction to the minimum and maximum operations,
classical triangular norms and conorms can be fuzzied with the use of (2.2)
to model the alternative operations on fuzzy-valued fuzzy sets.
Denition 2.3. Let F and G be fuzzy truth values, with their membership
functions f and g, respectively, at x R, where for simplicity x is omitted,
and let T and T be arbitrary t-norms. An extended t-norm T based on T
according to the generalized extension principle, denoted by T T
(F, G), is
characterized by the following membership function,
TT
(F,G)
(w) =
sup
T (f (u) , g (v)) ,
(2.14)
T (u,v)=w
(F,G)
(w) =
sup
T (f (u) , g (v)) ,
(2.15)
S(u,v)=w
sup f (u) .
(2.16)
N (u)=w
38
TM
c
s
n
t
t o
n
i
r
n
c
u
a
n
o
t
.
r
t
c
n
h
a
i
r
TDP
base
t-norm
extended
t-norm
39
TP
f
trapezoidal
Thm. 2.4
TP
Thm. 2.6
fuzzy
truth
intervals
Thm. 2.1
f
Thm. 2.5
f
Thm. 2.7
TL
nilpotent
strict
continuous Archimedean
TM
continuous
Fig. 2.1 Analytical expressions for extended t-norms and application areas of pro
a
fuzzy truth
vided in this chapter theorems; particular forms of arguments:
f um
1
a a
interval such that f is concave on slopes, f (u) =
40
For example, knowing that a extended t-norm preserves the Gaussian shape,
we are able to express ring fuzzy grades only with their mean values and
standard deviations. This approach evidently reduces the computational cost
of operations performed on fuzzy truth intervals and provides the opportunity for converting the fuzzy-valued fuzzy logic systems into their network
structures, called type-2 adaptive network fuzzy inference systems.
T (x,y)=w
(2.18)
where the second inequality is valid since f is non-decreasing on [0, mF ] and
g is non-increasing on [mG , 1]. For any positive , the resultant membership
grade at points (u , mG + ) is not greater than the grade at (u, mG ).
Such situation is claried in Fig. 2.2 for three representative examples. Observe that subgure (a) applies also to the drastic product or to the noncontinuous nilpotent minimum, and subgure (b) applies to any t-norm that
has monotonic horizontal cuts as the product t-norm for example. Therefore
in order to obtain the solution, v may be bounded by mG , i.e. the maximal
membership grade may be reached only when also v mG . Together with
the case of v < mG , (u < mF v mG ) (u mF v < mG ).
Similarly, from T (u, v) > T (nF , nG ) it can be implied that u > nF v
nG or u nF v > nG . The above discussion leads to the following remark.
41
(b)
(c)
T(u,v) = const
=0
T(u,v) = const
T(u,v) = const
Fig. 2.2 Representative horizontal cuts of t-norms: (a) min, (b) TL , (c)
ordinal sum of (0.2, 1, TL )
Remark 2.1. Finding the membership function of a continuous extended tnorm when fuzzy truth intervals are used can be considered independently
on three intervals, i.e., when {u, v} belongs to [0, mF ] [0, mG ] or [mF , nF ]
[mG , nG ] or [nF , 1] [nG , 1].
The most intricate membership grade of an extended t-norm is probably
observed in case of w = 0, since it may be produced by many pairs {u, v}.
Therefore, if Ts is strict, the condition w = 0 implies u = 0 or v = 0, which
leads to the particular result for the extension of Ts based on T
TsT (0) = max (f (0) , g (0)) .
(2.19)
if TA (mF , mG ) = 0,
(2.20)
otherwise the result relies on the maximization of T (f (u) , g (v)) with the
constraint of the form TA (u, v) = 0.
The exact formulae for membership functions of T T
(F, G) are hardly
possible to obtain for some extended operations T based on several t-norms
T and for some types of arguments (i.e. their membership functions). Nevertheless, such formulae exist in certain cases, some of them will be derived
in the following subsections.
42
the forms of so called meet and join operations under minimum by Karnik
and Mendel [Karnik and Mendel 2000]. We expand this to the case of fuzzy
truth intervals and an arbitrary t-norm extension.
Theorem 2.1 ([Starczewski 2009b]). Consider the two fuzzy truth intervals F and G with membership functions f and g, such that [F ]1 = [mF , nF ]
and [G]1 = [mG , nG ] (normality). Then the extended minimum t-norm based
on an arbitrary t-norm T can be expressed by the following membership function
min (mF , mG ) ,
if w
1
min (nF , nG )
min
(2.21)
T (F,G) (w) =
f (w)
if w (nF , nG ]
g(w)
if w (nG , nF ]
if w (max (nF , nG ) , 1] .
T (f (w) , g (w))
We have restated this theorem without the original assumption that nF nG ,
which is more suitable for implementation.
Proof. The membership function of the extended minimum relies on the generalized extension principle in the following way
min
T
(F,G)
sup
T (f (u) , g (v)).
(2.22)
min(u,v)=w
If w [0, min (mF , mG )), we rstly assume that u = w; then with the use
of the constraint min (u, v) = w, it follows that v w. Consequently, T
is maximal for v = mG . Assuming that v = w, it follows that u w.
Consequently, T is maximal for u = mF . By substituting u and v in (2.22),
we obtain the partial formula
max [T (f (w) , g (mG )) , T (f (mF ) , g (w))] = max (f (w) , g (w)) . (2.23)
If w (nF , nG ], we again assume that u = w, then the minimum operation
ensures that v w. Consequently, T is maximal for v = nG . Assuming that
v = w, it follows that u w, then T is maximal for u = w, since f (t) is
non-increasing when t > nF and T in non-decreasing. Accordingly, (2.22) is
equivalent to the following formula
max (T (f (w) , g (nG )) , T (f (w) , g (w))) = f (w) .
(2.24)
43
0.8
0.6
0.4
0.2
0.2
0.4
0.6
0.8
w
if w [0, min (0.3, 0.5))
max w0.1
0.2 , 0.5 , 0
1
if w [min (0.3, 0.5) , 0.4]
(2.25)
(w) =
min
0.6w
TL
(F,G)
if w (0.4, 0.5]
0.2
1.12w
if w (0.5, 1] .
0.2
The calculations are demonstrated in Fig. 2.3.
The result of Karnik and Mendel [Karnik and Mendel 2000] follows as a direct
corollary from Theorem 2.1, if the extension is based on minimum t-norm and
arguments are restricted to fuzzy truth numbers, i.e., when mF = nF and
mG = n G ,
44
words, the formula (2.21) does not preserve the shape. Consequently, it cannot be directly applied in adaptive network fuzzy inference systems, although
some approximations of (2.21) or (2.26) can help in deriving such systems.
[1]
[1]
w
(w) if w (T (nF , nG ) , 1] ,
where
w () = T f (1) () , g (1) ()
[1]
w () = T f
() , g[1] () ,
(2.28)
(2.29)
if u [lF , mF ]
(2.30)
g (v) = g (v)
if v [lG , mG ]
(2.31)
f (u) = f (u)
if u [nF , r F ]
(2.32)
g (v) = g (v)
if v [nG , r G ] .
(2.33)
The quickest proof for this theorem relies on the use of the Nguyen theorem
[Nguyen 1978] for the extension of a continuous monotone operation.
Proof. The Nguyen theorem [Nguyen 1978] states that for a continuous binary
operation, let us say T (or S while proving the complementary theorem for the
minimum-based extension of a continuous t-conorm), its extension based on
45
T = min can be derived from formula T min
(F, G) = T ([F ] , [G] ). Note
that plays a role of the resultant membership grade T min (F,G) ( for short).
For the 1-cut, TT (F, G) = T ([F ]1 , [G]1 ), i.e., the resultant membership
1
function is equal
to unity
F , mG ) , T (nF , nG )]. For other
whenw [T (m
[1] = T f [1] () , g [1] ()
(2.34)
(2.35)
for the left slope, i.e. if w [0, T (mF , mG )). Let us denote [F ] = f , f
and [G] = g , g . Using Remark 2.1, for w (T (nF , nG ) , 1], we take
[1]
() (nF , 1] and
into account only upper bounds of -cuts, i.e., f
g [1] () (nG , 1], and for w [0, T (mF , mG )), lower bounds of -cuts are
calculated from f (1) () [0, mF ) and g (1) () [0, mG ). For all [0, 1],
f (1) () = f and g(1) () = g . Therefore, (2.28) is valid. Similarly with
the use of the upper pseudo-inverse, (2.29)
is valid. Theinterval [w () , w ()]
is obviously the -cut of the result, i.e. T min
(F, G) . The use the upper
pseudo-inverse ends the proof, since both the non-decreasing function w and
the non-increasing function w are left-continuous.
A detailed graphical explanation of the procedure described by this theorem
can be found in Fig. 2.4.
The following two examples apply Theorem 2.2 to continuous triangular
and trapezoidal fuzzy truth intervals. The extension of the L
ukasiewicz tnorm partially leads to unexpected results.
Example 2.2. Consider two fuzzy
! membership
! truth
intervals with triangular
umF +F L mF +F R u
and g (v) =
,
functions dened as, f (u) = min
F L
F R
!
!
vmG +GL mG +GR v
min
. Now, the L
ukasiewicz t-norm TL (u, v) =
,
GL
GR
(2.36)
46
(a)
(b)
0.5
0.5
0.5
(c)
0.5
0.5
(d)
1
(e)
0.5
0.1
0.05
0.5
(f)
0.5
0.5
0.5
(g)
0.5
(h)
0.5
(i)
0.8
0.6
0.5
0.4
0
0.5
1
1
0.5
0
0.5
Fig. 2.4 Extended product based on the minimum: (a) f , (b) g, (c) pseudo-inverse
f (1) (), (d) pseudo-inverse g (1) (), (e) product of the pseudo-inverses w, (f)
[1]
"
TLmin (F,G) (w) =
min
"
,
(2.38)
otherwise
TLmin (F,G) (w) =
1
!
! w=0
.
elsewhere.
(2.39)
Note that in the rst case the result (2.38) remains a triangular membership
function. Regrettably, (2.39) requires some approximation to a triangular
shape. A simple approximation method allowed us for implementation of
ecient triangular type-2 fuzzy logic systems [Starczewski 2009a; Starczewski
and Rutkowski 2002; Starczewski 2006]. To extend the following result on
trapezoidal fuzzy truth intervals we provide the following example.
Example 2.3. Consider two fuzzy
! membership
! truth
intervals with trapezoidal
r
umF +F L nF +F u
and g (v) =
,
functions dened as, f (u) = min
F L
rF
!
!
vmG +lG nG +GR v
min
. Again using Theorem 2.2, the L
ukasiewicz
,
GR
lG
t-norm can be extended by the lower and upper inverses calculated as
47
(b)
(a)
1
0.9
0.9
0.8
0.8
0.7
0.7
0.6
0.6
0.5
0.5
0.4
0.4
0.3
0.3
0.2
0.2
0.1
0.1
0.2
0.4
0.6
0.8
0.2
0.4
0.6
0.8
(2.40)
(2.41)
(w) = !
TLmin (F,G)
! w=0
elsewhere.
(2.43)
The reader may try to advance Theorem 2.2 by the use of the generalized
Nguyens theorem [Fuller and Keresztfalvi 1991] valid for all continuous functions, here denoted by T , and upper semicontinuous t-norms in the class of
upper semicontinuous and compactly supported fuzzy sets (see also [Carlsson
and Fuller 2002]). However, simplied results for min-based extended t-norms
seem to be more practical. A similar theorem restricted to fuzzy truth numbers can be found in [Starczewski 2005]. Moreover, formula of Theorem 2.2
may be simplied when the t-norm T is strict, i.e. a continuous and strictly
monotone t-norm Ts [Klement et al 2000],
Ts (a, c) < Ts (b, c)
(2.44)
48
(b)
0.9
0.9
0.8
0.8
0.7
0.7
0.6
0.6
0.5
0.5
0.4
0.4
0.3
0.3
0.2
0.2
0.1
0.1
0.2
0.4
0.6
0.8
0.2
0.4
0.6
0.8
1 1
1
0
otherwise,
(2.45)
where
f (u) = f (u)
if u [lF , mF )
(2.46)
g (v) = g (v)
if v [lG , mG )
(2.47)
f (u) = f (u)
g (v) = g (v)
if u [mF , rF ]
if v [mG , r G ] .
(2.48)
(2.49)
49
approximation of extended t-norms, one of which, i.e. Gaussian approximation of the extended product based on the minimum, will be presented in
Sect. 2.4.1 after [Starczewski 2005].
[1]
[1]
max
f
T
(w)
,
g
T
(w)
m
m
G
F
(1)
(1)
max
f
T
(w)
,
g
T
(w)
m
m
G
F
(1)
= f Tm
(w)
G
(1)
g
T
(w)
m
(2.50)
if w [0, T (mF , mG )]
if w (T (mF , mG ), min (mF , mG )]
if w (mF , mG ]
if w (mG , mF ]
otherwise.
sup
f (u) ,
T (u,mG )=w
= max
sup
[1]
u=TmG (w)
sup
g (v)
T (mF ,v)=w
f (u) ,
sup
[1]
v=TmF (w)
g (v) .
50
2
1 wmF mG
exp
2
mG F
T
(2.51)
(w)
=
max
2
P TD
(F,G)
F mG
exp 12 wm
mF G
2
1
wmF mG
= exp
.
(2.52)
2 max(mG F ,mF G )
Applying the whole expression (2.50), we obtain
T
(w)
P TD
(F,G)
2
wmF mG
1
exp
2 max(mG F ,mF G )
exp 1 wmF mG 2
2
mG F
=
2
1 wmF mG
exp
2
mF G
(2.53)
if w [0, min (mF , mG )]
if w (mF , mG ]
if w (mG , mF ]
otherwise.
As it can be seen in Fig. 2.7, the extended product based on the weakest tnorm preserves the Gaussian shape on [0, min(mF , mG )] and on[min(mF , mG ),
max (mF , mG )], separately. Therefore, some approximation of this result can
be applied to adaptive network fuzzy inference systems with small computational costs. Is seems somehow unexpectedly, that this result in [0, mF ]
have the same form as the approximate result of Karnik and Mendel derived
without the context of the drastic product t-norm [Karnik and Mendel 2000;
Mendel 2001].
51
0.8
0.6
0.4
0.2
0.2
0.4
0.6
0.8
u
F
G
and g (v) = min mvl
, respectively;
, rrFFn
, rG v
min mul
F lF
F
G lG rG nG
0 < lF < mF nF < rF 1; 0 < lG < mG nG < rG 1. Then
the extended product t-norm based on TP is characterized by the following
membership function
)
)
lF
lG
w
g
w
,
l
l
G F if w [lF lG , mF mG )
max
w
w
f mG , g mF
1
)
if w [mF mG , nF nG ]
)
T
(w) =
r
r
P TP
(F,G)
F
G
f
w ,
rG w g
if w (nF nG , rF rG ]
rF
max
w
w
,
g
f
nG
nF
0
otherwise.
(2.54)
Proof. For all w [lF lG , mF mG ], the minimized function is as follows
w
*
+
F
u lG
w (u) = inf log mul
log
,
(2.55)
mG lG
F lF
u
w
mG
,mF
52
mG . From w
(u) = 0,
)
lF
1
w
1
u2 = 0, which is fullled whenever u = lG w. This
we get ulF w
u lG
solution, together with u mwG , mF lead to the following result
w
u
)
)
lF
lG
w
g
w
,
f
lF
lG
w
T
(w)
=
max
g
(m
f
)
,
G
mG
P TP
(F,G)
f (mF ) g mwF
)
)
w
w
lF
lG
,g
.
= max f
lG w g
lF w , f
mG
mF
(2.56)
For all w [nF nG , rF rG ], the minimized function is
w (u) =
inf
u nF , nw
log
rF u
rF nF
log
rG w
u
rG nG
.
(2.57)
w
f
g 2w ,
w2 w
max
0.6 , g 0.4
1
T
(w) =
, w
P TP
(F,G)
f
,
0.9w
g
w w 0.9
max
f
,
g
0.7
0.5
if w [0.08, 0.24)
if w [0.24, 0.35]
if w (0.35, 0.9]
otherwise.
(2.58)
53
0.8
0.6
0.4
0.2
0.2
0.4
0.6
0.8
2.2.6 Extended L
ukasiewicz T-Norm Based on a
Continuous Archimedean T-Norm
The extended L
ukasiewicz t-norm can be represented by analytical formulae
if only the generalized extension principle based on continuous Archimedean
t-norms and arguments are of special type. A certain combination
Theorem 2.5 ([Starczewski 2009b]). Let Ta be a continuous Archimedean
t-norm with an additive generator . Moreover, let fuzzy truth intervals F
and G be characterized by their membership functions f , increasing only on
[lF , mF ] and decreasing only on [nF , rF ], and g, increasing only on [lG , mG ]
and decreasing only on [nG , rG ], respectively, and such that f is concave
on [lF , mF ] and [nF , rF ] and g is concave on [lG , mG ] and [nG , rG ]; 0
lF < mF nF < rF 1, 0 lG < mG nG < rG 1. Then the extension
of the L
ukasiewicz t-norm TL based on Ta is characterized by the following
membership function
TLT (F,G) (w)
a
0
if w = 0;
T
(f
(max
(w
m
+
1,
l
))
,
g
(min
(m
,
w
l
+
1)))
,
a
G
F
G
F
max
= 1
if w [TL (mF , mG ) , TL (nF , nG )];
max
0
otherwise .
(2.59)
54
where
0
1
if TL (mF , mG ) =
0
otherwise.
(2.60)
This result was inspired by the result of Fuller and Keresztfalvi, [Fuller
and Keresztfalvi 1992], and other papers on the addition of fuzzy numbers
[Hong and Hwang 1994; Mesiar 1996], and on the addition of fuzzy intervals
[Mesiar 1997].
Proof. For Ta being either strict or nilpotent, the common way of construction of an Archimedean t-norm Ta is via its additive generator . As
a consequence, our objective is to minimize a function w : [w, 1] [0, ],
which can be dened for all w (0, 1] by
w (u) = f (u) + g (v (u)) = f (u) + g (w u + 1) ,
(2.61)
u[w,1]
(2.62)
For w (TL (nF , nG ) , TL (rF , rG )], f is increasing in u and g is
decreasing in u. By reason of the concavity of the composites, the function
w reaches its minimum at the border values: max (nF , w, /w rG + 1/) and
min (/w nG + 1/ , rF ), where for the bounding operator, it is sucient that
/x/ = min (1, x). Thus,
inf w = min (w (max (nF , /w rG +1/)) , w (min (/w nG +1/ , rF ))) .
u[w,1]
(2.63)
For w = 0, either TL (mF , mG ) = 0 or TL (mF , mG ) > 0. In the former case
w obviously belongs to the kernel. In the latter case we shall minimize a
function 0 : [0, 1] [0, ], dened by
u (u, v) = f (u) + g (v) ,
(2.64)
55
a (F,G)
(2.66)
a (F,G)
(w) = max
=
0.55
w+0.15
0.11
w0.45
(2.67)
Otherwise the resultant membership grades are equal to unity, what can be
seen in Fig. 2.9.
0.8
0.6
0.4
0.2
0.2
0.4
0.6
0.8
56
Some results for the addition of fuzzy intervals have been derived without
restrictions to concavity, but assuming a specic membership function form
[Mesiar 1997]. However, the conveyance of that result on a wide range of tnorms is no longer easy, but can be done for the extension of the L
ukasiewicz
t-norm. As we stated earlier each continuous Archimedean t-norm can be
either strict or nilpotent. Applying a strict t-norm Ts as a base for the extension of an arbitrary t-norm, the generalized extension principle transforms
itself into
TT (F,G) (w) = 1
(2.68)
inf ( f (u) + g (v)) ,
s
T (u,v)=w
T (u,v)=w
b
,
a
b
respectively; a, b > 0; m, n [0, 1]. Then the the extended L
ukasiewicz t-norm
TL based on Ts is characterized by the following membership function
0
if w = 0
(2.70)
TLT (F,G) (w) =
wmn+1
1
s
(a + b)
otherwise,
a+b
where
0 =
1
1
(a + b) 1mn
a+b
if TL (m, n) = 0
otherwise.
(2.71)
Proof. Using the generalized extension principle in the form of (2.68), the
following expression shall be minimized
um
(u, v) =
inf
a a + b vn
,
(2.72)
b
u+v1=w
um
wu+1n
w (u) = inf a a + b
.
(2.73)
b
u[w,1]
57
0.8
0.6
0.4
0.2
0.2
0.4
0.6
0.8
=
The
minimum
is reached with the use of the necessary condition um
a
um
wun+1
vn
,
which
is
fullled
when
=
=
,
or,
after
some
wu+1n
b
a
b
b
calculations, when um
= wmn+1
. The sucient condition for obtaining
a
a+b
the minimum is that is convex and monotone in [0, ). The rest of the
proof follows immediately.
Example 2.7. Consider the extended L
ukasiewicz t-norm based on the product on Gaussian fuzzy truth numbers. The product TP is obviously a strict
t-norm. with the add For the additive generator = log x, the function
may be dened by = x2 and the following substitutions may be performed:
2
= b, mF = m, mG = n; mF , mG [0, 1]. Thus,
2F2 = a, 2G
the arguments
2
1 umF
are described by their membership functions f (u) = exp 2
and
F
2
G
g (v) = exp 12 vm
. Moreover, let us assume that mF + mG > 1.
G
The use of Theorem 2.6 leads to the result described by the membership
function
1
T
(w) = exp
L T P
w mF mG + 1
,
2
F2 + G
2
.
(2.74)
The illustration is given in Fig. 2.10. This result, due to its preserving shape
for TL (mF , mG ) > 0, after some approximations may be applied in adaptive network fuzzy inference systems by performing operations on parameters
mi , i for each i-th fuzzy set.
58
a
,
respectively;
a,
b
>
0;
m,
n
[0,
1].
Then
the
exg (v) = 1 b vn
b
tended L
ukasiewicz t-norm TL based on Tn is characterized by the following
membership function
0 !
! if w = 0
(2.75)
TLT (F,G) (w) =
wmn+1
1
n
(a + b)
otherwise,
a+b
where
0 =
1
1
!
!
(a + b) 1mn
a+b
if TL (m, n) = 0
otherwise.
(2.76)
Proof. The proof diers from the proof of Theorem 2.6 in a detail, i.e., we
minimize
vn
a um
+
b
inf
(2.77)
a
b
u+v1=w
wu+1n
+
b
.
=
inf a um
a
b
u[w,1]
59
Corollary 2.2. Consider the two fuzzy truth intervals F and G with membership functions f and g, such that [F ]1 = [mF , nF ] and [G]1 = [mG , nG ]
(normality). Then the extended maximum t-norm based on an arbitrary tnorm T can be expressed by the following membership function
T (f (w) , g (w))
if w [0, min (mF , mG ))
g(w)
if
w [mF ,mG )
f (w)
if w [m
G ,mF )
max
T (F,G) (w) =
max
(m
,
m
)
,
F
G
1
if w
max (nF , nG )
[1]
(w)
w
Smin (F,G) (w) = 1
[1]
w
(w)
if w [0, S (mF , mG )]
if w (S (mF , mG ) , S (nF , nG ))
if w [S (nF , nG ) , 1] ,
(2.79)
where
w () = S f (1) () , g(1) () ,
[1]
w () = S f
() , g [1] () ,
(2.80)
(2.81)
if u [lF , mF ] ,
(2.82)
g (v) = g (v)
if v [lG , mG ] ,
(2.83)
f (u) = f (u)
g (v) = g (v)
if u [nF , rF ] ,
if v [nG , r G ] .
(2.84)
(2.85)
60
g
S
(w)
m
(1)
f SmG (w)
(1)
f
S
,
m
G (w)
max
(1)
S
(w) =
g SmF (w)
TD
(F,G)
[1]
f
S
,
m
G (w)
max [1]
g SmF (w)
if w [mF , mG )
if w [mG , mF )
max (mF , mG ) ,
if w
S (mF , mG )
if w [S (mF , mG ) , 1]
otherwise.
(2.86)
b
, respectively; a, b > 0;
f (u) = 1 a um
a
b
m, n [0, 1]. Then the extended bounded sum (Lukasiewicz) t-conorm SL
based on Ts is characterized by the following membership function
1
if w = 1
SLT (F,G) (w) =
(2.87)
wmn
1
s
(a + b)
otherwise,
a+b
where
1 =
1
1
(a + b)
1mn
a+b
if SL (m, n) = 1
otherwise .
(2.88)
While proving this theorem we use minimization of (2.72) with the constraint u + v = 1 (from the bounded sum) instead of u + v 1 = w (from
L
ukasiewicz t-norm). Hence the minimization proceeds identically. The utility
of this corollary may be followed by the example.
61
Example 2.8. Consider the extended bounded t-norm based on the product
on Gaussian fuzzy truth numbers. The product TP is obviously a strict t-norm
with its additive generator = log x, the function is dened by = x2
2
and the following substitutions are performed: 2F2 = a, 2G
= b, mF =
m, mG = n; mF , mG [0, 1].
The
arguments
are
described
by
their
member
2
2
1 umF
1 vmG
ship functions f (u) = exp 2
and
g
(v)
=
exp
.
F
2
G
Moreover, let us assume that mF + mG < 1. The use of Corollary 2.8 leads
to the result described by the membership function
2
w
m
1
G
.
, F
S
(2.89)
(w) = exp
2
L TP
2
F2 + G
Evidently, if SL (mF , mG ) < 1, this result preserves the Gaussian shape.
Theorem 2.7 together with the Theorem 2.8 lead us to the following corollary.
Corollary 2.5. Let : [, ] [0, ) be a continuous convex function
and strictly monotone in [0, ] such that (0) = 0 and (x) = (x) for all
x R. Let Tn be a nilpotent t-norm with an additive generator . Moreover,
let the operands
functions
F and G
be characterized
by their
membership
vn
1
and
g
(v)
=
b
,
respectively;
a, b >
f (u) = 1 a um
a
b
0; m, n [0, 1]. Then the extended bounded sum (Lukasiewicz) t-conorm SL
based on Tn is characterized by the following membership function
1 !
! if w = 1
SLT (F,G) (w) =
(2.90)
wmn
1
n
(a + b)
otherwise,
a+b
where
1 =
1
1
!
!
(a + b) 1mn
a+b
if TL (m, n) = 0
otherwise.
(2.91)
62
and Mendel [Karnik and Mendel 2000; Mendel 2001]. We recall this result
here. If there are two Gaussian fuzzy truth numbers, F and G, with means
mF , mG and standard deviations F , G , respectively, then, the formula for
Gaussian approximation to the product-based extended product
t-norm can be expressed by
1
T
(w) = exp
P TP
(F,G)
2
2
wmF mG
(F mG )2 +(G mF )2
(2.92)
if u [lF , mF )
(2.93)
if v [lG , mG )
(2.94)
if u [mF , r F ]
(2.95)
if v [mG , r G ] .
(2.96)
The product operation leads us to the lower and upper inverse functions:
f 1 () g1 () = mF mG (mG F + mF G )
,
2 ln 2F G ln
if [0, mF mG ] ,
(2.97)
,
() g1 () = mF mG + (mG F + mF G ) 2 ln 2F G ln
(2.98)
if [mF mG , 1] ,
At this point, we have to compare forms of (2.97) and (2.93). Since a Gaussian
membership function is strongly expected as the result, we must consider
whether we can ignore the summand F G log in (2.97) and (2.98). Hence,
the approximating assumption can be evaluated in the following way:
,
(mG F + mF G ) 2 ln |2F G ln | = 2F G ln ,
(2.99)
,
mF
mG
ln .
(2.100)
G + F
63
1 wmF mG 2
(w)
exp
.
P TM
(F,G)
2 F mG +G mF
(2.103)
2
1 umF
u [0, mF ]
exp 2
F
(2.104)
f (u) =
2
,
1]
,
u
(m
exp 12 um
F
F
2
1 vmG
v [0, mG ]
exp 2
G
g (v) =
(2.105)
2
,
1]
.
v
(m
exp 12 vm
G
G
64
2
w [0, m]
exp 21 wm
2
(w)
=
T
P TM
(F,G)
w (m, 1] .
exp 12 wm
(2.106)
.
= min exp
F
G
2
2
TP TM
(F,G)
(2.111)
65
Since exp x2 is a decreasing function of any positive x, the minimum of
the functions goes into the function of the maximum of the arguments such
that
2
2
1
1 mF 1 mG
1 1m
,
= exp max
. (2.112)
exp
2
2
F
G
Combining (2.110) and (2.112), we get the following formula for an assymetricGaussian approximation
2
wmF mG
1
exp 2 max(F mG ,G mF )
if w [0, mF mG ]
2
(w) exp 1
T
wmF mG
P TM
(F,G)
1mF mG
1mF mG
2
min F 1m
,G 1m
F
G
if w (mF mG , 1] .
(2.113)
Actually this approximation is a rather simple three-point piecewise Gaussian interpolation of the exact membership function. However, it is one exemplary step toward parametrized operations preserving shapes of membership
functions.
2.4.2.1
(2.114)
m + = T (/mF + F / , /mG + G /) .
(2.115)
= m T (/mF F / , /mG G /) ,
(2.116)
= T (/mF + F / , /mG + G /) m.
(2.117)
Therefore,
66
sup
(2.118)
(2.119)
min(u,v)=w
max
(F, G) =
sup
max(u,v)=w
Following Mizumoto and Tanaka [Mizumoto and Tanaka 1976], the relation
ordering fuzzy truth values can be dened as
(F, G) = F
F G min
and max
(F, G) = G,
(2.120)
(2.121)
Mizumoto and Tanaka [Mizumoto and Tanaka 1976] have proven that under
these order relations (not necessarily both) the set of arbitrary fuzzy truth
values forms a partially ordered set, i.e., the relations are reexive, transitive
and antisymmetric. It can be easily veried that only fuzzy truth values of
the same height can satisfy the ordering relation given by both (2.120) and
(2.121).
Let L = (F ([0, 1]) , ) denote an underlying lattice of the fuzzy set theory,
where F ([0, 1]) is the power set of fuzzy truth values. The smallest element
of L is 0 = 1/0, and the largest element is 1 = 1/1. An axiomatic notation
of triangular norms on L can be provided as follows.
Denition 2.4. A t-norm on the complete lattice L = (F ([0, 1]) , ) is a
function of two variables T : F ([0, 1]) F ([0, 1]) F ([0, 1]) that satises:
67
if w [0, mF ]
if w [nG , 1] .
(2.122)
(2.123)
where mF is the greatest lower bound of the kernel of F and nG is the least
upper bound of the kernel of G.
The following question arises. Does every t-norm extended using the extension principle is a t-norm on L? The answer to this question is in the
following theorem presenting conditions under which extensions of t-norms
are t-norms on the complete lattice.
Theorem 2.9 ([Starczewski 2009b]). An extended continuous t-norm on
fuzzy truth intervals is a t-norm on L = (F ([0, 1]) , ).
Proof. The existence of the unit element and commutativity can be easily
proved by the following:
TT
(F,1)
TT
(F,G)
(w) =
sup
T (f (u) , 1) = f (w) ,
(2.124)
T (u,1)=w
(w) =
sup
T (f (u) , g (v)) =
T (u,v)=w
= TT
(G,F )
sup
T (g (v) , f (u))
T (v,u)=w
(w) .
T (x,w)=y
sup
T (f (u) , g (v)) , h (w)
T (u,v)=x
(2.125)
=
sup
T (u,T (v,w))=y
68
if u [0, mF )
if u (nG , 1] .
(2.126)
(2.127)
it must be inferred that for all fuzzy truth intervals H, T (F, H) T (G, H).
For z [0, T (mF , mH )], by Remark 2.1, u [0, mF ] and w [0, mH ]. Then
by the monotonicity of T ,
T (f (u) , h (w))
sup
sup
T (u,w)=z
T (g (u) , h (w)) .
(2.128)
T (u,w)=z
For z [T (nG , nH ) , 1], by Remark 2.1, u [nG , 1] and w [nH , 1]. Again,
by the monotonicity of T ,
T (g (u) , h (w))
sup
T (u,w)=z
sup
T (f (u) , h (w)) .
(2.129)
T (u,w)=z
However, if the participant sets are not convex, formula (2.14) no longer
represents the type-2 t-norm.
Example 2.9. Consider membership functions dened as follows: f = 1/0.4,
g = 1/0.6 and h = 1/0 + 1/1. It is obvious that F G. While checking monotonicity, this has to imply that T (F, H) T (G, H). Since T (f (u) , h (v)) =
0 for v = 0 and v = 1, only v = 0 or v = 1 will be considered. Then,
TT
(F,H)
(0) =
sup
T (f (u) , h (v))
(2.130)
T (u,v)=0
= max
T (f (u) , h (0)) ,
sup
T (u,0)=0
sup
T (f (u) , h (1))
T (u,1)=0
(F,H)
(w) =
sup
T (f (u) , h (1))
(2.132)
T (u,1)=w
= T (f (w) , 1) = f (w) .
(2.133)
= 1/0 + 1/0.4.
(2.134)
= 1/0 + 1/0.6.
(2.135)
Therefore,
TT
(F,H)
Similarly,
TT
(G,H)
min T T
(F, H) (u) , T T
(G, H) (v)
=
sup
69
(2.136)
max(u,v)=0.4
min T T
(F, H) (0.4) , T T
(G, H) (0) = 1,
which states that
max
TT
, TT
(F,H)
(G,H)
= TT
(G,H)
(2.137)
(2.138)
Thus T T
on non-convex fuzzy truth values does not satisfy monotonicity.
An example of a type-2 t-norm which preserves the triangular shape can be
dened following [Starczewski 2009a].
Denition 2.5. Let a complete lattice L = (F ([0, 1]) , ) of triangular fuzzy truth numbers be bounded by the unity element expressed as
1 = singleton (u 1) and the zero element expressed by 0 = singleton (u). A
regular t-norm on a set of triangular fuzzy truth numbers can be dened by
its membership function as follows
(u) = max (0, min ( (u) , (u))) ,
TN
n=1 Fn
(2.139)
where
/
(u) =
/
(u) =
ul
ml
if m > l
singleton (u m) if m = l,
ru
rm
if r > m
singleton (u m) if m = r,
(2.140)
(2.141)
and
N
l = T ln ,
(2.142)
n=1
N
m = T mn ,
(2.143)
n=1
N
r = T rn .
(2.144)
n=1
The following theorem substantiates the application of this formula in triangular type-2 fuzzy systems.
Theorem 2.10. The function given by (2.139) operating on triangular and
normal fuzzy truth values is a t-norm on L = (F ([0, 1]) , ) (of type-2).
70
(2.145)
ru
rn
if r > n
singleton (u n) if n = r,
(2.146)
and
N
l = T li ,
(2.147)
i=1
N
m = T mi ,
(2.148)
i=1
N
n = T ni ,
(2.149)
i=1
N
r = T ri .
(2.150)
i=1
71
fuzzy truth values A = F ([0, 1]) , 0, 1, (2.120) , (2.121) as straightforward
extensions of the classical implication satisfying the boundary conditions
I (0, 0) = I (0, 1) = I (1, 1) = 1, I (1, 0) = 0, which are also decreasing
in the rst and increasing in the second argument with respect to at least
one of the partial orders given by (2.120) and (2.121).
However, the extensions of fuzzy implications are not always type-2 fuzzy
implications. Let us consider the extended s-implication construction, i.e.
IR
s T (F,G)
(w) =
sup
T (f (u) , g (v)) .
(2.151)
S((1u),v)=w
Gera has proven that this extended s-implication is a type-2 fuzzy implication
over algebra A if and only if A is a subalgebra of the algebra of convex
normal functions. He has also proposed pointwise formulae for calculations
of extended s-implications of the four fundamental t-norms in a fairly general
form.
More specic analytical formulae for extended s-implications can be derived using our corollaries about representation of extended t-conorms. Consequently, the extension of the known Kleene-Dienes implication IKD (a, b) =
max (1 a, b) follows from Corollary 2.2.
Corollary 2.6. Consider the two fuzzy truth intervals F and G with membership functions f and g, such that [F ]1 = [mF , nF ] and [G]1 = [mG , nG ]
(normality). Then the extended Kleene-Dienes implication based on an arbitrary t-norm T can be expressed by the following membership function
T (f (1 w) , g (w))
if w [0, min (1 nF , mG ))
g(w)
if w [1 nF ,mG )
f (1 w)
if w
[mG , 1 nF )
IKDT (F,G) (w) =
max
(1
n
,
m
)
,
F
G
1
if w
max (1 mF , nG )
72
[1]
(w)
w
Is,min (F,G) (w) = 1
[1]
w
(w)
where
if w [0, S (1 nF , mG )]
if w (S (1 nF , mG ) , S (1 mF , nG ))
if w [S (1 mF , nG ) , 1] ,
(2.153)
w () = S n(1) () , g(1) () ,
w () = S n[1] () , g[1] () ,
(2.154)
(2.155)
if u [1 rF , 1 nF ] ,
(2.156)
g (v) = g (v)
if v [lG , mG ] ,
(2.157)
n (u) = f (1 u)
if u [1 mF , 1 lF ] ,
(2.158)
g (v) = g (v)
if v [nG , rG ] .
(2.159)
(1)
if w [mG , 1 mF )
f 1 SmG (w)
if
(1)
w
m
,
m
)
,
F
G
(1)
I
(w) =
g S1mF (w)
s, TD
(F,G)
I (mF , mG )
[1]
f 1 SmG (w) ,
if w [Is (mF , mG ) , 1]
max
[1]
g
S
(w)
1mF
0
otherwise.
(2.160)
Theorem 2.8 leads us to the extended L
ukasiewicz implication, which can be
constructed either as the s-implication or as the residual implication called
r-implication.
Theorem 2.11. Let : [, ] [0, ) be a continuous convex function
and strictly monotone in [0, ] such that (0) = 0, and (x) = (x)
for all x R. Let Ts be a strict t-norm with an additive generator .
73
b
, respectively;
functions f (u) = 1 a um
a
b
a, b > 0; m, n [0, 1]. Then the extension of L
ukasiewicz s-implication
IL (a, b) = min (1, 1 a, b) based on Ts is characterized by the following membership function
1
if w = 1
SLT (F,G) (w) =
(2.161)
w+mn1
1
s
(a + b)
otherwise,
a+b
where
1 =
1
1
(a + b)
mn
a+b
if SL (m, n) = 1
otherwise.
(2.162)
Proof. Using the generalized extension principle in the form of (2.68), the
following expression shall be minimized
um
(u, v) =
inf
a a + b vn
,
(2.163)
b
1u+v=w
um
w+u1n
w (u) = inf a a + b
.
(2.164)
b
u[w,1]
In order to have the necessary condition to obtain the minimum in the form
of (x) = (x) , we use the property that (x) = (x) . Consequently,
w (u) = inf a um
+ b wu+1+n
.
(2.165)
a
b
u[w,1]
= nwu+1
, which is fullled when um
= n+1wu
,
Therefore, um
a
b
a
b
um
n+1wm
.
The
sucient
condior, after some calculations, when a =
a+b
tion for obtaining the minimum is that is convex and monotone in [0, )
and in (, 0]. Using the property of symmetry of , the rest of the proof
follows.
The utility of this corollary may be followed by the example.
Example 2.10. Consider the extended L
ukasiewicz s-implication based on the
product on Gaussian fuzzy truth numbers. The product TP is obviously a
strict t-norm with the add additive generator = log x, the function may
2
= b, mF = m, mG = n; mF , mG
be dened by = x2 and 2F2 = a, 2G
[0, 1]. As a consequence, the arguments
are
described by their
membership
2
2
um
1
1 vmG
F
functions f (u) = exp 2
and g (v) = exp 2
.
F
G
Moreover, let us assume that mF < mG . The use of Theorem 2.11 leads
to the following result
74
1
T
(w) = exp
L T P
w + mF mG 1
,
2
F2 + G
2
.
(2.166)
(F,G)
(w) =
sup
supz[0,1] {z|T (u,z)v}=w
T (f (u) , g (v)) .
(2.167)
References
76
References
Kawaguchi, M., Miyakoshi, M.: Extended triangular norms in type-2 fuzzy logic.
In: EUFIT 1999 7th European Congress on Intelligent Techniques & Soft Computing, Aachen (1999)
Klement, E.P., Mesiar, R., Pap, E.: Triangular Norms. Kluwer, Dordrecht (2000)
Mendel, J.M.: Uncertain rule-based fuzzy logic systems: Introduction and new directions 2001. Prentice Hall PTR, Upper Saddle River (2001)
Mendel, J.M.: Advances in type-2 fuzzy sets and systems. Information Sciences 177,
84110 (2007)
Mesiar, R.: A note to the t-sum of lr fuzzy numbers. Fuzzy Sets and Systems 79,
259261 (1996)
Mesiar, R.: Triangular norm-based addition of fuzzy intervals. Fuzzy Sets and Systems 91, 231237 (1997)
Mizumoto, M., Tanaka, K.: Some properties of fuzzy sets of type-2. Information
and Control 31, 312340 (1976)
Nguyen, H.T.: A note on the extension principle for fuzzy sets. Journal of Mathematical Analysis and Applications 64, 369380 (1978)
Reiser, R.H.S., Dimuro, G.P., Bedregal, B.C., Santiago, R.H.N., Callejas-Bedregal,
R.: Simplications on complete lattices and the interval constructor. TEMA
Tendencias em Matemtica Aplicada e Computacional 9(1), 143154 (2008)
Sepulveda, R., Castillo, O., Melin, P., Montiel, O.: An ecient computational
method to implement type-2 fuzzy logic in control applications. In: Melin, P.,
et al. (eds.) Analysis and Design of Intelligent Systems using Soft Computing
Techniques, 1st edn., vol. 41, ch. 5, pp. 4552. Springer, Germany (2007)
Starczewski, J., Rutkowski, L.: Neuro-fuzzy systems of type 2. In: Proc. 1st Intl
Conf. on Fuzzy Systems and Knowledge Discovery, Singapore, vol. 2, pp. 458462
(2002)
Starczewski, J.T.: Extended triangular norms on gaussian fuzzy sets. In: Proc.
EUSFLAT-LFA 2005 Conf., Barcelona, Spain, pp. 872877 (2005)
Starczewski, J.T.: A triangular type-2 fuzzy logic system. In: Proc. IEEE-FUZZ
2006, Vancouver CA, pp. 72317238 (2006)
Starczewski, J.T.: Ecient triangular type-2 fuzzy logic systems. International
Journal of Approximate Reasoning 50, 799811 (2009a)
Starczewski, J.T.: Extended triangular norms. Information Sciences 179, 742757
(2009b)
Tahayori, H., Tettamanzi, A., Degli Antoni, G., Visconti, A.: On the calculation
of extended max and min operations between convex fuzzy sets of the real line.
Fuzzy Sets and Systems 160(21), 31033114 (2009)
Uncu, O., T
urksen, I.B.: Discrete interval type 2 fuzzy system models using uncertainty in learning parameters. IEEE Transactions on Fuzzy Systems 15(1),
90106 (2007)
Walker, C.L., Walker, E.A.: The algebra of fuzzy truth values. Fuzzy Sets and
Systems 2, 309347 (2005)
Walker, C.L., Walker, E.A.: Sets with type-2 operations. International Journal of
Approximate Reasoning 50, 6371 (2009)
Zadeh, L.A.: The concept of a linguistic variable and its application to approximate
reasoning I. Information Sciences 8, 199249 (1975)
Zhou, S., Garibaldi, J., John, R., Chiclana, F.: On constructing parsimonious type2 fuzzy logic systems via inuential rule selection. IEEE Transactions on Fuzzy
Systems 17(3), 654667 (2009)
Chapter 3
78
2000; Mendel 2001]. This work introduced a two step centroid defuzzication method. The rst step of defuzzication, which is called type-reduction,
transforms a type-2 fuzzy set into a type-1 fuzzy set. The latter needs a nal defuzzication of the traditional type. Since the centroid type-reduction
for general type-2 fuzzy set required a dense discretization in two dimensions, only a method of type-reduction for interval-valued fuzzy sets, known
as a Karnik-Mendel (KM) iterative procedure [Karnik et al 1999; Liang and
Mendel 2000], was pertaining to practical realizations of fuzzy logic systems.
The KM iterative procedure requires a suciently small number of computations, which is one of the major reasons that IT2 FLSs have received
attention whereas general T2 FLSs have not [Mendel and Wu 2007]. During the recent years mostly modications of the basic KM algorithm have
been being developed; among others Wu and Tan have proposed quite efcient type-reduction strategies [Wu and Tan 2005], Sepulveda et al. have
reduced the computational complexity of the KM algorithm [Sepulveda et al
2007], and also Melgarejo has dedicated a fast defuzzication algorithm to
interval type-2 sets [Melgarejo 2007]; and also Wu and Mendel have dened
new optimal values of initial switch points for the enhanced KM algorithms
[Wu and Mendel 2009]. While these approaches rely mostly on savings in
the computation time of the type-reduced set, two other interesting methods have simplied the original idea of the defuzzication: Wu and Mendel
have provided uncertainty bounds for the type-reduced set instead of costly
computations of type-reduction [Wu and Mendel 2002]; Greeneld et al. have
proposed a collapsing method of defuzzication for an interval type-2 fuzzy
set discretized along the domain of elements via a type-1 representative embedded set [Greeneld et al 2009]. Although, this representative set is an
intermediate result whose defuzzied value by the denition is equal to that
of the type-2 fuzzy set, mathematically, it is no longer the type-reduced set
in the sense of the extension principle. We will attache the last two methods
to this chapter for comparison purposes.
As we need to defuzzify interval-valued fuzzy sets into a ordinary fuzzy
set, which has to be further defuzzied into a crisp output value, we need
to apply the extension principle to the centroid defuzzication or to its discrete form called a height defuzzication. The following considerations have a
general signicance since K either denotes the number of consequents for the
extended height defuzzication, or is a discretization density for the extended
centroid.
The centroid of an interval-valued fuzzy set, given by its lower and upper
memberships, k and k , can be fuzzied via the extension principle, i.e.,
0
K
yk uk 0
1 if y = k=1
0
K
k=1 uk
uk [k ,k ] ,
(y) =
(3.1)
0 otherwise
where k = 1, . . . , K.
79
ymax =
1R
k=1
k +
1K
k=R+1
(3.2)
(3.3)
ymin + ymax
.
2
(3.4)
(3.5)
80
Putting arguments within the boundaries k , k , y attains its maximal
value when
q for yq > y (u1 , . . . , uk )
uq =
k for yq y (u1 , . . . , uk )
and y attains its minimal value when
q for yq < y (u1 , . . . , uk )
uq =
k for yq y (u1 , . . . , uk )
for all q = 1, . . . , K.
The following Karnik-Mendel iterative procedure has been brought to a
standard. Here, we present it in its simplest form; for other modications we
refer to [Mendel 2001]. Let the consequent values be ordered in the following
way y1 < y2 < . . . < yK . The KM iterative procedure can be enumerated as
follows.
1. calculate principal output
ypr as an average of yk weighted by mean
membership grades, i.e., k + k /2,
2. set the initial values ymin = ymax = ypr ,
3. for each k = 1, 2, . . . , K, if yk > ymax then k = k , otherwise k = k ,
4. nd nearest ynext = min yk : yk > ymax ,
k=1,...,K
5.
6.
7.
8.
81
1K
yj =
k=1
Ak (x)
Ak (x)
(3.6)
where
Ak (x) is a rough approximation of a fuzzy set Ak given by its upper
and lower approximations, A (x) and Ak (x), respectively, and the singlek
rule membership of object to the j-th class is binary
1 if x Cj
(3.7)
yj,k =
0 if x
/ Cj
for all rules k = 1, . . . , K and all classes j = 1, . . . , J. Then, the lower and
upper approximations of the membership of object x to class Cj is given by
1K
ymin (j) =
and
1K
ymin (j) =
where
(x) =
Ak
and
Ak (x) =
Ak (x)
k=1
k : yj,k =1
1K
k=1 Ak (x)
Ak (x)
k=1
k : yj,k =1
1K
k=1 Ak (x)
A (x)
if yj,k = 1
Ak (x)
if yj,k = 0
A (x)
if yj,k = 0
Ak (x)
if yj,k = 1
(3.8)
(3.9)
(3.10)
(3.11)
However the most useful result emerging from Nowickis works concerns the
defuzzication in the case of binary memberships of objects to classes. The
crucial thing is that this result does not require any arrangement of yj,k as
the Karnik-Mendel method does. Here, we put this result in the framework
of a theorem and deliver a formal proof.
Theorem 3.2 (based on [Nowicki 2008]). Having rough approximations,
the upper j,k and the lower j,k , of a binary set yj,k = {0, 1} representing
the single-rule class membership (3.7), where k is the index for rules k =
1, . . . , K and j is the index for classes j = 1, . . . , J, the lower and upper
approximations of the membership of an object to class Cj is given by
82
1K
j,k yj,k
,
1K
k=1 j,k yj,k +
k=1 j,k yj,k
1K
k=1 j,k yj,k
.
ymax (j) = 1K
1K
k=1 j,k yj,k +
k=1 j,k yj,k
ymin (j) = 1K
k=1
(3.12)
(3.13)
Proof. For simplicity, we omit the class index j. Therefore, given (3.2), we
make use of the fact that yk is either 0 or 1 in rearrangement (3.14), and
then, in the denominator, we add two components, whose value is equal to
0, i.e.,
1
1
1
k : yk =0 k 0 +
1k : yk =1 k
1
(3.14)
ymin =
+
k : yk =0 k
k : yk =1 k
1
1
0 + k : yk =1 k 1
1k : yk =0 k
1
1
= 1
k : yk =0 k +
k : yk =1 k 0 +
k : yk =0 k 0 +
k : yk =1 k
1
k=1,...,K k yk
1
= 1
,
(3.15)
k=1,...,K k yk +
k=1,...,K k yk
where yk denotes a binary negation dened by yk = 1 yk . By analogy,
the right bound is determined as follows.
1
1
k : yk =0 k 0 +
k : yk =1 k 1
1
1
(3.16)
ymax =
+
k : yk =0 k
k : yk =1 k
1
1
0 + k : yk =1 k 1
1k : yk =0 k
1
1
= 1
k : yk =0 k +
k : yk =1 k 0 +
k : yk =0 k 0 +
k : yk =1 k
1
k=1,...,K k yk
1
= 1
.
(3.17)
k=1,...,K k yk +
k=1,...,K k yk
Observe that K can be extended to Kj , and in such manner, the number
of rules does not necessarily has to be the same for each class.
In [Wu and Mendel 2002], the authors have presented a design method for
fuzzy logic systems, based on bound sets. In their intentions, their wanted
to relieve the computation burden of an interval type-2 FLS during its
83
operation, which makes an interval type-2 FLS useful for real-time applications. Namely, instead of strict ymin and ymax , they proposed to use innerand outer-bound sets for a centroid set, described in the following theorem
rewritten with our notations.
Theorem 3.3 ([Wu and Mendel 2002]). The end points ymin and ymax
of the centroid of an interval-valued fuzzy set, are bounded from below and
above by
ymin ymin y min ,
y max ymax y max ,
where the outer-bound set is given by
1P
ymin =
y max =
p=1 yp wp
min
,
1P
p=1 w p
1P
p=1 yp wp
max
,
1P
p=1 w p
(3.18)
(3.19)
1P
p=1 yp wp
1P
p=1 w p
1P
p=1 yp wp
1P
p=1 w p
(3.20)
(3.21)
(3.22)
(3.23)
y min + ymin
,
2
y max + y max
2
(3.24)
,
(3.25)
84
Theorem 3.4 ([Wu and Mendel 2002]). The dierence, , between the
defuzzied outputs of the type-reduced set and its approximation set, which is
dened as
0
0
0 ymin + ymax
ymax + y max 0
1 y min + y min
0
0
+
=0
(3.26)
0
2
2
2
2
is bounded from above as
=
1
y min ymin + y max y max
4
(3.27)
Collapsing Method
+
R
+
b
l1
i ;
i=0 L
1I1
and Rl1 k=0 rk with R0 = 0.
Theorem 3.6 (Defuzzied value of a discretised interval type-2 FS
[Greeneld et al 2009]). For the conditions and notation of Theorem 3.5,
the defuzzied value of F approximates to
1N
I=1 rI (xI XL )
,
XF XL + 1n1
1N
i=0 L +
I=1 rI
where XL is the centroid of L.
(3.29)
85
From the experience of the author, the procedure behaves similarly to the
ordinary centroid for average membership grades, what we will show in the
section of comparative analysis at the end of this chapter.
86
with its
Now let the same formula be applied to a fuzzy-valued fuzzy set, B,
fuzzy-membership function, B , dened by secondary membership functions
fk : [0, 1] [0, 1] for each yk , k = 1, . . . , K. Via the extension principle this
formula can be fuzzied into the following one [Karnik and Mendel 2001;
Karnik et al 1999; Mendel 2001].
0
K
yk uk 0
sup
if y = k=1
min fk (uk )
0
K
k=1,...,K
k=1 uk
uk Uk [0,1] .
B (y) =
(3.31)
0
otherwise
In practise, until the publication of our formulae for extended centroids of
Gaussian and triangular fuzzy-valued fuzzy sets, we were not able to conusually requires the
sider continuous uk [0, 1]. The calculation
procedure
discretization of each domain Uk = supp B (yk ) [0, 1] for uk so that
each of them contains a nite number of points, let us say uk1 , . . . , ukQk ,
87
sup
y=
K
y u
k=1 k ki
K
u
k=1 ki
min
k=1,...,K
fk (uki ) .
(3.32)
It is possible that more than one K-tuple (u1q1 , . . . , ukqk , . . . , uKqK ) induce
the same element y of the centroid fuzzy set. In this case, the membership
degrees of this element must be determined as the supremum over all equivalent K-tuples. In this discrete approach,
2Kwe achieve the number of K-tuples
(including equivalent ones) equal to k=1 Qk . If we assume that each Uk
contains an equal number of discrete points, Q, we obtain the number of
QK (K-th power of Q) set of fuzzy sets. This sets up the highest barrier for
applying this exhaustive method fuzzy logic systems especially with the rigor
of real-time.
The sequence of computations needed to obtain the fuzzy centroid set is
as follows.
1. Discretize the output space Y into K points, y1 , . . . , yK .
2. Discretize the domain [0, 1] of each B (yk ) into a suitable number of points
uk1 , . . . , ukQk , k = 1, . . . , K.
3. Compute the centroid fuzzy set using (3.32) for all possible K-tuples
(u1q1 , . . . , ukqk , . . . , uKqK ), qk = 1, . . . , Qk , k = 1, . . . , K.
Although other extended defuzzication methods based on dierent t-norms
may be considered, they are of no practical importance when a t-norm satK
fk (uk ) = 0 for fk (uk ) < 1. This occurs for
ises the condition limK Tk=1
dense discretization also when a nite number of fk (uk ) is equal to 1. In this
case the the centroid type-reduced set becomes a centroid of a discrete principal membership function,
3k = uk : fk (uk ) = 1. The problem was pointed
out by Karnik and Mendel in the context of algebraic product t-norm [Karnik
and Mendel 2001].
88
}
{u [0,1] |fx (u)
closure FOU A
if > 0
if = 0
is an interval-valued fuzzy set with its interval membership
where FOU A
closed.
grades FOU(A) = support (fx (u)) and closure makes FOU A
-planes are known to preserve properties similar to those of -cuts.
1. A
1 A2 ,if 1 2 .
=A
max
2. A max
B
B .
B
=A
B
3. A
min
min .
where
The value of the -plane decomposition theorem can be recognized in decomposition of an extended centroid into multiple computing of type-reduced sets
of interval-valued -planes.
Theorem 3.8. For the minimum t-norm operation, centroid type-reduction
is the union of the centroids of its associated -planes
for a type-2 fuzzy set A
, with [0, 1], i.e.,
A
4
4
. (3.33)
C=
centroid (A ) =
/support centroid A
[0,1]
[0,1]
The proof of this theorem can be found in [Liu 2008]. As a direct consequence,
an -cut C is nothing else but the domain of the centroid of the -plane
. Then, with the use of the Karnik-Mendel iterative procedure, this -cut
A
can be described as follows:
C = / [yleft, , yright, ] ,
(3.34)
89
where yleft, and yright, are the left and the right end-point of the interval
type-reduced set. Lius has presented a strategy to compute centroid typereduction for a general type-2 set in the following way:
1. Break the into values, which are 0, 1/, 2/, ..., ( 1)/, 1. De with the
compose the general type-2 fuzzy set into multiple -planes A
chosen values.
2. Compute the centroid / [yleft, , yright, ] for each associated type-2 fuzzy
.
set A
3. Compute the union of all these centroids.
Comparing with the exhaustive computation approach, this strategy reduces
the computation complexity from exponential into linear, however Lius approach suers from a dense discretization of the domain of .
|yk M| k
,
1K
3k
k=1
k=1
(3.37)
(3.38)
is satised, where k is the number of standard deviations of a Gaussian considered signicant (generally, k = 2 or 3).
90
There are two ways to calculate the centroid in fuzzy logic systems: numerical
integration with the use of approximation and restriction of B to the specic
shapes of known integrals, see e.g. [Van Broekhoven and De Beats 2006].
For discrete y values, y1 , . . . , yd , . . . , yD , the centroid can be calculated by
the discrete centroid given by (3.30) [Wang 1994]
D
1
y =
yd B (yd )
d=1
D
1
(3.40)
B (yd )
d=1
The origin of the discrete centroid method comes from the height type defuzzication (known also as the center average defuzzication) that
disregards exact shapes of membership functions of fuzzy rule conclusions,
and takes into account only their height. This approach is equivalent to reducing fuzzy rule conclusions to singleton membership grades. The drawback
of the height type defuzzication is that it cannot be applied directly to fuzzy
logic systems with logical reasoning, in which the aggregation operation has
to be performed previously, as it is pointed out by [Rutkowska et al 1999].
91
Here comes the denition of fuzzy convexity instead from the classical convexity
of a function.
92
(3.41)
(3.42)
93
The bounds of -cuts for these fuzzy membership grades can be calculated
from f1 (u1 ) = f2 (u2 ) = . Subsequently, we can rearrange upper and lower
bounds of uncertainty into functions of . In consequence, the problem of the
type-reduction for trapezoidal fuzzy-valued fuzzy sets can be considered as
an -dependent interval type-reduction.
Proposition 3.1. Suppose we have two trapezoidal fuzzy-valued singletons
characterized by (3.43) and (3.44) at y1 and y2 arranged by y1 < y2 , with
upper, upper-principal, lower-principal, and lower membership grades satisfying k < k k < k , k = 1, 2. The support [ymin , ymax ] can be calculated
as a centroid fuzzy set for the interval fuzzy sets constituted by the upper and
lower membership grades. The kernel [ylpr , yrpr ] can be calculated as a centroid fuzzy set for the interval fuzzy sets constituted by the upper-principal
and lower-principal membership grades. Then the centroid of two trapezoidal
fuzzy-valued singletons is characterized by the following membership function:
yymin
if y [ymin, ylpr ] ,
1
if y [ylpr , yrpr ] ,
(y) =
(3.45)
yymax (y)
if
y
[y
,
y
]
,
rpr
max
(1q
)y+q
y
y
(y)
r
r
rpr
max
0
otherwise.
where the parameters are expressed by
1 + 2
,
1 + 2
+ 2
qr = 1
.
1 + 2
ql =
(3.46)
(3.47)
Proof. The bounds of -cuts for fuzzy membership grades are solutions of
equations
f1 (u1 ) = ,
f2 (u2 ) = ;
(3.48)
(3.49)
note that all the solutions are within the unity interval [0, 1] for the secondary
membership functions given by (3.43) and (3.44). By inversion, we get upper
and lower bounds of uncertainty as linear functions of , i.e.,
u1 () = 1 1 + 1 ,
(3.50)
u1 () = ( 1 1 ) + 1 ,
u2 () = 2 2 + 2 ,
(3.52)
u2 () = ( 2 2 ) + 2 .
(3.53)
(3.51)
94
yl () =
(3.54)
(3.55)
yr () =
(3.56)
(3.57)
The bounds of the support [ymin , ymax ] and the kernel [ylpr , yrpr ] are expressed
by
ymin = yl (0) =
(3.58)
,
1 + 2
1 y1 + 2 y2
= yl (1) =
,
1 + 2
y1 + 2 y2
= yr (1) = 1
.
1 + 2
(3.59)
ymax = yr (0) =
ylpr
yrpr
1 y 1 + 2 y 2
1 + 2
1 y 1 + 2 y 2
y
+ ymin
min
1 +
2
yl () =
,
1 + 2
+
1
1 +
2
1 y1 + 2 y2
ymin + ymin
+2
1
.
yr () =
1 + 2
+
1
+
1
(3.60)
(3.61)
(3.62)
(3.63)
yl () =
1 y1 + 2 y2
1 +2
ymin + ymin
1 +1
1 + 2
1 + 2
1 + 2
1 +2
y
max
1 +2
1 + 2
yr () =
1 + 2
+ 1 + 1
95
(3.64)
(3.65)
(3.66)
(3.67)
in other cases the result is trivially equal to either 1 or 0. Since plays the
role of the membership, i.e. (y) = , we immediately achieve (3.45) as the
analytical expression for a centroid fuzzy set.
Observe that the arms of the membership function (3.45) are two hyperbolas which are parameterized by the left- and the right-principal values ylpr
and yrpr , end-points ymin and ymax , and parameters ql and qr . Moreover, the
result preserves the trapezoidal shape if and only if both ql = 1 and qr = 1.
Now, we generalize the two singleton case to the case of multiple elements
in the discrete primary domain. Let fk be a trapezoidal membership function
of a k-th primary value,
"
"
u k k u k k
min
,
,
(3.68)
fk (uk ) =
k k k k
where k < k < k < k , k = 1, 2, . . . , K.
96
yyleft (y)
if y [ymin , ylpr ] ,
1
if y [ylpr , yrpr ] ,
,
(3.69)
(y) =
yyright (y)
if y [yrpr , ymax ] ,
0
otherwise.
where the parameters are expressed by
1K
k (y)
ql (y) = 1k=1
,
K
k=1 k (y)
1K
k (y)
,
qr (y) = 1k=1
K
k=1 k (y)
(3.70)
(3.71)
and
1K
k=1 k (y) yk
yleft (y) = 1
,
K
k=1 k (y)
1K
k=1 k (y) yk
yright (y) = 1
,
K
k=1 k (y)
1K
k=1 k (y) yk
yleftpr (y) = 1
,
K
k=1 k (y)
1K
k=1 k (y) yk
yrightpr (y) = 1
,
K
k=1 k (y)
with
(y) =
k (y) =
(3.72)
(3.73)
(3.74)
(3.75)
k
k
if yk y
,
otherwise
(3.76)
k
k
if yk y
,
otherwise
(3.77)
k (y) =
k (y) =
97
k
k
if yk y
,
otherwise
(3.78)
k
k
if yk y
.
otherwise
(3.79)
and
k are stepped functions, i.e., they
Note that membership grades
k
can change their values only at the discrete points yk . As a result, ql , qr , yleft
and yright can be calculated once for each interval between subsequent yk .
Proof. In comparison to Proposition 3.1, a vector ofmemberships
chosen for
(y) = , . . . , , is dierent
the left end-point of an -cut, denoted by
1
K
right end-points of 0-cut and 1-cut, respectively, are composed of (3.78) and
(3.79).
Analogically to the case of two singletons, we obtain the uncertainty
bounds of arguments selected for the left and right end-points of the centroid fuzzy set as linear functions of , i.e.,
(, y) = (
(y)) +
(y) ,
u
(y)
u (, y) = (
(y)
(y)) +
(y) .
(3.80)
(3.81)
In consequence, the left and right end-points of an interval centroid fuzzy set
for a given can be represented by:
1K
k=1 u k (, yl ) yk
yl () = 1
K
k=1 u k (, yl )
1K
(y )) y + 1K
k=1 (
k (yl )
k
l
k
k=1 k (yl ) yk
=
,
1K
1
(y )) + K
k=1 (
k (yl )
k
l
k=1 k (yl )
1K
k=1 u k (, yr ) yk
yr () = 1
K
k=1 u k (, yr )
1K
1K
k (yr ) yk
k=1 (
k (yr )
k (yr )) yk + k=1
.
=
1K
1K
(3.82)
(3.83)
(3.84)
(3.85)
98
k=1 k (yl ) yk
yleft (yl ) = yl (0) = 1
,
K
k=1 k (yl )
1K
k=1 k (yl ) yk
yleftpr (yl ) = yl (1) = 1
.
K
k=1 k (yl )
Note that functions yleft and yleftpr are constant within the range [yk , yk+1 ]
[ymin , ylpr ]. Moreover, for each closed range, these boundary points yleft and
yleftpr lie outside the open range (yk , yk+1 ) (ymin , ylpr ). Analogically, for yr ,
1K
k=1 k (yr ) yk
yright (yr ) = yr (0) = 1
,
K
k=1 k (yr )
1K
k=1 k (yr ) yk
yrightpr (yr ) = yr (1) = 1
.
K
k=1 k (yr )
Now, we introduce (3.70) in (3.83) making also the use of (3.72) and (3.74),
i.e.,
K
K
K
(y )y
k
l
k
k=1 k (yl )yk
k=1 k (yl )yk
+ k=1
(y ) K
(y )
K
K
k
l
k
l
k=1
k=1
k=1 k (yl )
K
yl () =
k (yl )
k=1
1
+1
K
(y )
k=1
(3.86)
Similarly, (3.85) can be rearranged with the use of (3.71), (3.73) and (3.75),
i.e.,
K
K
K
K
K
K
k=1 k (yr )
k=1 k (yr )
k=1 k (yr )
K
yr () =
k (yr )
k=1
1 +1
K
(y )
k=1
(3.87)
the kernel, ylpr = 1.25 and yrpr = 1.6. For all y [ymin , y2 ],
99
of memberships
elected
for the left end-point of the centroid fuzzy set, i.e.
if y [ymin, y2 ]
=
0.2727y + 0.7273 1.25 0.4545
0.2727y + 0.4546
(y) = , , and
For all y [y2 , ylpr ],
1
2
3
(y)
=
yleft (y) =
ql (y) =
y 0.6842
y 0.6842
if y [y2 , ylpr ]
=
0.5789y + 0.4211 1.25 0.6842
0, 5789y 0.1578
end-point of the centroid fuzzy set, i.e. (y) = 1 , 2 , 3 . Now yright (y) =
ymax . Then,
[0.1 0.2 0.5] 1t
= 0.8.
qr (y) =
[0 0.1 0.9] 1t
Consequently the membership function of the centroid fuzzy set is as follows:
(y) =
y 1.9
y 1.9
=
if y [yrpr , ymax ]
0.2y + 0.8 1.6 1.9
0.2y 0.62
The membership function of the fuzzy centroid is either equal to 1 for the
kernel or equal to 0 otherwise. Figure 3.1 shows the arguments and the result. Emphasize that the obtained shape is quite irregular due to the specially
chosen parameters of the arguments in order to distinguish separate constructions of the parts of the membership function.
100
1
0.8
0.6
0.4
0.2
0
0y
1
0.5
1y
y 2
(b)
0.5
ymin
1y
y 2
1.5
2y
3
1
0.8
0.6
0.4
0.2
0
ylpr
1.5 y
rpr
2
ymax
Fig. 3.1 Centroid of fuzzy-valued fuzzy sets with trapezoidal secondary membership functions: (a) upper, upper- and lower-principal, and lower
membership grades; (b) centroid fuzzy set
singletons (in the domain of y), which can be characterized by their secondary
membership functions:
"
"
u 1 1 1 u 1
f1 (u1 ) =
min
,
,
(3.88)
31 1 1
31
"
"
u 2 2 2 u 2
min
,
f2 (u2 ) =
.
(3.89)
32 2 2
32
Now, the centroid for triangular fuzzy-valued singletons can be viewed as an
immediate consequence of Theorem 3.1 whenever
3k = k = k , k = 1, 2.
Corollary 3.1. Suppose we have two triangular fuzzy-valued singletons characterized by (3.88) and (3.89) at y1 and y2 ordered by y1 < y2 , with upper,
principal and lower membership grades satisfying k >
3k > k , k = 1, 2.
Let [ymin , ymax ] be a centroid fuzzy set for the interval-valued fuzzy sets constituted by the upper and lower membership grades and let ypr be a centroid
2 y2
of the principal membership function ypr = 1 y11 +
+
2 . Then the centroid of
the triangular fuzzy-valued fuzzy set of two singletons is characterized by the
following membership function:
yymin
if y [ymin , ypr ]
l ypr ymin
(y) = (1ql )y+q
,
(3.90)
yymax (y)
if y [ypr , ymax ]
(1qr )y+qr ypr ymax (y)
101
32
31 +
,
1 + 2
(3.91)
qr =
32
31 +
.
1 + 2
(3.92)
The extension of this result to the case of multiple elements in the discrete
primary domain can be considered as a consequence of Theorem 3.11 with the
following constraint
3k = k = k , k = 1, . . . , K. Let the triangular fuzzyvalued fuzzy set be characterized by its secondary membership function
"
"
u k k k u k
min
,
(3.93)
fk (uk ) =
3k k k
3k
for k = 1, . . . , K.
Corollary 3.2. Suppose we have a triangular fuzzy-valued fuzzy set of ordered discrete primary values yk with their secondary membership functions
3k >
(3.93) specied by upper, principal and lower membership grades, k >
k , k = 1, 2, . . . , K. Assume also that the KM algorithm determined an interval centroid fuzzy set [ymin , ymax ] for the interval-valued fuzzy set constituted
by the upper and lower membership grades. Moreover, let ypr be a centroid of
the principal membership grades calculated by
ypr =
K
5
3k yk
k=1
3k
(3.94)
3k
,
ql (y) = 1K k=1
k=1 k (y)
1K
3k
qr (y) = 1K k=1
,
k=1 k (y)
and
(3.96)
(3.97)
102
1K
k=1 k (y) yk
,
yleft (y) = 1
K
k=1 k (y)
1K
k=1 k (y) yk
yright (y) = 1
,
K
k=1 k (y)
with
(y) =
k (y) =
k
k
if yk y
,
otherwise
k
k
if yk y
.
otherwise
3 = [0.1 0.9 0.5], and upper memberships = [0.8 1 0.9]. From the KM
method we get the bounds of the 0-plane centroid fuzzy set, ymin = 0.3 and
ymax = 1.9. The principal value of the centroid set is calculated then as:
ypr =
(y) is a vector of memberships elected for the left endFor all y [ymin , y2 ],
(y) = , , . Initially, let y (y) = y .
point of the centroid set, i.e.
left
min
1
2
3
Then,
[0.1 0.9 0.5] 1t
ql (y) =
= 1.5 .
[0.8 0.1 0.1] 1t
Consequently, the membership function of the centroid within the considered
range [ymin , y2 ] is obtained as
y 0.3
y 0.3 .
=
0.5y + 1.5 1.2667 0.3
0.5y + 1.6
(y) = , , and
For all y [y2 , ypr ],
1
2
3
(y)
=
yleft (y) =
ql (y) =
Consequently, the membership function of the centroid in [y2 , ypr ] set is obtained as
103
(a)
1
0.8
0.6
0.4
0.2
0
0y
1
0.5
1y
y 2
(b)
ymin 0.5
1y
y 2
1.5
2y
3
1
0.8
0.6
0.4
0.2
0
ypr
1.5
2
ymax
Fig. 3.2 Centroid of fuzzy-valued fuzzy sets with triangular secondary membership
functions: (a) upper, principal and lower membership grades; (b)
centroid fuzzy set
(y)
=
y 0.6316
y 0.6316
.
=
0.2105y + 0.7895 1.2667 0.6316
0.2105y + 0.3685
(y) is a vector
elected for the right
For all y [ypr , ymax ],
of memberships
end-point of the centroid set (y) = 1 , 2 , 3 and yright (y) = ymax . Then,
qr (y) =
Consequently, the membership function of the centroid set within [ypr , ymax ]
is obtained as
(y) =
y 1.9
y 1.9
.
=
0.5y
0.5y + 1.5 19
1.9
15
104
2
exp 21 u1
1
f1 (u1 ) =
2
exp 21 u1
1
2
exp 21 u2
2
f2 (u2 ) =
2
exp 21 u2
2
31 ] ,
u1 [0,
(3.98)
1 , 1] ,
u1 (3
32 ] ,
u2 [0,
(3.99)
2 , 1] ,
u2 (3
2
2 )yy1
2 y2
1 (1+
exp
if y [y1 , ya )
2
2 (yy2 )
2 )y(
1 y1 +
2 y2 )
if y [ya , ypr ]
exp 12 ( 11 +
y1 2 y2 y(1 2 )
2
(3.100)
(y) = exp 1 (1+ 1 )yy2 1 y1
if y [ypr , yb ]
2
1 (yy1 )
2
2 +
1 )y(
2 y2 +
1 y1 )
1 (
if y (yb , y2 ]
exp
2
2 y2 1 y1 (2 1 )y
0
otherwise
where the boundary values for conditions are expressed by
y1
2
1
1
y2
+
2
2
1
ya =
,
1+
2
1
1
2 1
y2
1
1
2
y1
1 + 1 2
yb =
.
1+
1 +
1
2
2
1
Proof. For the minimum-based centroid and fuzzy-convex secondary membership functions, their -cuts producing the result should be of the same
level, i.e. [f1 ] and [f2 ] . Upper and lower bounds of uncertainty can be
expressed as functions of ., i.e.,
u1 () = max 0,
31 1 2 ln
(3.101)
u1 () = min 1,
31 + 1 2 ln
(3.102)
u2 () = max 0,
32 2 2 ln
(3.103)
u2 () = min 1,
32 + 2 2 ln
(3.104)
105
(3.105)
(3.106)
u2 () = max (0,
32 2 ) ,
(3.107)
u2 () = min (1,
32 + 2 ) ,
(3.108)
with [0, ).
Now the problem of nding a centroid of Gaussian fuzzy-valued fuzzy sets
reduces to the interval centroid calculation dependent on . Consequently,
the left bound yl of the resultant interval set is a function of , i.e.,
u1 () y1 + u2 () y2
(3.109)
u1 () + u2 ()
min (1,
31 + 1 ) y1 + max (0,
32 2 ) y2
=
min (1,
31 + 1 ) + max (0,
32 2 )
if
31 + 1 > 1 and
32 2 < 0,
y1
y1 +( 2 2 )y2
if
3
+
>
1
and
32 2 0,
1
1
1+
2 2
=
y1
if
31 + 1 1 and
32 2 < 0,
( 1 +1 )y1 +( 2 2 )y2
otherwise,
1 +1 +
2 2
if > 22 ,
y
1
2 y2 +y1 +
2 y2
1
1
2
if
,
(3.110)
=
2 +1+
2
1
2 ,
(
y
y
)+
y
+
y
1
1
2
1 1
2 2
1 1 2 2
otherwise (if min
,
).
yl () =
(1 2 )+
1 +
2
We can invert this formula with respect to and then obtain which equivalent to for y [y1 , ypr ]. Consequently,
2
for
2
2
2
1
(1+
)yy
y
,
exp
2
1
2 2
2 2
(y) = exp 12
(yy
)
2
2
2
1
1 1
exp
2
1
exp 1 ( 1 + 2 )y( 1 y1 + 2 y2 )
otherwise,
2
1 y1 2 y2 y(1 2 )
y1
2
1
1
2
y2
2 + 2 1
2 )yy1
2 y2
1 (1+
,
exp 2
if y <
1+
2
1
1
2 (yy2 )
2
1
=
(3.111)
2
2 )y(
1 y1 +
2 y2 )
exp 12 ( 11 +
otherwise.
y1 2 y2 y(1 2 )
106
The right bound yr of an interval set can also be expressed in terms of , i.e.,
u1 y1 + u2 y2
(3.112)
u1 + u2
32 + 2 ) y2
max (0,
31 1 ) y1 + min (1,
=
max (0,
31 1 ) + min (1,
32 + 2 )
y2
if
31 1 < 0 and
32 + 2 > 1,
1 y1 +y2 + 1 y1
if
31 1 0 and
32 + 2 > 1,
1 +1+
1
=
if
<
0
and
32 + 2 1,
y
2
1
1
(2 y2 1 y1 )+ 2 y2 + 1 y1
otherwise,
(2 1 )+
2 +
1
if > 11 ,
y2
1 y1
1
2
1
1 y1 +y2 +
if
,
=
(3.113)
1
2
1 ,
1 +1+
(2 y2 1 y1 )+ 2 y2 + 1 y1 otherwise.
yr () =
(2 1 )+
2 +
1
Then its inverse is the membership function of the centroid fuzzy set for
y [ypr , y2 ], i.e.,
2
for
2
2
1
1
(1+
)yy
y
,
exp
1
2
1 1
2 1
(y) = exp 12
(yy
)
1
1
2
2
1 1
exp
2
2
exp 1 ( 2 + 1 )y( 2 y2 + 1 y1 )
otherwise,
2
2 y2 1 y1 (2 1 )y
y2
1
1
2
2
y1
1 + 1 2
1 )yy2
1 y1
1 (1+
exp 2
< y,
if
1+
1
1
2
1 (yy1 )
1
2
(3.114)
.
=
2
2 +
1 )y(
2 y2 +
1 y1 )
1 (
otherwise.
exp 2 2 y2 1 y1 (2 1 )y
We now need to generalize the previous result for the case of multiple points
in the domain of y.
Theorem 3.12. Suppose we have a asymmetric-Gaussian fuzzy-valued fuzzy
set with its principal membership function
3 : Y [0, 1], its upper spread
function : Y [0, 1] and its lower spread function : Y [0, 1] where Y
is a discrete domain consisting K points yk , k = 1, . . . , K. Let a secondary
membership function is described by
2
exp 12 uk
k
fk (uk ) =
2
exp 12 uk
k
107
3k ] ,
if uk [0,
(3.115)
otherwise.
k k
1. calculate ypr = k=1
,
K
k
k=1
2. n = 1; ya = yn ; i = 1,
3. calculate (ya ) =
minK
k=2
2
1
exp 2 kk
,
2
k
1 1
1
for
(y)
<
exp
and if k i,
2
k
2
mik = 0
(3.116)
for (y) < exp 12 kk
and if k > i,
3k otherwise.
2
k
1 1
k
for (y) exp 2
and if k i,
2
sik =
for (y) exp 12 kk
and if k > i, (3.117)
k
0
otherwise,
5. choose yb (ya , ypr ] closest to ya from ybrk,k , k = 1, 2, . . . , K, and yn+1
(if they exist),
1 k K
K
q=1 siq yq +
q=1 miq yq
k
if k i
1
k K
K
miq +
q=1 siq
k
ybrk,k = k q=1
(3.118)
K
K
q=1 siq yq +
i=1 miq yq
otherwise
kK
k K
q=1
miq +
q=1
siq
1
2
1K
K
m
y
m
y
1
ik
ik k
k=1
k=1
,
(y) = exp
1K
1K
2
s
y
s
y
k=1 ik k
k=1 ik
7. if yb = yn+1 then increase n,
8. ya = yb ; go to step 4,
9. n = K; ya = yn ,
2
K1
1
10. calculate (ya ) = mink=1 exp 2 kk
,
(3.119)
108
11. for each k = 1, 2, . . . , K calculate mjk (y) , sjk (y) according to (3.120)
and (3.121)
2
1
1
k
1
for (y) < exp 2
and k i,
2
mjk = 0
(3.120)
and k < i,
for (y) < exp 21 kk
3k otherwise,
2
k
1 1
for
(y)
exp
and k i,
2
k
k
2
sjk =
k
1
for
(y)
exp
2
k
0
otherwise,
12. choose yb [ypr , ya ) closest to ya from ybrk,k (3.118), k = 1, 2, . . . , K,
and yn1 (if they exists),
13. determine (y) given by (3.119) for y [yb , ya )
1
2
1K
K
1
k=1 mik y
k=1 mik yk
,
(y) = exp
1K
1K
2
k=1 sik yk
k=1 sik y
14. if yb = yn1 then decrease n,
15. ya = yb ; go to step 11.
In step 3. (and also in 10.), a necessary condition for starting the procedure
is that at least one of the lower parts of Gaussian secondary membership
functions is not clipped by 0.
Proof. Analogically to the previous case, we get a spread of uncertainty corresponding to the left and right slopes of a centroid set
= max 0, min 1,
2 ln
3+
(3.122)
u
i
i
3+
j 2 ln
(3.123)
u j = max 0, min 1,
= [
,...,
] with
=
where vector
3 = [3
1 , . . . ,
3K ]; vector
i
i1
iK
ik
k
with
jk = k whenever yj yk and
jk = k otherwise; i =
1, 2, . . . :
yi ypr , j = 1, 2, . . . : ypr yj , k = 1, 2, . . . , K. Substituting for 2 ln ,
the spread of uncertainty take the following form:
u
i
i
3+
j ))
u j = max (0, min (1,
(3.124)
(3.125)
109
Now, the centroid set for a given can be represented by its left and right
slopes
1K
u ik yk
yl () = 1k=1
K
k=1 u ik
1K
(y) )) y
3k +
ik
k
k=1 max (0, min (1,
= 1
,
K
3k + ik (y) ))
k=1 max (0, min (1,
1K
u jk yk
yr () = 1k=1
K
k=1 u jk
1K
(y) )) y
3k +
jk
k
k=1 max (0, min (1,
= 1
.
K
3k + jk (y) ))
k=1 max (0, min (1,
(3.126)
(3.127)
(3.128)
(3.129)
Subsequently, the left slope function can be expressed with the use of conditions for the secondary membership functions to be clipped either by 0 or 1,
i.e.,
1K
k=1 (mik + sik ) yk
,
(3.130)
yl () = 1
K
k=1 (mik + sik )
where
mik
sik
for
3k + k > 1 and k i,
1
= 0
for
3k k < 0 and k > i,
3k otherwise,
for
3k + k 1 and k i,
k
= k for
3k k 0 and k > i,
0
otherwise.
(3.131)
(3.132)
k=1
k=1
k=1
1K
1K
k=1 mik yl
k=1 mik yk
1K
1K
k=1 sik yk
k=1 sik yl
(3.133)
.
(3.134)
Therefore, for y [y1 , ypr ], we achieve (y) = = exp 2 /2 in the form
(3.119):
1
2
1K
K
m
y
m
y
1
ik
ik
k
k=1
k=1
,
(y) = exp
1K
1K
2
s
y
s
y
ik
k
ik
k=1
k=1
110
where i is such that y [yi , yi+1 ) and mik and sik are expressed by (3.116)
and (3.117), respectively,
2
1
1
k
1
for (y) < exp 2
and if k i ,
2
mik = 0
and if k > i ,
for (y) < exp 21 kk
3k otherwise ,
2
k
1 1
for
(y)
exp
and if k i ,
2
k
k
sik = for (y) exp 1 k 2 and if k > i ,
k
2
k
0
otherwise .
Observe that (3.119) is an implicit function of y, since i depends on a current
y value. Up to now we know only membership values for which mik changes
from 0 or 1 to
3k , and sik changes from 0 to k or k . Hence, we have to
obtain corresponding values for y, i.e.,
1K
2
1K
m
y
m
y
iq brk,k
iq q
1
q=1
q=1
(3.135)
exp
1K
1K
2
s
y
s
y
q=1 iq q
q=1 iq brk,k
2
k
1 1
if k i
exp 2
k
=
2
otherwise
exp 12 kk
1 k K
K
q=1 siq yq +
q=1 miq yq
k
if k i
K
1
K
k
m
+
iq
q=1 siq
k
K
.
(3.136)
ybrk,k = k q=1
K
q=1 siq yq +
i=1 miq yq
otherwise
kK
k K
q=1
miq +
q=1
siq
Similarly, we obtain the right slope of the centroid expressed by the same
equation (3.119) but with mjk and sjk dened dierently
2
1
1
k
1
for (y) < exp 2
and k i,
2
mjk = 0
and k < i,
for (y) < exp 12 kk
3k otherwise,
2
k
1 1
k
k
2
sjk = for (y) exp 1 k
and k < i,
2 k
k
0
otherwise,
111
112
2
2
17y 12
1.7y 1.2
= exp
.
(y) = exp
1.5y + 0.8
15y 8
In the third loop, m = [0.1 0.2 0.5] and s = [2.5 0.1 0.7]. The right
bound yb := min (y2 , ypr ) = min (1, 1.5) = y2 = 1. Consequently, for y
[0.4674, 1], we determine
2
2
8y 12
0.8y 1.2
= exp
.
(y) = exp
1.5 1.7y
17y + 15
In this loop n := n + 1 = 2 since yb = y2 .
In the fourth loop, m = [0.1 0.2 0.5] and s = [2.5 0.2 0.7]. The right
bound yb := ypr = 1.5 . Then, for y [1, 1.5],
2
2
0.8y 1.2
4y 6
(y) = exp
= exp
.
1.2 2y
y+6
A right slope of a membership function for the centroid has to be calculated
in the reverse direction. We start from n := K = 3 and the new right bound
ya := yn = 2. In the rst loop, m = [0 0.2 1] and s = [0 0.1 0]. Now the
left bound yb = max (ybrk,1 , ybrk,3 , ypr )
= max (1.8571, 1.9302, 1.5)
= ybrk,3
=
1.9302. Consequently, for y [1.9302, 2], we determine
2
2
12y 22
1.2y 2.2
= exp
.
(y) = exp
0.1 + 0.1y
y1
In the second loop, m = [0 0.2 0.5] and s = [0 0.1 0.4]. The left bound
yb = max (ybrk,1 , ypr )
= max (1.7363, 1.5)
= ybrk,1
= 1.7917. Consequently,
for y [1.7917, 1.9302], we determine
2
2
7y 12
0.7y 1.2
= exp
.
(y) = exp
0.7 0.3y
3y 7
The third loop in the reverse direction produces: m = [0.1 0.2 0.5], s =
[0.3 0.1 0.4] and yb = ypr = 1.5. Thus, for y [1.5, 1.7917],
2
2
0.8y 1.2
8y 12
(y) = exp
= exp
.
0.7
7
Otherwise the membership function of the centroid fuzzy set is equal to 0.
The membership function in the whole domain is presented in Fig. 3.3.
113
(a)
1
0.5
0
1
f3
f2
f1
0.5
x
0 x1
0
u
1 x2
0.5
x
(b)
f1(0)
0.5
f3(1)
f1(1)
f3(0)
f2(0)
0
x1
0
x (1)
b
x (2)
b
0.5
xb(3) = x2
1
x
xpr
x (2)
b
xb(1) x
3
1.5
f (0)
2
114
Corollary 3.3. Suppose we have two Gaussian fuzzy-valued singletons characterized by (3.137) and (3.138) at y1 and y2 , arranged such that y1 < y2 ,
with principal membership grades
3k (0, 1) and standard deviations k > 0,
k = 1, 2. Let ypr be a centroid of the principal membership function calculated by (3.94). Then the centroid of such Gaussian fuzzy-valued fuzzy sets is
characterized by the membership function
2
2 )yy1
2 y2
1 (1+
exp 2
if y [y1 , ya )
2 (yy2 )
2 )y(
1 y1 +
2 y2 )
if y [ya , ypr ]
exp 12 ( 11 +
y1 2 y2 y(1 2 )
2
(y) = exp 1 (1+ 1 )yy2 1 y1
(3.139)
if y [ypr , yb ]
2
1 (yy1 )
2
2 +
1 )y(
2 y2 +
1 y1 )
1 (
if y (yb , y2 ]
exp
2
2 y2 1 y1 (2 1 )y
0
otherwise
where the boundary values for the condition parts are expressed by
y1
2
1
1
y2
+
2
2
1
ya =
,
1+
2
1
1
2 1
y2
1
1
2
+
y1
1
1
2
yb =
.
1+
1 +
1
2
2
1
A generalization of this result for the case of multiple points in the domain
of y ows immediately from Theorem 3.12 if k = k , k = 1, . . . , K.
Corollary 3.4. Suppose we have a Gaussian fuzzy-valued fuzzy set with its
principal membership function
3 : Y [0, 1] and standard deviation function
: Y [0, 1] where Y is a discrete domain consisting K points y1 , y2 , . . . , yK .
Let a secondary membership function be described by (3.35)
2
3k
1 uk
, k = 1, . . . , K.
fk (uk ) = exp
2
k
The algorithm described in Theorem 3.12 is valid for Gaussian fuzzy-valued
fuzzy sets if only (3.116) and (3.117) are replaced by
2
k
1 1
1
for (y) < exp 2
and if k i,
2
mik = 0
(3.140)
and if k > i,
for (y) < exp 12 kk
3k otherwise,
sik =
115
2
k
for (y) exp 12 1
and if k i,
k
2
(3.141)
for (y) exp 12 kk
and if k > i,
otherwise,
2
k
1 1
1
for (y) < exp 2
and k i,
2
mik = 0
(3.142)
for (y) < exp 12 kk
and k < i,
3k otherwise,
2
k
1 1
for
(y)
exp
and k i,
k
2
k
2
sik =
(3.143)
for (y) exp 12 kk
and k < i,
k
0
otherwise,
Example 3.4. Suppose we have the discrete primary domain given by y=
[0 1 2], the principal membership grades
3 = [0.1 0.2 0.5], and the standard
deviations = [0.1 0.2 0.5] proportional to the principal grades. Obviously
bounds of the centroid fuzzy set are ymin = y1 = 0 and ymax = y3 = 2. The
rst loop of the algorithm is demonstrated in details.
1. The principal value of the centroid fuzzy set is calculated in the following
way:
ypr =
2. We initialize parameters n := 1; ya := yn = 0.
3. Then we calculate an initial membership grade
2
K
1
3k
(ya ) = min exp
= f2 (0) = f3 (0)
= 0.6065 .
k=2
2 k
4. According to (3.140) and (3.141) we determine m = [0.1 0.2 0.5] and s =
[0.1 0.2 0.5].
5. We have to choose a right bound which is closest to ya from the right,
i.e., yb := min (ybrk,1 , y2 , ypr ) = min (2.087, 1, 1.5) = y2 = 1, since ybrk,2 =
ybrk,3 = 0.
116
117
(y) = (2s y) .
(3.144)
1
0.5
0
1
f3
f2
0.5
x
0 x1
0
u
1 x2
0.5
x
(b)
f (0) = f (0)
f (0)
1
= f (0)
2
= f (1)
0.5
x
0
0.5
1
x
x
1.5
pr
Fig. 3.4 Centroid of fuzzy-valued fuzzy sets with Gaussian secondary membership
functions: (a) secondary membership functions; (b) centroid fuzzy set
118
KM algorithm are performed to obtain 1-cut and 0-cut, which coincides with
our method.
Trapezoidal Approximation
We describe the method which is an extension of our triangular centroid approximation [Starczewski 2009a, 2006] to trapezoidal membership functions.
3k ) membership function
Let fk be a trapezoidal (triangular for k = k =
of the k-th primary value (3.68),
"
"
u k k k u k
, k = 1, 2, . . . , K.
min
,
fk (uk ) =
k k k k
Using the fact that ring sets have trapezoidal secondary membership functions, the centroid fuzzy set can be expressed by its membership function,
which is not always of trapezoidal shape.
"
"
K
u k k k u k
min min
,
(3.145)
(y) =
sup
K
k=1
k k k k
y u
k=1 k k
y=
K
u
k=1 k
for all uk = [0, 1], where the parameters of the trapezoidal membership functions are ordered k k k k , k = 1, . . . , K. Note that secondary
membership functions becomes triangular whenever k = k =
3k .
The following observations are inspired by those presented in [Karnik and
Mendel 2001].
1. If secondary membership functions in (3.145) are discretized only in their
vertex points, i.e. k , k , k , k , the discrete centroid has a trapezoidal (triangular) membership function, uniquely specied by its left bound ymin ,
left-principal point ylpr , right-principal point yrpr , and right bound ymax .
2. From the t-norm T property of the unity existence, the kernel [ylpr , yrpr ]
has to be generated by elements with unity secondary memberships. Consequently the KM iterative procedure can be applied for calculating this
kernel from intervals [ k , k ], k = 1, . . . , K.
a. If triangular secondary membership functions are employed, the principal value of output ypr can be calculated as an average of yk weighted
by
3k .
119
max
k=1,...,K
2
2
2
2
ylpr
+ ymax
ymin
+ yrpr ymax ymin ylpr
1 yrpr
3
yrpr ylpr + ymax ymin
(3.148)
120
or
y =
(3.150)
end-point of the centroid fuzzy set, ymin , represented by the vector (y) =
1 , . . . , K , and a vector of memberships elected for the right end-point
y
, denoted by
(y) = , . . . , . A principal element can be calculated
max
K
5
3k yk
k=1
3k
Assuming that ymin < ypr < ymax , the following formula
y ymin ymax y
(y) = min
,
ypr ymin ymax ypr
(3.151)
3k =
K
5
k=1
k (y) =
K
5
(y) .
(3.152)
k=1
Proof. We know that the secondary membership function of the k-th ring
grade is triangular, i.e.,
"
"
u k k k u k
=
min
,
.
3k k k
3k
3k and uk,upp [3
k , k ] have their
Both slopes of this function uk,low k ,
inverse functions:
uk,low = k (1 ) +
3k ,
(3.153)
uk,upp = k (1 ) +
3k .
(3.154)
121
The KM algorithm, in order to obtain the right slope of the centroid fuzzy
set, selects one of these functions for each k. We denote the selected functions
with the unied notation
3k ,
uk = k (1 ) +
(3.155)
where k stands for either k or k depending on the KM selection. Consequently, the maximal output value is expressed by
1K
y k k
(3.156)
ymax = 1k=1
K
k=1 k
and the principal output is weighted by the principal ring grades, i.e.,
1K
yk
3k
.
(3.157)
ypr = 1k=1
K
3k
k=1
The exact output value with the use of (3.155) is expressed by
1K
1K
1K
3k k
k=1 yk k +
k=1 yk
k=1 yk uk
y = 1K
= 1K
.
1K
3k k
k=1 uk
k=1 k +
k=1
From (3.158), it follows that
1K
1K
k
k=1 yk k y
= 1K
1K k=1
.
3k k k=1 yk
3k k
y k=1
(3.158)
(3.159)
K
K
k
k=1
y
3
k
k
K
k=1 yk k
k=1
k=1
(3.161)
Since the numerators in right hand sides of formulae (3.159) and (3.161) are
equal,
1it remains1toK prove that under the condition assumed in the theorem,
3k = k=1 k , the denominators are also equal, i.e.,
i.e., K
k=1
K
5
1K
yk k 1k=1
K
k=1
k=1
K
5
k=1
K
k 5
3k
k=1
yk
3k =
K
5
y k k
k=1
K
5
yk
3k
k=1
K
K
5
5
3k k = y
3k k
3k k .
yk
yk
k=1
k=1
122
1
0.8
0.6
0.4
0.2
0
min3
|
max
6y
Fig. 3.5 An example of the triangular fuzzy-valued fuzzy set satisfying condition
(3.152) for Theorem 3.14; upper, principal and lower membership
functions; the grades elected to compute ymin , ypr and ymax are connected by lines
Condition (3.152) is not very restrictive. On the left hand side of the condition, all principal ring grades are summed. Since k are either upper ring
grades (for consequents greater than the output) or lower ring grades (for
consequents lower than the output), the right hand side may be only slightly
dierent from the LHS of the condition. Consequently, the approximate defuzzication method for triangular fuzzy-valued fuzzy sets is close to the extended defuzzication. Fig. 3.5 presents a quite possible case when condition
(3.152) is exactly fullled.
(y) and
Note that
(y) may change only at points of discrete yi positioned between ymin and ymax . Therefore, the following corollary holds.
Corollary 3.5. Let {yi } be a set of elements that belong to the open interval
(ymin , ymax ). An necessary condition for (3.152) to be true is that at least of
the following statements is true:
1. either {yi } is empty,
2. or there is a unique yi = ypr ,
3i .
3. or {yi } is characterized by crisp membership grades, i.e., i = i =
Nevertheless, if condition (3.152) is more or less satised, the resultant centroid fuzzy set is quasi-triangular, which allows for a triangular approximation
of the real centroid This approximation is addressed especially to the situation when the secondary membership functions situated out of a support of
the centroid fuzzy set are much more uncertain than secondary membership
functions within (ymin , ymax ). It has been demonstrated that approximate
triangular type-2 fuzzy logic systems are a reasonable compromise between
interval fuzzy systems and ordinary fuzzy systems in classication tasks when
only the characteristic points of the centroid fuzzy set are subject to interpretation [Starczewski 2009a]. This means that an exact membership function
is of no importance whenever classication can be performed on the base of
the principal point (or kernel) and the horizontal end-points of the centroid
set.
123
Besides, our approximate method coincides with the recent type-2 defuzzication strategy of Liu [Liu 2008] when only two -planes are employed. The
experiment of Liu exhibited that the centroid error of our method is less than
0.1%.
Now we generalize the previous theorem to trapezoidal membership
functions.
Theorem 3.15. Let a fuzzy-valued fuzzy set be characterized by generalized
trapezoidal secondary membership functions given by (3.68) for all ordered
k-th primary values, k = 1, 2, . . . , K. Assume that kernels and supports of
the trapezoidal secondary membership functions are treated as intervals and
, respectively. Suppose from [ k , k ] the KM iterative procedure determines
a nal set of memberships elected for the kernel of the centroid fuzzy set,
(y) = [ 1 , . . . , K ] and
[ymin , ymin ], represented by the respective vectors
(y) = , . . . ,
centroid fuzzy set, [ylpr , yrpr ], denoted by
and
(y) =
1
K
1 , . . . , K , respectively. Assuming that ymin < ylpr and yrpr < ymax , the
following formula for a membership function
y ymin
ymax y
,
(y) = min
(3.162)
ylpr ymin ymax yrpr
characterizes the centroid fuzzy set of the trapezoidal fuzzy-valued fuzzy set
as long as the successive condition is satised
K
5
k=1
k (y) =
K
5
k (y) =
k=1
K
5
k (y) =
k=1
K
5
(y) .
(3.163)
k=1
Proof. The proof diers from the one of Theorem 3.14 only in details. Namely,
instead of (3.157) we use ylpr and yrpr interchangeably depending on the
choice of
(y) and
(y). The result follows.
3.4.1.2
Hyperbolic Approximation
yymin
if y [ymin , ypr ]
y+ KK
k=1 k (y y)y
pr
min
k
k=1
(y) =
(3.164)
yymax
K
K
k
k=1
124
and
where
(3.165)
y + ( y)
2 + 1 2 2
ln ( 1) ( y + y)
( ) ( ) ,
3 32 + 3 1
4
y
y
dy =
(3.166)
y + ( y)
1
ln ( 1) ( y + y) ,
2
2 + 1
After some calculations, the overall centroid of a triangular-valued fuzzy set
for the hyperbolic approximation is expressed by
y =
) ln(1)+1
1 2 2
( )2 (
2 1
(1)(+1)
( ) ln(1)+1
ln(1)+1
+ ( ) ( )1
1
) ln(1)+1
( )2 (
(1)(+1)
( )
1 2 2
2 1
(3.167)
yymin
K
if y [ymin , ylpr ]
y+
(ylpr y)ymin
k=1
k=1
1
if y [ylpr , yrpr ]
(y) =
(3.168)
yymax
if y [yrpr , ymax ]
k=1
y+ K
(yrpr y)ymax
k=1
0
otherwise,
where
k and
k denote the memberships elected in the preceding KM
,
k k denote are
elected while obtaining ymin and ymax , respectively.
The overall centroid of the hyperbolic approximation to the centroid of
the trapezoidal-valued fuzzy sets can be calculated as
125
( )
y =
( )
, (3.169)
= k=1
v k / k=1
k
k=1 v k /
k=1 k .
We left the derivation of accuracy for these two approximations, and conne ourselves to carry out a comparative analysis of defuzzication methods
in the next section.
(3.170)
we get a vector of spreads (associated with their signs) elected for the left
= [+ , . . . , ], and a vector
bound of a produced min -cut, denoted by
1
K
k =
k=1
K
5
= 0,
(3.171)
k=1
formula
2
1 yypr
exp 2
(y) =
2
1 yypr
exp 2
(3.172)
represents a membership function of the centroid set where the principal element is calculated by (3.94) and the standard deviations are expressed by
126
1K
=
k=1
1K
1K
yk
k
3k
(3.173)
(3.174)
k=1
k=1
1K
k=1
3k
The proof is similar to 3.14 and diers in that we must pay attention to the
clipping of Gaussian functions, see [Starczewski unpublished] for details. Note
that condition (3.171) for Gaussian secondary memberships is less frequently
occurring than condition (3.152) in the context of triangular secondary membership functions.
However
obtaining a Gaussian
centroid
fuzzy set in a nar
rowed range ypr 2 ln min , ypr + 2 ln min is theoretically possible, we rstly use this result as an asymmetric-Gaussian approximation of a
centroid fuzzy set.
The following denite integrals are useful to derive a formula for the overall
centroid for approximation given in (3.172). The rst of the following
integrals
may have changed the limits of integration by substitution y = 2t + , i.e.,
2
4
1 y
dy
(3.175)
y exp
2
4
4
= 2 2
(3.176)
t exp t2 dt + 2
exp t2 dt.
0
1 y
2
.
(3.177)
y exp
dy = +
2
4
4
2
2
= 2
t exp (t) dy + 2
exp t2 dy (3.178)
0
0
9
= 2 +
.
(3.179)
2
127
4
(3.181)
exp t2 dt
= 2
0
9
.
(3.182)
=
2
With = ypr , the overall centroid of the asymmetric-Gaussian approximation
is expressed by
.
. ypr
y (y) dy + ypr y (y) dy
.
(3.183)
y = . ypr
(y) dy + ypr (y) dy
9
2
( ) .
(3.184)
= ypr +
4 b
4 b
2
2
= 2
(3.186)
t exp t dt + 2
exp t2 dt.
0
2
The rst of the RHSintegrals, by substitution t = z, is equal to
1 exp ln min /2. The second one is the Gauss error function, de.b
ned by erf (b) = 2 0 exp t2 dt, which can be calculated using Taylor
expansion or approximated. Hence,
9
2
4 + 2b
1 y
erf (b) .
y exp
dy = 2 (1 exp (b)) +
2
(3.187)
and by analogy,
2
4
1 y
dy
y exp
2
2a
9
2
= (1 exp (a)) +
erf (a) .
(3.188)
2
128
Clearly,
+ 2b
1
exp
2
2
9
dy =
erf (b) .
2
(3.189)
y =
y (y) dy +
yleft
. ypr
yleft
. yright
y
. yprright
y (y) dy
(3.190)
(y) dy + ypr (y) dy
9
2 2 (1 exp (b)) 2 (1 exp (a))
,
(3.191)
= ypr +
129
IRSA
y
1.30 0.37
3.49 0.49
9.73 8.99
0.00 0.00
1.70 0.23
0.57 0.35
AVG
y
1.67
3.33
9.59
-0.00
1.67
0.41
approximation can be used. The reason is certainly that the singleton placed
at 10 is described by the very large interval of membership uncertainty, while
the singleton at 10 has the very thin membership interval and its upper
membership grade is still much greater than the lower membership grade of
the other singleton. We can interpret this as meaning that the precise membership, in spite of its small value, attracts ymin to the left singleton because
of the large membership uncertainty of the right singleton. The next three
cases consider interval-valued fuzzy sets continuous in the primary domain
for symmetrical and asymmetrical triangular upper and lower membership
functions as well as for the aggregated interval-valued Gaussian membership
functions, whose defuzzication computations are illustrated in Fig. 3.6. In
the case of symmetrical fuzzy set, the centroids of all methods trivially converge to the axis of symmetry. Otherwise, although the uncertainty bound
approximation give somehow satisfactory centroid values, its behavior cannot
be guaranteed since is signicant.
All these cases will be studied in details in the context of equivalence
between fuzzy-valued and ordinary fuzzy logic systems in Chapt. 6. Unfortunately, in non of this cases the collapsing method was able to cope with
the defuzzication of interval-valued fuzzy sets. This stems probably from
the fact that the interval representative embedded set approximation has a
totally dierent interpretation that the KM method derived from the Zadeh
extension of classical defuzzication.
130
(a1)
(b1)
(c1)
0.5
0.5
0.5
0
10
10
0
10
(a2)
10
0
10
(b2)
0.5
0.5
0.5
0
10
10
0
10
(a3)
10
0
10
(b3)
1
0.5
0.5
0.5
10
0
10
10
10
(c3)
0
10
0
(c2)
10
0
10
10
Figure 3.7 presents the defuzzication of three exemplary fuzzy sets with
triangular secondary membership functions. In addition to the exact centroid computation procedure, the triangular approximation given by 3.146,
the hyperbolic approximation given by 3.164, simple average and principal
approximations are examined. The centroid fuzzy sets of the triangular and
hyperbolic approximations are plotted according to (3.150) and (3.167), respectively. The numerical result for the comparison of these methods are
summarized in Table 3.2. Observe that although the triangular approximation gives results closed to the exact defuzzifed values, the hyperbolic approximation is burdened with almost zero error.
Figure 3.8 illustrates the defuzzication by the Karnik&Mendel Gaussian
approximation of the centroid according to Theorem 3.9 and the asymmetricGaussian approximation of the centroid given by (3.172). Optically, both
methods reect the nature of the centroid fuzzy sets. The dierence between
the exact centroid fuzzy sets and its approximations are apparent. Recall that
131
(a1)
(b1)
0.5
0.5
0
10
10
(a2)
1
0.5
0.5
0
10
10
(a3)
1
0.5
0.5
(b3)
0
10
2
(b2)
10
Exact
y
1TrTr 1.559
2TrTr 0.292
3TrTr 0.168
Triangular appx.
y
1.537 0.021
0.232 0.060
0.134 0.034
Hyperbolic appx.
y
1.559 0.000
0.293 0.000
0.164 0.004
Average
y
1.667
0.454
0.277
Principal
ypr
1.667
0.556
-0.000
132
(b1)
0.5
0.5
0
10
10
0
6
0.5
0.5
0
10
10
0
6
0.5
0.5
(b3)
(a3)
0
10
0
(b2)
(a2)
10
0
6
Exact
y
1AGsGs 1.695
3GsGs 0.688
3GsAGs -0.000
1.670 0.025
1.837 0.142
-0.022 0.710
-0.000 0.688
-0.000 0.000
0.000 0.000
Principal
ypr
1.837
0.000
0.000
3.6 Summary
133
3.6 Summary
In this chapter we have proposed new calculation methods for defuzzication
of triangular, trapezoidal, Gaussian and asymmetric-Gaussian fuzzy-valued
fuzzy sets. The rst step of the defuzzication has been regarded as extended
centroid calculation, i.e. the sup-min extension of the ordinary centroid defuzzication.
The centroids for aforementioned trapezoidal and their particular forms
triangular fuzzy-valued (type-2) fuzzy sets rely on analytical formulae
and employ the known interval fuzzy defuzzication methodology called the
KM iterative procedure. Trapezoidal fuzzy-valued fuzzy sets require the KM
computation separately for the kernel and support of the centroid fuzzy set,
while triangular fuzzy-valued fuzzy sets needs only performing the single KM
procedure for the support. When only two triangular fuzzy-valued singletons
are defuzzied, the resultant formula consists two hyperbolas for each slope
of the function. For a densely discretized primary domain, a hyperbolic shape
of the result is maintained between points of discretization.
Simplifying the exact analytical formulae to the piecewise-linear functions,
we have obtained the family of interpolation methods for triangular and
trapezoidal fuzzy-valued fuzzy sets. Closer approximations have been derived
using a single hyperbolic function for each slope of the resultant fuzzy set.
Concerning Gaussian and asymmetric-Gaussian secondary membership
functions, the extended centroid can be determined recursively without the
use of the KM procedure. But, only in the cases of two fuzzy-valued singletons
and in cases of approximation the formulae are no longer recursive.
Extending the idea presented in this paper, further extended centroid
procedures and their approximations for other-type fuzzy-convex secondary
membership functions can be derived alike.
References
Castillo, O., Aguilar, L., Cazarez-Castro, N., Boucherit, M.: Application of type-2
fuzzy logic controller to an induction motor drive with seven-level diode-clamped
inverter and controlled infeed. Electrical Engineering 90(5), 347359 (2008)
Coupland, S., John, R.I.: A fast geometric method for defuzzication of type-2
fuzzy sets. IEEE Transactions on Fuzzy Systems 16(4), 929941 (2008a)
Coupland, S., John, R.I.: New geometric inference techniques for type-2 fuzzy sets.
International Journal of Approximate Reasoning 49(1), 198211 (2008b)
Dziech, A., Gorzalczany, M.B.: Decision making in signal transmission problems
with interval-valued fuzzy sets. Fuzzy Sets and Systems 23, 191203 (1987)
Gera, Z., Dombi, J.: Type-2 implications on non-interactive fuzzy truth values.
Fuzzy Sets and Systems 159(22), 30143032 (2008)
Gorzalczany, M.B.: A method of inference in approximate reasoning based on
interval-valued fuzzy sets. Fuzzy Sets and Systems 21, 117 (1987)
Greeneld, S., John, R.I.: Stratication in the type-reduced set and the generalised
karnik-mendel iterative procedure. In: Proc. IPMU 2008, Malaga, pp. 12821289
(2008)
Greeneld, S., Chiclana, F., Coupland, S., John, R.: The collapsing method
of defuzzication for discretised interval type-2 fuzzy sets. Information Sciences 179(13), 20552069 (2009)
Hagras, H.: Type-2 Fuzzy Logic Controllers: A Way Forward for Fuzzy Systems in
Real World Environments. In: Zurada, J.M., Yen, G.G., Wang, J. (eds.) Computational Intelligence: Research Frontiers (WCCI 2008). LNCS, vol. 5050, pp.
181200. Springer, Heidelberg (2008)
Karnik, N.N., Mendel, J.M.: Operations on type-2 fuzzy sets. Fuzzy Sets and
Systems 122, 327348 (2000)
Karnik, N.N., Mendel, J.M.: Centroid of a type-2 fuzzy set. Information
Sciences 132, 195220 (2001)
Karnik, N.N., Mendel, J.M., Liang, Q.: Type-2 fuzzy logic systems. IEEE Transactions on Fuzzy Systems 7(6), 643658 (1999)
Liang, Q., Mendel, J.M.: Interval type-2 fuzzy logic systems: Theory and design.
IEEE Transactions on Fuzzy Systems 8, 535550 (2000)
Liu, F.: An ecient centroid type-reduction strategy for general type-2 fuzzy logic
system. Information Sciences 178(9), 22242236 (2008)
Melgarejo, M.: A fast recursive method to compute the generalized centroid of an
interval type-2 fuzzy set. In: Proc. NAFIPS 2007, pp. 190194 (2007)
References
135
Mendel, J.M.: Uncertain rule-based fuzzy logic systems: Introduction and new directions 2001. Prentice Hall PTR, Upper Saddle River (2001)
Mendel, J.M.: On a 50% savings in the computation of the centroid of a symmetrical
interval type-2 fuzzy set. Information Sciences 172, 417430 (2005)
Mendel, J.M., Wu, H.: New results about the centroid of an interval type-2 fuzzy
set, including the centroid a fuzzy granule. Information Sciences 177, 360377
(2007)
Mendel, J.M., Liu, F., Zhai, D.: -plane representation for type-2 fuzzy sets: theory
and applications. IEEE Transactions on Fuzzy Systems 17, 11891207 (2009)
Nowicki, R.: On combining neuro-fuzzy architectures with the rough set theory to
solve classication problems with incomplete data. IEEE Trans. Knowl. Data
Eng. 20(9), 12391253 (2008)
Nowicki, R.: Rough-neuro-fuzzy structures for classication with missing data.
IEEE Trans. Syst. Man. Cybern. B 39 (2009)
Rutkowska, D., Nowicki, R., Rutkowski, L.: Singleton and non-singleton fuzzy systems with nonparametric defuzzication. In: Computational Intelligence and
Application, pp. 292301. Springer (1999)
Sepulveda, R., Castillo, O., Melin, P., Montiel, O.: An ecient computational
method to implement type-2 fuzzy logic in control applications. In: Melin, P.,
et al. (eds.) Analysis and Design of Intelligent Systems Using Soft Computing
Techniques, 1st edn., vol. 41, ch. 5, pp. 4552. Springer-Verlag, Germany (2007)
Starczewski, J.T.: Extended triangular norms on gaussian fuzzy sets. In: Proc.
EUSFLAT-LFA 2005 Conf., Barcelona, Spain, pp. 872877 (2005)
Starczewski, J.T.: A triangular type-2 fuzzy logic system. In: Proc. IEEE-FUZZ
2006, Vancouver, CA, pp. 72317238 (2006)
Starczewski, J.T.: Ecient triangular type-2 fuzzy logic systems. International
Journal of Approximate Reasoning 50, 799811 (2009a)
Starczewski, J.T.: Extended triangular norms. Information Sciences 179, 742757
(2009b)
Starczewski, J.T.: General type-2 FLS with uncertainty generated by fuzzy rough
sets. In: Proc. IEEE-FUZZ 2010, Barcelona, pp. 17901795 (2010)
Starczewski, J.T.: Centroid of triangular and gaussian type-2 fuzzy sets (submited
to review) (unpublished)
Torres, P., Sez, D.: Type-2 fuzzy logic identication applied to the modeling of a
robot hand. In: Proc. FUZZ-IEEE 2008, Hong Kong (2008)
Van Broekhoven, E., De Beats, B.: Fast an accurate center of gravity defuzzication
of fuzzy system outputs dened on trapezoidal fuzzy partitions. Fuzzy Sets and
Systems 157, 904918 (2006)
Wang, L.: Adaptive Fuzzy Systems and Control. PTR Prentice Hall, Englewood
Clis (1994)
Wu, D., Mendel, J.M.: Enhanced karnik-mendel algorithms. IEEE Transactions on
Fuzzy Systems 17(4), 923934 (2009)
Wu, D., Tan, W.: Computationally ecient type-reduction strategies for a type-2
fuzzy logic controller. In: Proc. IEEE Fuzzy Conference, Reno, NV, pp. 353358
(2005)
Wu, H., Mendel, J.M.: Uncertainty bounds and their use in the design of interval
type-2 fuzzy logic systems. IEEE Transactions on Fuzzy Systems 10(5), 622639
(2002)
Chapter 4
138
Rk
xc
FUZZIFIER
Ac
INFERENCE
ENGINE
Bc
DEFFUZZIFIER
yc
of a fuzzy premise and fuzzy rules, a defuzzier reducing fuzzy conclusion set
to a crisp value, and an optional input fuzzier converting crisp input values
into a fuzzy premise set (see e.g. [Rutkowski 2004b, 2008]).
The knowledge base for a typical MISO (multiple input single output)
system contains k pairs of fuzzy antecedents and fuzzy consequents forming
the following rules
Rk : IF x is Ak THEN y is Bk ,
(4.1)
(4.3)
(4.4)
(residual) r-implications
z[0,1]
(4.5)
(Dishkant) d-implications
R(x, y) = S (T (N (x) , N (y)) , y) .
(4.6)
139
(4.7)
if x = x
.
if x =
x
(4.8)
t
x x
x x
1
,
A (x) = exp
(4.9)
2
140
In the case of no fuzzication of inputs, i.e. when the singleton representation is used, the compositional rule of inference (4.7) simplies signicantly
sup {T (1, R (Ak (x ) , Bk (y)))} ,
(4.11)
B k (y) = max
supxX\{x } {T (0, R (Ak (x) , Bk (y)))}
= R (Ak (x ) , Bk (y)) .
(4.12)
B (y) = S B k (y) .
k=1
(4.13)
In
of reasoning using material implications, we expect that B =
Rthe case
k=1 B k , consequently,
K
B (y) = T B k (y) .
k=1
(4.14)
141
:
;
max min A (x) , A (x)
xX
max A (x)
xX
max min A (x) , Ak (x)
xX
max A (x)
(4.17)
(4.18)
xX
xX
and max A (x) = max Ak (x), no matter how dierent the shapes of A
xX
xX
k are, Gorzalczanys compatibility measure always gives A
, A
k =
and A
k , A
= [1, 1] [Wu and Mendel 2008].
A
As an alternative concept to the compatibility degree, an inclusion grade
for interval-valued fuzzy sets was introduced to establish a method for approximate reasoning [Bustince 2000]. The interval-valued indicator of the grade
of inclusion for interval-valued fuzzy sets is dened as follows
+
*
A , Ak = inf (1, min ( (x) , (x))) , inf (1, max ( (x) , (x))) ,
xX
xX
(4.20)
where
(x) = g c A (x) + g A (x) ,
k
(x) = g (c (A (x))) + g Ak (x) ,
(4.21)
(4.22)
such that g : [0, 1] [0, 1] is continuous and strictly increasing function satisfying boundary conditions g (0) = 0, g (1) = 1, and c (u) = g 1 (1 g (u)).
We see that c becomes the standard negation if g (u) = u. This indicator helps
in each of
to calculate the inclusion of an input interval-valued fuzzy set A
142
(4.23)
(4.24)
,
sup T A (x) , R A (x) , B (y)
k
k
;
B (y), B k (y) = xX :
.
k
sup T A (x) , R Ak (x) , Bk (y)
xX
(4.28)
However, if we do not need to fuzzify input values x , this composition can
be simplied. Since A (x) is non-zero only at x , we do not need to nd
supremum over the whole X. Therefore,
B (y), B k (y)
(4.29)
k
= T 1, R A (x ) , B (y) , T 1, R Ak (x ) , Bk (y)
k
k
(4.30)
= R A (x ) , B (y) , R Ak (x ) , Bk (y) .
k
143
LEFT KM
ALGORITHM
LOWER FLS
xc
yc
RIGHT KM
ALGORITHM
UPPER FLS
k=1
k=1
144
xc
TYPE-2
FUZZIFIER
~
Ac
TYPE-2
INFERENCE
ENGINE
~
Bc
TYPE REDUCER
Bc
DEFFUZZIFIER
yc
Consider a type-2 fuzzy logic system of N inputs, represented by an N dimensional input variable x, and single output y. The rule base is formed
by K rules
k : IF A
is A
k THEN B
is B
k ,
R
is a type-2 conclusion
is a type-2 fuzzied N -dimensional input x, B
where A
k is
fuzzy set, Ak is an N -dimensional antecedent fuzzy set of type-2, and B
a consequent fuzzy set, k = 1, . . . , K. We can interpret relations Rk either
as conjunctions realized in general by type-2 t-norms and their special types
constructed as extended t-norms, which were thoroughly described in Sect.
2, or as material implications of type-2 [Gera and Dombi 2008].
, which is an
The fuzzy inference produces the conclusion of the form y is B
aggregation of all single rule conclusions B k . The individual rule conclusion,
k = A
(A
k " B
k ), can be
given by the compositional rule of inference B
obtained using an extended version of sup-T composition, i.e.
:
;
(x) , (y)
B k (y) = sup T A (x) , R
,
(4.33)
Ak
Bk
xX
which in its simplest form of extended sup-min composition was rst presented by [Dubois and Prade 1980]. Obviously, antecedent membership grades
Ak (x) are realized by any of type-2 t-norms.
The highly theoretical fuzzication of x can be dened as a mapping from
real input space X Rn to type-2 fuzzy subsets of X. However, usually input
values x without fuzzication are represented by singleton type-2 fuzzy sets
. As a consequence, composition (4.33) reduces to the following form
A
:
;
(x ) , (y)
sup T 1, R
,
Bk
: Ak
; (4.34)
B k (y) = max
supxX\{x } T 0, R Ak (x ) , Bk (y)
(x ) , (y) .
(4.35)
=R
Ak
Bk
In the case of reasoningwith conjunction relations, we expect the aggregated
= R B
k . Consequently,
conclusion to be B
k=1
145
K
(4.36)
k=1
(4.37)
k=1
sup
y=
K
y u
k=1 k ki
K
u
k=1 ki
min
k=1,...,K
fk (uki ) .
(4.38)
...
xc
WEIGHTED
AVERAGE
yc
TYPE-1 FLS #s
Fig. 4.4 Embedded type-1 subsystems of a type-2 fuzzy logic system
146
QK fuzzy sets. This sets up the highest barrier for applying this exhaustive
method fuzzy logic systems.
147
Both cases are, as it turns out later, a compilation of conventional fuzzication applied to fuzzy reasoning based on conjunctions, and to reasoning
relying on s-implications. Therefore, the proposed methods can be viewed as
extensions to the conventional non-singleton fuzzication method.
Besides, we discover that the same upper and lower bounds the antecedent
membership function, aected by fuzzication, can be used both in the conjunction and implication reasoning.
To these reasoning methods on the ground of the possibility theory, we
also devote a short discussion about possibility and necessity qualications.
4.2.1.1
Since the implementation of (4.12) is much simpler than the use of formula
(4.7), the majority of fuzzy systems are derived from the singleton fuzzication. After our work [Nowicki and Starczewski 2010], the following theorems
recapitulate the statement that we can model non-singleton fuzzication with
ordinary singleton frameworks of fuzzy logic systems. Precisely, we show how
k from an original fuzzy anto obtain a modied antecedent fuzzy set A
tecedent Ak embedding a non-singleton premise fuzzy set A . First we recall
the known composition of non-singleton fuzzication with conjunction-type
fuzzy reasoning.
Theorem 4.1 ([Nowicki and Starczewski 2010]). Consider a non-singleton conjunction-type fuzzy logic system equipped with the discrete centroid
defuzzication (3.30). If all consequent fuzzy sets are non-overlapping singletons (yj = yk j = k) then there exists a singleton fuzzy system which is
equivalent to the non-singleton fuzzy system whenever
Ak (x ) = sup T (A (x , x), Ak (x)) ,
xX
(4.39)
148
Ak (xn ) = sup An (xn , xn )Ak,n (xn )
xn Xn
2
2
1 xn xn
1 xn mk,n
exp
exp
= sup
2
n
2
k,n
xn Xn
2
2
1 xn xn
1 xn mk,n
= sup exp
.
2
n
2
k,n
xn Xn
(4.40)
(4.41)
(4.42)
(n ) mk,n + (k,n ) xn
2
(n )2 + (k,n )2
(4.43)
m
1
k,n
n
Ak (xn ) = exp
,
(4.44)
2
k,n
where
k,n =
)
2
2
(n ) + (k,n ) .
(4.45)
For the left slope, min An (xn , xn ), Ak,n (xn ) attains its supremum at xn
satisfying
xn + n xn
x mk,n + k,n
= n
.
(4.47)
n
k,n
Hence,
xn =
n mk,n + k,n xn
.
n + k,n
(4.48)
149
where
k,n = n + k,n ,
k,n = n + k,n .
(4.51)
(4.52)
(4.54)
Introducing the sup-T composition formula (4.7) and its simplication for
singleton premises (4.12), we obtain
150
(yk ) = supxX T (A (x , x), I (Ak (x), Bk (yk )))
I Ak (x ), Bk
I Aj (x ), Bj (yk ) = supxX T A (x , x), I Aj (x), Bj (yk ) j = k,
(4.56)
for each k = 1, . . . , K. Using normality of Bj and the fact that consequents
are non-overlapping, the result follows.
(4.57)
1 = sup T (A (x , x) , 1) ,
xX
(4.59)
sup z [0, 1] |T Ak (x ) , z 1
151
(4.63)
(4.64)
where the residual negator N is, in general, only non-increasing (and not
necessarily continuous) negation.
If T has a continuous contour line at 0, as for a prototypical example, the
L
ukasiewicz t-norm has, then the residual negator N is continuous and, by
the commutativity of T , strictly decreasing and involutive. We say that a
contour line of T is orthosymmetrical. As a consequence of this assumption,
the following corollary follows.
Corollary 4.1. If a non-singleton fuzzy logic system is based on the rimplication obtained as a residuum of a left-continuous T which has a continuous contour line, then there exists a singleton fuzzy system which is equivalent to the non-singleton fuzzy system, and this equivalence is given by (4.57).
Theorem 4.4 (based on [Nowicki and Starczewski 2010]). Consider a
non-singleton fuzzy logic system based on a ql-implication. If all conditions
in Lemma 4.1 are valid then there exists a singleton fuzzy system which is
equivalent to the non-singleton fuzzy system, and this equivalence is given by
(4.57), when additionally S is dual to T with respect to involutive N .
Proof. For a ql-implication, the rst subequation of condition (4.53) can be
evaluated as
(4.67)
S N Ak (x ) , T Ak (x ) , 1
= sup T (A (x , x) , S (N (Ak (x)) , T (Ak (x) , 1))) ,
xX
S N Ak (x ) , Ak (x )
(4.68)
Not all operators S (N (a) , T (a, b)) are implications, since monotonicity in a
can fail. The necessary condition for the ql-operator to be a ql-implication is
that S (N (a) , a) = 1 [Mas et al 2006]. Hence,
152
1 = sup T (A (x , x) , 1) ,
xX
1 = sup T (A (x , x) , 1) ,
xX
(4.71)
153
(a)
1
0.8
Ak
0.6
0.4
Ak
0.2
0
A |x =5
4
10
10
x
(b)
1
0.8
Ak
0.6
0.4
Ak
0.2
0
A |x =5
4
6
x
Fig. 4.5 Fuzzication of antecedent fuzzy sets by the minimum t-norm: premises
(dotted lines), antecedents (dashed lines), and fuzzied antecedents (solid lines)
(a)
1
0.8
0.6
Ak
0.4
Ak
0.2
0
A |x =5
4
10
10
x
(b)
1
0.8
0.6
Ak
0.4
Ak
0.2
0
A |x =5
4
6
x
154
4.2.1.2
(4.73)
xX
(4.74)
Notice that the possibility degree (4.73) is identical with the fuzzication
formula for conjunction reasoning (4.39). Thus, the calculation of possibilities
is equivalent to the conventional fuzzication method [Mouzouris and Mendel
1997].
Surprisingly, the necessity degree given by (4.74) has the same form as the
fuzzication formula for implication reasoning (4.57). Using possibility grades
with added necessity, we can involve the whole information about fuzzication
in a fuzzy system using interval version of composition of a fuzzy premise A
with a fuzzy antecedent Ak .
The possibility together with the necessity degree may be regarded as an
extension of traditional non-singleton fuzzication in fuzzy systems.
To delve into details, let us assume that A (x, x ) varies in the whole
spectrum of possible values of x independently of x. In this way, we can
determine the upper limit of a t-norm according to (4.73), as well as the lower
limit of an s-implication in (4.74). In Fig. 4.7, the construction of possibility
and necessity of antecedent Ak is demonstrated for ve exemplary values of x .
In a concise form, two examples of the possibilistic fuzzication are shown in
Fig. 4.8. An analytical computation of the lower bound produced by necessity
grades is provided by the following example, in which both the antecedent
fuzzy set and the possibility distribution (fuzzication) are characterized by
triangular functions.
Example 4.3. Suppose we have two triangular
membership
functions: !
the
!
xn xn +n xn +n xn
,
,
premise membership function, An (xn ) = min
n
n
155
(a)
1
A1
A2
A4
A3
A5
Ak
x1
x2
x3
A k
x4
x5
(b)
A
1 A1
0
1 A2
x1
1 A3
x2
1 A4
x3
Ak
1 A5
x4
x5
Fig. 4.7 Construction of upper (a) and lower (b) membership functions of an antecedent fuzzy set as possibility and necessity measures; Ak antecedent membership function (dashed line), Ai (x) = A (x, xi ) examples of non-singleton fuzzy
premise sets (dotted lines) i = 1, 2, 3, Ak and A upper and lower antecedent
k
membership function (dashed lines)
(a)
1
0.8
Ak
0.6
0.4
Ak
0.2
0
A |x =5
4
10
10
x
(b)
1
0.8
Ak
0.6
0.4
Ak
0.2
0
A |x =5
4
6
x
Fig. 4.8 Examples of fuzzied antecedent sets with the use of possibility and
necessity: (a) Gaussian fuzzication (dotted line) of Gaussian antecedent (dashed
line) and the resultant upper and lower membership functions (solid lines), (b)
triangular fuzzication (dotted line) of triangular antecedent (dashed line) and the
resultan upper and lower membership functions
156
and
! function, expressed by Ak,n (xn ) =
! the
k-th antecedent membership
xn mk,n +k,n mk,n +k,n xn
. Assuming a t-conorm in (4.74) to be
,
min
k,n
k,n
the maximum, the necessity antecedent function embedding triangular fuzzication by An (x) is given by
A (xn ) = inf max 1 An (xn , xn ), Ak,n (xn ) .
(4.75)
k
xn Xn
For the left slope, max An (xn , xn ), Ak,n (xn ) attains its inmum at xn
satisfying
x xn + n
x mk,n + k,n
1 n
= n
.
(4.76)
n
k,n
Hence,
k,n xn + n (mk,n k,n )
.
n + k,n
n mk,n + k,n xn
xn =
.
n + k,n
xn =
(4.77)
(4.78)
xn mk,n + k,n
if xn mk,n n k,n , mk,n ,
n + k,n
(4.79)
mk,n + k,n xn
if xn mk,n , mk,n + n + k,n .
n + k,n
(4.80)
k,n
k,n
where
k,n = n + k,n ,
k,n = n + k,n .
157
(4.82)
(4.83)
n (k,n k,n )
2n +k,n +k,n
n + k,n
k,n + k,n
.
2n + k,n + k,n
(4.84)
(4.85)
Although the possibilistic view on antecedents employs the necessity convergent with ordinary non-singleton fuzzication implemented by implications,
the reasoning scheme still relies on fuzzy conjunctions. As a further development, (4.73) and (4.74), without any changes, can act as an extended (possibilistic) non-singleton fuzzication in fuzzy systems with reasoning based on
material implications. Therefore, both in implication and conjunction reasoning schemes, the membership functions can be evaluated in the same manner.
The rest of calculations can be performed according to the standard KarnikMendel computing procedure for interval-valued fuzzy logic systems described
in Sect. 4.1.1.
4.2.1.3
(4.86)
xX
(4.87)
158
(4.88)
where A is the antecedent fuzzy set with its membership grade A (x), B is
the consequent fuzzy set characterized by its membership function B , and
B is the conclusion fuzzy set with its possibility distribution B .
Any possibility distribution satises the following
B (y) B (y) ,
(4.89)
(4.90)
This is actually the lower bound of possibility, and it explains the fact that
the fuzzy output of linguistic controllers is generally subnormalized [Dubois
and Prade 1991].
Let us consider another type of a fuzzy rule, called a certainty qualifying
rule, of the form the more x is in A, the more certain is that y is in B with
the certainty at least A (x). In the fuzzy reasoning framework, the certainty
qualication rule can be formalized with the help of the necessity measure
A (x) B (B) = inf I (B (y) , B (y)) .
y
(4.91)
In the general case, certainty qualication (4.91) can not be solved for B (y).
However, if the implication I is realized by the reciprocal of an r-implication,
denoted by IR , we are able to nd the greatest possibility distribution B (y)
satisfying
A (x) B (B) = inf IR (N (B (y)) , N (B (y))) , x.
y
(4.92)
(4.93)
(4.94)
(4.95)
(4.96)
159
k=1
+
*K
K
B (y), B (y) = T B (y), T B k (y) .
k=1
k=1
(4.102)
Although fuzzy sets and rough sets are semantically quite descriptions of
data uncertainty, there are known approaches combining these two theories,
e.g. [Czogala and Roderer 1995; Greco et al 2006, 1998; Inuiguchi and Tanino
2004; Jensen and Shen 2007; Lingras 2001; Liu et al 2004; Nakamura 1988;
Nowicki 2008, 2009; Radzikowska and Kerre 2002; Yao 2004]. In this subsection, we use the denition of the fuzzy-rough set by [Dubois and Prade 1990,
1992]. Recall that this notion is basically dierent than rough-fuzzy sets of
the same authorial, i.e., comparing fuzzy-rough sets to rough-fuzzy sets, we
160
obtain upper and lower approximations of fuzzy sets which are fuzzy rather
than crisp approximation degrees.
When fuzzication is interpreted as imprecision of the measurements, it
can be imposed by fuzzy-rough sets, or more precisely, as fuzzy-rough approximations of an antecedent fuzzy set Ak . In this case, the fuzzy partitioning
is determined by imprecision of input data, and consequently, a premise
fuzzy set A plays a role of a fuzzy partition set Fi .
Applying the extended version of the fuzzy-rough set dened in Chapt. 1
by (1.66) and (1.67), we obtain the same bounds of fuzzication as in the
possibilistic approach (4.73) and (4.74), i.e.,
Ak (x ) = sup T (A (x, x ) , Ak (x)) ,
xX
xX
(a1)
1
A1
A
1
0
0
5
y
(a2)
10
A12
5
y
(b2)
10
5
y
(c)
10
5
y
10
161
5
y
10
Fig. 4.9 Conjunction reasoning scheme: Ak (x ) and Ak (x ) upper and lower
membership functions of antecedent fuzzy sets; Bk (y) consequent membership functions; Bk (y) and Bk (y) upper and lower conclusion membership
functions, k = 1, 2; B (y) and B (y) upper and lower aggregated conclusion
membership functions
(a1)
(b1)
1
A1
A
1
0
0
5
y
(a2)
10
5
y
(c)
10
5
y
10
10
5
y
(b2)
A12
5
y
10
Fig. 4.10 Implication reasoning scheme: Ak (x ) and Ak (x ) upper and lower
membership functions of antecedent fuzzy sets; Bk (y) consequent membership functions; Bk (y) and Bk (y) upper and lower conclusion membership
functions, k = 1, 2; B (y) and B (y) upper and lower aggregated conclusion
membership functions
162
-cuts,
(0, 1]. Finally,
we have demonstrated that the union of -cuts
(A)
,
(A)
is formally a type-2 fuzzy set. Thus, the use of such
(0,1]
constructed fuzzy-valued fuzzy sets in fuzzy logic requires the application of
the type-2 fuzzy logic system architecture.
4.2.2.1
When both approximated fuzzy sets, A, and fuzzy partition sets, Fi , are fuzzy
intervals or, in particular, fuzzy numbers. The following theorem links the
notion of the fuzzy-rough set with a convex fuzzy-valued fuzzy set represented
by a secondary membership function.
Theorem 4.6 ([Starczewski 2010]). Let A and Fi be continuous fuzzy
numbers with their membership functions strictly monotone on slopes. The
secondary membership function of the fuzzy-valued fuzzy set, induced by a
fuzzy-rough set of A with the fuzzy partition set Fi , is expressed as
1
f (u) = max Fi 1
(u)
,
(u)
,
(4.103)
F
i
A
A
where A and A denote respectively the left and the right slope of the membership function of A, i.e., A : [X mA ] [0, 1] and A : [X mA ]
[0, 1] with A (mA ) = 1, Fi (mFi ) = 1 and A (mFi ) > 0.
The proof relies on the use of inverses and the fact that for convex membership functions rough-fuzzy sets are generated by boundaries of alpha cuts of
[Fi ] [Starczewski 2010]. With the use of pseudoinverses, this result will be
proved here in more general settings without the assumption of the strict
monotonicity on slopes.
Theorem 4.7. Let A be a continuous fuzzy interval and Fi be a fuzzy interval
with upper semicontinuous membership functions. The secondary membership
function of the fuzzy-valued fuzzy set, induced by a fuzzy-rough set of A with
the fuzzy partition set Fi , is expressed as
[1]
f (u) = max Fi (1)
(u)
,
(u)
,
(4.104)
F
i
A
A
where A and A denote respectively the left and the right slope of the membership function of A, i.e., A : [X mA ] [0, 1] and A : [X mA ]
[0, 1] with A (mA ) = 1.
Proof. We decompose the fuzzy-rough set into intervals (A) , (A)
which are -dependent rough approximations
of fuzzy set A by the parti
1
tioning interval [Fi ] = 1
()
,
()
.
The
lower approximation of this
Fi
Fi
rough-fuzzy set using convexity of A may be evaluated as follows
()
,
A
Fi
F
i
163
(4.105)
(4.106)
()
Fi
A
F
i
(4.107)
if mA [Fi ] ,
otherwise,
(4.108)
(4.109)
f (u) =
1
([Fi ] ) otherwise,
(A)
1
1 1
1
, A Fi
if u A (mF ) ,
max A Fi
=
(4.110)
1
1
otherwise,
max A 1
F
i
A
F
i
where the minimum operator in (4.106) changes into the maximum in (4.110)
since both A 1
and A 1
Fi are increasing functions of whenever u
Fi
A (mF ) while the maximum operator in (4.108) remains without changes
since both A 1
and A 1
Fi are decreasing with whenever u A (mF ).
F
i
1
1
max
(u)
,
(u)
if u A (mF ) ,
F
A
i
Fi A
f (u) =
(4.111)
1
1
max
A (u) , Fi A (u)
otherwise,
F
i
164
1
0.8
Fi (x)
0.6
u
f (u)
0.4
0.2
0
0
A (x)
0
A (x)
0.5
5
1
10
(c)
0.6
0.4
0.2
0
5
x
(b)
10
A, F
0.8
0.6
0.4
0.2
0
5
x
10
0.8
0.8
0.6
0.6
u
A, F
0.8
(e)
0.4
0.4
0.2
0
0.2
0
0.5
(d)
0.8
0.8
0.6
0.6
0.5
f
(f)
0.5
f
0.4
0.4
0.2
0
0.2
0
0.5
165
where and denote left spreads, and denote right spreads, and of the
corresponding membership functions.
The secondary membership function of the fuzzy-valued fuzzy set induced
by a fuzzy-rough approximation may be evaluated as follows:
(u) , Fi 1
(4.115)
f (u) = max Fi 1
A (u)
A
= max (Fi (m (1 u)) , Fi (m + (1 u)))
(4.116)
or more precisely
!
!
+ x m++ u
min u+mx
,
,
!
f (u) = max !
(4.117)
mx ++u u+x m+
min
,
-
u+(mx +)/ (x m++ )/u
,
,
min
/
/
= max
(4.118)
166
Example 4.5. Let both A and Fi be symmetric triangular fuzzy numbers, i.e.,
xm+ mx+
A (x) = max 0, min
,
,
(4.119)
x x + x x +
,
Fi (x) = max 0, min
.
(4.120)
!
f (u) = !
min m(1u)x + , x m+(1u)+
if m x
, (4.122)
otherwise
"
"
1+(mx +)/u
/
min
if m x
u1+(x m+)/
/
"
f (u) = "
,
u1+(mx +)/
/
min
otherwise
1+(x m+)/u
(4.123)
Figure 4.13 demonstrates graphically the method of construction membership functions for fuzzy-rough sets according to Theorem 4.6 in the case of
asymmetric triangular fuzzy sets, and according to Corollary 4.2 in the case
of symmetric triangularities (subgures b,d,f). It is easy to observe, that the
triangular secondary membership function of the fuzzy-rough set can be preserved if we use only symmetric triangular fuzzy sets such that the center
of the premise fuzzy set has any non-zero membership representation in the
antecedent fuzzy set.
The subsequent example allows us to design Gaussian-fuzzy-valued fuzzy
logic systems.
Example 4.6. If we consider another situation, where A is characterized by
the symmetric triangular membership function given by (4.119), and Fi is
described by the following Gaussian membership function
2
1 x x
Fi (x) = exp
.
(4.124)
2
(a)
0.6
0.4
0.2
0
5
x
(b)
10
A, F
0.8
0.6
0.4
0.2
0
5
x
10
0.8
0.8
0.6
0.6
u
A, F
0.8
(e)
0.4
0.4
0.2
0.2
0.5
(d)
0.8
0.8
0.6
0.6
0.5
f
(f)
0.5
f
167
0.4
0.4
0.2
0
0.2
0
0.5
2
u + x m
1
1
.
= exp
(4.125)
(4.126)
2
u + mx
1
1
= exp
(4.127)
(4.128)
/ [m , m + ]
1
if u = 0 and x
2
f (u) =
(4.129)
exp 21 um
otherwise
168
(a)
0.6
0.4
0.2
0
5
x
(b)
10
A, F
0.8
0.6
0.4
0.2
0
5
x
10
0.8
0.8
0.6
0.6
u
A, F
0.8
(e)
0.4
0.4
0.2
0.2
0.5
(d)
0.8
0.8
0.6
0.6
0.5
f
(f)
0.5
f
0.4
0.4
0.2
0
0.2
0
0.5
Figure 4.14 illustrates the method given by Corollary 4.2 for a symmetric
triangular antecedent fuzzy set and Gaussian fuzzy partitions (premises).
Again it may be observed, that the Gaussian secondary membership function
can be preserved if we use only triangular fuzzy sets such that the center
of the premise fuzzy set has any non-zero membership representation in the
antecedent fuzzy set. It can be also demonstrated that allowing the triangular
antecedent fuzzy set to be asymmetric, in particular, we obtain an asymmetric
Gaussian secondary membership function.
169
10
Fig. 4.15 Upper, principal, and lower membership functions (ordered from the
top)
B (y) =
hk (yk ) = T Ak,n (xn ) .
k
n=1
(4.131)
170
KM ALGORITHM
(left bound)
PRINCIPAL FLS
yc
KM ALGORITHM
(right bound)
LOWER FLS
hk (yk ) = T A (xn ) ,
k,n
(4.132)
n=1
N
3
3Ak,n (xn ) ,
hk (yk ) = T
(4.133)
n=1
N
hk (yk ) = T Ak,n (xn ) .
(4.134)
n=1
Henceforth, the ring fuzzy grades are triangular and can be determined
independently by three ordinary fuzzy logic subsystems: upper, principal
and lower. The remaining problem is to defuzzify the aggregated conclusions
(4.132)(4.134).
The use of the triangular approximation to defuzzication given by (3.151)
results with the design of the ecient triangular type-2 fuzzy logic systems
[Starczewski 2009, 2006]. Since the approach relies on the three-node linear
interpolation of a general result for centroid defuzzication, the standard or
enhanced KM algorithm can be used together with the overall defuzzication
given by (3.150). Consequently, the structure of the ecient triangular-valued
fuzzy system can be recognized as in Fig. 4.16.
It should be noted that the -plane centroid type-reduction, [Liu 2008],
leads in general to multiple fuzzy upper and lower subsystems. However,
using only the three subsystems it is recommended to apply the hyperbolic
approximation (3.164), which is a sucient compromise between the simple
triangular and costly -plane strategy or its improvement the centroid
ow algorithm [Zhai and Mendel 2010]. Figure 4.17 shows a connectionist
implementation of hyperbolic approximation to defuzzication of triangularvalued fuzzy sets together with the nal defuzzication.
Note also that we need not be limited to the use of the height type defuzzication. Thus, if the assumption that all consequents must be singletons
is not obligatory, instead of (4.131), we can use (4.35) with the relation expressed either by conjunctions or extended material implications.
171
/..
ln
P k
Pk
/..
ymin
principal output
y pr
..
ymax
Pr
P
yc
/..
..
/..
ln
/..
172
SUBORDINATE
KM (left bound)
UPPER-PRINCIPAL FLS
PRINCIPAL KM
(left bound)
LOWER-PRINCIPAL FLS
PRINCIPAL KM
(right bound)
LOWER FLS
SUBORDINATE
KM (right bound)
xc
TRAPEZOIDAL
OVERALL
DEFUZZIFIER
yc
left subordinate KM
ymin
left principal KM
ylpr
right principal KM
yrpr
..
yc
/..
right subordinate KM
ymax
..
Fig. 4.19 Implementation of overall defuzzication with trapezoidal approximation; adder, multiplier, ..2 power, k multiplication by a constant,
1/.. reciprocal
N
k (yk ) = T Ak,n (xn ) ,
(4.135)
n=1
N
k (yk ) = T Ak,n (xn ) .
(4.136)
n=1
Henceforth, the trapezoidal ring fuzzy grades can be determined independently by four ordinary fuzzy logic subsystems: an upper, upper-principal,
lower-principal and lower one. The trapezoidal approximation to defuzzication given by (3.146) requires a double use of the KM algorithm separately
for the support and the kernel of the resultant fuzzy set, which may be called
subordinate and principal KM algorithms, respectively. Consequently, the
structure of an ecient trapezoidal-valued fuzzy system can be recognized as
in Fig. 4.18. Next, the nal defuzzication can be performed by (3.149). Figure 4.17 shows a connectionist implementation of the overall defuzzication
for the trapezoidal approximation.
A closer approximation to the centroid can be realized by the hyperbolic
approximation (3.168), whose connectionist implementation is shown in Fig.
4.20 shows an implementation of the hyperbolic approximation to defuzzication of trapezoidal-valued fuzzy sets.
173
/..
ln
s
Qs
P
k
/..
ymin
..
left-principal output
y lpr
/..
right-principal output
y rpr
ymax
yc
..
Qr
P
k
/..
ln
/..
?N
n=1
3Ak,n (xn ) ,
(4.137)
174
xc
DEVIATION COMPUTATION
ASYMMETRICGAUSSIAN
OVERALL
DEFUZZIFIER
yc
ASYMMETRICGAUSSIAN
OVERALL
DEFUZZIFIER
yc
(b)
UPPER DEVIATION
COMPUTATION
xc
PRINCIPAL FLS
KM ALGORITHM
(left deviation)
LOWER DEVIATION
COMPUTATION
(right deviation)
Fig. 4.21 Ecient fuzzy-valued fuzzy logic systems: (a) Gaussian, (b)
assymetric-Gaussian
k (yk ) =
5N
n=1
Ak,n (xn )
?N
j
=n,j=1
3Ak,j xj ;
(4.138)
3Ak,j xj
;
(4.139)
Ak,n (xn )
n=1
j =n,j=1
3Ak,j xj .
(4.140)
k (yk ) = max Ak,n (xn )
j
=n,j=1
n=1
An interesting observation is that if the product t-norm is based on the minimum the deviation is computed as an average of deviations cross-weighted
by the means. Likewise, in the case of the product-based extended product,
the deviation is an Euclidean norm of the deviations crosswise normed by
the means. Lastly, if the product t-norm is based on the drastic product, the
resultant deviation is the largest of the deviations crosswise normed by the
mean values.
In the case of principal subsystem being realized by Gaussian approximation to the extended L
ukasiewicz t-norm based on the product (2.74), the
principal ring grades are given by
-5
N
3
3Ak,n (xn ) N + 1 ,
(4.141)
hk (yk ) =
n=1
ypr
KM algorithm selection
r
s
y k (V k V k )
P
k
175
yc
/
(4.142)
u
(xn ) 2
A
u 0,
3Ak,n (xn )
exp 21 A k,n(xn )
k,n,x
fk,n,xn (u) =
2
k,n,x (xn )
1
u
3Ak,n (xn ) , 1 ,
exp 2
A
(xn )
k,n
176
?N
N
Ak,n (xn )
(4.143)
1
3Ak,n (xn ) min
n=1
n=1 1
3Ak,n (xn )
?
/
A
N
1
N
= max Ak,n (xn )
3Ak,j xj +
(4.144)
,
j
=n,j=1
n=1
1
3Ak,n (xn )
k (yk ) =
which is the largest of upper deviations weighted by reciprocals of complements to their means and cross-weighted by the other means.
In other cases, one can make use of the classical t-norms for the assymetricGaussian approximation presented in Sect. 2.4.2.1, i.e.,
N
3
3Ak,n (xn ) ,
hk (yk ) = T
n=1
hk (yk ) T
k (yk ) = 3
3Ak,n (xn ) Ak,n (xn ) ,
(4.145)
3Ak,n (xn ) + Ak,n (xn ) 3
hk (yk ) .
(4.146)
n=1
k (yk ) = T
n=1
Obviously, the discussion about the possibility of going beyond the height
type defuzzication and reasoning with conjunctions in Sect. 4.3.1 is also
valid for ecient Gaussian and assymetric-Gaussian fuzzy logic systems.
References
Bustince, H.: Indicator of inclusion grade for interval-valued fuzzy sets. application to approximate reasoning based on interval-valued fuzzy sets. International
Journal of Approximate Reasoning 23, 137209 (2000)
Czogala, E., Roderer, H.: On the control of allpass components using conventional,
fuzzy and rough fuzzy controllers. In: Proceedings of IEEE International Conference on Fuzzy Systems, International Joint Conference of the Fourth IEEE
International Conference on Fuzzy Systems and the Second International Fuzzy
Engineering Symposium, vol. 3, pp. 14051412 (1995)
Dubois, D., Prade, H.: Fuzzy sets and systems: Theory and applications. Academic
Press, Inc., New York (1980)
Dubois, D., Prade, H.: Rough fuzzy sets and fuzzy rough sets. International Journal
on General Systems 17, 191209 (1990)
Dubois, D., Prade, H.: Fuzzy sets in approximate reasoning, part 1: inference with
possibility distributions. Fuzzy Sets and Systems 40, 143202 (1991)
Dubois, D., Prade, H.: Putting rough sets and fuzzy sets together. In: Slowi
nski,
R. (ed.) Intelligent Decision Support: Handbook of Applications and Advances
of the Rough Sets Theory, pp. 203232. Kluwer, Dordrecht (1992)
Gera, Z., Dombi, J.: Type-2 implications on non-interactive fuzzy truth values.
Fuzzy Sets and Systems 159(22), 30143032 (2008)
Gorzalczany, M.B.: A method of inference in approximate reasoning based on
interval-valued fuzzy sets. Fuzzy Sets and Systems 21, 117 (1987)
Grattan-Guiness, I.: Fuzzy membership mapped onto interval and many-valued
quantities. Zeitschrift fr Mathematische Logik und Grundlagen der Mathematik 22, 149160 (1975)
Greco, S., Matarazzo, B., Slowi
nski, R.: Fuzzy Similarity Relation as a Basis for
Rough Approximations. In: Polkowski, L., Skowron, A. (eds.) RSCTC 1998.
LNCS (LNAI), vol. 1424, pp. 283289. Springer, Heidelberg (1998)
Greco, S., Inuiguchi, M., Slowi
nski, R.: Fuzzy rough sets and multiple-premise
gradual decision rules. International Journal of Approximate Reasoning 41(2),
179211 (2006)
Inuiguchi, M., Tanino, T.: New fuzzy rough sets based on certainty qualication.
In: Pal, S.K., Polkowski, L., Skowron, A. (eds.) Rough-Neural Computing: Techniques for Computing with Words, pp. 277296. Springer, Heidelberg (2004)
178
References
Jensen, R., Shen, Q.: Fuzzy-rough sets assisted attribute selection. IEEE Trans.
Fuzzy Syst. 15(1), 7389 (2007)
Karnik, N.N., Mendel, J.M.: Centroid of a type-2 fuzzy set. Information Sciences 132, 195220 (2001)
Karnik, N.N., Mendel, J.M., Liang, Q.: Type-2 fuzzy logic systems. IEEE Transactions on Fuzzy Systems 7(6), 643658 (1999)
Liang, Q., Mendel, J.M.: Interval type-2 fuzzy logic systems: Theory and design.
IEEE Transactions on Fuzzy Systems 8, 535550 (2000)
Lingras, P.: Fuzzy-rough and rough-fuzzy serial combinations in neurocomputing.
Neurocomputing 36(1-4), 2944 (2001)
Liu, F.: An ecient centroid type-reduction strategy for general type-2 fuzzy logic
system. Information Sciences 178(9), 22242236 (2008)
Liu, W.-N., Yao, J., Yao, Y.: Rough Approximations Under Level Fuzzy Sets.
In: Tsumoto, S., Slowi
nski, R., Komorowski, J., Grzymala-Busse, J.W. (eds.)
RSCTC 2004. LNCS (LNAI), vol. 3066, pp. 7883. Springer, Heidelberg (2004)
Mas, M., Monserrat, M., Torrens, J.: QLimplications versus Dimplications. Kybernetika 42(3), 351366 (2006)
Mendel, J.M.: Uncertain rule-based fuzzy logic systems: Introduction and new directions 2001. Prentice Hall PTR, Upper Saddle River (2001)
Mendez, G.M., Hern
andez, A., Cavazos, A., Mata-Jimenez, M.-T.: Type-1 NonSingleton Type-2 Takagi-Sugeno-Kang Fuzzy Logic Systems Using the Hybrid
Mechanism Composed by a Kalman Type Filter and Back Propagation Methods.
In: Gra
na Romay, M., Corchado, E., Garcia Sebastian, M.T. (eds.) HAIS 2010
Part-I. LNCS, vol. 6076, pp. 429437. Springer, Heidelberg (2010)
Mouzouris, G.C., Mendel, J.M.: Nonsingleton fuzzy logic systems: theory and
application. IEEE Transactions on Fuzzy Systems 5(1), 5671 (1997)
Nakamura, A.: Fuzzy rough sets. Note on Multiple-Valued Logic in Japan 9(8), 18
(1988)
Nowicki, R.: On combining neuro-fuzzy architectures with the rough set theory to
solve classication problems with incomplete data. IEEE Trans. Knowl. Data
Eng. 20(9), 12391253 (2008)
Nowicki, R.: Rough-neuro-fuzzy structures for classication with missing data.
IEEE Trans. Syst. Man. Cybern B 39 (2009)
Nowicki, R.K., Starczewski, J.T.: On Non-Singleton Fuzzication with DCOG Defuzzication. In: Rutkowski, L., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2010 Part-I. LNCS (LNAI), vol. 6113, pp. 168174.
Springer, Heidelberg (2010)
Radzikowska, A.M., Kerre, E.E.: A comparative study of fuzzy rough sets. Fuzzy
sets and systems 126, 137155 (2002)
Rutkowska, D., Nowicki, R., Rutkowski, L.: Singleton and non-singleton fuzzy systems with nonparametric defuzzication. In: Computational Intelligence and
Application, pp. 292301. Springer (1999)
Rutkowska, D., Nowicki, R., Hayashi, Y.: Parallel Processing by ImplicationBased Neuro-Fuzzy Systems. In: Wyrzykowski, R., Dongarra, J., Paprzycki, M.,
Wasniewski, J. (eds.) PPAM 2001. LNCS, vol. 2328, pp. 599607. Springer, Heidelberg (2002)
Rutkowski, L.: Flexible neuro-fuzzy systems: structures, learning and performance
evaluation. Kluwer Academic Publishers (2004b)
References
179
Rutkowski, L.: New soft computing techniques for system modeling, pattern classication and image processing. In: Studies in Fuzziness and Soft Computing,
Springer (2004b)
Rutkowski, L.: Computational intelligence - methods and techniques. Springer
(2008)
Rutkowski, L., Cpalka, K.: Flexible neuro-fuzzy systems. IEEE Transactions on
Neural Networks 14(3), 554574 (2003)
Sahab, N., Hagras, H.: A type-2 nonsingleton type-2 fuzzy logic system to handle
linguistic and numerical uncertainties in real world environments. In: Proc. 2011
IEEE International Symposium on Advances in Type-2 Fuzzy Logic Systems
(2011)
Sambuc, R.: Fonctions -ous. application a laide au diagnostic en pathologie thyroidienne. PhD thesis. These Univ. de Marseille, Marseille (1975)
Starczewski, J., Rutkowski, L.: Neuro-fuzzy systems of type 2. In: Proc. 1st Intl
Conf. on Fuzzy Systems and Knowledge Discovery, Singapore, vol. 2, pp. 458462
(2002)
Starczewski, J.T.: A triangular type-2 fuzzy logic system. In: Proc. IEEE-FUZZ
2006, Vancouver, CA, pp. 72317238 (2006)
Starczewski, J.T.: Ecient triangular type-2 fuzzy logic systems. International
Journal of Approximate Reasoning 50, 799811 (2009)
Starczewski, J.T.: General type-2 FLS with uncertainty generated by fuzzy rough
sets. In: Proc. IEEE-FUZZ 2010, Barcelona, pp. 17901795 (2010)
T
urksen, I.B.: Interval valued fuzzy sets based on normal forms. Fuzzy Sets and
Systems 20, 191210 (1986)
Wu, D., Mendel, J.M.: A vector similarity measure for linguistic approximation:
Interval type-2 and type-1 fuzzy sets. Information Sciences 178, 381402 (2008)
Yao, Y.: Semantics of Fuzzy Sets in Rough Set Theory. In: Peters, J.F., Skowron,
A., Dubois, D., Grzymala-Busse, J.W., Inuiguchi, M., Polkowski, L. (eds.) Transactions on Rough Sets II. LNCS, vol. 3135, pp. 297318. Springer, Heidelberg
(2004)
Zadeh, L.A.: The concept of a linguistic variable and its application to approximate
reasoning I. Information Sciences 8, 199249 (1975)
Zhai, D., Mendel, J.M.: Centroid of a general type2 fuzzy set computed by means
of the centroidow algorithm. In: Proc. IEEE FUZZ, Barcelona, pp. 18 (2010)
Chapter 5
J.T. Starczewski: Advanced Concepts in Fuzzy Logic and Systems, STUDFUZZ 284, pp. 181277.
c Springer-Verlag Berlin Heidelberg 2013
springerlink.com
182
that conjunctive normal forms1 and disjunctive normal forms2 of all 16 basic logical connectives not always coincide in multiple-valued logic. In the
two-valued case, the conjunctive and disjunctive normal forms of material
implication are dened as follows
CN F (p q) = p q ,
(5.1)
DN F (p q) = (p q) (p q) (p q) .
(5.2)
(5.3)
(5.4)
(5.5)
uk (xt ) = 1, t = 1, . . . , N ,
(5.6)
J (U, V) =
k=1 t=1
where U = [uk (xt )]kt is a fuzzy partition matrix of patterns {xt } in the k-th
cluster, V = [v1 , . . . , vC ] is a vector of clusters prototypes, and m > 1 is the
level of fuzziness.
1
2
j=1 djt
uk (xt ) =
1
183
(5.7)
where the distance between prototype vk of the k-th cluster and pattern xt
is expressed by
dkt = #xt vk # .
if dkt = 0 then ukt = 1 and uit = 0 for i = k.
(5.8)
(5.9)
(5.10)
Ozkan and T
urksen were the rst to consider the level of fuzziness m as
a source of uncertainty for type-2 membership functions determined by the
FCM algorithm [Ozkan and T
urksen 2004]. According to their method, a level
of fuzziness can be evaluated with the use of the possibilistic entropy measure. In [Ozkan and T
urksen 2007], the lower and upper values for the level
of fuzziness are identied. Namely, signicant changes in FCM membership
values can be observed roughly between 1.4 and 2.6.
An interesting method, in which genetic algorithms are used to optimize
the secondary membership function of the type-2 fuzzy set based on fuzzy
c-regression with dierent levels of fuzziness, was presented in [Celikyilmaz
and T
urksen 2008].
Hwang and Rhee noticed that the pattern set can be extended to interval
type-2 sets by allowing the degree of fuzziness m to be in some interval, e.g.
[m1 , m2 ] [Hwang and Rhee 2007]. Consequently, they proposed to manage
the uncertainty of the fuzzier in the FCM algorithm by the following two
procedures:
1. procedure for updating cluster centers,
2. procedure for hard partitioning (defuzzication) of the nal clustering
decision.
To begin with, using two dierent values of m we can obtain an interval membership given by its lower and upper memberships u
k (xt ) = [uk (xt ) , uk (xt )].
The lower and upper memberships can be dened by
uk (xt ) = min (uk (xt , m1 ) , uk (xt , m2 )) ,
(5.11)
(5.12)
184
vk,L + vk,R
.
2
(5.14)
Finally, a pattern should be assigned to a cluster according to a fuzzy membership, which can be considered as a defuzzication of a fuzzy set. In the
hard partitioning, we assign xt to cluster k if uk (xt ) > uj (xt ) for j = 1, . . . , C
and j = k. For this purpose, we need membership to be defuzzied, i.e.,
uk (xt ) =
(5.15)
The representative values for the left and right memberships can be computed
for each feature in the following way
1M
uk,L (xt ) =
l=1
ukl (xt )
,
M
l=1
ukl (xt )
,
M
where M denotes the number of features available for patterns. The method
is demonstrated to be very eective in image segmentation [Choi and Rhee
2009].
185
their meanings are expressed by fuzzy sets and the linguistic modiers are
performed by hedge operations.
However, the human descriptions of semantic rules are usually ill-dened,
since words can mean dierent things to dierent people, as Mendel pointed
out in [Mendel 1999]. Also the linguistic hedges are very context dependent.
Accordingly, the linguistic values frequently are associated with the concept
of fuzzy truth-values specied by linguistic values such as true, rather true
or more or less true.
Many papers [Kacprzyk et al 2006; Kacprzyk and Yager 2001; Kacprzyk
et al 2000; Kacprzyk and Zadrozny 2005; Liu and Mendel 2008; Lawry 2001;
Lawry et al 2003; Mendel 2002, 2007a, 1999, 2007b; T
urksen and Resconi
2006; Wang 2001; Wu and Mendel 2007a,b, 2008; Zadeh 1999; Zadeh and
Kacprzyk 1999] adopt fuzzy logic systems (fuzzy logic system) to computing
with words (CWW) a new methodology performing computations in a
natural language proposed by Zadeh [Zadeh 1996]. The concept of CWW is
closely related to manipulation of perceptions [Zadeh 1999] and perceptual
computers [Mendel 2002]. In this section, the employment of the perceptual computer is put in the framework of knowledge engineering. The aim
of the knowledge engineering is to acquire a base of rules from experts in
some domain. The main intention for the knowledge representation in the
form of fuzzy rules is to adequately reect the semantic meaning of linguistic
variables.
When a membership function is assigned by more than one expert, the
assignments need to be somehow fused. The standard method uses the probabilistic interpretation and results with the calculation of the arithmetic mean
of all experts membership functions. Naturally, the method is satisfactory
when competencies of all experts are equal, otherwise when the degrees of
competence of particular experts are dierent, we may apply the weighted average. Disregarding the homogeneity of competencies, the experts perception
of the knowledge domain of interest may be dierent, and consequently, the
experts assignments of membership functions may dier signicantly form
each other.
When the assignments given by experts are completely dierent, the most
radical opinions may falsify the reasoning process. Usually in such cases, we
may erase the two most outstanding assignments, but we lose some the experts opinions. If there was only 3 experts, we would be forced to make a
decision basing on the only one expert opinion. Nevertheless, the extreme
opinions, even if they are the least reliable, are still signicant for fuzzy
reasoning. From the selected opinions about a membership function, it is
necessary to set up an aggregate of these opinions. Simple averaging of membership functions, which leads to the type-1 fuzzy logic, is one kind of such
fusion.
A modern methodology supported by many scientists [Liu and Mendel
2008; Mendel 2002; Wu and Mendel 2007a] relies on the aggregation of
fuzzy sets to type-2 fuzzy sets. In [Wu and Mendel 2007a], Wu and Mendel
186
proposed to leave the evaluation process to the type-2 fuzzy logic especially
if one reviewer suggests rejection of the paper, another suggests a revision
of the paper, and the third reviewer suggest acceptance of the paper. This
statement partially coincides with the opposite statement of Starczewski:
the uniform uncertainty of memberships in a trained interval type-2 fuzzy
logic system acts a supposition that this type-2 fuzzy logic system may be
reduced to the corresponding type-1 system [Starczewski 2008].
By modelling the aggregates with interval type-2 (interval-valued) fuzzy
sets, only the extreme assignments are considered to dene the upper and
lower membership functions of the interval fuzzy sets. What if outlier or
not trustable membership functions are also present? The more robust technique than the interval-valued approach is needed. Helpfully, triangular type2 (triangular-valued ) fuzzy sets give also the possibility of modelling a central
tendency of assigned membership functions in addition to the spread of uncertainty these membership functions. The uncertainty associated with words
is modeled adequately by interval-valued fuzzy sets, while the uncertainty associated with the rules assembled from more than two experts require using
triangular-valued fuzzy sets.
187
T2 FSs
Encoder
TypeReducer
Rule Base
T1 FSs
words
T2 FSs
Decoder
Aggregator
T1 FSs
Evaluator
MF assignment
...
Rule Encoders
words
words
...
Head
Expert #I
ordinary fuzzy sets or crisp values xn , which correspond to the singleton type
fuzzication in fuzzy logic systems.
In a more sophisticated direct approach, engineers are required to assign
directly membership grades to each element of the input domain. In [Mendel
2007a], there are proposed two approaches for transformation the linguistic
value into a interval-valued fuzzy set: the person membership function approach a kind of direct method, in which each engineer provides their
assignments of interval-valued fuzzy sets for a word, and the interval endpoint approach, in which each person provides the end-points for an interval
associated with a linguistic value. The interval end-point approach can be
summarized in a coding table (codebook). An other approach known as indirect method [Klir and Yuan 1995] relies on pairwise comparisons of elements
of the input domain according to their relative weights of belonging to the
fuzzy set. In Section 5.2.3, a triangular approach for modeling words is proposed, and described in detail in the context of rule encoding.
188
The degree of intensity together with the modied word are expressed by
terms like: extremely high, very high, (moderately or just) high, more than low,
and not low. The degrees of intensity move the membership function of a fuzzy
set along its domain in the way presented in Fig. 5.2. Note that the use of the
comparative description more than low and the negative expressions not low
are dictated by the human way of understanding English words [Sutherland
1998], while the term not very high means high with exception of very high,
and this should be characterized by a convex membership function.
high
extremely
extremely
low
1
0.5
0
0.5
0
1
0.5
0
0.5
1
0.5
0
1
0.5
0
1
0.5
0
very
0.5
0
0.5
not low
very
0.5
0
Fig. 5.2 Degree of intensity along the domain for descriptions low and high
The dilution modier, like relatively, somehow or more or less, and the
concentration modier, like absolutely, convert the fuzzy set in a way presented in Fig. 5.3. In our intention, the word really remains the standard
meaning of the linguistic terms, therefore it can be omitted. The author is
convinced that the introduced dilution words rather extend the segment of
membership function between the empty and the full membership than modify the linearity of the triangular membership function as the hedge operators
do3 .
A syntactic rule compose the two proposed modiers with a fuzzy description as high or small. Fig. 5.4 illustrates the all possible combinations
of the word modiers and Table 5.1 summarizes the fuzzy meaning of these
modiers.
3
The modication expressed by the word very usually is realized by the concentration hedge, i.e., by performing the square of a membership function. However, the
square-hedge operation concentrates the the -membership function only within
its increasing part rather than concentrates the meaning of the words high or
low. The use of the square-hegde very we leave to the modication of words like
middle.
absolutely
189
1
0.5
0
[really]
1
0.5
relatively
0
1
0.5
more or less
somehow
0
1
0.5
0
1
0.5
0
high
I
high
R
E
A
more than low
B
S
O
more than low
very high
L
U
high
L
Y
high
T
very high
E
L
very high
Y
extremely high
190
Table 5.1 Exemplary type-1 membership function coding table (for the one-expert
use); optional words in brackets
Concentration
Absolutely
Absolutely
Absolutely
Absolutely
Absolutely
[really]
[really]
[really]
[really]
Relatively
Relatively
Relatively
Somehow
Somehow
More or less
l
4
3
2
1
0
3
2
1
0
2
1
0
1
0
0
r
5
4
3
2
1
5
4
3
2
5
4
3
5
4
5
min Ak,ni
(5.19)
(5.20)
(5.21)
k,n
Degree
extremely high
very high
high
more than low
not low
very high
high
more than low
not low
very high
high
more than low
high
more than low
high
i=1,...,E
i=1,...,E
i=1,...,E
Ak,n =
i=1,...,E wi
Obviously, depending on the interpretation of the middle membership function, we can employ other central tendencies like the geometric mean, the
harmonic mean, RMS or the median.
5.2.4.1
191
(5.22)
3
lk,n = mean lni
(5.23)
lk,n =
(5.24)
i=1,...,E
i=1,...,E
min lni
i=1,...,E
(5.25)
(5.26)
rk,n =
(5.27)
i=1,...,E
i=1,...,E
min rni
i=1,...,E
rejection
acceptance
ni
ni
192
5.2.5 Decoding
There are three possibilities with decoding. One relies on direct mapping
of a consequent fuzzy-valued fuzzy set to a linguistic label, the second is a
based on a type-reduction and decoding complementary to the type-2 encoder
presented in Section 5.2.3, and the third possibility relies on the use of the
type-reduction together with the common defuzzication. The last one may
be followed by a simply linguistic ranking, while the two rst approaches
need a similarity method between output fuzzy set (either type-2 or type-1)
and fuzzy set given in the term-set (output codebook).
5.2.5.1
Type-2 Decoding
5.2.5.3
193
This method in its rst stage uses the triangular type-reduction described
in the previous section. The benet of the proposed triangular approach is
that we always obtain a triangular membership function of the type-reduced
set. Owing to this shape, the overall defuzzication of the type-reduced set
is obviously performed by the centroid calculation of the triangle, i.e.,
=
y
+ y + ymax
ymin
.
3
(5.30)
This crisp centroid, although lost the information about its central tendency
and its marginal values, is the most capable by human thinking, and therefore
can be immediately translated by a linguistic ranking with the codebook
containing words like accept, accept with minor revision, accept with major
revision, or decline to accept.
(5.31)
(5.32)
3
l1,n = mean lni
(5.33)
(5.34)
l1,n =
min lni
(5.35)
min rni
(5.36)
i=1,...,E
i=1,...,E
i=1,...,E
i=1,...,E
r 1,n =
i=1,...,E
i=1,...,E
where upper indexes indicate the rule numbers: 1 for the acceptance and 2
for the rejection, the number of experts E = 4, n = 1, 2, . . . , 6. Parameters
lk,n and r k,n dene the upper antecedent membership function Ak,n , lk,n and
194
(5.37)
(5.38)
3
l1,n
l2,n = 3
r32,n = r31,n
(5.39)
(5.40)
l2,n = l1,n
r 2,n = r 1,n
(5.41)
(5.42)
Here, the testing component of the on-line learning platform as the exemplary
application of the triangular type-2 fuzzy logic system to the multiple expert
decision making is demonstrated. It is sucient that the system incorporates
only two type-2 fuzzy rules derived from 4 experts-examiners for 6 inputs
computed by (5.31)(5.42) (E = 4, N = 6). These inputs correspond to the
students replies submitted on-line for 6 questions. Each question had 5 check
points (or subsequent questions) like in check-box type of tests with many
possible answers for one question. Corrected answers for the check points
were summed and presented as the input value. Throughout the reasoning
process the minimum Cartesian product is used.
The numeric outputs of the perceptual computer take their values from
the Grade Point Average (GPA), which is commonly used in United States
as a metric by employers to compare students and evaluate their skill. Thus,
in all analyzed cases, the two rules are concluded with crisp 4 for passing the
test and 0 for rejecting.
195
Table 5.2 Numeric and linguistic students grades: Grade Point Average (GPA),
standard grading scale (SGS), linguisitic ECTS grading (LECTS), typical percentage range (PR)
GPA
SGS
LECTS
PR
00.99
F
Fail
059%
11.49
D
Below average
60%69%
1.52.49
C
Average
70%79%
2.53.49
B
Above average
80%89%
3.54
A
Excellent
90%-100%
The numeric values can be directly translated into the standard letter
grading scale supported by many universities in U.S. as well as by European
Credit Transfer and Accumulation System (ECTS) in European Union. The
coding table for this purpose is presented in Table 5.2.
Table 5.2 also presents a typical percentage for passing tests and exams.
Normally, these percentages are summed for a considered test. However, each
question, according to teachers leading the same subject, may be of dierent
importance. This group of teachers have to play a role of the experts dening
the marginal numbers of points or percentages for passing the test as well as
the punctation sucient for apprising the test as excellent. Since teachers my
be unfamiliar with fuzzy logic, it is necessary to give them a tool for linguistic
expression of the importance of particular questions.
Case 1
In the rst case, the experts provided us with their assignments diering each
from the other. The descriptions of high acceptance of the test is presented
in Table 5.3. This descriptions were encoded according to Table 5.1 so thus
the resulting parameters of membership functions are summarized in Table
5.4. The aggregated antecedents for two rules according to (5.31)(5.42) are
presented in Fig. 5.6a.
Table 5.3 Expert (E1,E2,E3,E4) descriptions of acceptance related to 6 inputs
(I1I6); case 1
E1
E2
E3
E4
I1
More
More
More
More
E1
E2
E3
E4
or
or
or
or
less
less
less
less
high
high
high
high
I2
More or less high
More or less high
More or less high
Somehow high
I4
More or less high
Not low
More than low
Relatively high
I3
More or less high
More or less high
More or less high
Somehow more than low
I5
Relatively very high
Relatively more than low
Relatively more than low
Somehow more than low
I6
More or less high
Relatively high
Relatively high
Relatively high
196
E1
E2
E3
E4
I1
l1 r 1
0 5
0 5
0 5
0 5
I2
l2 r 2
0 5
0 5
0 5
1 5
I3
l3 r 3
0 5
0 5
0 5
0 4
I4
l4 r 4
0 5
0 2
1 3
1 4
I5
l5 r 5
2 5
0 3
0 3
0 4
(1)
(a)
1
1
0.5
(2)
0.5
0.5
0
0.5
0.5
0
(4)
0.5
0
0.5
0.5
0
0
1
1
0.5
0
0.5
0
(5)
(6)
(3)
(b)
0.5
0
I6
l6 r 6
0 5
1 4
1 4
1 4
0.5
0
Fig. 5.6 Triangular type-2 fuzzy antecedents for the acceptance rule (nondecreasing) and for the rejection rule (non-increasing); principal membership functions (solid lines), upper and lower membership functions (dashed lines); (16)
inputs
197
Table 5.5 The maximum, mean value and standard deviation of the absolute difference between the triangular type-2 and interval-valued numeric outputs of perceptual computer, and between the triangular type-2 and type-1 computer outputs;
case 1
max |y
yI |
0.5098
max |y
y|
1.0196
mean |y
yI |
0.0499
mean |y
y|
0.0997
std |y
yI |
0.1037
std |y
y|
0.2074
Table 5.6 Triangular, interval and type-1 perceptual computer outputs for the
maximal absolute dierence triangular type-2 and interval-valued numeric outputs;
case 1
y
yI
y
|y
yI | |y
y|
1.4902 2.0000 0.4706 0.5098
1.0196
I1
I2
I3
Somehow more than low Somehow more than low Somehow more than low
Somehow high
Somehow high
Somehow high
Relatively high
More or less high
More or less high
More or less high
Relatively high
Relatively high
E1
E2
E3
E4
I4
I5
Somehow high
More or less high
Somehow more than low Somehow high
Relatively high
Relatively high
More or less high
Somehow more than low
I6
Somehow more than low
More or less high
Relatively high
Somehow high
It can be seen that the triangular type-2 approach for modeling deviating membership uncertainties gives strongly dierent results from the interval
type-2 and type-1 approaches. In the most distinct case, the triangular-valued
perceptual computer infers the output value diering in 1.0196 from the output of the corresponding type-1 fuzzy system, which is relatively equal to
25% since the output domain varies from 0 to 4. Further, the mean dierence
between these systems is equal to the meaningful 2.49%. In details, we found
the occurrence of the largest absolute dierence between the triangular and
the interval system, i.e., when input sets is [0.5, 0.5, 0.5, 2, 0.5, 0.5]. Table 5.6
shows nal outputs of compared systems for this occurrence.
Looking at dierent outputs of the perceptual computers, we intuitively
incline toward the answer of the triangular-valued computer, which uses the
upper, lower and principal (average) membership functions in the reasoning process instead of using no more than the upper and lower membership
198
E1
E2
E3
E4
I1
l1 r 1
0 4
1 5
1 4
0 5
I2
l2 r 2
0 4
1 5
0 5
1 4
I3
l3 r 3
0 4
1 5
0 5
1 4
I4
l4 r 4
1 5
0 4
1 4
0 5
I5
l5 r 5
0 5
1 5
1 4
0 4
I6
l6 r 6
0 4
0 5
1 4
1 5
Table 5.9 The maximum, mean value and standard deviation of the absolute
dierence between the triangular type-2 and interval-valued perceptual computer
numeric outputs, and between the triangular type-2 and type-1 computer outputs;
case 2
max |y
yI |
0.2222
max |y
y|
0.4444
mean |y
yI |
0.0224
mean |y
y|
0.0447
std |y
yI |
0.0618
std |y
y|
0.1237
functions (in the interval approach) or instead of simply averaging membership functions (in the type-1 approach).
The nal step is to decode the numeric output values, by use of Table 5.2.
The linguistic answers of the triangular-valued perceptual computer diered
from the interval-valued linguistic outputs in one grade at most, and the rate
of occurrence was 28514 to 116 . The same linguistic answers diered from the
ordinary linguistic outputs maximally in 2 grades with 32966 occurrences,
which stays behind the use of triangular-valued fuzzy logic.
Case 2
In the second case, we assumed that the experts provided us with assignments
lni and rni specied in Table 5.8, which were uniformly distributed within
some intervals. The aggregated antecedents for two rules are presented in Fig.
5.6b and the results for all the possible input combinations ranging from 0
to 5, as in the previous case, are summarized in Table 5.9.
In this case, the dierences between systems diminish roughly twice. One
of the two most distinct cases is when the input vector is [1, 1, 1, 1, 1, 4.5].
An interesting fact is that the numerical dierences occur when some of the
inputs take its values from the borders of the domain, this will be eliminated
in the next subsection.
Applying the Table 5.2, we get the linguistic values of compared perceptual
computers. The linguistic answers of the triangular-valued computer diered
from the interval-valued linguistic outputs in one grade at most, and the rate
of occurrence was 39962 to 116 . The dierence between linguistic outputs of
the triangular-valued and ordinary perceptual computers were in one grade
at most with 147004 occurrences.
199
Table 5.10 The maximum, mean value and standard deviation of the absolute
dierence between the triangular type-2 and interval-valued perceptual computer
numeric outputs, and between the triangular type-2 and type-1 computer outputs;
case 2a
max |y
yI |
4.44e-16
max |y
y|
4.44e-16
mean |y
yI |
3.41e-17
mean |y
y|
1.93e-17
std |y
yI |
1.08e-16
std |y
y|
7.72e-17
Case 2a
In this simulation, we modeled the same circumstances as in Case 2, but the possible input values were restricted to the following set: {1, 1.5, 2, 2.5, 3, 3.5, 4}.
The results for all the possible input combinations are summarized in
Table 5.10.
This case sustains Theorem 6.1. The triangular-valued perceptual computer gives extremely close results to the interval type-2 and type-1 systems.
Even in the most distinct case, when the input vector is [2, 2, 2, 2, 2, 3.5],
the numeric outputs of all compared systems give roughly 2.4. With the use
of nal defuzzication preceding the decoding into words, both interval and
triangular-valued perceptual computers seems useless for modelling problems
similar to the presented one. A detailed study of similar cases and the mathematical explanation are delivered in [Starczewski 2008]. Expectedly, there
were no dierences between linguistic outputs of the three compared perceptual computers.
5.2.6.2
The second potential application of the triangular-valued perceptual computer is an automatic paper evaluation. Nowadays, an editor makes the decision to accept or reject the submitted paper basing mostly on overall evaluations delivered by reviewers. Unfortunately for authors, there are no precise
review rules merging evaluations within categories with the overall evaluation.
That makes the reviewing process very subjective and incomprehensible.
In the proposed application, we employed the standard 6 measures for
reviewing the paper: importance, original content, depth, readable style, precise organization and ordered presentation. The 6 measures correspond to 6
inputs of the perceptual computer. The vocabulary used for this inputs consisted of: poor, marginal, adequate, good and excellent. Not alike in [Wu and
Mendel 2007a], we decided to code the input vocabulary uniformly into the
real numbers from 0 to 4, since, in my impression, the words are precise and
linearly ordered. The evaluation of three reviewers were rstly encoded and
then averaged in the following way:
200
xi = mean xir ,
(5.43)
r=1,2,3
where xir denotes the numeric evaluation of the rth reviewer for the ith
measure. The same level of expertise for the reviewers were assumed, however,
taking into account the self-evaluated expertise level, the weighted average
instead of (5.43) could be employed.
The experts constructing the rule base (members of the editorial committee) were to answer for the following question: With regard to the one of the
measures, what should be the condition for the acceptance of a paper? The
answer had to be put within linguistic limits from the same vocabulary as
used for inputs. The linguistic conditions for the acceptance are summarized
in Table 5.11. The transformation of these linguistic intervals into membership function parameters is demonstrated in Table 5.12.
Two rules: paper accepted and paper rejected were concluded with 1 for
the acceptance and 0 for the rejection. The minimum t-norm for the Cartesian
product was applied. The outputs produced crisp numeric values, which had
to serve as ranking values before the editorial decision of acceptation.
Table 5.11 Expert (E1,E2,E3,E4,E5) lingustic conditions for the acceptance of
the paper related to importance (I), original content (C), depth (D), readable style
(S), precise organization (O) and ordered presentation (P)
E1
E2
E3
E4
E5
I
C
D
marginal to excellent adequate to excellent marginal to excellent
adequate to excellent adequate to excellent marginal to excellent
adequate to excellent adequate to excellent marginal to excellent
adequate to excellent adequate to excellent marginal to good
adequate to excellent marginal to excellent marginal to excellent
S
O
P
E1 poor to excellent
poor to excellent poor to excellent
E2 poor to adequate
marginal to good marginal to good
E3 marginal to good
marginal to good marginal to good
E4 poor to good
marginal to good marginal to good
E5 marginal to excellent poor to good
marginal to excellent
E1
E2
E3
E4
E5
I
l1
1
2
2
2
2
r1
4
4
4
4
4
C
l2
2
2
2
2
1
r2
4
4
4
4
4
D
l3
1
1
1
1
1
r3
4
4
4
3
4
S
l4
0
0
1
0
1
r4
4
2
3
3
4
O
l5 r 5
0 4
1 3
1 3
1 3
0 3
P
l6
0
1
1
1
1
r6
4
3
3
3
4
201
Table 5.13 The maximum, mean value and standard deviation of the absolute
dierence between the triangular type-2 and interval-valued perceptual computer
numeric outputs, and between the triangular type-2 and type-1 computer outputs;
automatic paper evaluation
max |y
yI |
0.119
max |y
y|
0.238
mean |y
yI |
0.005
mean |y
y|
0.010
std |y
yI |
0.017
std |y
y|
0.034
Table 5.14 Triangular, interval and type-1 perceptual computer outputs for the
maximal absolute dierence triangular type-2 and interval-valued numeric outputs;
automatic paper evaluation
y
yI
y
|y
yI | |y
y|
0.381 0.500 0.144 0.119
0.238
Having no objective function for the paper evaluation, only the numeric
crisp outputs of the triangular-valued perceptual computer could be compared with outputs of the interval-valued and ordinary computers. For type-1
fuzzy logic engine principal membership functions were used. The results for
all combinations of words from the input vocabulary (poor, marginal, adequate, good and excellent ) for 6 measures of the submitted paper and for 3
reviewers are summarized in Table 5.13
We can see that triangular approach for modeling membership uncertainties gives quite dierent results from the interval type-2 and the type-1 approach. Since in the triangular approach more information about the expert
opinions were used, it can be concluded that the triangular type-2 fuzzy
logic systems are more reliable than interval fuzzy logic systems and type-1
fuzzy logic systems for this kind of not-uniform setting of the rule base. The
largest absolute dierence between the triangular-valued and interval-valued
perceptual computers, i.e., when input sets (after averaging of reviews) is
[1.3 (3) , 1.3 (3) , 1.3 (3) , 2, 0.3 (3) , 0.3 (3)], is described in Table 5.14.
An interesting heuristic approach that combines type-2 fuzzy logic with
modular classier structures is presented in [Starczewski et al 2008], where
fuzzy logic subsystems are trained with the AdaBoost algorithm and the back
propagation method, and nally, the ensemble of classiers is aggregated to
a form of triangular type-2 fuzzy logic system.
202
Type-1 Learning
(5.45)
Tuning antecedent parameters, mk,n and k,n , as well as consequent parameters, y k and k , can be realized by any method of learning like gradient
methods (e.g. Error Back Propagation) or genetic algorithms.
5.3.1.2
The purpose of the second phase is to create type-2 fuzzy membership functions, which should cover the inner uncertainty of a modeled process. To perform this, let us assume that the number of cluster centers is equal to K. Each
cluster center is a vector that contains centers of antecedents and consequent,
i.e., vk = [mk,1 , mk,2 , . . . , mk,N , yk ]. This vector is actually determined by
the preceding type-1 learning phase. In analogy to a cluster center, any t-th
instance can be represented by the extended vector xt = [x1 (t) , x2 (t) . . . ,
xN (t) , y (t)]. In this setting, we are able to employ fuzzy memberships dened
by the standard FCM method using (5.7) and (5.10).
Doing this, we assume that training data are not corrupted by any measurement error, and the uncertainty is due to the nature of the modeled process. Therefore, we can bound the training extended data by an upper and
lower membership functions. Upper memberships can be assumed as normal
Gaussian membership functions, i.e.,
203
2
1 xn mk,n
,
Ak,n (xn ) = exp
2
k,n
2
1 y yk
Bk (y) = exp
,
2
k
as upper limits of a function family drawn through points (xn (t) , ukt ), i.e.,
B
2
1 xn (t) mk,n
k,n = max t : exp
= ukt
(5.46)
t
2
t
|xn (t) mk,n |
k,n = max
,
t
2 log ukt
(5.47)
(5.48)
ukt
2 .
1 y(t)yk
exp 2
k
(5.53)
Fig. 5.7 presents a graphical representation of the membership function obtained for the third dimension (Petal Length) of the second cluster achieved
by the FCM algorithm for the Iris classication problem. Symbols x
204
20
30
40
50
60
70
Fig. 5.7 Type-2 membership function obtained by the Gaussian function tting
indicate the points which selected to determine the upper and lower membership functions.
5.3.1.3
In Fig. 5.7, an unfavorable phenomenon can be observed, i.e., the lower membership function is characterized by too small height. Consequently, we obtain
too wide interval of uncertainty, which does not provide us substantial information. The reason for this is that the lower membership function is a lower
bound of the function family drawn through points (xn (t), ukt ), xn (t) x.
With such selected function family, all instances are obligatory considered
with no respect into which main cluster they were assigned by the FCM
algorithm.
To overcome this drawback, the previous algorithm can be modied by
putting it into the context of a particular cluster. Namely, we can calculate
fuzzy memberships ukt of each instance in every cluster. Turning to hard
partitioning, we can dene instance x(t) assigned to the -th cluster, =
1, . . . , K, by arg(max ukt ) = . After assigning all instances to particular
k
(5.54)
where t is a cluster to which instance x(t) is assigned. Then, (5.47) and (5.48)
apply adequately to compute the width of upper membership functions.
By analogy, scaled factors of lower membership functions can be calculated
within the context of particular clusters, i.e., taking into consideration only
those instances that belong to set xk ,
205
,
t
2 log ukt
ukt
= min
2 .
t
x
(t)m
exp 21 k,n k,n k,n
k,n = max
(5.55)
hk,n
(5.56)
20
30
40
50
60
70
Fig. 5.8 Type-2 membership function obtained the contextual Gaussian function
tting
5.3.1.4
2
1 xm
for x < m,
exp 2 k,n
(x) =
2
otherwise.
exp 21 xm
k,n
(5.57)
where k,n and k,n have to be computed independently for {xk (t) : xk,n (t)
mk,n } and {xk (t) : mk,n < xk,n (t)}. The result is presented in Fig. 5.9.
206
20
30
40
50
60
70
2
for x < m,
exp 12 xm
2
3 (x) =
otherwise,
exp 21 xm
207
208
The inequality method of comparing interval fuzzy numbers has given the
lowest number of incorrect classications (Misclass.). Unfortunately, the
greatest number of correct classications (Class.) is still a domain of the
type-1 fuzzy logic.
Table 5.15 Classication rates for Gaussian interval functions obtained by the
basic uncertainty tting method
Class.
NoClass.
Misclass.
0.06
0.25
0.12
0.11
0.13
0.13
0.01
Table 5.16 Classication rates for asymmetric-Gaussian upper membership functions and symmetric Gaussian lower membership functions obtained by the basic
uncertainty tting method
Class.
NoClass.
Misclass.
0.07
0.19
0.12
0.11
0.15
0.15
0.03
Table 5.17 Classication rates for Gaussian interval membership functions obtained by the contextual uncertainty tting method
Class.
NoClass.
Misclass.
0.06
0.23
0.10
0.08
0.12
0.11
0.02
Table 5.18 Classication rates for asymmetric-Gaussian upper membership functions and symmetric Gaussian lower membership functions obtained by the contextual uncertainty tting method
Class.
NoClass.
Misclass.
0.02
0.14
0.10
0.09
0.11
0.11
0.03
209
which each of the classes was trained against all other classes in independent
fuzzy logic systems. As a consequence the number of the classifying singleoutput fuzzy logic systems was equal to the number of classes. The outputs
of these subsystems were combined using the maximum decision function.
In each problem, we compared the triangular type-2 fuzzy logic system
with the interval and type-1 fuzzy logic system. The rules (3 rules per class in
the Iris problem and only 2 rules per class in the Wine classication problem)
were generated by the classical FCM algorithm (with fuzziness degree = 2)
basing on the instances described by attributes and class labels. We assumed
all principal membership functions to be of the asymmetric-Gaussian form,
such that the least squares tting method could be used to t these functions
to the membership degrees of data to each cluster obtained from the FCM
algorithm. The same principal membership functions were used in the triangular type-2 and the basic type-1 fuzzy logic systems. The upper and lower
membership functions were obtained by the basic interval uncertainty tting
using asymmetric-Gaussian membership functions. In the type-1 fuzzy logic
system, the Cartesian product was realized by the algebraic product t-norm
and the approximate extended product t-norm in the type-2 case.
Every run of the proposed FCM-based algorithm was performed on randomly chosen training instances (75 in the Iris problem, 89 in the Wine classication) and the rest of instances were used for testing the systems. Table
5.19 demonstrates the best, the worst as well as the average classication rates
of the type-1, interval and triangular type-2 fuzzy logic systems obtained in
10 independent runs of the training algorithm [Starczewski 2009]. Comparing
the overall outputs of the systems, the triangular type-2 fuzzy logic system
performs not worse and sometimes even signicantly better than interval and
type-1 systems.
Table 5.19 Classication accuracy of the type-1, interval and triangular type-2
FLSs after 10 independent runs of the FCM algorithm
problem result
Iris
best
worst
average
Wine
best
worst
average
type-1
0.9733
0.6800
0.8400
0.9101
0.5843
0.7652
interval
0.9733
0.6267
0.7627
0.8315
0.5955
0.6831
triangular type-2
0.9733
0.7067
0.8494
0.9213
0.6067
0.7753
Obviously, the classication accuracy could be improved using other learning methods, e.g. [Dziwi
nski and Rutkowska 2006, 2008; Nowicki 2008, 2009].
However, the aim of this simulation was just to demonstrate that triangular uncertainty of memberships brings benets of both the interval type-2
fuzzy logic and the classical type-1 fuzzy reasoning. Incorporating a type-1
fuzzy logic system as the principal subsystem into the interval type-2 fuzzy
210
(5.58)
(5.59)
kn
where k is the index of rule, n is the index of input with missing information,
and Xi is the set resulting from discretization, e.g. Xi = [xi , xi + i ].
5.4 Rough-Fuzzy Systems for Discretization of Inputs and Missing Attributes 211
y (t 1) y (t 2) y (t 1) 12
.
1 + y 2 (t 1) + y 2 (t 2)
(5.60)
(5.61)
212
5.4 Rough-Fuzzy Systems for Discretization of Inputs and Missing Attributes 213
The specicity of interval-valued fuzzy logic systems allow us for an analysis on a lower level of classication if only we make use of the interval outputs
of the system: ymin and ymax . Using this information, instead of hard classication, we obtain three groups of classied object with the following labels:
certain classication if ymin > ,
uncertain classication if ymax ymin,
and certain rejection if ymax < .
As a result, we obtain three groups of rates: classication, misclassication,
and no classication (NoClass.) when classication cannot be performed
certainly. This could help in the real classication systems such as the medical diagnosis, when uncertain classication cases can be again directed to a
thorough examination.
The classication results with the imputation of input values by means of
rough-fuzzy sets are presented in Tables 5.205.23.
Table 5.20 Iris-Setosa with rough-fuzzy imputation of missing inputs
MissingInput
1
2
3
4
Basic FLS
Interval (rough-fuzzy) FLS
Class./Misclass. Class./NoClass./Misclass.
0.967/0.033
0.560/0.440/0.000
1.000/0.000
0.973/0.027/0.000
1.000/0.000
0.640/0.360/0.000
0.800/0.200
0.000/1.000/0.000
Basic FLS
Interval (rough-fuzzy) FLS
Class./Misclass. Class./NoClass./Misclass.
0.927/0.073
0.827/0.160/0.013
0.940/0.060
0.520/0.480/0.000
0.440/0.560
0.000/1.000/0.000
0.940/0.060
0.620/0.367/0.013
Basic FLS
Interval (rough-fuzzy) FLS
Class./Misclass. Class./NoClass./Misclass.
0.967/0.033
0.873/0.127/0.000
0.967/0.033
0.507/0.493/0.000
0.873/0.127
0.207/0.793/0.000
0.920/0.080
0.033/0.967/0.000
214
Needless to say that this novel interpretation of interval classication characterizes with a number of misclassication tending to 0, at the expense of
the rate of correct classications. The both rates are balanced by the noclassication rate, when the interval system is not decided. High values of
this rate testify about the importance of the missing input for the emergence
of a given class. In particular, the fourth input is necessary for correct classication of species of the Setosa (corresponding no-classication rate is equal
to 0), in the same way, the third input is indispensable to correctly classify
the Versicolor species; however, substantial features for the classication of
Virginica are inputs 3 and 4. For the proper classication of the WisconTable 5.23 Wisconsin Breast Cancer with rough-fuzzy imputation of missing
inputs
MissingInput
1
2
3
4
5
6
7
8
9
Basic FLS
Interval (rough-fuzzy) FLS
Class./Misclass. Class./NoClass./Misclass.
0.977/0.023
0.795/0.193/0.012
0.974/0.026
0.385/0.612/0.003
0.972/0.028
0.593/0.407/0.000
0.978/0.022
0.936/0.050/0.015
0.978/0.022
0.895/0.097/0.009
0.963/0.037
0.893/0.100/0.007
0.977/0.023
0.198/0.799/0.003
0.978/0.022
0.927/0.061/0.012
0.971/0.029
0.291/0.704/0.004
sin Breast Cancer cases the list of important features that we cannot miss
includes: 2, 7 and 9.
Nonlinear function approximation and prediction with missing inputs using rough-fuzzy sets are presented in Tables 5.24 and 5.25.
Table 5.24 Nonlinear Dynamic Plant approximation with rough-fuzzy imputation
of missing inputs
MissingInput
1
2
In the case of Nonlinear Dynamic Plant approximation, interval roughfuzzy systems perform signicantly better than their basic fuzzy logic systems
in terms of RMSE. But this is not the rule, what can be seen in Table 5.25.
Most likely, the problem here is due to an inadequately trained basic system.
5.4 Rough-Fuzzy Systems for Discretization of Inputs and Missing Attributes 215
Table 5.25 Kinematics prediction with rough-fuzzy imputation of missing inputs
MissingInput
1
2
3
4
5
6
7
8
=0.1
1
0.5
0
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
=0.2
1
0.5
0
0.5
=0.5
=1
1
0.5
0
0.5
=2.5
=5
1
0.5
0
216
Basic FLS
Interval (rough-fuzzy) FLS
Class./Misclass. Class./NoClass./Misclass.
1.000/0.000
1.000/0.000/0.000
1.000/0.000
1.000/0.000/0.000
1.000/0.000
1.000/0.000/0.000
1.000/0.000
0.960/0.040/0.000
1.000/0.000
0.720/0.280/0.000
1.000/0.000
0.360/0.640/0.000
1.000/0.000
1.000/0.000
1.000/0.000
1.000/0.000
1.000/0.000
1.000/0.000
1.000/0.000/0.000
1.000/0.000/0.000
1.000/0.000/0.000
0.980/0.020/0.000
0.960/0.040/0.000
0.580/0.420/0.000
1.000/0.000
1.000/0.000
1.000/0.000
1.000/0.000
0.987/0.013
0.987/0.013
1.000/0.000/0.000
1.000/0.000/0.000
1.000/0.000/0.000
1.000/0.000/0.000
1.000/0.000/0.000
0.940/0.060/0.000
1.000/0.000
1.000/0.000
0.980/0.020
0.960/0.040
0.800/0.200
0.800/0.200
1.000/0.000/0.000
1.000/0.000/0.000
1.000/0.000/0.000
0.833/0.167/0.000
0.000/1.000/0.000
0.000/1.000/0.000
217
Basic FLS
Interval (rough-fuzzy) FLS
Class./Misclass. Class./NoClass./Misclass.
0.927/0.073
0.933/0.007/0.060
0.927/0.073
0.933/0.007/0.060
0.927/0.073
0.920/0.027/0.053
0.900/0.100
0.907/0.053/0.040
0.860/0.140
0.853/0.107/0.040
0.847/0.153
0.753/0.247/0.000
0.933/0.067
0.933/0.067
0.933/0.067
0.927/0.073
0.927/0.073
0.927/0.073
0.927/0.013/0.060
0.920/0.020/0.060
0.900/0.040/0.060
0.900/0.047/0.053
0.527/0.473/0.000
0.373/0.627/0.000
0.933/0.067
0.947/0.053
0.953/0.047
0.880/0.120
0.927/0.073
0.667/0.333
0.887/0.047/0.067
0.880/0.080/0.040
0.827/0.153/0.020
0.633/0.353/0.013
0.627/0.360/0.013
0.293/0.693/0.013
0.933/0.067
0.953/0.047
0.960/0.040
0.953/0.047
0.940/0.060
0.940/0.060
0.933/0.007/0.060
0.913/0.020/0.067
0.853/0.087/0.060
0.680/0.280/0.040
0.613/0.373/0.013
0.613/0.373/0.013
218
=0.1
1
0.5
0
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
=0.2
1
0.5
0
0.5
=0.5
=1
1
0.5
0
0.5
=2.5
=5
1
0.5
0
0.5
=0.1
=0.2
1
0.5
0
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
=0.5
1
0.5
0
0.5
=1
=2.5
1
0.5
0
=5
1
0.5
0
219
Basic FLS
Interval (rough-fuzzy) FLS
Class./Misclass. Class./NoClass./Misclass.
0.967/0.033
0.967/0.000/0.033
0.967/0.033
0.967/0.000/0.033
0.967/0.033
0.967/0.000/0.033
0.967/0.033
0.960/0.007/0.033
0.953/0.047
0.953/0.013/0.033
0.927/0.073
0.853/0.133/0.013
0.967/0.033
0.960/0.040
0.940/0.060
0.920/0.080
0.847/0.153
0.847/0.153
0.967/0.000/0.033
0.960/0.007/0.033
0.920/0.060/0.020
0.753/0.247/0.000
0.600/0.400/0.000
0.367/0.633/0.000
0.967/0.033
0.967/0.033
0.980/0.020
0.953/0.047
0.840/0.160
0.687/0.313
0.953/0.013/0.033
0.947/0.020/0.033
0.900/0.080/0.020
0.827/0.160/0.013
0.687/0.300/0.013
0.473/0.513/0.013
0.967/0.033
0.967/0.033
0.980/0.020
0.907/0.093
0.720/0.280
0.720/0.280
0.967/0.000/0.033
0.933/0.033/0.033
0.873/0.100/0.027
0.600/0.400/0.000
0.027/0.973/0.000
0.027/0.973/0.000
220
Table 5.29 Wisconsin Breast Cancer with rough-fuzzy partition of input space
X1
Basic FLS
Interval (rough fuzzy) FLS
Class./Misclass. Class./NoClass./Misclass.
0.0 0.978/0.022
0.978/0.000/0.022
2.0 0.980/0.020
0.965/0.020/0.015
5.0 0.972/0.028
0.915/0.070/0.015
2
0.0 0.978/0.022
0.978/0.000/0.022
2.0 0.975/0.025
0.959/0.023/0.018
5.0 0.974/0.026
0.947/0.040/0.013
3
0.0 0.978/0.022
0.978/0.000/0.022
2.0 0.977/0.023
0.958/0.028/0.015
5.0 0.962/0.038
0.857/0.141/0.003
4
0.0 0.978/0.022
0.978/0.000/0.022
2.0 0.977/0.023
0.977/0.004/0.019
5.0 0.975/0.025
0.965/0.019/0.016
5
0.0 0.978/0.022
0.978/0.000/0.022
2.0 0.978/0.022
0.971/0.010/0.019
5.0 0.977/0.023
0.956/0.028/0.016
6
0.0 0.978/0.022
0.978/0.000/0.022
2.0 0.975/0.025
0.968/0.018/0.015
5.0 0.975/0.025
0.941/0.045/0.013
7
0.0 0.978/0.022
0.978/0.000/0.022
2.0 0.977/0.023
0.966/0.018/0.016
5.0 0.969/0.031
0.893/0.095/0.012
8
0.0 0.978/0.022
0.978/0.000/0.022
2.0 0.978/0.022
0.972/0.009/0.019
5.0 0.974/0.026
0.959/0.023/0.018
9
0.0 0.978/0.022
0.978/0.000/0.022
2.0 0.978/0.022
0.968/0.015/0.018
5.0 0.978/0.022
0.950/0.035/0.015
i
221
=0.2
1
0.5
0
10
10
10
10
10
=0.5
1
0.5
0
=1
1
0.5
0
=2.5
1
0.5
0
=5
1
0.5
0
Fig. 5.13 Generation of Antecedents for Wisconsin Breast Cancer with roughfuzzy partition of input space X1 (original membership functions - solid and dotdashed lines, upper and lower membership functions - dashed and dotted lines)
Table 5.30 Nonlinear Dynamic Plant approximation with rough-fuzzy partition
of input space Xi
1
0.1
0.2
0.3
0.4
0.5
0.6
0.7
2
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.0771
0.0784
0.0877
0.0893
0.0951
0.1078
0.1057
222
0.0962
0.0964
0.0969
0.0981
0.0974
0.1031
0.1122
0.1229
0.0964
0.0980
0.1016
0.1064
0.0971
0.1008
0.1069
0.1146
0.0962
0.0970
0.0989
0.1024
0.0968
0.1002
0.1063
0.1144
0.0962
0.0972
0.1000
0.1043
0.0969
0.1020
0.1102
0.1198
0.0963
0.0984
0.1023
0.1101
0.0970
0.1020
0.1100
0.1193
0.0962
0.0974
0.1013
0.1084
0.0960
0.0975
0.1014
0.1063
0.0962
0.0971
0.0989
0.1026
=0.3
0.5
=0.4
0.5
=0.5
0.5
=0.6
0.5
0.5
=0.1
=0.2
0.5
=0.7
1
0.5
223
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
=0.1
1
0.5
=0.2
0
2
1
=0.3
0
2
1
=0.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
0.5
0
2
1
0.5
0
2
1
=0.7
1.5
0.5
0.5
0
2
emphasizing that the membership of A is also an explicit function of x . Specifically, the possibility of Ak forms an upper bound of fuzzication (4.73), i.e.,
Ak (x ) = sup T (A (x, x ) , Ak (x)) ,
xX
xX
224
Assuming that both fuzzifying fuzzy sets and sets to be fuzzied are triangular, the possibility and necessity fuzzications remain triangular. Starting
from
a symmetric premise membership
(fuzzication) function An (xn ) =
!
!
min
xn xn +n xn xn +n
,
n
n
k,n
k,n
where
k,n = k,n + n ,
(5.64)
k,n = k,n + n .
(5.65)
k,n
k,n
This triangular function has a center mk,n calculated by
mk,n =
n (k,n k,n )
+ mk,n .
2n + k,n + k,n
(5.66)
225
k,n + k,n
.
2n + k,n + k,n
If we impose! symmetry
on the antecedent !
membership function, i.e.,
xn mk,n +k,n mk,n xn +k,n
, the possibility function
Ak,n (xn ) = min
,
k,n
k,n
embedding also symmetric triangular fuzzication is described as follows:
"
"
xn mk,n + k,n mk,n xn + k,n
Ak (xn ) =
min
,
,
(5.67)
k,n
k,n
and the necessity presents in its form
"
"
xn mk,n + k,n mk,n xn + k,n
min
,
,
A (xn ) =
k
k,n
k,n
(5.68)
where k,n is given by (4.51). This triangular function has a center at mk,n and
a corresponding height given by
hk,n =
5.5.1.2
k,n
.
k,n + n
(5.69)
k,n
where
k,n =
)
2 .
n + k,n
(5.71)
Assuming a t-conorm in (4.74) to be the algebraic sum, the necessity antecedent membership function embedding triangular fuzzication by An (x)
can be expressed as
226
1 An (xn , xn ) 1 Ak,n (xn )
xn Xn
2
1 xn xn
= 1 sup exp
2
n
xn Xn
2
1 xn mk,n
1 exp
,
2
k,n
A (xn ) =
k
inf
(5.72)
(5.73)
(5.74)
227
,
(5.76)
(u)
,
x
(u)
,
x
fn (u, xn ) = max Fn 1
F
n
n
n
Ak,n
A
k,n
x +
n
n
k,n
k,n
k,n
, k,n k,n
triangular fuzzy numbers, i.e. Ak,n (xn ) =
k,n
!
!
xn xn +n xn xn +n
, respectively, where n and k,n
,
and Fn (xn ) =
n
n
denote spreads of the triangular membership functions, the secondary membership function of the fuzzy-valued fuzzy set induced by a fuzzy-rough approximation may be expressed as follows:
m
x +n
1+ k,n n
u
k,n
min
,
k,n
fk,n u, xn =
m
x +n
u1+ k,n n
k,n
,
min
k,n
x m
+n
u1+ n k,n
k,n
n
k,n
x m
+n
1+ n k,n
u
k,n
n
k,n
if mk,n xn
.
otherwise
(5.77)
This function has a triangular shape for xn [mk,n k,n , mk,n + k,n ]. The
principal memberships is obviously described by
3Ak,n (xn ) = Ak,n (xn ) .
(5.78)
228
Therefore,
-
A (xn )
k,n
= hk,n
n
= 1
k,n
-
xn mk,n n + k,n mk,n n xn + k,n
,
.
k,n
k,n
(5.82)
(5.83)
For xn
/ [mk,n k,n , mk,n + k,n ], the fuzzy partition set does not intersect
suciently with the antecedent fuzzy set, hence, the secondary membership
function of the fuzzy-rough set is quasi-triangular. However while constructing a system, we assume triangularity due to very low values of the upper
membership functions found in such cases.
In Figure 5.16, the construction of secondary membership functions is
demonstrated in three exemplary x , i.e., xa , xb and xc . In order to construct
a complete fuzzy-valued fuzzy antecedent set we have to vary F (x, x ) in the
whole spectrum of possible x values.
Example 4.4 from Sect. 4.2.2 in Chapt. 4 has provided more general formulae for triangular fuzzication of triangular antecedent membership functions
according to Theorem 4.6. Assuming that k,n and k,n denote left and right
(a)
1
A, Fi
0.8
0.6
0.4
0.2
0
10
x
(b)
1
0.5
0
1
0.5
0
u
10
Fig. 5.16 Construction of fuzzy-rough sets: a) Ak antecedent membership function (solid line), F1 , F2 , F3 three realizations of non-singleton premise membership functions (dashed lines), b) fx (u) corresponding secondary membership
functions constituting f (u, x ).
229
spreads of the triangular fuzzy antecedent set Ak,n (of k-th rule and n-th
input), i.e.,
xn mk,n + k,n mk,n xn + k,n
,
, (5.84)
Ak,n (xn ) = max 0, min
k,n
k,n
and n and n denote left and right spreads of the triangular fuzzy-rough
approximation set Fn fuzzifying n-th input, i.e.,
xn xn + n x xn + n
,
,
(5.85)
F n (xn , xn ) = max 0, min
n
n
the secondary membership function of the antecedent may be evaluated as
follows:
fk,n (u)
u+(mk,n xn k,n +n )/k,n (xn mk,n +k,n +n )/k,n u
min
,
,
n /k,n
n /k,n
= max
k,n
(5.86)
k,n
n
k,n
n
m
x
+
x m
+k,n +n
min u + k,n nk,n k,n n , n k,n
u
,
k,n
mk,n xn +k,n +n
xn mk,n k,n +n
min
u, u +
k,n
k,n
(5.87)
.
(5.88)
This function not always has a triangular shape. Obviously, the principal
membership function is expressed by (5.78). The upper membership function has a trivial kernel [mk,n n , mk,n + n ] and is characterized by the
trapezoidal membership function alike
-
xn mk,n + n + k,n mk,n + n xn + k,n
Ak,n (xn ) =
,
, (5.89)
k,n
k,n
since fk,n (u, x ) = 0 for all u [0, 1] whenever mk,n k,n xn + n or
mk,n + k,n xn n . The lower membership is a subnormal triangular
function with support [mk,n k,n + n , mk,n + k,n n ] and peak value
calculated for in the following way.
Since we are interested in u satisfying fk,n (u) = 0 such that u bounds
support of fk,n from below, we can calculate two possibilities for u by starting
with the observation that the rising slopes of the two maximized component
230
functions in (5.87) reach 0 from above, and therefore we can omit boundary
operation / /, i.e.
u1 +
mk,n xn k,n + n
=0
k,n
x mk,n n + k,n
u1 = n
,
k,n
(5.90)
(5.91)
xn mk,n k,n + n
=0
k,n
mk,n xn n + k,n
u2 =
k,n
(5.92)
(5.93)
k,n
(xn ) = /min (u1 , u2 )/
(5.94)
xn mk,n n + k,n mk,n xn n + k,n
= min
,
.
k,n
k,n
(5.95)
Then using the fact that the lower membership function is triangular and
supported by [mk,n + n k,n , mk,n n + k,n ], the center of this triangle, denoted by ck,n , can be calculated as xn at the point of equal values of
both slopes, i.e.,
mk,n ck,n n + k,n
ck,n mk,n n + k,n
=
(5.96)
k,n
k,n
k,n ck,n k,n mk,n k,n n = k,n mk,n k,n ck,n k,n n (5.97)
k,n k,n
ck,n = mk,n
n .
(5.98)
k,n + k,n
Consequently, the corresponding peak is expressed by
hk,n =
k,n
k,n
n n + k,n
k,n +k,n
= 1
(5.99)
k,n
2n
.
k,n + k,n
(5.100)
(5.101)
5.5.2.2
231
x +
n
n
k,n
k,n
k,n
,
triangular fuzzy number, i.e. Ak,n (xn ) =
, k,n k,n
k,n
and a fuzzy partition
set
is
characterized
by
a
Gaussian
membership
function
2
1 xn xn
Fn (xn ) = exp 2
, where n denotes the xed deviation, the
n
1 u +
fk,n (u, xn ) = exp
2
|xn mk,n |
k,n
n
k,n
2
1
,
(5.102)
3Ak,n (xn ) = Ak,n (xn ) .
(5.103)
k,n (xn ) =
n
,
k,n
(5.104)
232
fn (u, xn ) = max (Fn (mk,n k,n (1 u)) , Fn (mk,n + k,n (1 u)))
2
1 mk,n k,n (1u)xn
,
n
exp 2
= max
2
2
1
mk,n xn
(5.105)
(5.106)
k,n
exp 1
,
n
2
k,n
= max
m x
2
,
n
1+ k,n
u
k,n
1
exp
n
2
(5.107)
k,n
233
234
Gaussian fuzzication in the sense of possibilistic reasoning of a fuzzy system with Gaussian antecedent membership functions transforms this system
always into an interval-valued fuzzy logic system. The classication ranks
for the Iris-Setosa subproblem in the case of Gaussian noise disturbance are
summarized in Tables 5.32 and 5.33.
Exemplary interval fuzzy antecedents for the Iris-Setosa classication with
possibilistic fuzzication of the rst input are demonstrated in Fig. 5.17. The
number of wrong classications for each interval (possibilistic) fuzzy systems
is equal to zero when either X1 , X2 or X3 is fuzzied, in the other case the
misclassication rate only is close to 0. The dierence in the misclassication
rate is especially evident in Table 5.33 for all inputs corrupted with high
values of i , particularly, the misclassication rates for the singleton system
and the standard non-singleton system reach 0.51 and 0.24, respectively, while
for the interval system is only 0.007 for i = 0.2, i = 1, . . . , 4. However, the
number of correct classications of the interval system becomes signicantly
less than for the singleton and standard non-singleton systems.
The results for the Iris-Versicolor classication in the case of Gaussian
noise disturbance are summarized in Tables 5.34 and 5.35. Exemplary interval fuzzy antecedents for the Iris-Versicolor classication with possibilistic
fuzzication of the rst input are demonstrated in Fig. 5.18. In the IrisVersicolor classication subproblem, the number of misclassications for each
interval (possibilistic) fuzzy system is equal or close to zero. The dierence
235
Table 5.32 Iris-Setosa with possibilistic Gaussian fuzzication of Gaussian membership functions and additional Gaussian noise applied to single input Xi
1
0.1
0.2
0.5
1.0
2.0
2
0.1
0.2
0.5
1.0
2.0
3
0.1
0.2
0.5
1.0
2.0
4
0.1
0.2
0.5
1.0
2.0
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
1.000/0.000
1.000/0.000
0.980/0.020/0.000
1.000/0.000
1.000/0.000
0.960/0.040/0.000
0.993/0.007
1.000/0.000
0.940/0.060/0.000
0.960/0.040
1.000/0.000
0.820/0.180/0.000
0.887/0.113
1.000/0.000
0.607/0.393/0.000
1.000/0.000
1.000/0.000
1.000/0.000
1.000/0.000
0.993/0.007
1.000/0.000
1.000/0.000
1.000/0.000
1.000/0.000
0.993/0.007
1.000/0.000/0.000
1.000/0.000/0.000
0.980/0.020/0.000
0.927/0.073/0.000
0.833/0.167/0.000
1.000/0.000
1.000/0.000
1.000/0.000
1.000/0.000
0.987/0.013
1.000/0.000
1.000/0.000
1.000/0.000
1.000/0.000
1.000/0.000
1.000/0.000/0.000
1.000/0.000/0.000
0.987/0.013/0.000
0.993/0.007/0.000
0.933/0.067/0.000
1.000/0.000
0.993/0.007
0.967/0.033
0.827/0.173
0.560/0.440
1.000/0.000
0.993/0.007
0.920/0.080
0.847/0.153
0.873/0.127
0.973/0.027/0.000
0.967/0.027/0.007
0.773/0.227/0.000
0.240/0.760/0.000
0.027/0.967/0.007
=0.1
1
0.5
0
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
=0.2
1
0.5
0
=0.5
1
0.5
0
=1
1
0.5
0
=2
1
0.5
0
236
Table 5.33 Iris-Setosa with possibilistic Gaussian fuzzication of Gaussian membership functions and additional Gaussian noise applied to all inputs
i
0.1
0.2
0.5
1.0
2.0
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
1.000/0.000
1.000/0.000
0.940/0.060/0.000
0.993/0.007
0.993/0.007
0.867/0.133/0.000
0.927/0.073
0.940/0.060
0.507/0.493/0.000
0.733/0.267
0.827/0.173
0.000/1.000/0.000
0.487/0.513
0.753/0.247
0.013/0.980/0.007
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
0.933/0.067
0.933/0.067
0.900/0.053/0.047
0.933/0.067
0.933/0.067
0.887/0.067/0.047
0.940/0.060
0.940/0.060
0.907/0.053/0.040
0.933/0.067
0.933/0.067
0.847/0.100/0.053
0.900/0.100
0.933/0.067
0.773/0.200/0.027
0.933/0.067
0.933/0.067
0.940/0.060
0.940/0.060
0.933/0.067
0.840/0.160
0.660/0.340
0.633/0.367
0.620/0.380
0.613/0.387
0.833/0.120/0.047
0.647/0.307/0.047
0.580/0.393/0.027
0.533/0.467/0.000
0.393/0.607/0.000
0.940/0.060
0.900/0.100
0.867/0.133
0.780/0.220
0.720/0.280
0.973/0.027
0.953/0.047
0.707/0.293
0.533/0.467
0.513/0.487
0.847/0.133/0.020
0.813/0.180/0.007
0.360/0.640/0.000
0.200/0.793/0.007
0.093/0.880/0.027
0.920/0.080
0.933/0.067
0.907/0.093
0.813/0.187
0.820/0.180
0.920/0.080
0.927/0.073
0.933/0.067
0.887/0.113
0.853/0.147
0.853/0.113/0.033
0.853/0.120/0.027
0.767/0.213/0.020
0.707/0.260/0.033
0.627/0.347/0.027
in the misclassication rate is especially evident for all inputs corrupted with
high values of i (Table 5.35), particularly, the misclassication rates for the
singleton system and the standard non-singleton system reach 0.38 and 0.62,
respectively, while for the interval system the rate is equal to 0 for i = 0.2,
i = 1, . . . , 4. As in the previous case, the number of correct classications of
237
=0.1
1
0.5
0
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
=0.2
1
0.5
0
=0.5
1
0.5
0
=1
1
0.5
0
=2
1
0.5
0
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
0.913/0.087
0.847/0.153
0.533/0.467/0.000
0.887/0.113
0.660/0.340
0.293/0.707/0.000
0.847/0.153
0.493/0.507
0.060/0.933/0.007
0.747/0.253
0.380/0.620
0.000/1.000/0.000
0.620/0.380
0.380/0.620
0.000/1.000/0.000
the interval system becomes 0 which is signicantly less than for the singleton
and standard non-singleton systems.
The classication ranks for the Iris-Virginica subproblem in the case
of Gaussian noise disturbance are summarized in Tables 5.36 and 5.37.
Exemplary interval fuzzy antecedents for the Iris-Virginica classication with
possibilistic fuzzication of the rst input are demonstrated in Fig. 5.19. In
the Iris-Virginica classication, the number of misclassications for each interval (possibilistic) fuzzy system is equal or close to zero. The dierence in
the misclassication rate is especially evident for all inputs corrupted with
high values of i (Table 5.37), particularly, the misclassication rates for the
singleton system and the standard non-singleton system reach 0.38 and 0.32,
respectively, while for the interval system the rate is equal to 0 for i = 0.2,
i = 1, . . . , 4. As in the previous case, the number of correct classications of
the interval system becomes even close to 0 which is signicantly less than
for the singleton and standard non-singleton systems.
238
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
0.967/0.033
0.967/0.033
0.967/0.000/0.033
0.967/0.033
0.967/0.033
0.967/0.000/0.033
0.967/0.033
0.960/0.040
0.940/0.033/0.027
0.960/0.040
0.820/0.180
0.760/0.240/0.000
0.927/0.073
0.707/0.293
0.560/0.440/0.000
0.960/0.040
0.967/0.033
0.953/0.047
0.940/0.060
0.847/0.153
0.960/0.040
0.947/0.053
0.693/0.307
0.700/0.300
0.707/0.293
0.913/0.080/0.007
0.793/0.207/0.000
0.573/0.427/0.000
0.513/0.487/0.000
0.327/0.673/0.000
0.967/0.033
0.953/0.047
0.920/0.080
0.907/0.093
0.773/0.227
0.973/0.027
0.953/0.047
0.933/0.067
0.900/0.100
0.867/0.133
0.840/0.133/0.027
0.853/0.107/0.040
0.753/0.220/0.027
0.673/0.307/0.020
0.520/0.467/0.013
0.960/0.040
0.973/0.027
0.900/0.100
0.840/0.160
0.660/0.340
0.960/0.040
0.973/0.027
0.907/0.093
0.873/0.127
0.800/0.200
0.940/0.047/0.013
0.907/0.087/0.007
0.727/0.227/0.047
0.393/0.573/0.033
0.133/0.867/0.000
=0.1
1
0.5
0
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
=0.2
1
0.5
0
=0.5
1
0.5
0
=1
1
0.5
0
=2
1
0.5
0
239
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
0.960/0.040
0.947/0.053
0.733/0.260/0.007
0.920/0.080
0.900/0.100
0.407/0.593/0.000
0.900/0.100
0.707/0.293
0.113/0.887/0.000
0.740/0.260
0.687/0.313
0.007/0.993/0.000
0.620/0.380
0.673/0.327
0.007/0.993/0.000
240
241
=0.2
1
0.5
0
10
10
10
10
10
=0.5
1
0.5
0
=1
1
0.5
0
=2
1
0.5
0
=5
1
0.5
0
Fig. 5.20 Generation of antecedents for Wisconsin Breast Cancer with possibilistic
Gaussian fuzzication of Gaussian membership functions and additional Gaussian
noise applied to single input X1 (original membership functions - solid and dotdashed lines, upper and lower membership functions - dashed and dotted lines)
Table 5.39 Nonlinear Dynamic Plant approximation with possibilistic Gaussian
fuzzication of Gaussian membership functions and additional Gaussian noise applied to single input Xi
1
0.1
0.2
0.3
0.4
0.5
0.6
0.7
2
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.0866
0.1151
0.1479
0.1862
0.2087
0.2482
0.2524
0.0990
0.1247
0.1414
0.1706
0.1868
0.2177
0.2296
=0.3
0.5
=0.4
0.5
=0.5
0.5
0.5
0.5
=0.1
=0.2
0.5
=0.6
1
0.5
=0.7
242
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
243
=0.1
1
0.5
=0.2
0
2
1
=0.3
=0.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
0.5
0
2
1
0.5
0
2
1
0.5
0
2
1
=0.7
1.5
0.5
0
2
Fig. 5.22 Generation of antecedents for Kinematics prediction with possibilistic Gaussian fuzzication of Gaussian membership functions and additional Gaussian noise applied to single input X1 (original membership functions - solid and
dot-dashed lines, upper and lower membership functions - dashed and dotted
lines)
5.5.3.2
244
Table 5.43 Iris-Setosa with possibilistic triangular fuzzication of triangular membership functions and additional triangular noise applied to single input Xi ,
i = 1, . . . , 4
1
0.2
0.5
1.0
2.0
5.0
2
0.2
0.5
1.0
2.0
5.0
3
0.2
0.5
1.0
2.0
5.0
4
0.2
0.5
1.0
2.0
5.0
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
0.993/0.007
0.993/0.007
0.993/0.000/0.007
0.984/0.007
0.993/0.007
0.990/0.003/0.007
0.971/0.003
0.993/0.007
0.980/0.013/0.007
0.893/0.010
0.993/0.007
0.927/0.063/0.009
0.583/0.015
0.993/0.007
0.702/0.287/0.011
0.989/0.007
0.984/0.007
0.942/0.020
0.752/0.044
0.415/0.029
0.995/0.005
0.999/0.001
1.000/0.000
1.000/0.000
1.000/0.000
0.990/0.005/0.005
0.990/0.009/0.001
0.953/0.047/0.000
0.780/0.220/0.000
0.489/0.511/0.000
0.991/0.007
0.987/0.006
0.943/0.005
0.883/0.005
0.701/0.027
0.993/0.007
0.993/0.007
0.993/0.007
0.992/0.008
0.987/0.013
0.993/0.000/0.007
0.990/0.003/0.007
0.952/0.041/0.007
0.903/0.090/0.007
0.762/0.230/0.008
0.993/0.006
0.983/0.005
0.912/0.004
0.760/0.028
0.403/0.047
0.993/0.007
0.993/0.007
0.993/0.007
0.993/0.007
0.993/0.007
0.993/0.000/0.007
0.991/0.003/0.007
0.901/0.093/0.007
0.767/0.206/0.027
0.469/0.501/0.029
Table 5.44 Iris-Setosa with possibilistic triangular fuzzication of triangular membership functions and additional triangular noise applied to all inputs Xi
i
0.2
0.5
1.0
2.0
5.0
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
0.984/0.006
0.993/0.007
0.989/0.005/0.007
0.945/0.005
0.971/0.029
0.816/0.181/0.003
0.813/0.016
0.879/0.121
0.675/0.318/0.007
0.461/0.059
0.727/0.273
0.319/0.651/0.031
0.072/0.026
0.669/0.331
0.045/0.937/0.018
245
=0.2
1
0.5
0
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
=0.5
1
0.5
0
=1
1
0.5
0
=2
1
0.5
0
=5
1
0.5
0
246
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
0.958/0.041
0.960/0.040
0.959/0.000/0.041
0.949/0.041
0.960/0.040
0.955/0.004/0.041
0.928/0.040
0.960/0.040
0.939/0.027/0.034
0.851/0.043
0.963/0.037
0.875/0.103/0.021
0.535/0.041
0.963/0.037
0.683/0.305/0.012
0.959/0.040
0.955/0.044
0.922/0.041
0.749/0.053
0.381/0.037
0.960/0.040
0.958/0.042
0.957/0.043
0.962/0.038
0.953/0.047
0.960/0.001/0.039
0.951/0.019/0.030
0.920/0.051/0.029
0.803/0.179/0.019
0.629/0.362/0.009
0.957/0.040
0.952/0.040
0.915/0.043
0.843/0.048
0.640/0.073
0.960/0.040
0.959/0.041
0.957/0.043
0.955/0.045
0.954/0.046
0.960/0.000/0.040
0.956/0.004/0.040
0.939/0.021/0.040
0.906/0.062/0.032
0.725/0.258/0.017
0.954/0.041
0.909/0.069
0.781/0.121
0.567/0.209
0.338/0.116
0.953/0.047
0.926/0.074
0.896/0.104
0.851/0.149
0.843/0.157
0.939/0.028/0.033
0.881/0.080/0.039
0.726/0.221/0.053
0.455/0.489/0.057
0.235/0.753/0.013
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
0.950/0.045
0.951/0.049
0.906/0.071/0.023
0.889/0.075
0.881/0.119
0.700/0.281/0.019
0.695/0.145
0.713/0.287
0.301/0.671/0.028
0.329/0.189
0.571/0.429
0.075/0.893/0.032
0.051/0.029
0.460/0.540
0.010/0.985/0.005
247
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
0.973/0.021
0.978/0.021
0.978/0.002/0.020
0.958/0.022
0.979/0.021
0.969/0.013/0.018
0.931/0.025
0.979/0.021
0.960/0.023/0.017
0.841/0.038
0.979/0.021
0.905/0.077/0.017
0.511/0.048
0.980/0.020
0.700/0.288/0.012
0.971/0.019
0.951/0.030
0.917/0.041
0.746/0.068
0.389/0.035
0.970/0.023
0.968/0.025
0.967/0.027
0.967/0.027
0.967/0.027
0.969/0.013/0.018
0.957/0.023/0.020
0.931/0.050/0.019
0.812/0.169/0.019
0.592/0.396/0.012
0.962/0.025
0.956/0.023
0.905/0.033
0.805/0.068
0.593/0.091
0.969/0.025
0.965/0.029
0.965/0.029
0.962/0.031
0.957/0.036
0.963/0.019/0.019
0.963/0.019/0.018
0.948/0.031/0.021
0.905/0.055/0.040
0.773/0.181/0.046
0.932/0.031
0.854/0.053
0.769/0.099
0.665/0.153
0.428/0.187
0.957/0.043
0.942/0.058
0.933/0.067
0.930/0.070
0.912/0.088
0.949/0.031/0.021
0.925/0.041/0.033
0.868/0.081/0.051
0.785/0.131/0.083
0.627/0.235/0.138
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
0.918/0.029
0.951/0.049
0.937/0.049/0.015
0.830/0.053
0.907/0.093
0.853/0.124/0.023
0.687/0.099
0.860/0.140
0.590/0.362/0.048
0.379/0.139
0.787/0.213
0.307/0.605/0.088
0.063/0.045
0.695/0.305
0.055/0.909/0.036
248
249
Singleton
Non-singleton
Interval (possibilistic)
Class./Misclass. Class./Misclass. Class./NoClass./Misclass.
0.888/0.028
0.977/0.023
0.875/0.112/0.013
0.802/0.031
0.972/0.028
0.661/0.327/0.011
0.551/0.044
0.968/0.032
0.405/0.572/0.023
0.330/0.039
0.930/0.070
0.232/0.750/0.018
0.150/0.030
0.761/0.239
0.094/0.892/0.014
=0.5
1
0.5
0
10
10
10
10
10
=1
1
0.5
0
=2
1
0.5
0
=3
1
0.5
0
=5
1
0.5
0
Fig. 5.24 Generation of antecedents for Wisconsin Breast Cancer with possibilistic
triangular fuzzication of triangular membership functions and additional triangular noise applied to single input X1 (original membership functions - solid and
dot-dashed lines, upper and lower membership functions - dashed and dotted lines)
The errors for interval fuzzy logic systems obtained via the triangular
possibilistic fuzzication of triangular membership functions in the Nonlinear
Dynamic Plant approximation are compared with the classical fuzzy logic
systems in Tables 5.51 and 5.52. In the case of X1 fuzzied, the interval fuzzy
logic systems outperform non-singleton systems, while the standard singleton
system performs slightly better than the interval systems. In the case of X2
fuzzied, the interval fuzzy system outperforms both the non-singleton and
singleton fuzzy logic systems, which is also the case of both inputs fuzzied
for high values of i , i = 1, 2.
250
0.0836
0.0980
0.1138
0.1318
0.1463
0.1663
0.1841
0.0811
0.0877
0.0969
0.1068
0.1163
0.1293
0.1415
=0.3
0.5
=0.4
0.5
=0.5
0.5
=0.6
0.5
0.5
=0.1
=0.2
0.5
=0.7
1
0.5
251
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
systems, if do not have the best performance, are always close to the better of
singleton and non-singleton systems. Exemplary interval fuzzy antecedents
for the Kinematics prediction with triangular possibilistic fuzzication of the
rst input with triangular membership functions are demonstrated in Fig.
5.26.
=0.1
1
0.5
=0.2
0
2
1
=0.5
0
2
1
=0.7
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
0.5
0
2
1
0.5
0
2
1
=1
1.5
0.5
0.5
0
2
Fig. 5.26 Generation of antecedents for Kinematics predictions with possibilistic triangular fuzzication of triangular membership functions and additional triangular noise applied to single input X1 (original membership functions - solid
and dot-dashed lines, upper and lower membership functions - dashed and dotted
lines)
252
5.5.3.3
0.0972
0.0975
0.0989
0.0998
0.1011
0.0972
0.0973
0.0983
0.0998
0.1051
0.0975
0.0985
0.1054
0.1132
0.1257
0.0980
0.1007
0.1131
0.1219
0.1333
0.0975
0.0988
0.1060
0.1126
0.1225
0.0973
0.0978
0.1023
0.1079
0.1228
0.0977
0.0991
0.1063
0.1114
0.1188
0.0974
0.0981
0.1024
0.1058
0.1130
253
0.0984
0.1017
0.1163
0.1263
0.1385
0.0976
0.0990
0.1073
0.1144
0.1253
0.0975
0.0987
0.1075
0.1184
0.1404
0.0985
0.1020
0.1159
0.1251
0.1362
0.0976
0.0992
0.1066
0.1132
0.1242
0.0975
0.0983
0.1061
0.1139
0.1336
0.0982
0.1000
0.1057
0.1093
0.1140
0.0976
0.0985
0.1023
0.1052
0.1119
254
Table 5.56 Iris-Setosa with triangular type-2 fuzzy (fuzzy-rough) sets induced by
triangular fuzzication of triangular membership functions and additional triangular noise applied to single input Xi , i = 1, . . . , 4
1
0.2
0.5
1.0
2.0
5.0
2
0.2
0.5
1.0
2.0
5.0
3
0.2
0.5
1.0
2.0
5.0
4
0.2
0.5
1.0
2.0
5.0
Singleton
Interval (rough fuzzy)
Triangular
Class./Misclass. Class./NoClass./Misclass. Class./Suggest./Confus./Misclass.
0.992/0.007
0.992/0.001/0.007
0.992/0.001/0.000/0.007
0.981/0.007
0.947/0.046/0.007
0.947/0.045/0.001/0.007
0.972/0.006
0.742/0.251/0.007
0.742/0.245/0.006/0.007
0.907/0.011
0.311/0.678/0.011
0.311/0.645/0.033/0.011
0.587/0.018
0.305/0.682/0.013
0.305/0.567/0.115/0.013
0.991/0.007
0.984/0.006
0.954/0.009
0.751/0.035
0.413/0.023
0.983/0.012/0.005
0.902/0.097/0.001
0.337/0.663/0.000
0.297/0.703/0.000
0.233/0.767/0.000
0.983/0.009/0.003/0.005
0.902/0.087/0.009/0.001
0.337/0.644/0.019/0.000
0.297/0.607/0.097/0.000
0.233/0.579/0.188/0.000
0.989/0.007
0.987/0.007
0.947/0.004
0.883/0.005
0.705/0.023
0.989/0.004/0.007
0.879/0.114/0.007
0.719/0.274/0.007
0.443/0.551/0.007
0.295/0.695/0.010
0.989/0.003/0.001/0.007
0.879/0.111/0.003/0.007
0.719/0.238/0.036/0.007
0.443/0.480/0.071/0.007
0.295/0.573/0.121/0.010
0.993/0.007
0.977/0.005
0.909/0.005
0.773/0.023
0.399/0.053
0.989/0.004/0.007
0.765/0.229/0.007
0.379/0.615/0.007
0.283/0.697/0.020
0.215/0.756/0.029
0.989/0.004/0.000/0.007
0.765/0.221/0.007/0.007
0.379/0.570/0.045/0.007
0.283/0.606/0.091/0.020
0.215/0.549/0.207/0.029
Table 5.57 Iris-Setosa with triangular type-2 fuzzy (fuzzy-rough) sets induced by
triangular fuzzication of triangular membership functions and additional triangular noise applied to all inputs
i
0.2
0.5
1.0
2.0
5.0
Singleton
Interval (rough fuzzy)
Triangular
Class./Misclass. Class./NoClass./Misclass. Class./Suggest./Confus./Misclass.
0.984/0.008
0.852/0.142/0.006
0.852/0.139/0.003/0.006
0.958/0.004
0.373/0.623/0.004
0.373/0.605/0.019/0.004
0.779/0.030
0.318/0.673/0.009
0.318/0.543/0.130/0.009
0.448/0.068
0.193/0.777/0.029
0.193/0.515/0.262/0.029
0.065/0.029
0.031/0.952/0.017
0.031/0.630/0.322/0.017
The same can not be held in relation to the singleton and non-singleton systems. Exemplary triangular fuzzy antecedents for the Iris-Setosa classication
with triangular fuzzy-rough fuzzication of the rst input with triangular
membership functions are demonstrated in Fig. 5.27. It can be noticed that
255
upper and lower membership functions (dashed lines) form a much larger
area, called also a footprint, of uncertainty than it is formed by the possibilistic (or fuzzy rough approach in the sense of Dubois and Prade).
=0.2
1
0.5
0
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
=0.5
1
0.5
0
=1
1
0.5
0
=2
1
0.5
0
=5
1
0.5
0
Fig. 5.27 Generation of antecedents for Iris-Setosa with triangular type-2 fuzzy
(fuzzy-rough) sets induced by triangular fuzzication of triangular membership
functions and additional triangular noise applied to single input X1 (original membership functions - solid and dot-dashed lines, upper and lower membership functions - dashed and dotted lines)
Classication rates for the triangular fuzzy-rough fuzzication of a triangular fuzzy logic system in the Iris-Setosa classication problem are collected
in Tables 5.58 and 5.59. Comparing Tables 5.58 and 5.59 with 5.45 and 5.46,
respectively, we can observe that the number of misclassications for the
triangular-valued fuzzy systems created with fuzzy-rough sets of Nakamura
is never greater than the misclassication rate of the interval possibilistic
fuzzy systems. Noteworthy is also the fact that the number of correct suggestions is much higher than the confusion rate, while the singleton fuzzy system
has inactive rules and all interval systems can not perform any classication.
Exemplary triangular fuzzy antecedents for the Iris-Versicolor classication with triangular fuzzy-rough fuzzication of the rst input with triangular
membership functions are demonstrated in Fig. 5.28.
Classication rates for the triangular fuzzy-rough fuzzication of a triangular fuzzy logic system in the Iris-Setosa classication problem are collected
in Tables 5.60 and 5.61.
Exemplary triangular fuzzy antecedents for the Iris-Virginica classication
with triangular fuzzy-rough fuzzication of the rst input with triangular
membership functions are demonstrated in Fig. 5.29.
The results for triangular fuzzy-rough fuzzication of a triangular fuzzy
logic system in the Wisconsin Breast Cancer classication problem are
256
Table 5.58 Iris-Versicolor with triangular type-2 fuzzy (fuzzy-rough) sets induced
by triangular fuzzication of triangular membership functions and additional triangular noise applied to single input X1
1
0.2
0.5
1.0
2.0
5.0
2
0.2
0.5
1.0
2.0
5.0
3
0.2
0.5
1.0
2.0
5.0
4
0.2
0.5
1.0
2.0
5.0
Singleton
Interval (rough fuzzy)
Triangular
Class./Misclass. Class./NoClass./Misclass. Class./Suggest./Confus./Misclass.
0.958/0.042
0.947/0.021/0.031
0.947/0.011/0.011/0.031
0.951/0.041
0.846/0.153/0.001
0.846/0.113/0.039/0.001
0.923/0.044
0.576/0.421/0.003
0.576/0.379/0.042/0.003
0.853/0.046
0.469/0.528/0.003
0.469/0.465/0.063/0.003
0.552/0.032
0.475/0.520/0.005
0.475/0.371/0.149/0.005
0.958/0.040
0.957/0.039
0.920/0.043
0.755/0.053
0.378/0.038
0.928/0.059/0.013
0.686/0.313/0.001
0.483/0.512/0.005
0.479/0.511/0.009
0.479/0.517/0.003
0.928/0.032/0.027/0.013
0.686/0.275/0.039/0.001
0.483/0.466/0.046/0.005
0.479/0.417/0.095/0.009
0.479/0.305/0.212/0.003
0.959/0.040
0.955/0.040
0.922/0.039
0.841/0.051
0.631/0.093
0.953/0.008/0.039
0.910/0.067/0.023
0.771/0.227/0.003
0.467/0.533/0.000
0.436/0.563/0.001
0.953/0.007/0.001/0.039
0.910/0.050/0.017/0.023
0.771/0.190/0.037/0.003
0.467/0.482/0.051/0.000
0.436/0.407/0.157/0.001
0.951/0.045
0.917/0.065
0.791/0.123
0.564/0.208
0.359/0.101
0.844/0.152/0.004
0.513/0.485/0.001
0.275/0.725/0.000
0.165/0.835/0.000
0.115/0.885/0.000
0.844/0.111/0.041/0.004
0.513/0.422/0.063/0.001
0.275/0.602/0.123/0.000
0.165/0.585/0.249/0.000
0.115/0.601/0.283/0.000
Table 5.59 Iris-Versicolor with triangular type-2 fuzzy (fuzzy-rough) sets induced
by triangular fuzzication of triangular membership functions and additional triangular noise applied to all inputs
i
0.2
0.5
1.0
2.0
5.0
Singleton
Interval (rough fuzzy)
Triangular
Class./Misclass. Class./NoClass./Misclass. Class./Suggest./Confus./Misclass.
0.952/0.043
0.591/0.409/0.001
0.591/0.367/0.042/0.001
0.889/0.070
0.389/0.607/0.005
0.389/0.541/0.066/0.005
0.709/0.134
0.119/0.877/0.004
0.119/0.740/0.137/0.004
0.351/0.188
0.040/0.950/0.010
0.040/0.653/0.275/0.010
0.041/0.041
0.003/0.995/0.003
0.003/0.640/0.334/0.003
257
Table 5.60 Iris-Virginica with triangular type-2 fuzzy (fuzzy-rough) sets induced
by triangular fuzzication of triangular membership functions and additional triangular noise applied to single input X1
1
0.2
0.5
1.0
2.0
5.0
2
0.2
0.5
1.0
2.0
5.0
3
0.2
0.5
1.0
2.0
5.0
4
0.2
0.5
1.0
2.0
5.0
Singleton
Interval (rough fuzzy)
Triangular
Class./Misclass. Class./NoClass./Misclass. Class./Suggest./Confus./Misclass.
0.973/0.019
0.958/0.028/0.014
0.958/0.021/0.006/0.014
0.963/0.019
0.897/0.098/0.005
0.897/0.079/0.019/0.005
0.929/0.025
0.702/0.292/0.006
0.702/0.263/0.029/0.006
0.829/0.041
0.503/0.495/0.002
0.503/0.425/0.070/0.002
0.506/0.039
0.478/0.514/0.008
0.478/0.389/0.125/0.008
0.968/0.023
0.949/0.031
0.909/0.046
0.733/0.075
0.392/0.045
0.932/0.056/0.012
0.828/0.164/0.008
0.541/0.450/0.009
0.485/0.506/0.009
0.443/0.547/0.010
0.932/0.039/0.011/0.012
0.828/0.135/0.023/0.008
0.541/0.401/0.042/0.009
0.485/0.385/0.115/0.009
0.443/0.325/0.216/0.010
0.968/0.021
0.959/0.025
0.891/0.043
0.805/0.065
0.596/0.105
0.952/0.038/0.010
0.893/0.101/0.007
0.736/0.251/0.013
0.490/0.486/0.024
0.479/0.478/0.043
0.952/0.020/0.011/0.010
0.893/0.075/0.019/0.007
0.736/0.213/0.032/0.013
0.490/0.420/0.059/0.024
0.479/0.350/0.121/0.043
0.921/0.032
0.859/0.050
0.767/0.097
0.667/0.149
0.447/0.180
0.905/0.089/0.007
0.710/0.281/0.009
0.551/0.421/0.028
0.526/0.419/0.055
0.541/0.337/0.122
0.905/0.062/0.026/0.007
0.710/0.237/0.044/0.009
0.551/0.347/0.075/0.028
0.526/0.321/0.099/0.055
0.541/0.227/0.110/0.122
Table 5.61 Iris-Virginica with triangular type-2 fuzzy (fuzzy-rough) sets induced
by triangular fuzzication of triangular membership functions and additional triangular noise applied to all inputs
i
0.2
0.5
1.0
2.0
5.0
Singleton
Interval (rough fuzzy)
Triangular
Class./Misclass. Class./NoClass./Misclass. Class./Suggest./Confus./Misclass.
0.919/0.029
0.808/0.185/0.007
0.808/0.161/0.025/0.007
0.822/0.063
0.461/0.531/0.009
0.461/0.467/0.064/0.009
0.669/0.115
0.395/0.571/0.033
0.395/0.456/0.115/0.033
0.403/0.145
0.268/0.649/0.083
0.268/0.478/0.171/0.083
0.057/0.043
0.051/0.917/0.032
0.051/0.610/0.307/0.032
258
=0.2
1
0.5
0
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
=0.5
1
0.5
0
=1
1
0.5
0
=2
1
0.5
0
=5
1
0.5
0
Fig. 5.28 Generation of antecedents for Iris-Versicolor with triangular type-2 fuzzy
(fuzzy-rough) sets induced by triangular fuzzication of triangular membership
functions and additional triangular noise applied to single input X1 (original membership functions - solid and dot-dashed lines, upper and lower membership functions - dashed and dotted lines)
=0.2
1
0.5
0
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
4.5
5.5
6.5
7.5
=0.5
1
0.5
0
=1
1
0.5
0
=2
1
0.5
0
=5
1
0.5
0
Fig. 5.29 Generation of antecedents for Iris-Virginica with triangular type-2 fuzzy
(fuzzy-rough) sets induced by triangular fuzzication of triangular membership
functions and additional triangular noise applied to single input X1 (original membership functions - solid and dot-dashed lines, upper and lower membership functions - dashed and dotted lines)
259
Table 5.62 Wisconsin Breast Cancer with triangular type-2 fuzzy (fuzzy-rough)
sets induced by triangular fuzzication of triangular membership functions and
additional triangular noise applied to single input X1
Singleton
Interval (rough fuzzy)
Triangular
Class./Misclass. Class./NoClass./Misclass. Class./Suggest./Confus./Misclass.
2.0 0.955/0.023
0.916/0.073/0.011
0.916/0.060/0.012/0.011
3.0 0.918/0.024
0.857/0.134/0.009
0.857/0.118/0.016/0.009
5.0 0.847/0.030
0.788/0.200/0.012
0.788/0.173/0.027/0.012
2
2.0 0.757/0.022
0.448/0.542/0.010
0.448/0.528/0.015/0.010
3.0 0.728/0.023
0.378/0.616/0.006
0.378/0.595/0.021/0.006
5.0 0.664/0.022
0.326/0.667/0.006
0.326/0.642/0.026/0.006
3
2.0 0.942/0.021
0.898/0.092/0.010
0.898/0.080/0.011/0.010
3.0 0.871/0.020
0.850/0.142/0.008
0.850/0.129/0.013/0.008
5.0 0.793/0.020
0.802/0.193/0.005
0.802/0.175/0.018/0.005
4
2.0 0.953/0.022
0.889/0.101/0.010
0.889/0.089/0.012/0.010
3.0 0.886/0.023
0.849/0.144/0.008
0.849/0.127/0.017/0.008
5.0 0.800/0.021
0.806/0.189/0.004
0.806/0.168/0.021/0.004
5
2.0 0.969/0.020
0.895/0.095/0.011
0.895/0.085/0.010/0.011
3.0 0.924/0.027
0.851/0.133/0.016
0.851/0.121/0.012/0.016
5.0 0.840/0.033
0.798/0.180/0.021
0.798/0.167/0.014/0.021
6
2.0 0.924/0.024
0.815/0.176/0.008
0.815/0.158/0.018/0.008
3.0 0.839/0.023
0.626/0.367/0.006
0.626/0.339/0.028/0.006
5.0 0.738/0.025
0.455/0.542/0.003
0.455/0.498/0.044/0.003
7
2.0 0.958/0.020
0.885/0.106/0.009
0.885/0.094/0.011/0.009
3.0 0.918/0.020
0.843/0.151/0.006
0.843/0.136/0.015/0.006
5.0 0.834/0.021
0.795/0.200/0.006
0.795/0.180/0.019/0.006
8
2.0 0.890/0.027
0.836/0.147/0.017
0.836/0.135/0.012/0.017
3.0 0.814/0.030
0.810/0.172/0.018
0.810/0.155/0.017/0.018
5.0 0.732/0.028
0.780/0.206/0.014
0.780/0.182/0.024/0.014
9
2.0 0.924/0.024
0.859/0.135/0.006
0.859/0.114/0.021/0.006
3.0 0.848/0.023
0.832/0.163/0.005
0.832/0.140/0.024/0.005
5.0 0.743/0.022
0.808/0.187/0.005
0.808/0.159/0.028/0.005
260
Table 5.63 Wisconsin Breast Cancer with triangular type-2 fuzzy (fuzzy-rough)
sets induced by triangular fuzzication of triangular membership functions and
additional triangular noise applied to all inputs
Singleton
Interval (rough fuzzy)
Triangular
Class./Misclass. Class./NoClass./Misclass. Class./Suggest./Confus./Misclass.
2.0 0.545/0.042
0.371/0.611/0.018
0.371/0.536/0.075/0.018
3.0 0.327/0.040
0.174/0.809/0.017
0.174/0.655/0.154/0.017
5.0 0.144/0.031
0.078/0.907/0.015
0.078/0.658/0.249/0.015
i
=0.5
1
0.5
0
10
10
10
10
10
=1
1
0.5
0
=2
1
0.5
0
=3
1
0.5
0
=5
1
0.5
0
Fig. 5.30 Generation of antecedents for Wisconsin Breast Cancer with triangular type-2 fuzzy (fuzzy-rough) sets induced by triangular fuzzication of triangular
membership functions and additional triangular noise applied to single input X1
(original membership functions - solid and dot-dashed lines, upper and lower membership functions - dashed and dotted lines)
261
Table 5.64 Nonlinear Dynamic Plant approximation with triangular type-2 fuzzy
(fuzzy-rough) sets induced by triangular fuzzication of triangular membership
functions and additional triangular noise applied to single input X1
1
0.1
0.2
0.3
0.4
0.5
0.6
0.7
2
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8194
0.8704
0.9522
1.0647
1.1776
1.3487
1.4989
0.8205
0.8726
0.9525
1.0520
1.1446
1.2788
1.3920
Table 5.65 Nonlinear Dynamic Plant approximation with triangular type-2 fuzzy
(fuzzy-rough) sets induced by triangular fuzzication of triangular membership
functions and additional triangular noise applied to all inputs
i
0.1
0.2
0.3
0.4
0.5
0.6
0.7
The errors for triangular-valued fuzzy logic systems obtained via the triangular fuzzy-rough fuzzication of triangular membership functions in the
Kinematics approximation are compared with the basic fuzzy logic system
in Tables 5.665.68. Although triangular-valued fuzzy systems have slightly
less performance than singleton systems for single inputs disturbed, their
performance is still much better than the one of interval fuzzy systems.
=0.3
0.5
=0.4
0.5
=0.5
0.5
0.5
0.5
=0.1
=0.2
0.5
=0.6
1
0.5
=0.7
262
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1
0
2.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
Nevertheless, the fuzzy-rough set approach to triangular fuzzication outperforms all systems when disturbance of all inputs follows the triangular
distribution.
Exemplary triangular fuzzy antecedents for the Kinematics prediction with
triangular fuzzy-rough fuzzication of the rst input with triangular membership functions are demonstrated in Fig. 5.32.
5.5.3.4
263
Table 5.66 Kinematics predictions with triangular type-2 fuzzy (fuzzy-rough) sets
induced by triangular fuzzication of triangular membership functions and additional triangular noise applied to single input X1
1
0.1
0.2
0.5
0.7
1.0
2
0.1
0.2
0.5
0.7
1.0
3
0.1
0.2
0.5
0.7
1.0
4
0.1
0.2
0.5
0.7
1.0
0.0972
0.0977
0.1130
0.1328
0.1682
0.0972
0.0975
0.1057
0.1159
0.1396
0.0975
0.0987
0.1055
0.1119
0.1253
0.0974
0.0988
0.1102
0.1265
0.1615
0.0974
0.0986
0.1064
0.1162
0.1378
0.0973
0.0978
0.1025
0.1089
0.1218
0.0974
0.0983
0.1115
0.1264
0.1597
0.0973
0.0980
0.1061
0.1151
0.1350
The errors for Gaussian-valued fuzzy logic systems obtained via the Gaussian fuzzy-rough fuzzication of triangular membership functions in the Nonlinear Dynamic Plant approximation are compared with the basic fuzzy logic
systems in Tables 5.77 and 5.78. In this case of approximation, the Gaussianfuzzy-rough fuzzy systems outperform the singleton ones.
The errors for Gaussian-valued fuzzy logic systems obtained via the Gaussian fuzzy-rough fuzzication of triangular membership functions in the Kinematics prediction are compared with the basic fuzzy logic systems in Tables
5.79 and 5.80. The Gaussian-fuzzy-rough fuzzy systems slightly outperform
the singleton systems in cases of single inputs fuzzied. When all inputs are
subject to Gaussian fuzzication, the dierence in eciency is even more
evident.
264
Table 5.67 Kinematics predictions with triangular type-2 fuzzy (fuzzy-rough) sets
induced by triangular fuzzication of triangular membership functions and additional triangular noise applied to single input X5
5
0.1
0.2
0.5
0.7
1.0
6
0.1
0.2
0.5
0.7
1.0
7
0.1
0.2
0.5
0.7
1.0
8
0.1
0.2
0.5
0.7
1.0
0.0973
0.0993
0.1190
0.1414
0.1780
0.0973
0.0986
0.1110
0.1254
0.1508
0.0975
0.0985
0.1073
0.1191
0.1395
0.0974
0.0991
0.1163
0.1414
0.1772
0.0974
0.0986
0.1095
0.1249
0.1498
0.0974
0.0984
0.1068
0.1154
0.1327
0.0976
0.0992
0.1142
0.1300
0.1631
0.0975
0.0985
0.1079
0.1176
0.1391
Table 5.68 Kinematics predictions with triangular type-2 fuzzy (fuzzy-rough) sets
induced by triangular fuzzication of triangular membership functions and additional triangular noise applied to all inputs
i
0.1
0.2
0.5
0.7
1.0
265
Table 5.69 Iris-Setosa with Gaussian type-2 fuzzy (fuzzy rough) sets induced by
Gaussian fuzzication of triangular membership functions and addional Gaussian
noise applied to single input Xi
1
0.1
0.2
0.5
1.0
2.0
2
0.1
0.2
0.5
1.0
2.0
3
0.1
0.2
0.5
1.0
2.0
4
0.1
0.2
0.5
1.0
2.0
Singleton
Class./Misclass.
0.989/0.007
0.984/0.007
0.957/0.003
0.835/0.019
0.603/0.018
Gaussian
Class./Misclass.
0.989/0.007
0.988/0.007
0.971/0.007
0.887/0.021
0.723/0.020
0.989/0.007
0.984/0.007
0.922/0.017
0.703/0.043
0.440/0.032
0.989/0.007
0.986/0.007
0.933/0.017
0.753/0.043
0.541/0.032
0.991/0.007
0.981/0.007
0.932/0.005
0.848/0.009
0.711/0.023
0.993/0.007
0.987/0.007
0.947/0.007
0.877/0.011
0.783/0.025
0.993/0.006
0.977/0.006
0.878/0.007
0.695/0.034
0.415/0.062
0.993/0.007
0.977/0.007
0.885/0.009
0.732/0.037
0.507/0.067
Table 5.70 Iris-Setosa with Gaussian type-2 fuzzy (fuzzy-rough) sets induced by
Gaussian fuzzication of triangular membership functions and additional Gaussian
noise applied to all inputs
i
0.1
0.2
0.5
1.0
2.0
Singleton
Class./Misclass.
0.983/0.007
0.959/0.005
0.730/0.023
0.361/0.066
0.078/0.032
Gaussian
Class./Misclass.
0.985/0.007
0.969/0.006
0.771/0.028
0.455/0.093
0.164/0.073
266
Table 5.71 Iris-Versicolor with Gaussian type-2 fuzzy (fuzzy rough) sets induced
by Gaussian fuzzication of triangular membership functions and addional Gaussian
noise applied to single input Xi
1
0.1
0.2
0.5
1.0
2.0
2
0.1
0.2
0.5
1.0
2.0
3
0.1
0.2
0.5
1.0
2.0
4
0.1
0.2
0.5
1.0
2.0
Singleton
Class./Misclass.
0.958/0.041
0.951/0.041
0.911/0.046
0.797/0.048
0.601/0.037
Gaussian
Class./Misclass.
0.959/0.041
0.957/0.041
0.945/0.045
0.888/0.047
0.781/0.035
0.961/0.039
0.950/0.041
0.893/0.045
0.678/0.059
0.415/0.040
0.961/0.039
0.958/0.040
0.933/0.045
0.827/0.061
0.686/0.040
0.958/0.040
0.954/0.040
0.903/0.043
0.803/0.060
0.646/0.087
0.960/0.040
0.960/0.040
0.949/0.042
0.909/0.060
0.788/0.087
0.950/0.047
0.922/0.061
0.745/0.147
0.526/0.187
0.364/0.135
0.950/0.047
0.923/0.061
0.751/0.144
0.533/0.187
0.371/0.137
Table 5.72 Iris-Versicolor with Gaussian type-2 fuzzy (fuzzy-rough) sets induced
by Gaussian fuzzication of triangular membership functions and additional Gaussian noise applied to all inputs
i
0.1
0.2
0.5
1.0
2.0
Singleton
Class./Misclass.
0.947/0.044
0.898/0.063
0.598/0.174
0.240/0.165
0.060/0.049
Gaussian
Class./Misclass.
0.950/0.044
0.913/0.064
0.643/0.183
0.323/0.203
0.129/0.087
267
Table 5.73 Iris-Virginica with Gaussian type-2 fuzzy (fuzzy rough) sets induced by
Gaussian fuzzication of triangular membership functions and addional Gaussian
noise applied to single input Xi
1
0.1
0.2
0.5
1.0
2.0
2
0.1
0.2
0.5
1.0
2.0
3
0.1
0.2
0.5
1.0
2.0
4
0.1
0.2
0.5
1.0
2.0
Singleton
Class./Misclass.
0.971/0.021
0.968/0.019
0.911/0.027
0.797/0.040
0.560/0.047
Gaussian
Class./Misclass.
0.977/0.021
0.978/0.019
0.959/0.028
0.893/0.041
0.745/0.048
0.964/0.025
0.959/0.027
0.875/0.052
0.663/0.058
0.413/0.047
0.969/0.025
0.967/0.027
0.915/0.052
0.779/0.061
0.617/0.051
0.967/0.024
0.950/0.029
0.906/0.039
0.777/0.076
0.625/0.089
0.969/0.024
0.962/0.030
0.949/0.039
0.889/0.076
0.800/0.094
0.919/0.033
0.859/0.048
0.753/0.107
0.613/0.174
0.443/0.195
0.965/0.033
0.946/0.049
0.876/0.108
0.761/0.179
0.645/0.200
Table 5.74 Iris-Virginica with Gaussian type-2 fuzzy (fuzzy-rough) sets induced
by Gaussian fuzzication of triangular membership functions and additional Gaussian noise applied to all inputs
i
0.1
0.2
0.5
1.0
2.0
Singleton
Class./Misclass.
0.915/0.031
0.832/0.057
0.614/0.126
0.289/0.127
0.071/0.049
Gaussian
Class./Misclass.
0.961/0.031
0.917/0.057
0.754/0.128
0.467/0.170
0.222/0.140
268
Table 5.75 Wisconsin Breast Cancer with Gaussian type-2 fuzzy (fuzzy rough)
sets induced by Gaussian fuzzication of triangular membership functions and addional Gaussian noise applied to single input Xi
Singleton
Class./Misclass.
1.0 0.938/0.023
2.0 0.849/0.028
3.0 0.758/0.032
2
1.0 0.737/0.023
2.0 0.679/0.022
3.0 0.622/0.019
3
1.0 0.925/0.019
2.0 0.808/0.020
3.0 0.723/0.019
4
1.0 0.929/0.022
2.0 0.813/0.023
3.0 0.732/0.023
5
1.0 0.948/0.025
2.0 0.848/0.036
3.0 0.777/0.035
6
1.0 0.891/0.025
2.0 0.757/0.027
3.0 0.682/0.029
7
1.0 0.937/0.020
2.0 0.849/0.020
3.0 0.766/0.022
8
1.0 0.856/0.030
2.0 0.744/0.028
3.0 0.673/0.027
9
1.0 0.899/0.023
2.0 0.750/0.020
3.0 0.687/0.018
1
Gaussian
Class./Misclass.
0.971/0.023
0.949/0.029
0.928/0.033
0.750/0.023
0.710/0.023
0.681/0.021
0.975/0.020
0.954/0.021
0.935/0.020
0.968/0.023
0.945/0.023
0.926/0.024
0.974/0.025
0.955/0.036
0.940/0.035
0.903/0.025
0.791/0.027
0.733/0.029
0.971/0.020
0.950/0.020
0.935/0.022
0.957/0.030
0.936/0.029
0.917/0.028
0.965/0.023
0.933/0.021
0.922/0.019
269
Table 5.76 Wisconsin Breast Cancer with Gaussian type-2 fuzzy (fuzzy-rough)
sets induced by Gaussian fuzzication of triangular membership functions and additional Gaussian noise applied to all inputs
Singleton
Class./Misclass.
1.0 0.455/0.041
2.0 0.170/0.029
3.0 0.067/0.018
i
Gaussian
Class./Misclass.
0.619/0.063
0.304/0.065
0.161/0.050
Table 5.77 Nonlinear Dynamic Plant approximation with Gaussian type-2 fuzzy
(fuzzy-rough) sets induced by Gaussian fuzzication of triangular membership functions and additional Gaussian noise applied to single input X1
1
0.05
0.1
0.2
0.3
0.4
0.5
2
0.05
0.1
0.2
0.3
0.4
0.5
Singleton
RMSE
0.0826
0.0879
0.1082
0.1434
0.1718
0.2090
Gaussian
RMSE
0.0803
0.0828
0.1022
0.1388
0.1701
0.2050
0.0831
0.0957
0.1312
0.1707
0.2051
0.2437
0.0810
0.0912
0.1229
0.1589
0.1907
0.2251
Table 5.78 Nonlinear Dynamic Plant approximation with Gaussian type-2 fuzzy
(fuzzy-rough) sets induced by Gaussian fuzzication of triangular membership functions and additional Gaussian noise applied to all inputs
i
0.05
0.1
0.2
0.3
0.4
0.5
Singleton
RMSE
0.0852
0.1023
0.1524
0.2017
0.2559
0.3116
Gaussian
RMSE
0.0817
0.0964
0.1444
0.1914
0.2416
0.2962
270
Table 5.79 Kinematics approximation with Gaussian type-2 fuzzy (fuzzy rough)
sets induced by Gaussian fuzzication of triangular membership functions and addional Gaussian noise applied to single input Xi
1
0.1
0.2
0.3
0.5
2
0.1
0.2
0.3
0.5
3
0.1
0.2
0.3
0.5
4
0.1
0.2
0.3
0.5
5
0.1
0.2
0.3
0.5
6
0.1
0.2
0.3
0.5
7
0.1
0.2
0.3
0.5
8
0.1
0.2
0.3
0.5
Singleton
RMSE
0.0975
0.0984
0.1006
0.1158
Gaussian
RMSE
0.0974
0.0984
0.1006
0.1143
0.0975
0.0998
0.1079
0.1552
0.0975
0.0998
0.1076
0.1486
0.0991
0.1052
0.1140
0.1365
0.0991
0.1052
0.1140
0.1354
0.0982
0.1027
0.1106
0.1336
0.0982
0.1027
0.1106
0.1330
0.0987
0.1028
0.1088
0.1266
0.0987
0.1030
0.1090
0.1263
0.0996
0.1076
0.1210
0.1627
0.0997
0.1080
0.1217
0.1629
0.0996
0.1075
0.1206
0.1601
0.0996
0.1075
0.1204
0.1556
0.0993
0.1053
0.1163
0.1475
0.0992
0.1053
0.1164
0.1447
271
=0.1
1
0.5
=0.2
0
2
1
=0.5
=0.7
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
1.5
0.5
0.5
1.5
0.5
0
2
1
0.5
0
2
1
0.5
0
2
1
=1
1.5
0.5
0
2
Singleton
RMSE
0.1082
0.1418
0.1916
0.3079
Gaussian
RMSE
0.1088
0.1421
0.1891
0.2954
5.5.4 Summary
This chapter has provided a few methods to generate membership
uncertainty:
incomplete and discrete information reasoning schema based on rough
fuzzy sets;
nonlinear tting, which draws a principal membership function and expands upper and lower membership functions over data partitioned by the
fuzzy C-means algorithm, and to forms, basing on three of this functions,
triangular secondaries (or interval, omitting the principal function);
multiperson decision making, which generates triangular secondary memberships;
generalized fuzzication performed either via possibility and necessity
measures or by fuzzy-rough sets.
272
273
approach for modeling membership uncertainties has given quite dierent results from the interval and the classical fuzzy approach as long as there were
signicant disagreement in experts designs. Since in this triangular approach
more information about the expert opinions have been used, it can be concluded that triangular-valued fuzzy logic systems are more reliable than the
interval and standard fuzzy logic systems as long as membership uncertainty
of particular rules is not uniform or not proportional. In summary, incorporating a principal fuzzy logic subsystem into an interval fuzzy classier
somehow guarantees an improved or at least not worsened performance of
the composed triangular-valued fuzzy system over its components.
In prediction and approximation, fuzzy-valued fuzzy systems can be compared with other classical fuzzy systems only considering their nal output
responses in terms of the root mean square error. It has been demonstrated
experimentally that this error for rough-fuzzy systems is usually lower than
the error of the basic systems for higher discretization intervals of inputs.
Also for greater values of standard deviation, the error rate of the possibilistic interval fuzzy systems is especially lower than the error of the singleton
and non-singleton systems. In the case of possibilistic fuzzication, interval
fuzzy systems perform better than singleton and non-singleton systems for
most of the fuzzied inputs; however, in several cases, singleton systems outperform slightly interval systems. Nevertheless, it can be generally found that
possibilistic interval fuzzy logic systems, if they do not have the best performance, are always close to the better accuracy of singleton and non-singleton
systems. In the case of fuzzy-rough approach to fuzzication, a triangularvalued fuzzy system usually outperforms both interval and singleton systems
when the corresponding interval rough fuzzy systems has better performance
than the singleton system. Otherwise, the performance of triangular-valued
system is only close to the singleton fuzzy system. A detailed study should be
devoted to the nature of this phenomenon. Gaussian-fuzzy-rough fuzzy systems either slightly outperform the singleton systems or their performance
is very similar. Only when all inputs are subject to Gaussian fuzzication,
eciency of Gaussian-valued fuzzy systems is even more evident.
Summarizing, all fuzzy-valued approaches studied in this chapter have the
ability to handle the uncertainty about the input features or the discrepancy about the membership independent designs. Moreover, the use of the
intermediate outputs (just before the nal defuzzication) could be a break
out in elaborating the real rst-sieve classication systems in such areas as
medical diagnosis, 3D face recognition, intelligent information retrieval or in
other cases when there is no real time regime, and the system can subject
some instances to an additional analysis. Systems using uncertain classication ranks and which the percentage of incorrect classications tends to
zero are more reliable than often misclassifying binary classiers. The initial
experimental results show the potential of general and interval fuzzy-valued
fuzzy logic systems and are especially promising in adjusting classiers to
zero misclassications.
References
Bartczuk, L
., Rutkowska, D.: Type-2 Fuzzy Decision Trees. In: Rutkowski, L.,
Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2008. LNCS (LNAI),
vol. 5097, pp. 197206. Springer, Heidelberg (2008)
Bartczuk, L
., Rutkowska, D.: Medical Diagnosis with Type-2 Fuzzy Decision Trees.
In: Kacki, E., Rudnicki, M., Stempczy
nska, J. (eds.) Computers in Medical Activity. Advances in Intelligent and Soft Computing (AISC 2009), vol. 65, pp.
1121. Springer, Heidelberg (2009)
Bartczuk, L
., Dziwi
nski, P., Starczewski, J.T.: New Method for Generation Type2 Fuzzy Partition for FDT. In: Rutkowski, L., Scherer, R., Tadeusiewicz, R.,
Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2010 Part-I. LNCS (LNAI), vol. 6113,
pp. 275280. Springer, Heidelberg (2010)
Bustince, H.: Indicator of inclusion grade for interval-valued fuzzy sets. application to approximate reasoning based on interval-valued fuzzy sets. International
Journal of Approximate Reasoning 23, 137209 (2000)
Castillo, O., Melin, P.: Type-2 fuzzy logic: theory and applications. Studies in
Fuzzines and Soft Computing, vol. 223. Springer (2008)
Castillo, O., Aguilar, L., Cazarez-Castro, N., Boucherit, M.: Application of type-2
fuzzy logic controller to an induction motor drive with seven-level diode-clamped
inverter and controlled infeed. Electrical Engineering 90(5), 347359 (2008)
Celikyilmaz, A., T
urksen, I.B.: A type 2 fuzzy c-regression method. In: Magdalena,
L., Ojeda-Aciego, M., Verdegay, J.L. (eds.) Proc. of IPMU 2008, Torremolinos
(Malaga), pp. 12901295 (2008)
Choi, B.I., Rhee, F.C.H.: Interval type-2 fuzzy membership function generation
methods for pattern recognition. Information Sciences 179, 21022122 (2009)
DELVE, Data for evaluating learning in valid experiments (2011),
http://www.cs.toronto.edu/delve/
Dorohonceanu, B.: Comparing fuzzy numbers, algorithm alley. Dr Dobbs Journal 343, 3845 (2002)
Dubois, D., Prade, H.: Fuzzy sets and systems: Theory and applications. Academic
Press, Inc., New York (1980)
Dziwi
nski, P., Rutkowska, D.: Algorithm for Generating Fuzzy Rules for WWW
Document Classication. In: Rutkowski, L., Tadeusiewicz, R., Zadeh, L.A.,
Zurada,
J.M. (eds.) ICAISC 2006. LNCS (LNAI), vol. 4029, pp. 11111119.
Springer, Heidelberg (2006)
References
275
Dziwi
nski, P., Rutkowska, D.: Ant Focused Crawling Algorithm. In: Rutkowski, L.,
Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2008. LNCS (LNAI),
vol. 5097, pp. 10181028. Springer, Heidelberg (2008)
Dziwi
nski, P., Starczewski, J.T., Bartczuk, L
.: New Linguistic Hedges in Construction of Interval Type-2 FLS. In: Rutkowski, L., Scherer, R., Tadeusiewicz, R.,
Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2010 Part-I. LNCS (LNAI), vol. 6114,
pp. 445450. Springer, Heidelberg (2010)
Fisher, R.: The use of multiple measurements in taxonomic problems. Annual Eugenics Part II (7), 179188 (1936)
Frank, A., Asuncion, A.: UCI machine learning repository (2010),
http://archive.ics.uci.edu/ml
Gorzalczany, M.B.: A method of inference in approximate reasoning based on
interval-valued fuzzy sets. Fuzzy Sets and Systems 21, 117 (1987)
Hagras, H.A.: A hierarchical type-2 fuzzy logic control architecture for autonomous
robots. IEEE Transactions on Fuzzy Systems 12(4), 524539 (2004)
Hirota, K., Pedrycz, W.: Matching fuzzy quantities. IEEE Transactions on Systems,
Man and Cybernetics 21(6), 908914 (1991)
Hwang, C., Rhee, F.C.H.: Uncertain fuzzy clustering: interval type-2 fuzzy approach
to c-means. IEEE Transactions on Fuzzy Systems 15, 107120 (2007)
Kacprzyk, J., Yager, R.: Linguistic summaries of data using fuzzy logic. Int. J. of
General Systems 30, 33154 (2001)
Kacprzyk, J., Zadrozny, S.: Linguistic database summaries and their protoforms:
toward natural language based knowledge discovery tools. Information Sciences 173, 281304 (2005)
Kacprzyk, J., Yager, R., Zadrozny, S.: A fuzzy logic based approach to linguistic
summaries of databases. Int. J. of Applied Mathematics and Computer Science 10, 813834 (2000)
Kacprzyk, J., Wilbik, A., Zadrozny, S.: Linguistic summaries of time series via a
quantier based aggregation using the sugeno integral. In: Proc. IEEE-FUZZ
2006, Vancouver, BC, pp. 36103616 (2006)
Karnik, N.N., Mendel, J.M.: Applications of type-2 fuzzy logic systems to forecasting of time series. Information Sciences 120, 98111 (1999)
Karnik, N.N., Mendel, J.M., Liang, Q.: Type-2 fuzzy logic systems. IEEE Transactions on Fuzzy Systems 7(6), 643658 (1999)
Klir, G.J., Yuan, B.: Fuzzy sets and fuzzy logic: Theory and applications. Prentice
Hall PTR, Upper Saddle River (1995)
Lawry, J.: An alternative to compuing with words. Int. J. of Uncertainty, Fuzziness
and Knowledge-Based Systems 9, 316 (2001)
Lawry, J., G. Shanahan, J., L. Ralescu, A. (eds.): Modelling with Words. LNCS,
vol. 2873. Springer, Heidelberg (2003)
Liu, F., Mendel, J.M.: Encoding words into interval type-2 fuzzy sets using an
interval approach. IEEE Transactions on Fuzzy Systems 16(6), 15031521 (2008)
Mangasarian, O., Wolberg, W.: Cancer diagnosis via linear programming. SIAM
News 23(5), 118 (1990)
Mendel, J.M.: Computing with words, when words can mean dierent things to
dierent people. In: Proceedings of the International ICSC Congress on Computational Intelligence Methods and Applications (1999)
Mendel, J.M.: Uncertain rule-based fuzzy logic systems: Introduction and new directions 2001. Prentice Hall PTR, Upper Saddle River (2001)
276
References
Mendel, J.M.: An architecture for making judgments using computing with words.
Int. J. Appl. Math. Comput. Sci. 12(3), 325335 (2002)
Mendel, J.M.: Computing with words and its relationships with fuzzistics. Information Sciences 177(4), 9881006 (2007a)
Mendel, J.M.: Computing with words: Zadeh, turing, popper and occam. IEEE
Computational Intelligence Magazine 2, 1017 (2007b)
Mitchell, H.: Pattern recognition using type-ii fuzzy sets. Information Sciences 170,
409418 (2005)
Mouzouris, G.C., Mendel, J.M.: Nonsingleton fuzzy logic systems: theory and application. IEEE Transactions on Fuzzy Systems 5(1), 5671 (1997)
Nakamura, A.: Fuzzy rough sets. Note on Multiple-Valued Logic in Japan 9(8), 18
(1988)
Nowicki, R.: On combining neuro-fuzzy architectures with the rough set theory to
solve classication problems with incomplete data. IEEE Trans. Knowl. Data
Eng. 20(9), 12391253 (2008)
Nowicki, R.: Rough-neuro-fuzzy structures for classication with missing data.
IEEE Trans. Syst. Man. Cybern B 39 (2009)
Ozkan, I., T
urksen, I.B.: Entropy assessment for type-2 fuzziness. In: Proc. FUZZIEEE, Budapest, vol. 2, pp. 11111115 (2004)
Ozkan, I., T
urksen, I.B.: Upper and lower values for the level of fuzziness in FCM.
Information Sciences 177, 51435152 (2007)
Rutkowska, D., Nowicki, R., Rutkowski, L.: Singleton and non-singleton fuzzy systems with nonparametric defuzzication. In: Computational Intelligence and Application, pp. 292301. Springer (1999)
Starczewski, J.T.: On Defuzzication of Interval Type-2 Fuzzy Sets. In: Rutkowski,
L., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) Articial Intelligence and
Soft Computing ICAISC 2008. LNCS (LNAI), vol. 5097, pp. 333340. Springer,
Heidelberg (2008)
Starczewski, J.T.: Ecient triangular type-2 fuzzy logic systems. International
Journal of Approximate Reasoning 50, 799811 (2009)
Starczewski, J.T., Scherer, R., Korytkowski, M., Nowicki, R.: Modular Type-2
Neuro-Fuzzy Systems. In: Wyrzykowski, R., Dongarra, J., Karczewski, K., Wasniewski, J. (eds.) PPAM 2007 Part-I. LNCS (LONAI), vol. 4967, pp. 570578.
Springer, Heidelberg (2008)
Starczewski, J.T., Bartczuk, L
., Dziwi
nski, P., Marvuglia, A.: Learning Methods for
Type-2 FLS Based on FCM. In: Rutkowski, L., Scherer, R., Tadeusiewicz, R.,
Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2010. LNCS, vol. 6113, pp. 224231.
Springer, Heidelberg (2010)
Sutherland, F.: Random house websters college thesaurus (1998)
Torres, P., Sez, D.: Type-2 fuzzy logic identication applied to the modeling of a
robot hand. In: Proc. FUZZ-IEEE 2008, Hong Kong (2008)
T
urksen, I.B.: Interval valued fuzzy sets based on normal forms. Fuzzy Sets and
Systems 20, 191210 (1986)
T
urksen, I.B., Resconi, G.: Fuzzy truthoods based on an additive semantic measure
with break of global symmetry in modal logic. Int. J. of Fuzzy Systems 8(1), 14
38 (2006)
Uncu, O., T
urksen, I.B.: Discrete interval type 2 fuzzy system models using uncertainty in learning parameters. IEEE Transactions on Fuzzy Systems 15(1),
90106 (2007)
References
277
Wang, L., Yen, J.: Extracting fuzzy rules for system modeling using a hybrid of genetic algorithms and kalman lter. Fuzzy Sets and Systems 101, 353362 (1999)
Wang, P. (ed.): Computing With Words. John Wiley & Sons, Inc., New York (2001)
Wu, D., Mendel, J.M.: Aggregation using the linguistic weighted average and interval type-2 fuzzy sets. IEEE Transactions on Fuzzy Systems 15(6), 11451161
(2007a)
Wu, D., Mendel, J.M.: Uncertainty measures for interval type-2 fuzzy sets. Information Sciences 177(23), 53785393 (2007b)
Wu, D., Mendel, J.M.: A vector similarity measure for linguistic approximation:
Interval type-2 and type-1 fuzzy sets. Information Sciences 178, 381402 (2008)
Zadeh, L.: Fuzzy logic = computing with words. IEEE Transactions on Fuzzy Systems 4, 103111 (1996)
Zadeh, L.: From computing with numbers to computing with wordsfrom manipulation of measurements to manipulation of perceptions. IEEE Trans. Circuits
SystI: Fundam Theory Appl. 4, 105119 (1999)
Zadeh, L., Kacprzyk, J. (eds.): Computing With Words in Information/Intelligent
Systems 1 & 2. Physica-Verlag, New York (1999)
Zadeh, L.A.: The concept of a linguistic variable and its application to approximate
reasoning I. Information Sciences 8, 199249 (1975)
Chapter 6
J.T. Starczewski: Advanced Concepts in Fuzzy Logic and Systems, STUDFUZZ 284, pp. 279304.
c Springer-Verlag Berlin Heidelberg 2013
springerlink.com
280
281
START:
BASIC FLS GIVEN
MEASUREMENT:
PERFORMANCE
ACCURACY
A1
Y
<<PARALLEL MODE>>
REDUCTION
OF CONSEQUENTS TO
SINGLETONS
N
N
POSSIBILISTIC
COMPUTATION
IS TRIANGULAR
BASIC FLS?
Y
FITTING TO UNCERTAINTY
IN MEMBERSHIPS
or
FUSION OF MULTIPLE
SYSTEM DESIGNS
WHAT TYPE OF
CORRUPTION
TRIANGULAR
OR GAUSSIAN
INTERVAL
ROUGH FUZZY
COMPUTATION
CASE OF:
TRIANGULAR CORRUPT. FUZZY ROUGH
COMPUTATION
MEASUREMENT:
PERFORMANCE
ACCURACY
A3
N
DIFFERENCE
IN ACCURACY A3 A2
ACCEPTABLE?
ORDER-REDUCTION TO
NON-UNCERTAIN FLS
CASE OF:
GAUSSIAN CORRUPT.
CONSTRUCTION
OF INTERVALVALUED FLS
MEASUREMENT:
PERFORMANCE
ACCURACY
A2interval
CONSTRUCTION
TO TRIANGULARVALUED FLS
CONSTRUCTION
TO (ASYMMETRIC) GAUSSIANVALUED FLS
MEASUREMENT:
PERFORMANCE
ACCURACY
A2fuzzyVal
MEASUREMENT:
PERFORMANCE
ACCURACY
A4
DIFFERENCE
IN ACCURACY A4 A3
ACCEPTABLE?
SELECTION OF SYSTEM
A2 = max (A2interval, A2fuzzyVal)
STOP
N
RECOVERY
OF PREVIOUS
SYSTEM STRUCTURE
282
fusion
of
multiple
designs
missing
corrupted
quotient
discretization
corrupted
adaptation
triangular
disturbance
Gaussian
disturbance
Object
283
284
(a)
1
1
L2
L1
This approximation of interval-valued fuzzy logic systems to their meanvalued counterparts is taken from [Starczewski 2009, 2008, 2004]. Consider
an interval-valued fuzzy logic system with all antecedents having uniform intervals of uncertainty, i.e., when the upper and lower membership functions
are almost entirely equidistant except the parts clipped by x axis, as it is
shown in Fig. 6.3. Let us denote the distance between the upper and the
lower membership functions at central points of the interval-valued fuzzy set
by , and refer to it as an interval of uncertainty.
Using singleton fuzzication, the minimum Cartesian product of antecedents leads to the lower ring grade dependent on the upper ring grade,
i.e.,
n
hk = min k,i ,
i=1
n
hk = min max 0, k,i
i=1
n
= max 0, min k,i
i=1
= max 0, hk .
(6.1)
(6.2)
(6.3)
(6.4)
285
k,i + k,i
2
(6.5)
or more precisely,
ki
k,i
k,i
2
if k,i (, 1]
if k,i (0, )
k,i
= max
, k,i
.
2
2
(6.6)
(6.7)
Finally, ring grades of the approximate fuzzy logic system can be calculated
as
n
k,i
, k,i )
(6.8)
hk = min max(
i=1
2
2
n k,i
n
= max min
, min k,i
(6.9)
i=1 2
i=1
2
1
hk , hk
.
(6.10)
= max
2
2
To begin with, let us assume the singleton form of consequents of the
interval-valued fuzzy logic system, i.e., singletons in the primary output domain and possibly interval in the secondary domain of memberships. Figure
6.4 presents nal output surfaces in the case of two interval-valued conclusions. Further, we assume that all consequents have the same intervals of
uncertainty as the antecedent have, and we use the minimum reasoning rule.
In the case of normal singletons also as the secondary membership functions, we can use any of t-norms in the reasoning process. In the sequel, we
compare the overall output of the interval-valued fuzzy logic system to the
approximate fuzzy system for various combinations of multiple red rules.
Note that singleton inputs may be projected on interval fuzzy antecedents
without clipping the lower membership function, which is depicted by line L1
in Fig. 6.3 (a) and is also true for all possible projections of the interval-valued
membership function of part (b) of this gure. The need of approximation
arises in handling clipped lower membership functions, which is indicated by
projection line L2 of subgure (a).
Single Fired Rule
In the case of a single red rule, both interval-valued fuzzy logic system and
its approximation give the same output values. Trivially,
286
yI =
1
(y1 + y1 ) = y1 = yA .
2
(6.11)
0.5
h2 = 1
0.45
0.4
0.35
0.3
0.25
0.2
0.15
0.1
0.05
0
0
0.2
0.4
0.6
h2
0.8
1
0.2
0.8
0.6
0.4
h1 = h1
(b)
(c)
0.6
0.5
0.5
h1 = 0, h2 = 1
0.4
h2 = 0
0.4
0.3
0.3
0.2
0.2
0.1
0.1
0
0
0
0.1
0
0.2
0.2
0.4
0.4
h2
0.2
0.4
0.6
0.6
0.8
1
0.2
0.4
0.8
0.6
h1
0.6
0.8
h1 = h1
0.8
1
h2
Fig. 6.4 Dierence between outputs of interval-valued fuzzy logic systems and
arithmetic mean approximate systems y1 = 0, y2 = 1
287
Lemma 6.1. If an interval-valued fuzzy logic system, with singleton consequents, and with reasoning and Cartesian product realized by the minimum
t-norm, has only two active rules with equal intervals between upper and lower
ring grades, i.e. hk hk = with k = 1, 2, the system is equivalent to the
ordinary fuzzy logic system with membership functions described by (6.5).
Proof. Since the both lower ring grades are positive, hk 0, the distance
between the upper and the lower ring grades is constant, i.e. hk hk = ,
k = 1, 2. Obviously, the output of the interval-valued fuzzy logic system is an
average of the bounds of the fuzzy centroid. Hence,
h1 y 1 + h2 y 2
1 h1 y1 + h2 y2
(6.12)
yI =
+
2
h1 + h2
h1 + h2
h1 2 y1 + h2 2 y2
= yA .
(6.13)
=
h1 2 + h2 2
It means that the interval-valued system produces the same output as its
approximation [Starczewski and Rutkowski 2002; Starczewski 2004]. This explains that both interval-valued and ordinary fuzzy approaches to reasoning
are equivalent as long as the uncertainty intervals of two active rules are
equal.
Two Fired Rules: One Interval of Uncertainty Clipped
Suppose that one of the interval ring grades is clipped by the projection L2
in Fig. 6.3 (a). Since 0 < h1 , the lower ring grades of the two subsystems
are h1 = 0 and h1 = h1 /2. Obviously, h2 . Consequently, the output of
the interval system can be evaluated as follows:
h1 y 1 + h2 y 2
1 0y1 + h2 y2
yI =
+
2
0 + h2
h1 + h2
h1
h2
1
=
y1 + 1 +
y2
(6.14)
2 h1 + h2
h1 + h2
and the ordinary system output is
yA =
h1
2 y 1 + h2
h1
2 + h2
y2
(6.15)
288
h1
0.8
0.7
h1
h2
0.6
0.5
0.4
= const
h1
h2
0.3
0.2
0.1
0
y1 ymin
yT 1
yT 2
h2
ymax
y2
Fig. 6.5 Outputs of the interval-valued and arithmetic mean approximation fuzzy
logic systems in case of uniform uncertainty of memberships; arithmetic mean membership grades indicated by *
e=
y1
2 h1 + h2
h1 + 2h2
1 h1 + 2h2 2
2h2
+
y2
2 h1 + h2
h1 + 2h2
h1 h1
(y2 y1 ) .
=
2 h1 + h2 h1 + 2h2
(6.16)
(6.17)
e
,
y2 y1
h1 h1
.
=
2 h1 + h2 h1 + 2h2
(6.18)
(6.19)
The approximation error grows with h2 and has a minimum for h2 = , since
2
h1 h1
=
2
2 0
h2
2h2 + h1
2 h2 + h1
(6.20)
289
=
2 0
h1
h1 +
(6.22)
(3 ) h1 + 2 ( 2) ( 1) h1 ( 2) ( 1)
= 0.
2
2
2 h1 + 1
h1 + 2
,
h1 |h2 =1 =
3
(6.23)
(6.24)
h1 |h2 =1
= 0.214 42, and
|h2 =1
h1 h1
=
2 h1 + 1 h1 + 2
= 0.06 707 7.
(6.25)
This situation for = 0.5 is illustrated in Fig. 6.6. It can be observed that
the absolute error reaches 0.025255 at h1
= 0.1899. The level of this error
reinforces our belief that under such working conditions the interval-valued
approach to reasoning is approximately the same applicable as ordinary fuzzy
logic systems.
Two Fired Rules: Two Intervals of Uncertainty Clipped
If the interval ring grades of both rules are clipped, i.e., 0 < h2 , 0 <
h1 , then h2 = h1 = 0, h2 = h2 /2 and h1 = h1 /2. Hence, the output of
the interval system is expressed by
h2 y 2
1 h1 y 1
1
yI =
+
(6.26)
= (y1 + y2 ) .
2
2
h1
h2
290
0.5
yI , yA
= const
y1
y2
(b)
1
0.8
0.6
0
0.2
0.4
0.6
0.8
0.6
0.8
(c)
h1
0.04
0.02
0
0.2
0.4
h1
Fig. 6.6 Artithmetic mean approximation in the case of two singletons with uniform intervals of uncertainty: (a) conclusions, (b) outputs of an interval-valued
fuzzy system (solid line) and of its approximation (dashed line) for h1 varying in
[0, 1], (c) corresponding approximation error
It is an interesting fact that output does not depend on the ring grades. It
is not the case of the approximated fuzzy logic system, which has the output
expressed by
h1 y 1
+ h22y2
h1 y 1 + h2 y 2
=
.
(6.27)
yA = 2
h1
h2
h1 + h2
+
2
e=
1 h1 h2
(y2 y1 ) ,
2 h1 + h2
(6.28)
(6.29)
(6.30)
1 h1 h2
.
2 h1 + h2
(6.31)
y2
0.5
yI , yA
0
1.5
291
= const
y1
0.5
(b)
0.5
y2
y3
0.5
1.5
y
0.5
1
0.5
0.5
1
h1
0.5
1
h1
(c)
0.1
0.05
0
1
0.5
Fig. 6.7 Artithmetic mean approximation in the case of three singletons with
uniform intervals of uncertainty: (a) conclusions, (b) outputs of an intervalvalued fuzzy system (solid line) and of its approximation (dashed line) for y2 varying
in [y1 , y3 ], (c) corresponding approximation error
The maximal approximation error can be observed, when h2 0. In consequence, 0.5. Note that (6.19) or (6.31) do not apply when membership
functions in the system are of the form presented in Fig. 6.3 (b).
Three Fired Rules
In order to nd some regularity in generalizing the previous results, we extend
the case of equal membership uncertainties to three singleton consequents, as
the exemplary ones shown in Fig. 6.7. With the dominant consequent y2 varying in the primary domain between y1 and y3 , the approximate fuzzy logic
system diers insignicantly in the output from the interval-valued fuzzy
system. The dierence increases as y2 tends to the singleton with more contrasting membership interval, that is to say y1 . Such contrasts should not
occur with further extension of these results to continuous output domain,
or to multiple singleton consequents in the absence of conicting rules. This
allows us to suppose that, in practise, the approximation error may be noticeable but should not be meaningful from the viewpoint of defuzzication.
292
(b)
e
0.4
0.35
0.35
h2 = 1
0.3
h2 = 1
0.3
0.25
0.25
0.2
0.2
0.15
0.15
0.1
0.1
0.05
0.05
0
0
0.2
1
0.4
0.8
0.6
0.6
h2
0.4
0.8
0.2
1
h1 = h1
0
0
0.8
0.6
0.2
0.4
h2
0.4
0.6
0.2
0.8
1
h1 = h1
Fig. 6.8 Dierence between outputs of interval-valued fuzzy systems with two
red interval consequents and the arithmetic mean systems: (a) y1 [1, 1] and
y2 [2, 2.5], (b) y1 [1.5, 1] and y2 [0, 2]
293
(a)
1
h1
0.5
= const
yI , yA
0
1.5
0.5
0
(b)
0.5
y1.5
0.5
0.2
0.4
0.6
0.8
h1 1
0.6
0.8
h1 1
(c)
0.1
0.05
0
0.2
0.4
Fig. 6.9 Artithmetic mean approximation in the case of two singletons with uniform intervals of uncertainty = 0.5: (a) conclusions, (b) outputs of an
interval-valued fuzzy system (solid line) and of its approximation (dashed line) for
h1 varying in [0, 1], (c) corresponding approximation error
(a)
(b)
(c)
=0.2
0.5
0.5
0
0
0.2
0.4
0.6
0.5
0.8
=0.5
=0.9
0.5
0.5
0.5
0
0
0.2
0.4
0.6
0.5
0.8
0.5
0
0
0.2
0.4
0.6
0.5
0.8
Fig. 6.10 ([Starczewski 2009]) Error of the arithmetic mean approximation for
equal intervals of uncertainty: (a) = 0.2, (b) = 0.5, (c) = 0.9
294
membership uncertainties, which occur in an interval-valued fuzzy logic system trained in any way, inclines to believe that this system can be reduced
to the approximate counterpart based on ordinary fuzzy sets.
Conclusion
Generally, if the dominant rule (with upper ring grade tending to 1) is characterized by a wide interval of its membership uncertainty, then less activated rules (but with upper ring grades greater than the lower ring grades
of the dominant rule) signicantly aect the overall (crisp) output of the
interval-valued fuzzy logic system. Otherwise, if dominant rules are activated
by precise ring grades with almost no membership uncertainty, the crisp
output of a interval-valued fuzzy system is very close to an approximating
fuzzy system. Intuitively, it is logical that if a conclusion is dominant but
not certain and there are no alternatives, then this conclusion is a reliable
answer of the considered system. On the contrary, if, apart from an uncertain
dominant conclusion, there is an other subordinate but certain conclusion,
then the latter should have a comparable impact on the output.
6.2.1.2
(6.32)
n
?
i=1
n
?
i=1
k,i ,
ak,i = an
(6.33)
n
?
k,i = hk .
(6.34)
295
Fig. 6.11 Geometric mean approximation of an antecedent with proportional upper and lower membership functions
(6.35)
k,i = k,i k,i = ak,i .
Exemplary upper and lower membership functions and their geometric mean
function are shown in Fig. 6.11. Accordingly, ring grades of the geometric
mean approximate fuzzy logic system are in the form
hk =
=
n
?
i=1
n
?
k,i
n
n?
ak,i = a
k,i
i=1
(6.36)
hk .
(6.37)
i=1
(6.38)
296
1 h1 y1 + h2 y2
h1 y1 + h2 y2
ymin + ymax
=
+
(6.39)
2
2
h1 + h2
h1 + h2
1
h1 y 1
h2 y 2
1
=
+
+
+
.
2
2
h1 + h2
h1 + h2
h1 + h2
h1 + h2
(6.40)
yI =
h1 y1 + h2 y2
=
h1 + h2
yA =
h1 y 1 + h2 y 2
.
h1 + h2
(6.41)
(6.42)
(6.43)
Therefore, the dierence between the interval-valued fuzzy system and its
approximation system is
e = yI yA
1
h1 y 1
h2 y 2
1
=
+
+
+
2
2
h1 + h2
h1 + h2
h1 + h2
h1 + h2
h1 y 1 + h2 y 2
(6.44)
h1 + h2
2 1 2 h2 h1 h1 h2
(y2 y1 ) .
(6.45)
=
2 h1 + h2 h1 + h2 h1 + h2
Thus, the relative approximate error presents in the closed form
2 1 2 h2 h1 h1 h2
.
=
2 h1 + h2 h1 + h2 h1 + h2
(6.46)
The error reaches its maximum for the minimal proportionality factor , i.e.,
2 1 2 h2 h1 h1 h2
lim = lim
(6.47)
0
0 2 h1 + h2
h1 + h2 h1 + h2
h2 h1 h1 h2
2 1 2
lim
=
(6.48)
2
2
0
2 h1 + h2
h1 + h1 h2 + 2 h1 h2 + h2
h2 h1 h1 h2 (1)
=
(6.49)
2 h1 + h2
h1 h2
=
h1 h2
.
2 h1 + h2
(6.50)
297
(b)
=0.0001
(c)
=0.2
0.5
(d)
=0.5
0.2
=0.9
0.1
0.015
0.01
0.1
0.05
0.005
0
0.005
0.1
0.05
0.01
0.5
0
0
0.2
0.4
0.6
0.5
0.8
0.2
0
0
0.2
0.4
0.6
0.5
0.8
0.1
0
0
0.2
0.4
0.6
0.5
0.8
0.015
0
0
0.2
0.4
0.6
0.5
0.8
Fig. 6.12 Error of the geometric mean approximation for proportional intervals
of uncertainty: (a) = 0.0001, (b) = 0.2, (c) = 0.5, (d) = 0.9
2 2
2 2
(6.52)
298
0.5
yI , yA
k = phk
y1
y2
(b)
1
0.8
0.6
0
0.2
0.4
0.6
0.8
0.6
0.8
h1
(c)
0.04
0.02
0
0.2
0.4
h1
Fig. 6.13 Geometric mean approximation in the case of two singletons with proportional intervals of uncertainty ( = 0.5): (a) conclusions, (b) outputs of
an interval-valued fuzzy system (solid line) and of its approximation (dashed line)
for h1 varying in (0, 1], (c) corresponding approximation error
(a)
1
h1
0.5
k = phk
yI , yA
0
1.5
0.5
0
(b)
0.5
y1.5
0.5
0.2
0.4
0.6
0.8
h1 1
0.6
0.8
h1 1
(c)
0.1
0.05
0
0.2
0.4
299
(a)
1
h2 = 1
h1 > h2 = 0
y1
yI , yA
= const
h1
0.5
y2
(b)
0.5
0
0.2
0.4
0.6
0.8
0.6
0.8
(c)
h1
0.5
0.2
0.4
h1
One of these specic cases, presented in Fig. 6.15 (a), is when the two singleton consequents are red. The membership
uncertainty of y2 stretches
throughout the whole unit interval, i.e. h2 , h2 [0, 1], while the upper
membership h1 varies up to 1 with h1 clipped by y axis. Obviously, the interval defuzzication leads directly to 0.5 value independently of h1 , while
an ordinary fuzzy logic system with average membership functions gives the
output in the range (0.5, 1] as long as h1 > 0. These output waveforms and
the arithmetic mean approximation error are plotted in Fig. 6.15.
300
0.5
yI , yA
1 = 0, 2 = 1
y1
y2
(b)
0.5
0
0.2
0.4
0.6
0.8
0.6
0.8
(c)
h1 1
0.5
0.2
0.4
h1
Fig. 6.16 Arithmetic mean approximation in the case of one precise consequent
Another specic situation occurs when the less red consequent has crispvalued membership function, while the other ranges in the whole unit interval,
as it is illustrated in Fig. 6.16. Similarly to the previous case, the interval
output is less than 0.5 when h1 = h1 are small enough but greater than h2 ,
and the arithmetic mean approximate output ranges from 0.5 asymptotically
to the interval output.
This indicates situations when interval-valued fuzzy logic systems have
no possibility of successful approximation by ordinary fuzzy logic systems.
Speaking generally, the situation when some rules are much more certain
than others is the technical rationale for using interval-valued logic. This
happens because if the dominant rule is characterized by a wide interval
membership uncertainty then less activated rules with upper memberships
greater than lower memberships of the dominant rule signicantly mark its
presence in the crisp output of the interval-valued fuzzy logic system. It
seems to be reasonable that if a conclusion is signicant but not certain and
there is no alternative then this conclusion is a reliable answer of the system,
otherwise, if apart from the uncertain signicant conclusion there is an other
less signicant but certain conclusion then the latter has comparable inuence
on the output.
However, if h2 , h2 extends to some tight interval rather than to the unit
interval, the situation is no more specic and both interval-valued and arithmetic mean approximate fuzzy systems give similar responses (see Fig. 6.17).
301
(a)
1
h1 = h1
0.5
0
1 = 0, 2 = 0.5
y1
y2
(b)
yI , yA
0.5
0
0.2
0.4
0.6
0.8
0.6
0.8
(c)
h1
0.02
0.01
0
0.2
0.4
h1 1
6.2.2.2
It can be expected that the most distinct situation when the type-reduction
is not close
type-1 defuzzication is when the membership uncertainty
to the
of y2 is h2 , h2 [0, 1] and the upper membership h1 varies in (h2 , 1]. In
Fig. 6.18, it can be seen that type-1 defuzzication gives the result varying in
[0, 0.7] while the KM type-reduction algorithm gives 0 independently of h1 .
Conclusion
On the one hand, the convergence of interval-valued fuzzy systems to approximate fuzzy systems invalidates a fuzzy-valued approach in many real
application tasks. On the other hand, the type of problems, the interval-valued
fuzzy logic can be addressed, is restricted to the problems requiring neither
uniform and wide nor proportional intervals of membership uncertainty. By
reason of that, it is still hard to verify wether a real problem requires fuzzy
rules to be diversied strongly in their intervals of memberships.
302
h1
0.5
h1 > h2 = 0
1
0.5
0
(b)
0.5
y1.5
yI , yA
0
1.5
h2 = 1
0.6
0.4
0.2
0
0.2
0.2
0.4
0.6
0.8
h1 1
0.6
0.8
h1 1
(c)
1
0.5
0
0.2
0.4
6.3 Summary
Usually, it is assumed that all disturbances of data have a stochastic character. The most popular is additive white noise with Gaussian distribution.
However, in real-world situations, we meet other forms of disturbance. First,
the values of a disturbance need not to be statistically independent. Second, the distribution of values is not necessarily Gaussian due to the central
limit theorem. The problem is that, in real world, all disturbances always
are bounded. For example, in business decision making and management,
the triangular distribution is frequently used, especially when not much is
known about the distribution of an outcome, i.e., with smallest, largest and
the most likely values of the disturbance. However, the theory of probability
implies that even if the probability density function is bounded, the random
variable generated according to this distribution need not be bounded. As
a consequence the possibilistic theory, fuzzy logic and rough sets are more
appropriate for capturing such kinds of uncertainty of data.
Consequently, corrupted data given to a conventional fuzzy system can be
processed by rough-fuzzy sets, possibility and necessity measures, and fuzzyrough sets besides the usual fuzzy sets. Rough-fuzzy sets are used to retune a
system from continuous to discrete or incomplete data. From all the methods
studied in Chapt. 5, fuzzy-rough sets, used in fuzzication, allow a fuzzy
system to obtain the highest reliability in terms of minimizing the occurrences
of misclassication. However, not always such approach is protable regarding
the classication rate interval-valued fuzzy logic systems generated by the
6.3 Summary
303
References
Birkin, P.A.S., Garibaldi, J.M.: A comparison of type-1 and type-2 fuzzy controllers
in a micro-robot context. In: FUZZ-IEEE, pp. 18571862 (2009)
Starczewski, J., Rutkowski, L.: Neuro-fuzzy systems of type 2. In: Proc. 1st Intl
Conf. on Fuzzy Systems and Knowledge Discovery, Singapore, vol. 2, pp. 458462
(2002)
Starczewski, J.T.: What Diers Interval type-2 FLS From Type-1 FLS? In:
Rutkowski, L., Siekmann, J.H., Tadeusiewicz, R., Zadeh, L.A. (eds.) ICAISC
2004. LNCS (LNAI), vol. 3070, pp. 381387. Springer, Heidelberg (2004)
Starczewski, J.T.: On Defuzzication of Interval Type-2 Fuzzy Sets. In: Rutkowski,
L., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2008. LNCS
(LNAI), vol. 5097, pp. 333340. Springer, Heidelberg (2008)
Starczewski, J.T.: A type-1 Approximation of Interval Type-2 FLS. In: Di Ges`
u,
V., Pal, S.K., Petrosino, A. (eds.) WILF 2009. LNCS (LNAI), vol. 5571, pp.
287294. Springer, Heidelberg (2009)
Tao, C.W., Taur, J.S., Chuang, C.C., Chang, C.W., Chang, Y.H.: An approximation of interval type-2 fuzzy controllers using fuzzy ratio switching type-1 fuzzy
controllers. IEEE Transactions on Systems, Man, and Cybernetics, Part B 41(3),
828839 (2011)
Wu, D., Mendel, J.M.: Aggregation using the linguistic weighted average and interval type-2 fuzzy sets. IEEE Transactions on Fuzzy Systems 15(6), 11451161
(2007)
Index
-cut 2, 5
-cut decomposition
algebraic operations
on fuzzy-valued fuzzy sets 36
on interval-valued fuzzy sets 35
ambiguity 27, 282
centroid of an interval-valued fuzzy set
80
complement
of a fuzzy set 6
computing with words 189
conditional 8
conjunction 7, 8, 17, 140, 142, 146,
159, 161, 162
continuity 27
decoder of a rule 193
defuzzication 91
of an interval-valued fuzzy set
nal 81
in classication 82
of interval-valued sets
collapsing method 86
degree of intesity 189
dilution grade 189
discretization 212
disjunction 7, 8, 17
encoder of a rule 189
entrywise matrix division 141
Euler-Poisson integral 128
extended centroid
306
Index
non-singleton 149
of type-2 145
trapezoidal-valued 173174
triangular-valued 171172
uncertain 148178
fuzzy set 1
convex 2
normal 2
fuzzy truth interval 10, 13, 36
fuzzy truth number 10, 36
fuzzy truth value 10, 36, 67
fuzzy-rough set
as possibility and necessity of a fuzzy
set 25
fuzzy approximation of a fuzzy set
22
of Dubois and Prade 25
of Nakamura 22
Gauss error function 129
gradual predicates 27
Hadamard matrix division
implication 8
fuzzy 145, 147, 159, 161, 162
d-implication 140
on fuzzy truth values 75
ql-implication 8, 140
r-implication 8, 140
s-implication 8, 140
intersection
of fuzzy sets 4
interval-valued approximate reasoning
142
Karnik&Mendel Iterative Procedure
81
kernel of a fuzzy set 2
lack of knowledge 27
limited perception 27
linguistic ranking 194
many-valued logic 27
membership function
upper semicontinuous 3
membership uncertainty tting
212
missing inputs 212
203,
141
186203
Index
drastic product 6, 4950, 60, 73
extended 3368
L
ukasiewicz 5358
algebraic product 51
analytical formula 58
approximate 6166
approximate Gaussian n-ary
operation 176
minimum 6
nilpotent 7, 54, 56, 58, 61
of type-2 (on fuzzy truth values) 67
307
on fuzzy truth values 6771
strict 7, 47, 54, 56, 60, 61, 73
type-2 fuzzy set 27
type-reduction
-planes strategy 89
uncertainty bounds 84
union
of fuzzy sets 4, 5
upper pseudo-inverse
vagueness
4, 45, 46, 50